期刊文献+
共找到7篇文章
< 1 >
每页显示 20 50 100
Super-proximity routing in structured peer-to-peer overlay networks 被引量:1
1
作者 吴增德 饶卫雄 马范援 《Journal of Zhejiang University Science》 EI CSCD 2004年第1期16-21,共6页
Peer to Peer systems are emerging as one of the most popular Internet applications. Structured Peer to Peer overlay networks use identifier based routing algorithms to allow robustness, load balancing, and distrib... Peer to Peer systems are emerging as one of the most popular Internet applications. Structured Peer to Peer overlay networks use identifier based routing algorithms to allow robustness, load balancing, and distributed lookup needed in this environment. However, identifier based routing that is independent of Internet topology tends to be of low efficiency. Aimed at improving the routing efficiency, the super proximity routing algorithms presented in this paper combine Internet topology and overlay routing table in choosing the next hop. Experimental results showed that the algorithms greatly improve the efficiency of Peer to Peer routing. 展开更多
关键词 ROUTING Peer to Peer network Distributed systems INTERNET
在线阅读 下载PDF
Cluster-based Intrusion Detection in Wireless Ad-Hoc Networks
2
作者 DiWu ZhishengLiu +1 位作者 YongxinFeng GuangxingWang 《计算机工程与应用》 CSCD 北大核心 2004年第29期122-125,共4页
There are inherent vulnerabilities that are not easily preventable in the mobile Ad-Hoc networks.To build a highly secure wireless Ad-Hoc network,intrusion detection and response techniques need to be deployed;The int... There are inherent vulnerabilities that are not easily preventable in the mobile Ad-Hoc networks.To build a highly secure wireless Ad-Hoc network,intrusion detection and response techniques need to be deployed;The intrusion detection and cluster-based Ad-Hoc networks has been introduced,then,an architecture for better intrusion detection based on cluster using Data Mining in wireless Ad -Hoc networks has been shown.A statistical anomaly detection approach has been used.The anomaly detection and trace analysis have been done locally in each node and possibly through cooperation with clusterhead detection in the network. 展开更多
关键词 入侵检测 移动AD-HOC网络 数据挖掘 网络安全 聚类检测
在线阅读 下载PDF
A real-time transaction service for grid computing
3
作者 唐飞龙 LiMinglu +2 位作者 JoshuaHuangZhexue FrankTong CaoJian 《High Technology Letters》 EI CAS 2005年第2期163-166,共4页
A real-time transaction service aims at ensuring the consistency of real-time and transactional Grid applications. This paper proposes an efficient real-time transaction service (RTTS). It provides abilities to discov... A real-time transaction service aims at ensuring the consistency of real-time and transactional Grid applications. This paper proposes an efficient real-time transaction service (RTTS). It provides abilities to discover qualified services, I.e., participants, to execute specified sub-transactions, coordinate real-time Grid transactions, calculate deadline and assign priority for scheduling concurrent transactions. The service discovery adopts the two-level registry mechanismto adapt to transient Grid services. The coordination algorithm invokes multiplefunctional alternative services for each sub-transaction so that it remarkablyimproves the successful ratio of real-time transactions. The experiment result shows that the RTTS can well coordinate real-time transactions for Grid service environment and shield users from the complex process. 展开更多
关键词 计算机网络 网格 实时处理系统 最终期限 优先权
在线阅读 下载PDF
A Partial Evaluator for A Parallel Lambda Language
4
作者 旷海蓉 孙永强 林凯 《Journal of Computer Science & Technology》 SCIE EI CSCD 1997年第5期441-457,共17页
This paper describes theoretical and practical aspects of a partial evaluator that treats a parallel lambda language. The parallel language presented is a combination of lambda calculus and message passing communicati... This paper describes theoretical and practical aspects of a partial evaluator that treats a parallel lambda language. The parallel language presented is a combination of lambda calculus and message passing communication mechanism. This parallel language can be used to write a programming language's denotational semantics which extracts the parallelism in the program. From this denotational definition of the programming language, the partial evaluator can generate parallel compiler of the language by self application.The key technique of partial evaluation is binding time analysis that determines in advance which parts of the source program can be evaluated during partial evaluation, and which parts cannot. A binding time analysis is described based upon type inference. A new type chcode is introduced into the type system, which denotes the type of those expressions containing residual channel operations. A well-formedness criterion is given which ensures that partial evaluation not only doesn't commit type errors but also doesn't change the sequence of channel operations. Before binding time analysis, channel analysis is used to analyze the communication relationship between send and receive processes. 展开更多
关键词 Partial evaluation binding time analysis parallel lambda language
原文传递
Minimum QOS Parameter Setin Transport Layer
5
作者 汪芸 顾冠群 《Journal of Computer Science & Technology》 SCIE EI CSCD 1997年第6期571-573,共3页
QOS (Quality of Service) parameter definitions are the basis of further QOS control.But QOS parameters defined by orgallizations such as ISO and ITU are incoherent and incompatible. It leads to the inefficiency of QOS... QOS (Quality of Service) parameter definitions are the basis of further QOS control.But QOS parameters defined by orgallizations such as ISO and ITU are incoherent and incompatible. It leads to the inefficiency of QOS controls. Based on the analysis of QOS parameters defined by ISO and ITU, this paper first promotes Minimum QOS Parameter Set in transport layer. It demonstrates that the parameters defined by ISO and ITU can be represented by parameters or a combination of parameters of the Set. The paper also expounds that the Set is open and manageable and it can be the potential unified base for QOS parameters. 展开更多
关键词 QOS QOS parameters QOS parameter mapping
原文传递
Research on Protocol Migration
6
作者 汪芸 顾冠群 兑继英 《Journal of Computer Science & Technology》 SCIE EI CSCD 1996年第6期601-606,共6页
This paper elaborates the concept and model of protocol migration in net-work interconnection. Migration strategies and principles are discussed and several cases are studied in detail Which show the basic procedu-re ... This paper elaborates the concept and model of protocol migration in net-work interconnection. Migration strategies and principles are discussed and several cases are studied in detail Which show the basic procedu-re and tech-niques used in protocol migration. 展开更多
关键词 Protocol migration INTERCONNECTION
原文传递
Agent Cooperation Based Control Integration by Activity—Sharing and Joint Intertion
7
作者 高济 林东豪 《Journal of Computer Science & Technology》 SCIE EI CSCD 2002年第3期331-339,共9页
In this paper,a control integration method based on agent cooperation,called ASOJI,is proposed,which designs the architecture of integrated application systems in distributed computation environments as an agent comm... In this paper,a control integration method based on agent cooperation,called ASOJI,is proposed,which designs the architecture of integrated application systems in distributed computation environments as an agent community composed of nested agent fed-erations in three aspects:architecture style,agent cooperation,and composition semantics.Through defining activity-sharing-orented joint intention in the way of stepwise refinement,ASOJI can not only support the transparent specification of the architecture for software com-position,but also eliminate the gap between agent theory and the engineering realiztion of control integration. 展开更多
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部