期刊文献+

一种支持Java应用中计算按需远程执行的方法研究

Research on a Method of Supporting Computing Execution on Demand in Java Application
下载PDF
导出
摘要 按需远程执行是基于软件应用的方式,实现按需占有资源信息,保障应用性能的同时促进资源利用效率的合理提升。基于此,提出了一种建立在Java应用之上的计算按需远程执行方法。远程执行涉及的核心技术是计算按需远程执行。设计模式过程中,提出了应用类别划分的方法。此外,分析、研究了支持Java应用中计算按需执行的决策过程,以期引起业内人士的关注与重视。 On-demand remote execution is based on software application,which realizes on-demand possession of resource information,guarantees application performance and promotes rational improvement of resource utilization efficiency.Based on this,a method of computing on demand remote execution based on Java application is proposed.The core technology of remote execution is computing on demand remote execution.In the process of design pattern,the method of application classification is proposed.In addition,the decision-making process supporting on-demand computing in Java applications is analyzed and studied in order to attract the attention of the industry.
作者 苑文建 Yuan Wenjian(Jiangxi Vocational College of Applied Engineering, Pingxiang Jiangxi 337000, China)
出处 《信息与电脑》 2018年第23期105-106,共2页 Information & Computer
关键词 远程执行 JAVA 按需占有资源 remote execution Java occupying resources on demand
  • 相关文献

参考文献4

二级参考文献90

  • 1Armbrust M. Fox A. Griffith R. et al. A view of cloud computing. Communications of the ACM. 2010. 53 (4): 50-58.
  • 2Chen Y. Paxson V. Katz R. What's new about cloud computing security? University of California at Berkley. Berkeley USA: Technical Report UCB/EECS-2010-5. 2010.
  • 3Ko R K L.Jagadpramana P. Mowbray M. et al. TrustCloud: A framework for accountability and trust in cloud computing/ / Proceedings of the 2nd IEEE World Congress on Services. Washington. USA. 2011: 584-588.
  • 4Sailer R. Zhang X.Jaeger T. van Doorn L. Design and implementation of a TCG- based integrity measurement architecture/ /Proceedings of the 13th USENIX Security Symposium. San Diego. USA. 2004: 223-238.
  • 5Sadeghi A-R. Schneider T. Winandy M. Token-based cloud computing: Secure outsourcing of data and arbitrary computations with lower latency/ /Proceedings of the 3rd Conference on Trust and Trustworthy Computing. Berlin. Germany. 2010: 417-429.
  • 6Parno B. McCuneJ M. Perrig A. Bootstrapping Trust in Modern Computers. Germany: Springer. 2011.
  • 7Seshadri A. Luk M. Shi E. et al. Pioneer: Verifying integrity and guaranteeing execution of code on legacy platforms/ / Proceedings of the ACM Symposium on Operating Systems Principles(SOSP). Brighton. UK. 2005: 1-15.
  • 8Anderson D P. CobbJ. Korpela E. et al. SETI@home: An experiment in public-resource computing. Communications of the ACM. 2002. 45(1): 56-61.
  • 9Castro M. Liskov B. Practical Byzantine fault tolerance and proactive recovery. ACM Transactions on Computer Systems. 2002. 20(4): 398-461.
  • 10Haeberlen A. Kouznetsov P. Druschel P. PeerReview , Practical accountability for distributed systems//Proceedings of the 21st ACM Symposium on Operating Systems Principles (SOSP). Stevenson. USA. 2007: 175-188.

共引文献25

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部