期刊文献+
共找到4,080篇文章
< 1 2 204 >
每页显示 20 50 100
Context-Aware Service IVlodes in the Cloud Computing Environment 被引量:3
1
作者 Pan Yu Luo Lijuan +1 位作者 Gao Li Lv Tingjie 《China Communications》 SCIE CSCD 2012年第2期86-95,共10页
This paper discussed the differences of context-aware service between the cloud computing environment and the traditional service system.Given the above differences,the paper subsequently analyzed the changes of conte... This paper discussed the differences of context-aware service between the cloud computing environment and the traditional service system.Given the above differences,the paper subsequently analyzed the changes of context-aware service during preparation,organization and delivery,as well as the resulting changes in service acceptance of consumers.Because of these changes,the context-aware service modes in the cloud computing environment change are intelligent,immersive,highly interactive,and real-time.According to active and responded service,and authorization and non-authorized service,the paper drew a case diagram of context-aware service in Unified Modeling Language(UML) and established four categories of context-aware service modes. 展开更多
关键词 cloud computing context-aware service service mode
在线阅读 下载PDF
Context-aware computing-based reducing cost of service method in resource discovery and interaction
2
作者 唐善成 《Journal of Chongqing University》 CAS 2004年第2期58-62,共5页
Reducing cost of service is an important goal for resource discovery and interaction technologies. The shortcomings of transhipment-method and hibernation-method are to increase holistic cost of service and to slower ... Reducing cost of service is an important goal for resource discovery and interaction technologies. The shortcomings of transhipment-method and hibernation-method are to increase holistic cost of service and to slower resource discovery respectively. To overcome these shortcomings, a context-aware computing-based method is developed. This method, firstly, analyzes the courses of devices using resource discovery and interaction technologies to identify some types of context related to reducing cost of service, then, chooses effective methods such as stopping broadcast and hibernation to reduce cost of service according to information supplied by the context but not the transhipment-method’s simple hibernations. The results of experiments indicate that under the worst condition this method overcomes the shortcomings of transhipment-method, makes the “poor” devices hibernate longer than hibernation-method to reduce cost of service more effectively, and discovers resources faster than hibernation-method; under the best condition it is far better than hibernation-method in all aspects. 展开更多
关键词 reducing cost of service context-aware computing resource discovery and interaction pervasive computing
在线阅读 下载PDF
A Method to Implement Full Anonymous Attestation for Trusted Computing Platform 被引量:3
3
作者 HAO Liming SUN Xun YANG Shutang LU Songnian 《Wuhan University Journal of Natural Sciences》 CAS 2007年第1期101-104,共4页
Trusted computing (TC) technology is brought out by trusted computing group (TCG) to make computing as safe and reliable as people expect. Attestation is one main function specified by TCG, which is the means by w... Trusted computing (TC) technology is brought out by trusted computing group (TCG) to make computing as safe and reliable as people expect. Attestation is one main function specified by TCG, which is the means by which a trusted computer assures a remote computer whose platform is not tampered with. There are two protocols that implement attestation without disclosing the platform's real identity, which are Privacy CA-based protocol and direct anonymous attestation (DAA) protocol. However, in the first protocol the privacy CA is the bottleneck and the platform's identity will be disclosed if the privacy CA is compromise, while DAA protocol can do profiling when dealing with rogue hardware device. In this paper, we propose a DAA-extended new approach to ensure full anonymous attestation that can not only detect a rogue TPM, but also reveal rogue TPM's real identity. 展开更多
关键词 trusted computing trusted platform module direct anonymous attestation
在线阅读 下载PDF
The Mechanism about Key and Credential on Trusted Computing Platform and the Application Study 被引量:2
4
作者 SHEN Zhidong ZHANG Huanguo ZHANG Miao YAN Fei ZHANG Liqiang 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1641-1644,共4页
Trusted Computing technology is quickly developing in recent years. This technology manages to improve the computer security and archive a trusted computing environment. The core of trusted computing technology is cry... Trusted Computing technology is quickly developing in recent years. This technology manages to improve the computer security and archive a trusted computing environment. The core of trusted computing technology is cryptology. In this paper, we analyze the key and credential mechanism which is two basic aspects in the cryptology application of trusted computing. We give an example application to illustrate that the TPM enabled key and credential mechanism can improve the security of computer system. 展开更多
关键词 trusted computing trusted platform module (TPM) key management CREDENTIAL
在线阅读 下载PDF
Merkle Tree Digital Signature and Trusted Computing Platform 被引量:1
5
作者 WANG Xiaofei HONG Fan TANG Xueming CUI Guohua 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1467-1472,共6页
Lack of efficiency in the initial key generation process is a serious shortcoming of Merkle tree signature scheme with a large number of possible signatures. Based on two kinds of Merkle trees, a new tree type signatu... Lack of efficiency in the initial key generation process is a serious shortcoming of Merkle tree signature scheme with a large number of possible signatures. Based on two kinds of Merkle trees, a new tree type signature scheme is constructed, and it is provably existentially unforgeable under adaptive chosen message attack. By decentralizing the initial key generation process of the original scheme within the signature process, a large Merkle tree with 6.87×10^10 possible signatures can be initialized in 590 milliseconds. Storing some small Merkle trees in hard disk and memory can speed up Merkle tree signature scheme. Mekle tree signature schemes are fit for trusted computing platform in most scenarios. 展开更多
关键词 digital signature one-time signature Merkle tree trusted computing platform
在线阅读 下载PDF
Analysis on medication rule of traditional Chinese medicine treating chemotherapy-induced diarrhea based on traditional Chinese medicine(TCM) inheritance computing platform system 被引量:1
6
作者 Yu Gao Shao-Bo Hu +2 位作者 Chao Deng Fei Su Li-Qun Jia 《Journal of Hainan Medical University》 2022年第7期65-70,共6页
Objective:To dig deeper into the traditional Chinese medicine treatment rules of chemotherapy-induced diarrhea with traditional Chinese medicine(TCM)inheritance computing platform system.Methods:Taking“traditional Ch... Objective:To dig deeper into the traditional Chinese medicine treatment rules of chemotherapy-induced diarrhea with traditional Chinese medicine(TCM)inheritance computing platform system.Methods:Taking“traditional Chinese medicine”,“chemotherapy”and“diarrhea”as the theme words,comprehensive search of the database of CNKI,Wanfang and VIP from its inception to November 2020 was conduct-ed.The formulas of external treatment of traditional Chinese medicine for chemotherapy-induced diarrhea were included and the association rule,clustering and factor analysis were carried out.Results:A total of 145 papers,57 prescriptions meeting the inclusion criteria were collected,among which high-frequency drugs including Baizhu(Atractylodis macrocephalae rhizoma),Fuling(Poria),Dangshen(Codonopsisradix),Huanglian(Coptidis rhizoma),Zhigancao(Glycyrrhizae radix et rhizoma praeparata cum melle)were the most commonly used.The confidence level was set as 0.7 and the support level was set as 10,12 core compatibility groups were obtained,and 6 categories were cluster analyzed.Conclusion:The principle of external treatment of chemotherapy-induced diarrhea is mainly“restore deficiency and benefiting qi”,“benefiting water infiltration and dampness”,“clearing heat”and“inducing astringency”.Prescription combination and new prescription combination based on traditional Chinese medicine(TCM)inheritance computing platform system can be used as reference for clinicians and applied in primary hospitals. 展开更多
关键词 Chemotherapy induced diarrhea Traditional Chinese medicine Medication regulation Data mining Traditional Chinese medicine(TCM) inheritance computing platform SYSTEM
暂未订购
ERP Virtual Simulation Experiment Teaching Platform based on UFIDA Cloud Computing
7
作者 Weibo Huang Qiuyi Chen 《教育研究前沿(中英文版)》 2020年第4期262-265,共4页
Economic Management Professional Academic Education are increasingly becoming personalization,intelligence and application.Colleges and universities should actively use cloud computing and big data.Also Internet of Th... Economic Management Professional Academic Education are increasingly becoming personalization,intelligence and application.Colleges and universities should actively use cloud computing and big data.Also Internet of Things and other advanced information technologies to build an economics and management ERP virtual simulation experiment teaching platform.Cloud computing and big data,virtual simulation experiment teaching resources with"resource library+project library+enterprise management simulation sandbox training"as the core can build an online and offline collaborative and practical experiment teaching platform.It is expected to achieve the ideal effect of integration of three spaces.Such as physics and resources and social digital teaching.Moreover,it can also benefit human-computer collaboration and interactive teaching and inquiry learning. 展开更多
关键词 Cloud computing ERP Virtual Simulation Experimental Teaching platform
在线阅读 下载PDF
Web-Based Computing and Property Database Portlet by Using HPC Portal Development Platform
8
作者 Chien-Heng Wu 《通讯和计算机(中英文版)》 2011年第12期1023-1032,共10页
关键词 开发平台 性能计算 PORTLET HPC Web 属性数据库 门户 企业应用程序
在线阅读 下载PDF
Study of Smart Grid Marketing System Architecture Based on Hadoop Platform of Cloud Computing
9
作者 Yu Song Maomao Wu Li Yang 《通讯和计算机(中英文版)》 2012年第7期741-743,共3页
关键词 营销系统 架构 平台 电网 智能 计算 电力营销 共享存储
在线阅读 下载PDF
An Improved Grid Security Infrastructure by Trusted Computing 被引量:3
10
作者 YAN Fei ZHANG Huanguo +3 位作者 SUN Qi SHEN Zhidong ZHANG Liqiang QIANG Weizhong 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1805-1808,共4页
Current delegation mechanism of grid security infrastructure (GSI) can't satisfy the requirement of dynamic, distributed and practical security in grid virtual organization. To improve this situation, a TC-enabled ... Current delegation mechanism of grid security infrastructure (GSI) can't satisfy the requirement of dynamic, distributed and practical security in grid virtual organization. To improve this situation, a TC-enabled GSI is discussed in this paper. With TC-enabled GSI, a practical delegation solution is proposed in this paper through enforcing fine granularity policy over distributed platforms with the emerging trusted computing technologies. Here trusted platform module is treated as a tamper-resistance module to improve grid security infrastructure. With the implement of Project Daonity, it is demonstrated that the solution could gain dynamic and distributed security in grid environment. 展开更多
关键词 trusted computing grid computing grid security trusted platform module
在线阅读 下载PDF
Context-aware smart car: from model to prototype 被引量:4
11
作者 Jie SUN Zhao-hui WU Gang PAN 《Journal of Zhejiang University-Science A(Applied Physics & Engineering)》 SCIE EI CAS CSCD 2009年第7期1049-1059,共11页
Smart cars are promising application domain for ubiquitous computing. Context-awareness is the key feature of a smart car for safer and easier driving. Despite many industrial innovations and academic progresses have ... Smart cars are promising application domain for ubiquitous computing. Context-awareness is the key feature of a smart car for safer and easier driving. Despite many industrial innovations and academic progresses have been made, we find a lack of fully context-aware smart cars. This study presents a general architecture of smart cars from the viewpoint of context- awareness. A hierarchical context model is proposed for description of the complex driving environment. A smart car prototype including software platform and hardware infrastructures is built to provide the running environment for the context model and applications. Two performance metrics were evaluated: accuracy of the context situation recognition and efficiency of the smart car. The whole response time of context situation recognition is nearly 1.4 s for one person, which is acceptable for non-time critical applications in a smart car. 展开更多
关键词 Smart car Intelligent vehicle context-aware Ubiquitous computing
原文传递
Modeling Trusted Computing 被引量:3
12
作者 CHEN Shuyi WEN Yingyou ZHAO Hong 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1507-1510,共4页
In this paper, a formal approach based on predicate logic is proposed for representing and reasoning of trusted computing models. Predicates are defined to represent the characteristics of the objects and the relation... In this paper, a formal approach based on predicate logic is proposed for representing and reasoning of trusted computing models. Predicates are defined to represent the characteristics of the objects and the relationship among these objects in a trusted system according to trusted computing specifications. Inference rules of trusted relation are given too. With the semantics proposed, some trusted computing models are formalized and verified, which shows that Predicate calculus logic provides a general and effective method for modeling and reasoning trusted computing systems. 展开更多
关键词 trusted computing group (TCG) trusted platform module (TPM) trusted computing root of trust predicate logic
在线阅读 下载PDF
A Trusted Mobile Payment Environment Based on Trusted Computing and Virtualization Technology 被引量:2
13
作者 WANG Juan LIN Wutao +3 位作者 LI Haoyu DU Bianxia MENG Ke WANG Jiang 《Wuhan University Journal of Natural Sciences》 CAS 2014年第5期379-384,共6页
In this paper, we propose a trusted mobile payment environment (TMPE) based on trusted computing and virtualization technology. There are a normal operating system (OS) and a trusted OS (TOS) in TMPE. We store t... In this paper, we propose a trusted mobile payment environment (TMPE) based on trusted computing and virtualization technology. There are a normal operating system (OS) and a trusted OS (TOS) in TMPE. We store the image of TOS in a memory card to hinder tampering. The integrity of TOS is protected by means of a trusted platform module (TPM). TOS can only be updated through a trusted third party. In addition, virtualization technology is applied to isolate TOS from normal OS. Users complete ordinary affairs in normal OS and security-sensitive affairs in TOS. TMPE can offer users a highly protected environment for mobile payment. Moreover, TMPE has good compatibility in different hardware architectures of mobile platforms. As the evaluation shows, TMPE satisfies the requirement of mobile payment well. 展开更多
关键词 trusted computing mobile payment VIRTUALIZATION mobile platform
原文传递
Real-time hybrid simulation of structures equipped with viscoelastic-plastic dampers using a user-programmable computational platform 被引量:2
14
作者 Jack Wen Wei Guo Ali Ashasi-Sorkhabi +1 位作者 Oya Mercan Constantin Christopoulos 《Earthquake Engineering and Engineering Vibration》 SCIE EI CSCD 2017年第4期693-711,共19页
A user-programmable computational/control platform was developed at the University of Toronto that offers real-time hybrid simulation (RTHS) capabilities. The platform was verified previously using several linear ph... A user-programmable computational/control platform was developed at the University of Toronto that offers real-time hybrid simulation (RTHS) capabilities. The platform was verified previously using several linear physical substructures. The study presented in this paper is focused on further validating the RTHS platform using a nonlinear viscoelastic-plastic damper that has displacement, frequency and temperature-dependent properties. The validation study includes damper component characterization tests, as well as RTHS of a series of single-degree-of-freedom (SDOF) systems equipped with viscoelastic-plastic dampers that represent different structural designs. From the component characterization tests, it was found that for a wide range of excitation frequencies and friction slip loads, the tracking errors are comparable to the errors in RTHS of linear spring systems. The hybrid SDOF results are compared to an independently validated thermal- mechanical viscoelastic model to further validate the ability for the platform to test nonlinear systems. After the validation, as an application study, nonlinear SDOF hybrid tests were used to develop performance spectra to predict the response of structures equipped with damping systems that are more challenging to model analytically. The use of the experimental performance spectra is illustrated by comparing the predicted response to the hybrid test response of 2DOF systems equipped with viscoelastic-plastic dampers. 展开更多
关键词 real-time hybrid simulation user-programmable computational/control platform supplemental dampers performance spectra
在线阅读 下载PDF
An Engineering Computational Method of Calculating Wave Forces on the Mat and Platform's Sit-on-Bottom Stability 被引量:1
15
作者 Gu Jianming Pan Bin Postgraduate, Dept. of Naval Architecture and Ocean Engineering, Shanghai Jiao Tong University, Shanghai Lecturer, Dept. of Naval Architecture and Ocean Engineering, Shanghai Jiao Tong University, Shanghai 《China Ocean Engineering》 SCIE EI 1993年第1期117-124,共8页
- In this paper, an engineering method is employed to calculate the horizontal and vertical wave forces on the mat of the submersible platform under Froude-Krylov hypothesis. According to some model tests, appropriate... - In this paper, an engineering method is employed to calculate the horizontal and vertical wave forces on the mat of the submersible platform under Froude-Krylov hypothesis. According to some model tests, appropriate diffraction coefficients are selected. And the results of the formulae given in the paper agree satisfactorily with those experimental data now available. The proposed computational method is effective and convenient to use in evaluating the horizontal and vertical wave forces on the mat. An exmaple is also given in this paper. Finally, the effects of the vertical wave force on the platorm's sit-on-bottom stability are analyzed. 展开更多
关键词 submersible platform MAT wave force sit-on-bottom STABILITY computation
在线阅读 下载PDF
Cloud Computing as an Innovation in GIS &SDI: Methodologies, Services, Issues and Deployment Techniques 被引量:1
16
作者 Mohammad Naghavi 《Journal of Geographic Information System》 2012年第6期597-607,共11页
Cloud computing is one of the main issues of interest to the scientific community of the spatial data. A cloud is referred to computing infrastructure for a representation of network. From the perspective of providers... Cloud computing is one of the main issues of interest to the scientific community of the spatial data. A cloud is referred to computing infrastructure for a representation of network. From the perspective of providers, the main characteristics of cloud computing is being dynamic, high power in computing and storage. Also cloud computing is a cost benefit and effective way for representation of web-based spatial data and complex analysis. Furthermore, cloud computing is a way to facilitate distributed computing and store different data. One of the main features of cloud computing is ability in powerful computing and dynamic storage with an affordable expense and secure web. In this paper we further investigate the methodologies, services, issues and deployed techniques also, about situation of cloud computing in the past, present and future is probed and some issues concerning the security is expressed. Undoubtedly cloud computing is vital for spatial data infrastructure and consequently the cloud computing is able to expand the interactions for spatial data infrastructure in the future. 展开更多
关键词 Cloud computing Software AS a SERVICE platform AS a SERVICE Infrastructure-as-a-Service SERVICE Oriented Architecture (SOA)
在线阅读 下载PDF
Context-aware Workflow Model for Supporting Composite Workflows 被引量:1
17
作者 Jong-sun CHOI Jae-young CHOI Yong-yun CHO 《Journal of Measurement Science and Instrumentation》 CAS 2010年第2期161-165,共5页
In recent years, several researchers have applied workflow technologies for service automation on ubiquitous compating environments. However, most context-aware workflows do not offer a method to compose several workf... In recent years, several researchers have applied workflow technologies for service automation on ubiquitous compating environments. However, most context-aware workflows do not offer a method to compose several workflows in order to get mare large-scale or complicated workflow. They only provide a simple workflow model, not a composite workflow model. In this paper, the autorhs propose a context-aware workflow model to support composite workflows by expanding the patterns of the existing context-aware wrY:flows, which support the basic woddlow patterns. The suggested workflow model of. fers composite workflow patterns for a context-aware workflow, which consists of various flow patterns, such as simple, split, parallel flows, and subflow. With the suggested model, the model can easily reuse few of existing workflows to make a new workflow. As a result, it can save the development efforts and time of context-aware workflows and increase the workflow reusability. Therefore, the suggested model is expected to make it easy to develop applications related to context-aware workflow services on ubiquitous computing environments. 展开更多
关键词 ubiquitous computing context-aware workfiow workflow model multiple workflows
在线阅读 下载PDF
Transformation from computation independent model to platform independent model with pattern 被引量:1
18
作者 曹晓夏 缪淮扣 陈怡海 《Journal of Shanghai University(English Edition)》 CAS 2008年第6期515-523,共9页
Model driven architecture(MDA) is an evolutionary step in software development.Model transformation forms a key part of MDA.The transformation from computation independent model(CIM) to platform independent model(PIM)... Model driven architecture(MDA) is an evolutionary step in software development.Model transformation forms a key part of MDA.The transformation from computation independent model(CIM) to platform independent model(PIM) is the first step of the transformation.This paper proposes an approach for this transformation with pattern.In this approach, we take advantage of"reuse"from various standpoints.Feature model is used to describe the requirement of the application.This can help us bring"reuse"into effect at requirement level.Moreover we use pattern to transform CIM to PIM.This can help us bring"reuse"into effect at development level.Meanwhile, pattern was divided into four hierarchies.Different hierarchies of pattern are used to help us utilize reuse at different phase of development.From another standpoint, feature model describes the problem of a domain while pattern describe the problem across domains.This can help us reuse the element in and across domains.Finally, the detailed process of the transformation is given. 展开更多
关键词 model driven architecture (MDA) computation independent model (CIM) platform independent model (PIM) pattern architecture
在线阅读 下载PDF
Simplified Computation Method of Vibration Characteristics of Jacket Platforms
19
作者 Yang Shengtian Professor, Institute of Engineering Mechanics, State Seismological Bureau, Harbin 150080 《China Ocean Engineering》 SCIE EI 1995年第2期121-129,共9页
In this paper a simplified computation method of natural frequency of jacket platforms is given. Shear, bending and rotary inertia effects are considered in the equation, while the jacket shape, rotary inertia and cen... In this paper a simplified computation method of natural frequency of jacket platforms is given. Shear, bending and rotary inertia effects are considered in the equation, while the jacket shape, rotary inertia and centralized mass of the platform top are all determined by using a coefficient-revising method. 展开更多
关键词 natural vibration computation method jacket platform
在线阅读 下载PDF
Adaptive Service Selection Method in Mobile Cloud Computing
20
作者 Wu Qing Li Zhenbang +1 位作者 Yin Yuyu Zeng Hong 《China Communications》 SCIE CSCD 2012年第12期46-55,共10页
Despite the rapid advances in mobile technology, many constraints still prevent mobile devices from running resource-demanding applications in mobile environments. Cloud computing with flexibility, stability and scala... Despite the rapid advances in mobile technology, many constraints still prevent mobile devices from running resource-demanding applications in mobile environments. Cloud computing with flexibility, stability and scalability enables access to unlimited resources for mobile devices, so more studies have focused on cloud computingbased mobile services. Due to the stability of wireless networks, changes of Quality of Service (QoS) level and user' real-time preferences, it is becoming challenging to determine how to adaptively choose the "appropriate" service in mobile cloud computing environments. In this paper, we present an adaptive service selection method. This method first extracts user preferences from a service's evaluation and calculates the similarity of the service with the weighted Euclidean distance. Then, they are combined with user context data and the most suitable service is recommended to the user. In addition, we apply the fuzzy cognitive imps-based model to the adaptive policy, which improves the efficiency and performance of the algorithm. Finally, the experiment and simulation demonstrate that our approach is effective. 展开更多
关键词 mobile cloud computing service selection context-aware
在线阅读 下载PDF
上一页 1 2 204 下一页 到第
使用帮助 返回顶部