首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 250 毫秒
1.
对私有云计算平台上资源最优路径匹配,实现对资源的有效调度和检测,提高资源共享能力。传统算法采用云平台的资源置换算法实现云资源目标匹配,受限于机器学习技术自身的复杂性,性能不好。提出一种基于委托管理节点角色量化合成的私有云计算平台上资源最优搜索路径匹配算法。构建私有云计算平台终端数据访问和资源调度模型,根据贪心算法的收缩原则,在资源访问管理中引入互斥锁机制以保证资源共享操作的完整性,路径匹配有向图模型,提高资源路径匹配搜索能力。以全局度量为中心节点,计算逆向追踪搜索频度,实现算法优化。仿真实验结果表明,采用该算法进行私有云计算平台上资源最优路径匹配优化,能有效提高私有云平台上的资源路径匹配准确度,从而提高资源搜索成功率,实现资源优化共享,展示优越的适用价值。  相似文献   

2.
本文主要研究云环境中用户跨域访问的身份鉴别问题。在建立了信任关系的域间使用可信的认证中介对跨域访问的用户进行身份认证,同时使用SAML协议传输跨域认证信息,从而实现云环境中用户跨域访问的安全控制。  相似文献   

3.
设定android特有的开发流程,设计及后续实现都构建于隐私权管控的移动终端之上,拟定必备的化解途径。针对智能手机,增设了管控隐私必备的搭配系统,采纳了服务器特有的主体架构。这样做在最大范围减低了多重的内外干扰,保护应用程序。管理隐私权采纳了知识库,后台配有虚拟情形的执行环境。系统可自动调配、分发现有一切的移动终端,这就整合了隐私信息关联的访问权限。自动调控了细粒度以便于规范平常的隐私访问,规避了认知缺失带来的配置权限偏差。设计及实现隐私管控必备的新系统,依循自动化路径来配置且管理预设的隐私权限。  相似文献   

4.
支持多自治域的安全通信是大规模分布式应用的基础,多域间的安全交互成为一个热点问题。基于角色的访问控制技术被应用到多域环境中,以提高多域间交互的安全性。但多域间的动态角色映射很容易引起违反职责分离的问题。因此,提出了一种安全检测机制。  相似文献   

5.
介绍了PhoneGap和jQuery Mobile两种 Hybrid App开发中常用的框架技术,并将其应用到高校课程群移动学习平台。通过对学习平台功能需求进行分析,设计了相应的功能模块。在开发模式上选择M VC模式,采用主流开发技术实现架构,对开发中存在的几种关键问题,如移动开发中的跨域数据通信、移动终端数据加载和系统配置等问题,提出了相应的解决方案。  相似文献   

6.
基于移动Ad Hoc网络的PKI/CA系统互操作模型   总被引:2,自引:1,他引:1  
沈颖 《情报杂志》2005,24(5):58-61
移动Ad Hoc网络(MANET)是由若干无线移动节点组成的不依赖于任何固定基础设施和集中式组织管理机构,而通过节点间的相互协作进行网络互联的一种多跳自组织临时性自治网络系统。在建立移动Ad Hoc网络多域全分布式PKI/CA系统过程中,在对国内外互操作技术及模型进行研究的基础上,提出了扩展推荐信任模型及相应的CA互操作结构模型,通过动态信任路径管理模式和认证机构信任列表实现CA间信任关系的管理和维护,提高了系统的安全性、可伸缩性和鲁棒性。  相似文献   

7.
沈茜 《人天科学研究》2013,(12):143-144
随着移动终端设备的普及,提出了传统的Web应用向移动终端拓展的需求。介绍了现有B/S架构模式下,在Web应用服务端为移动终端应用设计专用数据接口,通过HTTP请求访问远程数据库,利用JSON格式进行数据传输的解决方案。最后通过设计iOS实例具体介绍了移动终端应用远程数据访问的实现。  相似文献   

8.
在CStor云数据库访问中,细粒度云存储数据的信息特征存在个体较大差异,访问路径产生多频偏移,数据访问调度性能受限。传统方法中采用PSO局部搜索方法进行访问路径修正,搜索效率低,个体更新较慢。提出一种基于细粒度云存储数据迭代恢复匹配的云数据库访问路径偏移修正算法,以PSO多信息融合Pareto支配集为指导,构建多信息融合细粒度数据的主特征模型,采用迭代恢复匹配方法增加了局部搜索提高搜索到全局最优解的几率,实现路径偏移修正。仿真实验采用3组测试集对CStor云数据库进行访问调度和路径偏移修正,结果表明采用该算法,实现对访问路径的动态实时修正,收敛距离较小,提高了CStor云数据库访问和数据挖掘性能。  相似文献   

9.
提出了基于角色访问控制的移动工作流平台设计模型。借助于角色网络理论,通过角色访问控制技术将角色、权限、用户和任务等之间的关系体现出来。介绍了移动工作流技术,把移动工作流技术与基于角色的访问控制技术结合,并且在软件平台设计中体现出来,有利于远程办公,方便企业的应用。  相似文献   

10.
提出通过融合RBAC和TE模型来实现Clark-Wilson模型的一种方法,即:通过不同用户赋予不同角色实现责任分立;利用特殊的域表示变换过程;使用不同的类型标识约束数据项和非约束数据项. 分析了实施和认证规则的正确性. 通过在SEBSD系统中实施了FTP的完整性安全策略的实例,说明该方法能够实现细粒度的访问控制和灵活配置.  相似文献   

11.
CAS should stick to the principle of rendering service to, and giving impetus for, the development of China's science enterprise by making S&T innovations, said CAS President LU Yongxiang. The CAS president made the remarks in a recent talk to communicate the gist of the winter session of the Party's Leading-member Group at CAS, which was held from 7 to 11 January in Beijing.  相似文献   

12.
With great care, Dr. ZHOU Zhonghe takes out a package wrapped by cotton tissue from a drawer and says: "This is the gem of our collections: the fossil of a bird that lived 125 million years ago!" Then, pointing at a tiny mound, he explains: "Look, this is the claw and that is the head. It was in the egg shell and ready to hatch ... The species fell into a family of waterside inhabitants."  相似文献   

13.
This study examined how students who had no prior experience with videoconferencing would react to the use of videoconferencing as an instructional medium. Students enrolled in seven different courses completed a questionnaire at the beginning of the semester and again at the end of the semester. Students at the origination and remote sites did not differ in their reactions toward videoconferencing but there was a significant difference for gender. Women reacted less favorably to videoconferencing. Compared to the beginning of the semester, students reported significantly less positive attitudes toward taking a course through videoconferencing at the end of the semester. There were no significant differences in students' attitudes toward videoconferencing across courses at the beginning of the semester but there were significant differences across the courses at the end of the semester. The results suggest the need for better preparation for both students and instructors.  相似文献   

14.
Ajoint study by Prof. ZHANG Zhibin from the CAS Institute of Zoology and his co-workers from Norway, US and Swiss have indicated that historical outbreaks of migratory locusts in China were associated with cold spells, suggesting that China's projected climate warming could decrease the pest's numbers. The study was published in Proceedings of theNational Academy of Sciences on 17 September, 2007.  相似文献   

15.
A computer-mediated group is a complex entity whose members exchange many types of information via multiple means of communication in pursuit of goals specific to their environment. Over time, they coordinate technical features of media with locally enacted use to achieve a viable working arrangement. To explore this complex interaction, a case study is presented of the social networks of interactions and media use among members of a class of computer-supported distance learners. Results show how group structures associated with project teams dominated who communicated with whom, about what, and via which media over the term, and how media came to occupy their own communication niches: Webboard for diffuse class-wide communication; Internet Relay Chat more to named others but still for general communication across the class; and e-mail primarily for intrateam communication. Face-to-face interaction, occurring only during a short on-campus session, appears to have had a catalytic effect on social and emotional exchanges. Results suggest the need to structure exchanges to balance class-wide sharing of ideas with subgroup interactions that facilitate project completion, and to provide media that support these two modes of interaction.  相似文献   

16.
Electronic data interchange (EDI) provides means for interorganizational communication, creates network externalities, requires an advanced information technology (IT) infrastructure, and relies on standards. In the diffusion of such innovations, institutional involvement is imperative. Such institutions contain governmental agencies, national and global standardization organizations, local government, and nonprofit private organizations like industry associations. The last type of organizations we call intermediating institutions. They intermediate or coordinate ("inscribe") the activities of a group of would-be adopters. Unfortunately, little is known of how these organizations shape the EDI diffusion trajectory. In this article we examine one specific type of intermediating organizations?industry associations?and how they advanced the EDI diffusion process in the grocery sectors of Hong Kong, Denmark and Finland. We identify six institutional measures, placed into a matrix formed by the mode of involvement (influence vs. regulation) and the type of diffusion force (supply push vs. demand pull), that can be mobilized to further the EDI diffusion. Industry associations were found to be active users of all these measures to varying degrees. Their role was critical especially in knowledge building, knowledge deployment, and standard setting. Furthermore, institutional involvement varied due to policy and cultural contingencies and power dependencies.  相似文献   

17.
The increasing prospects of digital piracy has prompted the perceived need by electronic publishers to adopt technical systems of protection, and governments to reform their copyright laws. This article is a preliminary study of the management of intellectual property by electronic publishers, defined as those involved in the production of online databases, and CD-ROMs. It focuses on three main issues: (1) how electronic publishers view the increasing threat of piracy; (2) the methods of protection employed to protect intellectual property in digital format; and (3) the importance of technological protection of intellectual property in electronic publications. The analysis is based on a sample of 23 UK electronic publishers. The interviews revealed an interesting assortment of protection methods and did not show that technological protection was a preferred way. Instead, the means of protection, in addition to copyright law, comprised niche markets, pricing, trust, bad publicity, and nontechnical and technical means.  相似文献   

18.
Prof. SUN Changpu from the CAS Institute of Theoretical Physics and coworkers from University of Basel in Switzerland have worked out a way --at least in theory --to split a beam of molecules according to their chirality. The technique involves passing the molecules through three different laser beams and is similar to the famous Stern-Gerlach effect, whereby a beam of atoms passing through a magnetic field is split in two according to the atoms' spin states (Phys. Rev. Lett. 99 130403).  相似文献   

19.
Long-standing conflict between domain name registrants and trademark holders prompted the Internet Corporation for Assigned Names and Numbers (ICANN) to create a global, mandatory arbitration procedure known as the Uniform Dispute Resolution Policy (UDRP). The UDRP has been used in 2166 cases involving 3938 domain names as of 1 November 2000. The policy gives the initiator of a complaint, generally a trademark holder, the right to choose which ICANN-accredited dispute resolution service provider (RSP) will handle the case. During the preparation of the UDRP,some feared that complainant selection would lead to "forum shopping" that might bias the results. This article performs a statistical assessment of the forum-shopping thesis and finds support for it. There are statistically significant differences in the various RSPs' propensity to take away names from defendants; there are also major differences in the number of cases brought to each RSP. RSPs who take away names have the larger share of cases. The study examines other variables that might explain differences in market share, such as price, the plaintiff's nationality, or the time taken to decide a case. It finds that nationality and time also are correlated with market share. The study concludes that shopping for a favorable outcome is an important factor in the UDRP.  相似文献   

20.
Prof. Raymond C.K. Chen, a neuropsychologist with the CAS Institute of Psychology, has made novel progress in his studies of schizophrenia. His work has been reported by a recent issue of Behavioural Neurology.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号