您要查找的是不是:
- This paper designs a Intrusion Tolerant model for Distributed Web Servers (ITDW). 即使系统的某些组件已经遭受了破坏,系统也能继续提供降级的服务。
- This paper presents major error-control techniques available for voting for SITAR intrusion tolerant model,and discusses an effective method to avoid complex transformations in the Ballot Monitors. 文章将分组码的特性应用到sitar容侵模型的投票机制中去;讨论有效避免在sitar模型中投票监视器在投票/裁决之前需进行结果的复杂转换的方法.
- intrusion tolerance model 入侵容忍模型
- An improvement in the state transition model of intrusion tolerance system is proposed and a semi-Markov process(SMP) model is built. 对入侵容忍系统状态转移模型进行了改进,以此构建了半马尔可夫过程(SMP)模型,并用该模型计算了各状态的稳态概率。
- As for the work on threshold-ECC-based intrusion tolerance application, there is no any report about it by far. 至于在门限ECC密码体制基础上建立入侵容忍应用的研究工作,则尚未见到报道。
- The desired requirements for a tolerance model for part are: completeness,compatibility,computability and validity. 提出了一种基于关键特征和图的零件公差建模方法。
- This paper analyses the structure of distributed database system and its security issue, then proposes an architecture for distributed database system security based on intrusion tolerance. 分析了分布式数据库系统的结构及其面临的安全问题,提出了一种基于容侵技术的分布式数据库体系结构。
- Intrusion Tolerance is a new approach in network security, which is designed so that any intrusion into a part of the system will not endanger the data's confidentiality, integrity and availability. 摘要入侵容忍是网络安全中的一种新方法,该方法保证系统在遭受攻击的情况下信息的机密性、完整性和可用性。
- Distributed object based intrusion tolerant system (ITDOS) has become one of the attractive issues on intrusion tolerance. 基于分布式对象容忍入侵系统的研究是入侵容忍的研究热点之一。
- Analyzing the characteristics of Taguchi method and tolerance model of robust design, we advance a new strategy of robust optimization designprocess based on Taguchi method and tolerance model. 分析了田口方法和容差模型法的各自特点,提出了一种综合运用两种方法使其互补的稳健优化设计进程策略。
- A Model of Intrusion Tolerance Based on Security Area and Trusted Base 基于安全域和可信基的网络容侵系统模型
- The Research of Intrusion Tolerance System Based on State Transition Model 基于状态转换模型的容侵系统研究
- Application of Immunity Principle in Intrusion Tolerance System 免疫原理在容侵系统中的应用
- First, the strain, was treated by NTG, DES, then the methionine induction model and methylamine tolerance model were used as screening models to select strains, as a result, a favorable strain DMa-46 was obtained, its B1a components was about 43.2%. 首先采用了亚硝基胍和硫酸二乙酯进行诱变处理,处理后采用了甲硫氨酸诱导模型和甲胺耐受的模型,对菌株进行了选育,获得了有效组分Bla高达43.;2%25的菌株-DMa-46。
- tolerance model of gear tooth surface 齿面公差模型
- The fault tolerant model builds on the level of the service.We applied the fault tolerant on service which in the flatform of run-time management. 给出了一种服务容错模型,并对其进行了深入分析,消除了系统运行过程存在的单点故障问题,从而保证了监控系统的高可靠性。
- Research and Design of Certificate Authority Based on Intrusion Tolerance 基于入侵容忍的CA认证中心研究与设计
- Intrusion tolerant CA scheme based on CRT 基于中国剩余定理的入侵容忍CA方案
- Constructing Intrusion Tolerant COTS Server 构造入侵容忍的COTS服务器
- Intrusion Tolerant CA Scheme Based on Threshold ECC 基于门限ECC的入侵容忍CA方案
- 今日热词
-
- 深远海浮式风电平台 - deep-sea floating wind power platform
-
- 京雄高速公路 - Beijing-Xiongan expressway
-
- 农业及相关产业增加值 - the added value of agriculture and related industries