期刊文献+

构建公路规费征收管理网格

Construction of the Road Charge Collection Management Grid
下载PDF
导出
摘要 本文首先分析了C/S+T/S结构升级的多层体系结构公路征收管理应用系统平台,该系统具有极好的适用性、实用性、灵活性和先进性。但是随着信息化建设跨越式发展,需要远程互联网,为此,根据网格体系结构的五层沙漏模型,提出建设若干个高性能数据处理中心,将高性能计算机、存储系统集中起来,构建公路规费征收管理网格,实现信息一体化。 This paper analyses the application system flat of multilayer system structure in road collection management developed from C/S and T/S structure, This system has perfect applicability, practicability, flexibility, advancement. At the same time, with the immense development in information, the remote network will be in great demand. Therefore, according to the five layer sandglass model in grid system structure, we propose to construct many high performance data process center, integrate the high performance computer with storage system, construct the road fee levying management grid, and realize the integrity of information.
作者 李芸
出处 《电脑知识与技术》 2006年第8期62-63,共2页 Computer Knowledge and Technology
关键词 安全 管理系统 模型 一体化 公路规费征收系统 data safety management system pattern lntegaton road fee levying system
  • 相关文献

参考文献2

二级参考文献14

  • 1王鼎兴,庄伟强.一种实现并行计算的新主流技术──NOW[J].小型微型计算机系统,1995,16(2):29-34. 被引量:22
  • 21,Bishop M. A model of security monitoring. In: Proceedings of the 5th Annual Computer Security Applications Conference. 1989. 46~52. http://seclab.cs. ucdavis.edu/papers.html
  • 32,Staniford-Chen S, Cheung S, Crawford R et al. GrIDS: a graph based intru sion detection system for large networks. In: Proceedings of the 19th National Information Systems Security Conference, Vol 1. National Institute of Standards a nd Technology, 1996. 361~370
  • 43,Hochberg J, Jackson K, Stallings C et al. NADIR: an automated system for detecting network intrusion and misuse. Computers and Security, 1993,12(3):235~2 48
  • 54,White G B, Fisch E A, Pooch U W. Cooperating security managers: a peer-based intrusion detection system. IEEE Network, 1996,10(1):20~23
  • 65,Forrest S, Hofmeyr S A, Somayaji A. Computer immunology. Communications of th e ACM, 1997,40(10):88~96
  • 76,Hunteman W. Automated information system alarm system. In: Proceedings of the 20th National Information Systems Security Conference. National Institute of Standards and Technology, 1997
  • 87,Porras P A, Neumann P G. EMERALD: event monitoring enabling responses to anom alous live disturbances. In: Proceedings of the 20th National Information System s Security Conference. National Institute of Standards and Technology, 1997
  • 9Bell G.. Ultracomputers: a teraflop before its time[J]. Communications of the ACM, August 1992, 27~47
  • 10Grand Challenges: High-performance computing and communications[C]. Committee on Physical, Mathematical and Engineering Sciences, National Science Foundation, Washington, D.C., 1991

共引文献127

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部