期刊文献+
共找到3篇文章
< 1 >
每页显示 20 50 100
Emergency algorithm for enhanced survivability of key service
1
作者 赵国生 王慧强 王健 《Journal of Southeast University(English Edition)》 EI CAS 2007年第3期443-446,共4页
To work out a solution for answering the question when it is suitable for emergency response strategies to be executed, an emergency algorithm for enhanced survivability of a key service is presented. First, based on ... To work out a solution for answering the question when it is suitable for emergency response strategies to be executed, an emergency algorithm for enhanced survivability of a key service is presented. First, based on the central limit theorem and the hypothesis testing theory, the confidence interval of each key service's history average service response time in the host server and the spare server can be figured out, respectively. This can also be updated dynamically by a proposed method using the method of time slide window. Then, according to the five kinds of distributed situations of the current service response time' s confidence interval in the host server and the spare server, the proposed algorithm can dynamically choose the appropriate emergency policies such as resource reconfiguration, service degradation or service drifting, etc. in fight time. Thus, the key service request can be finished within its expected deadline by users as far as possible. Furthermore, the whole process of dynamic configuration is transparent to users. Finally, simulation tests are performed to prove the feasibility. 展开更多
关键词 emergency response SURVIVABILITY key service confidence interval
下载PDF
Privacy-Preserving Top-k Keyword Similarity Search over Outsourced Cloud Data 被引量:1
2
作者 TENG Yiping CHENG Xiang +2 位作者 SU Sen WANG Yulong SHUANG Kai 《China Communications》 SCIE CSCD 2015年第12期109-121,共13页
In this paper,we study the problem of privacy-preserving top-k keyword similarity search over outsourced cloud data.Taking edit distance as a measure of similarity,we first build up the similarity keyword sets for all... In this paper,we study the problem of privacy-preserving top-k keyword similarity search over outsourced cloud data.Taking edit distance as a measure of similarity,we first build up the similarity keyword sets for all the keywords in the data collection.We then calculate the relevance scores of the elements in the similarity keyword sets by the widely used tf-idf theory.Leveraging both the similarity keyword sets and the relevance scores,we present a new secure and efficient treebased index structure for privacy-preserving top-k keyword similarity search.To prevent potential statistical attacks,we also introduce a two-server model to separate the association between the index structure and the data collection in cloud servers.Thorough analysis is given on the validity of search functionality and formal security proofs are presented for the privacy guarantee of our solution.Experimental results on real-world data sets further demonstrate the availability and efficiency of our solution. 展开更多
关键词 similarity keyword preserving cloud collection privacy validity files ranking separate
下载PDF
走捷径,用批处理优化系统
3
作者 热心网友 《数码先锋》 2006年第4期60-61,共2页
系统优化是个老生常谈的话题了,网上类似优化文章也比比皆是,不过大多操作繁琐,如何才能快速优化系统。借用批处理来"批量"优化系统是个省时高效的好方法!
关键词 系统桌面 运行命令 启动速度 快捷方式 垃圾文件 计算机配置 后台服务 图片处理 任务管理器 关键服
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部