期刊文献+
共找到4,992篇文章
< 1 2 250 >
每页显示 20 50 100
Customer Joining Behavior and Regulation Strategy in Visible Multi-Server Queues with Synchronous Vacations of Partial Servers 被引量:1
1
作者 SUN Wei WANG Hao +1 位作者 XIE Xumeng LI Shiyong 《Journal of Systems Science & Complexity》 SCIE EI CSCD 2024年第3期1209-1232,共24页
This paper studies customer joining behavior and system regulation strategy in nonexhaustive visible M/M/m queues with synchronous vacations of a part of the servers.Once this part of the servers are idle,they take mu... This paper studies customer joining behavior and system regulation strategy in nonexhaustive visible M/M/m queues with synchronous vacations of a part of the servers.Once this part of the servers are idle,they take multiple vacations simultaneously(vacation period).Until there are customers waiting in the queue,they are reactivated and all servers are busy or idle(busy period).The authors call this part of the servers as“partial servers”.In view of the fully visible queue and the almost visible queue,the authors obtain customers’equilibrium joining threshold strategies and their socially optimal joining threshold strategies,respectively,and observe that customer joining behavior in equilibrium generally makes the system overcrowded,which makes the equilibrium social welfare lower than the optimal social welfare.After regulation,interestingly,for optimizing social welfare,the system manager hopes not only customers arriving in vacation period pay attention to the number of partial servers,but also customers arriving in busy period should care about it rather than ignore.Moreover,arranging more servers for vacation does not necessarily lead to the decrease of social welfare on condition that the number of partial servers is close to m.As for the information advantage of the fully visible case,it is not obvious for increasing social welfare and even unfavorable to servers’profit unless the number of partial servers is big enough.Furthermore,given the different composition of social welfare,there exists the optimal number of partial servers and the optimal arrival rate of customers for maximizing social welfare. 展开更多
关键词 Customer behavior non-exhaustive service partial servers regulation strategy synchronous vacations visible queue
原文传递
A Multi-server Queue in a Multi-phase Random Environment with Waiting Servers and Customers'Impatience Under Synchronous Working Vacation Policy
2
作者 Meriem Houalef Amina Angelika Bouchentouf Lahcene Yahiaoui 《Journal of the Operations Research Society of China》 EI CSCD 2023年第3期459-487,共29页
In this paper,we develop an M/M/c queueing system in a Markovian environment with waiting servers,balking and reneging,under both synchronous single and multiple working vacation policies.When the system is in operati... In this paper,we develop an M/M/c queueing system in a Markovian environment with waiting servers,balking and reneging,under both synchronous single and multiple working vacation policies.When the system is in operative phase j,j=1,K¯,customers are served one by one.Once the system is empty,the servers have to wait a random period of time before leaving,causing the system to move to vacation phase 0 at which new arrivals can be served at lower rate.Using the method of the probability generating functions,we establish the steady-state analysis of the system.Special cases of the queueing model are presented.Then,explicit expressions of the useful system characteristics are derived.In addition,a cost model is constructed to define the optimal values of service rates,simultaneously,to minimize the total expected cost per unit time via a quadratic fit search method.Numerical examples are provided to display the impact of different system characteristics. 展开更多
关键词 queueing models Random environment Working vacation policy Impatient customers Probability generating function Optimization
原文传递
Internet环境下“分布式智能决策支持系统生成器”Browser/Multi-Server结构的研究
3
作者 李宗岩 袁捷 汪盛 《计算机工程与应用》 CSCD 北大核心 2001年第15期115-117,125,共4页
针对当前的Internet环境,文章提出了一种新的分布式智能决策支持系统生成器的结构,并着重阐述了IDSSG的这种结构如何在Internet环境下实现。
关键词 INTERNET 分布式智能决策支持系统生成器 管理信系统 Browser/multi-server结构
在线阅读 下载PDF
Analysis and Improvement on a Hash-Based Authentication Scheme for Multi-Server Architecture 被引量:3
4
作者 LI Rui KANG Baoyuan MAI Kaiqiang 《Wuhan University Journal of Natural Sciences》 CAS CSCD 2021年第5期394-404,共11页
In order to meet people’s demand for various types of network services,researchers have conducted extensive research on authentication schemes for multi-server architecture.Although various schemes have been proposed... In order to meet people’s demand for various types of network services,researchers have conducted extensive research on authentication schemes for multi-server architecture.Although various schemes have been proposed,most of them still have safety defects and fail to meet safety requirements.Recently,Haq et al presented an efficient Hash-based authenticated key agreement scheme for multi-server scheme and claimed that their scheme can withstand all well-known attacks.However,we find that their scheme is vulnerable to replay attack,tracking attack and malicious server impersonation user attack.Then we propose an improved scheme.We also analyze the security of the improved scheme and compare with Haq et al’s scheme in security and computational efficiency.Furthermore,we use the AVISPA(Automated Validation of Internet Security Protocols and Applications)tool to verify the security of the improved scheme. 展开更多
关键词 multi-server architecture AUTHENTICATION SECURITY one-way hash function AVISPA
原文传递
A Secure Three-Factor Authenticated Key Agreement Scheme for Multi-Server Environment 被引量:2
5
作者 Meichen Xia Shiliang Li Liu Liu 《Computers, Materials & Continua》 SCIE EI 2020年第9期1673-1689,共17页
Multi-server authenticated key agreement schemes have attracted great attention to both academia and industry in recent years.However,traditional authenticated key agreement schemes in the single-server environment ar... Multi-server authenticated key agreement schemes have attracted great attention to both academia and industry in recent years.However,traditional authenticated key agreement schemes in the single-server environment are not suitable for the multi-server environment because the user has to register on each server when he/she wishes to log in various servers for different service.Moreover,it is unreasonable to consider all servers are trusted since the server in a multi-server environment may be a semi-trusted party.In order to overcome these difficulties,we designed a secure three-factor multi-server authenticated key agreement protocol based on elliptic curve cryptography,which needs the user to register only once at the registration center in order to access all semi-trusted servers.The proposed scheme can not only against various known attacks but also provides high computational efficiency.Besides,we have proved our scheme fulfills mutual authentication by using the authentication test method. 展开更多
关键词 Authenticated key agreement three-factor multi-server authentication test method.
在线阅读 下载PDF
An efficient hash-based authenticated key agreement scheme for multi-server architecture resilient to key compromise impersonation 被引量:3
6
作者 Inam ul haq Jian Wang +1 位作者 Youwen Zhu Saad Maqbool 《Digital Communications and Networks》 SCIE CSCD 2021年第1期140-150,共11页
During the past decade,rapid advances in wireless communication technologies have made it possible for users to access desired services using hand-held devices.Service providers have hosted multiple servers to ensure ... During the past decade,rapid advances in wireless communication technologies have made it possible for users to access desired services using hand-held devices.Service providers have hosted multiple servers to ensure seamless online services to end-users.To ensure the security of this online communication,researchers have proposed several multi-server authentication schemes incorporating various cryptographic primitives.Due to the low power and computational capacities of mobile devices,the hash-based multi-server authenticated key agreement schemes with offline Registration Server(RS)are the most efficient choice.Recently,Kumar-Om presented such a scheme and proved its security against all renowned attacks.However,we find that their scheme bears an incorrect login phase,and is unsafe to the trace attack,the Session-Specific Temporary Information Attack(SSTIA),and the Key Compromise Impersonation Attack(KCIA).In fact,all of the existing multi-server authentication schemes(hash-based with offline RS)do not withstand KCLA.To deal with this situation,we propose an improved hash-based multi-server authentication scheme(with offline RS).We analyze the security of the proposed scheme under the random oracle model and use the t4Automated Validation of Internet Security Protocols and Applications''(AVISPA)tool.The comparative analysis of communication overhead and computational complexity metrics shows the efficiency of the proposed scheme. 展开更多
关键词 multi-server architecture Authenticated key agreement Registration server One-way hash function Key compromise impersonation
在线阅读 下载PDF
Cryptanalysis of Two Dynamic Identity Based Authentication Schemes for Multi-Server Architecture
7
作者 WAN Tao JIANG Nan MA Jianfeng 《China Communications》 SCIE CSCD 2014年第11期125-134,共10页
Since network services are provided cooperatively by multiple servers in the lnternet, the authentication protocols for multiserver architecture are required by Internetbased services, such as online game, online trad... Since network services are provided cooperatively by multiple servers in the lnternet, the authentication protocols for multiserver architecture are required by Internetbased services, such as online game, online trade and so on. Recently, Li et al. analyzed Lee et al.'s protocol and proposed an improved dynamic identity based authentication protocol for multi-server architecture. They claimed that their protocol provides user's anonymity, mutual authentication and the session key agreement against several kinds of attacks. In this paper, a cryptanalysis on Lee et al.'s scheme shows that Lee et al's protocol is also vulnerable to malicious server attack, stolen smart card attack and leak-of-verifier attack. Moreover, Li e/ al.'s improved protocol is also vulnerable to all these attacks. Further cryptanalysis reveals that Li et al.'s improved protocol is susceptible to collusion attack. 展开更多
关键词 AUTHENTICATION multi-server smart card ANONYMITY Dynamic ID
在线阅读 下载PDF
Efficient Hierarchical Multi-Server Authentication Protocol for Mobile Cloud Computing
8
作者 Jiangheng Kou Mingxing He +2 位作者 Ling Xiong Zihang Ge Guangmin Xie 《Computers, Materials & Continua》 SCIE EI 2020年第7期297-312,共16页
With the development of communication technologies,various mobile devices and different types of mobile services became available.The emergence of these services has brought great convenience to our lives.The multi-se... With the development of communication technologies,various mobile devices and different types of mobile services became available.The emergence of these services has brought great convenience to our lives.The multi-server architecture authentication protocols for mobile cloud computing were proposed to ensure the security and availability between mobile devices and mobile services.However,most of the protocols did not consider the case of hierarchical authentication.In the existing protocol,when a mobile user once registered at the registration center,he/she can successfully authenticate with all mobile service providers that are registered at the registration center,but real application scenarios are not like this.For some specific scenarios,some mobile service providers want to provide service only for particular users.For this reason,we propose a new hierarchical multi-server authentication protocol for mobile cloud computing.The proposed protocol ensures only particular types of users can successfully authenticate with certain types of mobile service providers.The proposed protocol reduces computing and communication costs by up to 42.6%and 54.2%compared to two superior protocols.The proposed protocol can also resist the attacks known so far. 展开更多
关键词 multi-server authentication CRYPTOGRAPHY hierarchical authentication mobile cloud computing
在线阅读 下载PDF
Weaknesses of a Dynamic ID Based Remote User Authentication Protocol for Multi-Server Environment
9
作者 R. Madhusudhan Adireddi Praveen 《Journal of Computer and Communications》 2014年第4期196-200,共5页
Currently, smart card based remote user authentication schemes have been widely adopted due to their low cost and convenient portability. With the purpose of using various different internet services with single regis... Currently, smart card based remote user authentication schemes have been widely adopted due to their low cost and convenient portability. With the purpose of using various different internet services with single registration and to protect the users from being tracked, various dynamic ID based multi-server authentication protocols have been proposed. Recently, Li et al. proposed an efficient and secure dynamic ID based authentication protocol using smart cards. They claimed that their protocol provides strong security. In this paper, we have demonstrated that Li et al.’s protocol is vulnerable to replay attack, denial of service attack, smart card lost attack, eavesdropping attack and server spoofing attacks. 展开更多
关键词 AUTHENTICATION SMART CARD Dynamic ID multi-server Environments PASSWORD
在线阅读 下载PDF
Equilibrium Strategies in M/M/1 Retrial Queues with Variable Service Rate
10
作者 LIU Yuanyuan YAN Zhaozeng YANG Qin 《应用概率统计》 北大核心 2025年第3期448-466,共19页
We consider a single server constant retrial queue,in which a state-dependent service policy is used to control the service rate.Customer arrival follows Poisson process,while service time and retrial time are exponen... We consider a single server constant retrial queue,in which a state-dependent service policy is used to control the service rate.Customer arrival follows Poisson process,while service time and retrial time are exponential distributions.Whenever the server is available,it admits the retrial customers into service based on a first-come first-served rule.The service rate adjusts in real-time based on the retrial queue length.An iterative algorithm is proposed to numerically solve the personal optimal problem in the fully observable scenario.Furthermore,we investigate the impact of parameters on the social optimal threshold.The effectiveness of the results is illustrated by two examples. 展开更多
关键词 variable service rate retrial queues real-time adaptability equilibrium strategies ALGORITHM
在线阅读 下载PDF
Stochastic interpretation for a single server retrial queue with Bernoulli feedback and negative customers
11
作者 Mohamed Boualem Amina Angelika Bouchentouf +1 位作者 Aicha Bareche Mouloud Cherfaoui 《Applied Mathematics(A Journal of Chinese Universities)》 2025年第1期1-19,共19页
In this paper,we introduce a qualitative analysis in order to study the monotonicity and comparability properties of a single-server retrial queueing model with Bernoulli feedback and negative customers,relative to st... In this paper,we introduce a qualitative analysis in order to study the monotonicity and comparability properties of a single-server retrial queueing model with Bernoulli feedback and negative customers,relative to stochastic orderings.Performance measures of such a system are available explicitly,while their forms are cumbersome(these formulas include integrals of Laplace transform,solutions of functional equations,etc.).Therefore,they are not exploitable from the application point of view.To overcome these difficulties,we present stochastic comparison methods in order to get qualitative estimates of these measures.In particular,we prove the monotonicity of the transition operator of the embedded Markov chain.In addition,we establish conditions for which transition operators as well as stationary probabilities,associated with two embedded Markov chains,having the same structure but with different parameters,are comparable relative to the given stochastic orderings.Further,numerical examples are carried out to illustrate the theoretical results. 展开更多
关键词 retrial queueing models negative arrivals stochastic orderings MONOTONICITY SIMULATION
在线阅读 下载PDF
具有修正的Min(N,D)-策略和单重休假的Geo/G/1离散时间排队分析
12
作者 魏瑛源 余玅妙 唐玉玲 《应用数学》 北大核心 2026年第1期108-128,共21页
本文研究服务员具有单重休假和系统采用修正的Min(N,D)-策略的离散时间Geo/G/1排队系统,运用更新过程理论、全概率分解技术和z-变换工具,从任意初始状态开始,研究队长的瞬时性态和平稳性态,得到了任意时刻n^(+)处队长瞬态分布的z-变换... 本文研究服务员具有单重休假和系统采用修正的Min(N,D)-策略的离散时间Geo/G/1排队系统,运用更新过程理论、全概率分解技术和z-变换工具,从任意初始状态开始,研究队长的瞬时性态和平稳性态,得到了任意时刻n^(+)处队长瞬态分布的z-变换表达式和稳态分布的递推表达式,同时给出了不同时刻n^(-)、n、n^(+)和外部观测点处队长稳态分布之间的重要关系.进一步借助于数值实例,讨论了系统的空闲率与稳态平均队长关于系统参数的敏感性,并且阐述了便于作数值计算的队长稳态分布的递推公式在系统容量优化设计中的重要价值.最后,运用更新报酬过程定理,建立了费用结构模型,获得了系统长期运行下单位时间内所产生的期望费用的显示表达式,并通过数值算例,寻求使期望费用最小的最优控制策略(N^(*),D^(*)). 展开更多
关键词 离散时间排队 修正的Min(N D)-策略 单重休假 队长分布 系统容量优化设计 最优控制策略
在线阅读 下载PDF
带有异质信息顾客和差异化休假的排队系统最优策略
13
作者 田瑞玲 宋涛 +2 位作者 黄艳玲 王腾 陈小娟 《应用数学》 北大核心 2026年第1期198-208,共11页
本文研究了带有异质信息顾客和差异化休假的排队系统.当系统为空时,服务台开始休假,休假回来后如果系统中有顾客等待则进入忙期.否则服务台将进行多重休假直到某次休假回来系统中有顾客存在.到达顾客根据被告知信息程度的不同分为完全... 本文研究了带有异质信息顾客和差异化休假的排队系统.当系统为空时,服务台开始休假,休假回来后如果系统中有顾客等待则进入忙期.否则服务台将进行多重休假直到某次休假回来系统中有顾客存在.到达顾客根据被告知信息程度的不同分为完全告知顾客和完全不告知顾客.本文首先通过构建差分方程解平衡方程,获得系统稳态概率及性能指标.然后考虑顾客均衡和社会最优两种情况,对完全告知顾客求解阈值策略,对完全不告知顾客求解其混合加入策略.之后通过数值分析考察参数对顾客策略及社会收益的影响.本文考虑更复杂的现实,希望能丰富对排队问题的研究. 展开更多
关键词 异质信息 差异化休假 均衡策略 社会最优收益 排队
在线阅读 下载PDF
LabVIEW中Queue技术在发电机监测系统中的应用 被引量:3
14
作者 王会咪 刘志峰 +2 位作者 李雪丽 李富平 杨文通 《微计算机信息》 北大核心 2006年第03S期136-138,共3页
介绍了基于虚拟仪器的在线监测系统的基本组成,其采用PCI总线仪器和LabVIEW可视化的虚拟仪器系统开发平台,把传统仪器的所有功能模块集成在一台计算机中,用户可以通过修改虚拟仪器的软件改变其功能与规模。该系统有效地利用了LabVIEW提... 介绍了基于虚拟仪器的在线监测系统的基本组成,其采用PCI总线仪器和LabVIEW可视化的虚拟仪器系统开发平台,把传统仪器的所有功能模块集成在一台计算机中,用户可以通过修改虚拟仪器的软件改变其功能与规模。该系统有效地利用了LabVIEW提供的同步控制Queue技术实现了发电机在现场运行环境下运行状态的监测显示,体现出了其一定的优势。 展开更多
关键词 LABVIEW queue技术 发电机 在线监测
在线阅读 下载PDF
基于Message Queue技术的医疗信息交换与共享集成平台研究 被引量:4
15
作者 覃永胜 林崇健 《中国数字医学》 2010年第8期105-107,共3页
对目前医院信息系统集成方式进行了分析,简单介绍了IBM Message Queue的技术特点,通过介绍重症监护系统(ICU系统)和HIS系统之间的集成方案,阐述了基于消息机制构建医疗信息交换与共享集成平台的思路和方法。
关键词 MESSAGE queue 医院信息系统 集成平台
暂未订购
FastQueue:一种高性能的磁盘队列存储管理机制 被引量:1
16
作者 魏青松 卢显良 周旭 《计算机科学》 CSCD 北大核心 2003年第10期81-83,88,共4页
1.引言 随着消息通信(如消息、短消息)的爆炸式增长,消息传递系统的性能面临严峻的挑战.消息通信的首要特点是高可靠性,在发送人确认消息收到之前必须将消息保存到磁盘上.
关键词 磁盘队列存储管理机制 Fastqueue 磁盘带宽 文件系统 UNIX 操作系统
在线阅读 下载PDF
Active Queue Management技术的研究与发展
17
作者 王雅琳 王忠 +1 位作者 张洪渊 彭海清 《计算机工程与设计》 CSCD 2003年第12期1-5,88,共6页
Active Queue Management(AQM)技术通过有效控制输出队列的丢包时间和丢包方式,对拥塞进行早期通告,这在TCP拥塞控制的实现中至关重要。目前对AQM进行较全面介绍和总结的文献尚不多见,以RandomEarly Detection(RED)为重点介绍了这种第一... Active Queue Management(AQM)技术通过有效控制输出队列的丢包时间和丢包方式,对拥塞进行早期通告,这在TCP拥塞控制的实现中至关重要。目前对AQM进行较全面介绍和总结的文献尚不多见,以RandomEarly Detection(RED)为重点介绍了这种第一代AQM技术的设计思想、优缺点以及为此出现的多种RED变种方法,另外还简单介绍了其它几种与RED设计思路不同的AQM方法,以期对AQM技术的研究和发展进行较全面的总结,并促进国内学者以及设备制造商对这一技术的关注。 展开更多
关键词 INTERNET 网络性能 网络传输 拥塞控制机制 ActivequeueManagement技术
在线阅读 下载PDF
基于Virtual Output Queued交换结构的最大权重匹配算法
18
作者 鄂大伟 《计算机工程与应用》 CSCD 北大核心 2001年第18期66-69,共4页
信头阻塞(HOL)限制了采用FIFO输入队列交换机的吞吐率,而使用虚输出队列(VOQ)技术可以完全消除HOL阻塞。文章给出了VOQ的交换机模型,介绍了基于最大权重匹配的算法LQF、OCF、LPF及其性能,还描述了更加实用的并行迭代算法i-LQF、... 信头阻塞(HOL)限制了采用FIFO输入队列交换机的吞吐率,而使用虚输出队列(VOQ)技术可以完全消除HOL阻塞。文章给出了VOQ的交换机模型,介绍了基于最大权重匹配的算法LQF、OCF、LPF及其性能,还描述了更加实用的并行迭代算法i-LQF、i-OCF和i-LPF。文章的结论对于构造高带宽的交换机具有实际意义。 展开更多
关键词 FIFO队列 虚输出队列 最大权重匹配算法 B-ISDN ATM 交换机
在线阅读 下载PDF
带有工作休假的有限容量M/PH/1排队系统驱动的流模型性能分析
19
作者 叶晴晴 黄丽璇 刘津津 《应用数学》 北大核心 2026年第1期1-11,共11页
本文研究带有工作休假的有限容量M/PH/1排队系统驱动的流模型.对于该驱动系统,本文给出了可用矩阵几何组合解形式表示的稳态概率向量.对于流模型,推导了稳态联合概率分布函数所满足的微分方程,证明流模型的稳态联合概率分布函数的Laplac... 本文研究带有工作休假的有限容量M/PH/1排队系统驱动的流模型.对于该驱动系统,本文给出了可用矩阵几何组合解形式表示的稳态概率向量.对于流模型,推导了稳态联合概率分布函数所满足的微分方程,证明流模型的稳态联合概率分布函数的Laplace变换(简称LT)也可以表示为矩阵几何组合解形式.进一步,运用分解算法减少矩阵计算的复杂度,并给出了计算缓冲器平均库存量的计算算法.最后,通过数值实验分析系统参数对其性能指标的影响. 展开更多
关键词 流模型 工作休假 PH分布 矩阵几何解
在线阅读 下载PDF
基于IP Queue的实时网页过滤系统的设计与实现 被引量:1
20
作者 周聚 朱巧明 +1 位作者 李培峰 刘钊 《计算机应用与软件》 CSCD 2011年第2期205-207,234,共4页
在分析了IP Queue机制的实现技术、HTTP请求报文和响应报文,以及IP数据包的相关特征的基础上,实现了基于IP地址、URL的请求报文过滤以及基于关键词的响应报文过滤的实时网页过滤系统。该系统同时运行于一个具体的网关计费系统,提高了网... 在分析了IP Queue机制的实现技术、HTTP请求报文和响应报文,以及IP数据包的相关特征的基础上,实现了基于IP地址、URL的请求报文过滤以及基于关键词的响应报文过滤的实时网页过滤系统。该系统同时运行于一个具体的网关计费系统,提高了网关的监控能力,为增强同类产品的网络安全尤其是在用户态防火墙和网关监控等方面提供了有益的参考。 展开更多
关键词 IP queue机制 实时网页过滤 HTTP报文 字符编码转化
在线阅读 下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部