期刊文献+

P2P网络中移动agent的搜索资源分配研究 被引量:3

The Allocation of Search Resources on Mobile Agent in P2P Network
下载PDF
导出
摘要 针对P2P网络中的资源搜索问题,讨论了非结构化P2P网络中的几种搜索方案,着重关注了基于移动a-gent的资源搜索方法,针对搜索资源有限、网络节点的异质性等约束提出了基于最优搜索理论的移动agent搜索资源的全局最优分配模型,并与通常情况下的均匀资源分配进行了比较. The searching resources issue is very important in P2P network. This paper leads several search programs in the unstructured P2P networks. Moreover, focusing on the resources based on mobile agent search methods, the authors put on the global optimal resource allocation model according to optimal search theory and mobile agent in variety constraints limited resources, heterogeneity network, etc. ) and compare with the uniform allocation of resources.
出处 《西南师范大学学报(自然科学版)》 CAS CSCD 北大核心 2010年第1期164-167,共4页 Journal of Southwest China Normal University(Natural Science Edition)
基金 科技部国际合作项目(2009DFA12100)
关键词 P2P网络 移动AGENT 最优搜索理论 peer-to-peer network mobile agent optimal search theory
  • 相关文献

参考文献7

  • 1Lange D, Oshima M. Seven Good Reasons for Mobile Agents [J]. Communications of the ACM, 1999, 42(3) : 88 --89.
  • 2Stone L D. Theroy of Optimal Search [M]. 2nd ed. Arlington: ORSA Books, 1989.
  • 3Heinzelman W R, Chandrakasan A, Balakrishnan H. Energy-efficient Communication Protocol for Wireless Microsensor, Networks[C]//Proc 22rd Hawaii Int'I eonf on System Sciences. NY: IEEE Press, 2000:4 --7.
  • 4Manjeshwar A, Agrawal D P. A Routing Protocol for Enhanced Efficiency in Wireless Sensor Networks [C]//Proc 15th Int'l Parallel and Distributed Processing Symp(IPDPS'01). NY: IEEE Press, 2001: 23- 27.
  • 5Park Hyojin, Yang Jinhong, Park Juyoung, et al. A Survey on Peer-to Peer Overlay Network SchemesAdvanced Communication Technology [C]//ICACT 2008. NY: IEEE Press, 2008:986 --988.
  • 6Zhu Qingxin, John Oommen. On the Optimal Search Problem: the Case When the Target Distribution is Unknowa[C]// SCCC'97. NY: IEEEPress, 1997: 268--277.
  • 7Halgamuge M N, Guru S M, Jennings A. Energy Efficient Cluster Formation in Wireless Sensor Networks[C]//ICT' 03. NY: IEEE Press, 2003: 23.

同被引文献29

  • 1李明,李祥和.局域网通信中的安全问题及解决方案[J].微计算机信息,2006,22(02X):17-19. 被引量:5
  • 2胡丽娜,须文波.一个基于移动Agent的分布式入侵检测系统模型[J].微计算机信息,2006,22(07X):139-141. 被引量:6
  • 3苏威.计算机辅助工程中心安全管理及局域网ARP病毒防治.实验技术与管理,2009,26(3):246-250.
  • 4徐宁,朱连津,黄大刚.高校计算机机房的病毒防护[J].实验室科学,2007,10(4):168-169. 被引量:12
  • 5屈艳华,高振波,韩坤.计算机房网络系统安全与管理[J].实验室科学,2007,10(4):170-171. 被引量:5
  • 6Fabio Bellifemine, Developing Multi-Agent Systems with JADE [ M ]. Wiley,2007.
  • 7M ITZENMACH ER M. The Power of Two Choices in Randomized lo ad Balancing [J]. IEEE Transactions on Parallel and Distributed Systems, 2001, 12(10): 1094-1104.
  • 8MEZMAZ M, MELAB N, KESSACI Y, et al. A Parallel Bi-Objective Hybrid Metaheuristic for Energy-Aware Schedu- ling for Cloud Computing Systems[J]. Journal of Parallel Distribute Computing, 2012, 71(1) : 1497-1508.
  • 9DAH LIN M. Interpreting Stale Load Information [J]. IEEE Transactions on Parallel and Distributed System s, 2000, 11(10) : 1033-1047.
  • 10SON DUY DAO, KAZEM ABHARY, ROMEO MARIAN. Optimisation of Resource Scheduling in VCIM Systems Using Genetic Algorithm [J]. International Journal of Advanced Research in Artificial Intelligence, 2012, 1(8): 49-56.

引证文献3

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部