distributed access system 中文意思是什麼

distributed access system 解釋
分散式存取系統
  • distributed : 分佈的
  • access : n. 1. 接近;會面。2. 捷徑,門路〈指方法、手段〉;檢查孔;進路,入口;【自動化】(存貯器的)存取。3. (病的)發作;(怒氣等的)爆發。4. 增加。
  • system : n 1 體系,系統;分類法;組織;設備,裝置。2 方式;方法;作業方法。3 制度;主義。4 次序,規律。5 ...
  1. Through the implementing of kernel level file and cache mechanism at the client side, this newly proposed distributed network file system provides seamless network file access and reduces the performance decline caused by network transmission. utilizing the concept of logic block server, it provides the reliable data block storage and implements redundant storage capacity. utilizing the concept of the index server, it provide s the cost of the greatly for server and network during data access process and realizes the computing with balancing capacity

    在客戶端通過實現內核級文件的調用和緩沖機制,實現了文件的無縫網路存取,並減少由於網路傳輸帶來的性能下降的影響;利用邏輯塊服務器實現邏輯塊的冗餘存取,實現數據塊的安全存放;利用索引服務器進行負載均衡計算,實現資料存取的較低網路和服務器開銷;利用索引服務器實現服務器組的零管理,使該系統具有高效性、穩定性和可伸縮性。
  2. Through the analysis of the user access characteristics in the net, the " file burst access, fba " and the " server tide access, sta " characteristics are discovered. based on these two characteristics and some existing technology, a file - oriented distributed system " dftp " model is built to solve the problems in the lans. this system is built upon the application level, it is transparent to the end users

    本文重點分析了目前在這類網路中文件下載服務存在的一些問題,並對其自身特點和用戶對文件的訪問特點進行統計分析,提出了「文件的爆發訪問( fileburstaccess , fba ) 」和「服務器的潮汐訪問( servertideaccess , sta ) 」這兩個網路中用戶的基本訪問特點。
  3. Mobile agent, which originates from distributed - system research area and indicates the future of internet, is the result of gradually developed distributed - system technology. nevertheless, as a new concept, the mobile agent is probed both home and abroad. hence. there ' s neither regular model nor detailed description of agent. taking it for granted, this essy aims at the availiblity of mobile agent on the base of the mobility and autonomy of it. this essy then describes the " agent - based and fully materialized virtual database in the electronical book market system ", in which the author plays an importmant role. as regard to this sysetm, a uniform mirror database ( book market ) of all sourcedatabases is established and, with the help of the mobile agent, it ensures more instant access to diversified book information the customer needed. when some data is changed in the source termiante, the mobile agent then carries modification informations and moves from the source terminate to the mirror terminate, and, by doing relevant operations, the diferrent databases in different ends then become consistent

    本文描述了筆者參與開發的一個系統: 「基於移動agent的全具象vdb電子書市系統」 。本系統以移動agent為基礎,通過建立對各個數據源(書店)數據庫的一個總的鏡像數據庫(書市)來實現客戶數據查詢的即時性和快速性。每個源端數據庫一經修改,由移動agent攜帶相關修改信息移動到鏡像端對數據庫進行相應操作,從而保證源端數據庫與鏡像端數據庫的一致。
  4. For the process of simulation, the databases are supposed to be provided with two sides : real - time access for the distributed memory data and intelligence simulation technology. because each site in this simulation database emulates the different position and function structure character, and comes down to multi - platform, multi - type data, the great amount of system parameters, models, model structure parameters and rules in simulation must be managed by distributed database for administration, rapid information query and dynamic storage modification

    由於該模擬系統的每一個模擬節點分別模擬了分佈在不同位置、不同功能結構特徵的模擬對象,而且,涉及到多平臺、不同形式和種類的數據,因此模擬過程中大量的系統參數、模型、模型結構參數和規則,都必須使用分散式數據庫技術來管理、進行高速的數據檢索和動態存儲修改,來支持模擬環境的動態維護與模擬環境之間的相互作用。
  5. The earth system grid ii is a research project that s leveraging grid to make it easier for scientists to securely access the massive amounts of distributed data they need to do complex collaborative work around climate modeling

    Earth system grid ii是一個研究項目,其目的是利用網格讓科學家可以更加簡便地訪問大量的分散式數據(他們需要使用這些數據,圍繞氣象建模進行復雜的協作) 。
  6. In order to reduce access frequency to the ntp time server, and efficiently relieve the over - load situation of server. a time synchronization algorithm based on frequency adjustment in distributed system was proposed. under the same accuracy requirement,

    為了降低internet上對ntp時間服務器的訪問頻率,有效緩解時間服務器資源負擔過重的狀況,提出了一套適用於分散式系統的基於頻率調節的時間同步演算法。
  7. This paper discusses the design and implementation of a distributed directory service in grid monitoring system. we first compare and analyze several directory service systems in grid environment, such as grid monitoring architecture, relational grid monitoring architecture, metacomputing directory service and monitoring and discovery service, as well as popular directory service protocols, such as lightweight directory access protocol. from those systems and protocols, design demands and functions can be achieved

    本文比較分析了幾個在網格環境中提供信息服務的目錄服務系統及其標準,如網格監測體系結構、關系型網格監測體系結構、元計算目錄服務和監測與發現服務,同時也介紹了當前較為流行的目錄服務協議,如輕量級目錄訪問協議,得出一般目錄服務應滿足的要求和具備的功能,以及當前目錄服務系統普遍存在的局限性。
  8. The system adopts mature and advanced communication technology to make the centralized controls distributed on the network. it allows users to be able to monitor detailed status of the ups, the leaking, the air conditioning, the video capturing, the electric power supplying and the access switching in the central control room conveniently

    系統採用成熟先進的技術,實現了在計算機網路上的集中分佈監控,使用戶可以方便地監控機房內ups漏水空調視頻配電及機房門狀態等具體情況,將各種報警信息及時的通知相關的管理人員,從而有效地進行機房管理。
  9. In this paper we analyzed the structure, function and characteristics of the private office network, discussed the primary threats to the office network security and common attack methods, based on the p2dr model, we distributed the office network security policy across three layers : network layer, system layer and application layer. the security principle, implement solution and the relationship among these three layers were illustrated in this paper, including physical access control, logical access control, vpn, data encryption, authentication, authorization, audit, ids ( intrusion detection systems ), system leak test and anti - virus protection

    本文中將辦公網路的安全策略由下至上劃分為網路層、系統層和應用層三個層次,分別敘述了各個層次上的安全原則和實現方式,以及各層之間的相互關系,詳細介紹了物理控制、邏輯控制、 vpn與數據加密、用戶認證和授權、審計與入侵檢測、漏洞掃描及病毒防護等方面的策略和實現方式。
  10. In the 4th chapter, we discuss the problems in the implement of the web service based distributed file service system. it focuses on four problems : the design of central control unit, the policy of mass storage in local file service unit, the parallel access control algorithm and hierarchical cache management mechanism

    論文的第四部分介紹了基於webservice的分散式文件服務系統在應用實現中需要考慮的許多方面的問題,構造出針對四個方面問題的演算法模型:集中控制單元設計模型、海量文件的本地存儲策略、文件並發訪問控制演算法和分層的緩存管理機制。
  11. Based on such situation, this research proposes a distributed heterogeneous database information searching system model based on corba middleware. this model absolutely use existing network and utilize digital book database systems which have been built or under being built. it offers user a uniform search entrance to access the heterogeneous database at different area transparent on the orb provided by visibroker

    本課題根據目前這種現狀,提出了一個基於corba中間件的分散式異構數據庫的信息檢索模型,該模型基於現有網路,利用已經建設完全或正在建設的數字圖書資料數據庫系統,在visibroker提供的orb的基礎上為外部用戶提供統一介面透明地訪問分佈在各地域的異構數據庫,從而實現分散式異構數據庫系統間的統一檢索。
  12. This paper stresses on discussing the architecture, access protocol and implementation mechanism based on xml and web services technologies, researches key technologies of metadata information service and data uniform access and management in database grid, designs and implements distributed mis subsystem and das subsystem, which support multi - domain management. mis can provides metadata information for the whole system, such as das and clients, it uses domain name 、 logical name and internal name of data object to uniformly name database resources in grid and implements name mapping mechanism and user view metadata information service and provides virtual organization and management of database resources. das can provide a scalable uniform data access by virtual organization and management of storage resources and multi - mode data share access mechanism, thus integrate database resources in grid and shields distribution and heterogeneity of resources and achieves transparent access. system adopts data access mechanism based on user request mapping to flexibly implement data access across multi domains, and adopts distributed data cache mechanism 、 security mechanism based gsi to provide high - performance secure data service for grid users

    本文論述了griddaen - dai系統的邏輯結構、訪問協議、數據服務流程以及基於webservices 、 xml等技術的實現策略,重點研究數據庫網格中的元服務、數據統一訪問和管理等關鍵技術,設計和實現了支持多管理域的分散式元服務子系統和數據訪問服務子系統。其中元服務主要為整個系統提供各種元信息支持,它採用域名、數據對象的邏輯名稱、物理名稱和內部名稱對廣域環境下的數據庫數據進行了統一命名,實現了相應的名字映射機制和全局的用戶數據視圖服務,提供了數據庫資源的虛擬組織與管理方式;數據訪問服務通過提供可擴展的統一數據訪問和支持多種數據共享訪問模式,屏蔽了數據庫資源的分佈性和異構性,為用戶提供了統一透明的數據服務。
  13. Web service based distributed file service system, which is based on web, xml, and soap and built on hierarchical cache management, distributed mass - storage data management, access control, has a good extensibility, flexibility, reliability and security on the management system of enterprise ' s mass file date

    基於webservice構架的分散式文件服務系統基於web 、 xml和soap技術、以及層次式緩存管理、分散式海量數據管理、訪問控制等等多項技術,系統實現了企業級海量文件數據管理系統對可擴展、柔性、全分佈、可靠、安全等幾方面需求的支持。
  14. The paper also discusses build an authority control via end users access to make sure of the safety of the distributed database system. the replicate model in the sql sever 2000 is a tool to establish distributed database system quickly and facilities by configuration replication, founding publish, subscribing publish, applying original snapshot

    Sqlsever2000中的復制模型是快速建立分散式數據庫系統的方便工具,它通過配置復制、建立發布、訂閱發布、應用初始快照和同步數據等五個步驟來完成整個系統的建立與維護。
  15. Also part of the trusted computing base of the distributed system, and they flow together on the wire whenever a client is required to gain access to a particular object

    產生並頒發的,它也是分散式系統中可信計算基礎的一部分)中,每當客戶機被要求獲得對某個特定對象的訪問權限時,它們就會一起在線路上傳輸。
  16. The infrastructure provided by operation system decreases the difficulty of the of the distributed software developing. at the same way, the data access middle software of enterprise data access service can decrease the difficulty and cost of the enterprise application developing

    同時數據服務中間件也可作為一個基礎設施,降低了軟體開發過程中對開發人員技術要求多元化的需求,使那些非專業的開發人員也可以輕松加入到軟體開發中來,從而降低軟體的開發技術難度和成本。
  17. In distributed system which is created by the replication technology of sql - server, users can access, update both local data and remote replicative data. but because of the delay through network, local concurrency mechanism ca n ' t be aware of real - time operational status of other computers. even if there are conflicts in the system, each site ca n ' t gain real - time information

    利用sql - server的復制技術構建的分散式應用系統中,用戶可以訪問、更新本地的及復制到本地的數據,由於網路傳輸上的延遲,系統的並發控制機制不可能實時地了解其它計算機上的操作情況,即使發生沖突,也不可能實時得到反饋。
  18. At present, there is still a great deal of problem in the application of the secure model of the distributed database. under common circumstance, the secure usually is self - contradict with vivid in the database, while customer wanting to get stronger and vivid capability, needing the sacrifice to the database secure in some extent, vice versa. based on distributed database system and secure characteristic, this text analyzed its database safe strategy and related secure model, the system appearance and operate rule, the system appearance and operate rule, studied the customer role management, safe strategy and the role authorition problem, specially emphatically studied the bell. lapadula model. ( including its basic concept, system appearance, related operation and the secure rule gather ). according to the actual application environment, this text carried bell. lapadula model to entity to turn, through a research discover that model adoption compulsory secure strategy, attain a vivid secure control not easily, so increase the secure strategy of the independent access control mechanism to carry on " flabby " to the original model, and relatedly increased rule, put forward a new kind of secure mechanism - ddm ( the distributed database discretionary mandatory ). turn the rule principle according to the ddm secure mechanism and entity, designed a secure controller of database - dds ( the distributed database secure distribute ) controller adopted ddm secure mechanism, and established the secure control mechanism of the dds secure controller

    拉帕丟拉模型進行實體化,通過研究發現該模型採用強制性安全策略,不易做到靈活的安全控制,因此添加自主存取控制機制的安全策略對原模型進行「鬆弛」 ,並相應的增加了規則,提出一種新的安全機制? ? ddm ( distributeddatabasediscretionaryandmandatory ,分散式數據庫自主與強制性)安全機制。基於實體化規則原理,設計了一個採用ddm安全機制的數據庫控制器? ? dds ( distributeddatabasesecure ,分散式數據庫安全)控制器,並設置了dds安全控制器的安全控制機制。通過dds安全控制器在實踐中的應用,本文分析了dds安全控制器的各項功能和安全特點,設計了實際應用中dds控制器的管理方案,實現了分散式數據庫安全控制。
  19. As a centralized access control system, operating system is a good example, it based on gfac ( general framework of access control ). we introduced a distributed access control system, but new questions should be concerned

    它所實踐的訪問控制通用框架( gfac ) ,採用分層和隔離的方法,提供了一個高度抽象的訪問控制復用框架。
  20. This provides access to windows 2000 distributed file system fault tolerant and fail - over file shares specified in active directory

    可利用它訪問在active directory中設定的windows 2000分散式文件系統( dfs )容錯和故障轉移文件共享。
分享友人