期刊文献+

分布式Memcached在社交游戏中的应用研究 被引量:4

Research and Application of Distributed Memcached in the Social Game
下载PDF
导出
摘要 为了解决社交游戏服务器端逻辑量大、高负载、高并发的问题,通过对Memcached的应用和研究,提出了利用分布式Mem-cached来解决问题,分析了根据余数计算分散的分布式算法的缺点,采用更高效的Consistent Hashing算法来进行分布式部署。从而很好地解决了社交游戏的高负载问题。 To solve large social gaming, high load, high concurrency issues, through the application and research of Memcached is proposed to solve the problem using distributed Memcached. analyzed the number of calculations based on more than the shortcomings of decentralized distributed algorithm, using Consistent Hashing algorithm more efficient for distributed deployment. Which solves the problem of high-load social game.
作者 陈俊 黄维平 CHEN Jun, HUANG Wei-ping (China University of Geosciences, Beijing 100083, China)
机构地区 中国地质大学
出处 《电脑知识与技术》 2011年第4期2301-2305,共5页 Computer Knowledge and Technology
关键词 内存缓存 分布式 社交游戏 MEMCACHED Memcache distributed memory cache social game memcached memcache
  • 相关文献

参考文献7

  • 1张尧学,史美林.计算机操作系统教程[M].北京:清华大学出版社,2003.
  • 2张益新,沈雁.算法引论[M].北京:国防科技大学出版社,1997.
  • 3单国栋,戴英侠,王航.计算机漏洞分类研究[J].计算机工程,2002,28(10):3-6. 被引量:58
  • 4Elbaum S,Rothermel G.Leveraging user-session data to support web application testing[J].IEEE Transac-tions on Software Engineering,2005,31(3):187-202.
  • 5Wille R.Restructuring lattice theory:an approach based on hierarchies of concepts[J].Ordered Sets,1982:445-470.
  • 6Martin P,Eklund P W.Knowledge retrieval and the world wide web[J].IEEE International Conference on Software Engineering Research,Management and Applications,2000,3(15):18-25.
  • 7Ping Ng.A concept lattice approach for requirements validation with UML state machine model[C].IEEE International Conference on Software Engineering Re-search,Management and Applications,2007:393-400.

二级参考文献6

  • 1[3]Bishop M,Bailey D.A Critical Analysis of Vulnerability Taxonomies. Department of Computer Science at the University of California at Davis, 1996
  • 2[4]Aslam T,Krsul I.Use ofa Taxonomy of Security Faults. Eugene Spaff ord.In Proceedings of the 19th National Information Systems Security Conference,1996
  • 3[5]Krsul 0Software Vulnerability Analysis. Department of Computer Scie nces, Purdue University, 1998
  • 4[6]Knight E.Computer Vulnerabilities.http://www.securityparadigmcom/, 2000
  • 5[1]Denning D E.Cryptography and Data Security. Addison-Wesley Publis hing Company, 1983
  • 6[2]Marick B.A Survey of Software Fault Surveys. University of Illinois at rbana-Champaign, 1990

共引文献57

同被引文献19

  • 1李敏,林玉锁.城市环境铅污染及其对人体健康的影响[J].环境监测管理与技术,2006,18(5):6-10. 被引量:94
  • 2FAO/ISRIC.FAO-ISRIC Soil Database(SDB).World SoilResonres, 1989,64.
  • 3De Kimpe C R,Morel J L.Urban soil management:A grow-ing concem[J].Soil Science,2000, 165:31-40.
  • 4吴欣铠.memcached技术的社交游戏中的应用研究[D].南京:南京大学,2012.
  • 5熊小华,王帅,宁爱兵.基于Web服务的大数据访问性能优化研究[J].上海第二工业大学学报,2007,24(4):271-275. 被引量:4
  • 6(美)PieterHinens.ZeroMQ:云时代极速消息通信库[M].卢涛,李颖译.北京:电子工业出版社,2015.
  • 7Kjetil Raaen,Hard Espeland& HonKvale Stensland.ADemons- tration Of aLoekless,Relaxed Atomicity State Parallel Game Server[D].NorwaySimulaResearchLaboratory,2010.
  • 8(美)PieterHinqens.ZeroMQ:云时代极速消息通信库[M].卢涛.李颖译.北京:电子工业出版社.2015.
  • 9深入理解Nginx[M].陶辉.北京:机械工业出版社.2013.
  • 10(美)W.RichardStevens,(美)BillFenner,(美)AndrewM.Rud-off.Tudoff.UNIX网络编程卷1:套接字联网API[M].3版.北京:人民邮电出版社.2010.

引证文献4

二级引证文献15

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部