The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
We have developed reliable web applications based on the web services technology on J2EE and .NET. Web applications implemented using web services are platform and language independent. The web services are available from several servers on different platforms so that the users can have a truly dynamic web services environment with autonomous services with underline server and user credential context...
The structure has been put forward of P2P systems are strictly based on the keyword matching to find the way of routing resources, so the routing mechanism will not be able to reflect the massive, distributed resources, and semantic information, thus reducing the precision of service discovery and search prospective rate. Semantic Web as the next generation of the embryonic form of the World Wide...
Data are special kinds of resource in grid, and their flow, management and uniform view play an important role in the grid system. This paper presents a dynamic adaptive data transfer model based on multiple replicas in the grid environment, compared with the traditional data transfer method based on single replica, the experimental results show that this model has a better transfer performance.
Modern IT systems have evolved into complex distributed systems that support thousands of users, with each user requiring access to several applications. Single sign on (SSO) provides a convenient facility for managing user authentication such that a user only logs into a system once in order to gain access to many protected applications. For this reason it becomes vitally important to secure the...
This paper describes the windows CE development platform and Embedded Visual C++(EVC) program development environment, studies the TCP/IP protocol and Socket principle, then using a set of network communication functions which is provided by WinSock API to achieve network communication program between the PDA and other network devices. A detailed implementation and programming steps are given in an...
A Bluetooth embedded service model is introduced towards the floating population. The system is composed of smart phones, Bluetooth wireless server and background equipments. The system functions and workflow are elaborated focusing on the analysis of the core system equipments - Bluetooth server. The hardware design based on the 32bits ARM microprocessor XScale and the CSR BlueCore4 module is discussed...
This paper aims to develop the system of powerful computer laboratory class by simulation the ideal learning procedure, teachers and their students can keep in touch with each other in 2-way and immediately communication on Internet. This system can enhance the learning of computer laboratory class powerfully in 3 aspects: controlling, teaching, and evaluating on computer network technology with client/server...
Through the research of the existing security mechanisms and security technologies, combined with the actual security requirements of Web communications, this paper proposes a Web services security communication model. The model not only can meet the basic requirements for secure communications, and can achieve better results in the Web service application with higher security requirements. Compared...
An efficient and stable cluster system would be proposed in this paper for the load balancing of servers. It bases on the improved load balancing algorithm. The cluster system uses load parameter information including CPU utilization, memory utilization, I/O utilization and network traffic to decide the load of each child node. And it adds a redundant node to collect the load balancing parameters...
Fault-tolerance is an important research topic in the study of distributed systems. To counter the influence of faulty components, it is essential to reach a common agreement in the presence of faults before performing certain tasks. However, the agreement problem is fundamental to fault-tolerant distributed systems. In previous studies, protocols dealing with the agreement problem have focused on...
Increase in emphasis on risk management allows for better enterprise IT risk management. Early risk identification and assessment ensures effective risk management steps are formulated. The formulation and sustenance of an IT risk management framework is one of the critical and challenging tasks of modern corporate enterprise risk management. The existence of a risk assessment tool allows for effective...
In existing federated identity management systems it is more and more necessary new set of advanced policies, such as policies for the administrative delegation. They allow administrators to delegate a subset of the system policies management to other users, who will have a much wider knowledge in the application area where these policies will be applied. In this paper, we present an infrastructure...
Commercial off-the-shelf (COTS) hardware is becoming less and less reliable because of the continuously decreasing feature sizes of integrated circuits. But due to economic constraints, more and more critical systems will be based on basically unreliable COTS hardware. Usually in such systems redundant execution is used to detect erroneous executions. However, arithmetic codes promise much higher...
Aiming at shortening the design time of the optimal test cases, a model of Collaborative Multi-Agent based on Parallel Genetic Algorithm (CMA-PGA) is put forward, which is to be used in combinatorial testing of the software system. Because of the competition and coordination mechanisms especially designed in CMA-PGA, the convergence rate of this model outperforms that of simple genetic algorithm in...
Reducing the power consumption while maintaining the response time constraint has been an important goal in server system design. One of the techniques widely explored in the literature to achieve this goal is Dynamic Voltage Scaling (DVS). However, DVS is not efficient in modern systems where the overall power consumption includes a large portion of static power consumption. In this paper, we aim...
Computer-based college English test is one of the important ingredients in the reform of college English teaching and learning in China, which is based on communicative testing theories and represents the future trend of college English tests. This paper systematically studies the computer-based college English test, compares it with the traditional paper-and-pencil-based test, finding out its advantages...
In Vehicular Ad Hoc Network (VANET), the route between a source node and a destination node is intermittently broken. It is difficult to provide the reliable data transfer based on TCP because TCP is not adaptable to such networks such as VANET. Therefore, this paper proposes an end-to-end transfer rate adjustment mechanism in the application layer for VANET. The proposed mechanism consists of three...
As applications grow more and more complex, the current software faces a great challenge in dynamism. This paper proposes to modernize legacy software towards runtime plug-and-play architecture using service-oriented component model. Our object is to provide runtime plug-and-play feature for software to simplify development and adapt to changing execution environment. We propose a two-stage modernization...
This paper presents an integrated supporting tool for Attributed Goal-Oriented Requirements Analysis (AGORA), which is an extended version of goal-oriented analysis. Our tool assists seamlessly requirements analysts and stakeholders in their activities throughout AGORA steps including constructing goal graphs with group work, utilizing domain ontologies for goal graph construction, detecting various...
Virtual instrument technology and network technology combined, and building networked virtual instrument test System is the important development in today's3 society. In this paper, aiming at remote virtual instrument control by the data socket way using in the Lab view. Users can easily operate the remote virtual instrument by the release capacity of remote panel.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.