期刊文献+
共找到3篇文章
< 1 >
每页显示 20 50 100
基于多级信息网格的海量遥感数据存储管理研究 被引量:15
1
作者 李爽 程承旗 +2 位作者 童晓冲 陈波 翟卫欣 《测绘学报》 EI CSCD 北大核心 2016年第B12期106-114,共9页
随着遥感探测技术的高速发展,空间信息呈爆炸式增长。针对目前现有遥感数据存储管理系统数据量大、数据来源丰富、查询检索慢等问题,本文提出了一种基于GeoSOT网格的遥感数据组织方案,并首次在关系型数据库中增加数组数据类型的剖分网... 随着遥感探测技术的高速发展,空间信息呈爆炸式增长。针对目前现有遥感数据存储管理系统数据量大、数据来源丰富、查询检索慢等问题,本文提出了一种基于GeoSOT网格的遥感数据组织方案,并首次在关系型数据库中增加数组数据类型的剖分网格编码列,来存储遥感影像元数据中空间信息,对数据进行逻辑剖分索引,从而实现影像数据的统一存储与空间区域检索。试验选择Kingbase关系型数据库作为测试平台,通过模拟全球范围的影像数据,与Oracle平台进行对比试验。结果表明本文的检索效率具有明显优势,可有效提高遥感数据整合、检索效率,为现有遥感数据存储中心或管理系统提供了一种高效、可行的方案。 展开更多
关键词 GeoSOT网格 遥感影像 数据 数组数据结构 倒排索引
下载PDF
Membership Proof and Verification in Authenticated Skip Lists Based on Heap 被引量:1
2
作者 Shuanghe Peng Zhige Chen Deen Chen 《China Communications》 SCIE CSCD 2016年第6期195-204,共10页
How to keep cloud data intact and available to users is a problem to be solved. Authenticated skip list is an important data structure used in cloud data integrity verification. How to get the membership proof of the ... How to keep cloud data intact and available to users is a problem to be solved. Authenticated skip list is an important data structure used in cloud data integrity verification. How to get the membership proof of the element in authenticated skip list efficiently is an important part of authentication. Kaouthar Blibech and Alban Gabillon proposed a head proof and a tail proof algorithms for the membership proof of elements in the authenticated skip list. However, the proposed algorithms are uncorrelated each other and need plateau function. We propose a new algorithm for computing the membership proof for elements in the authenticated skip list by using two stacks, one is for storing traversal chain of leaf node, the other is for storing authentication path for the leaf. The proposed algorithm is simple and effective without needing plateau function. It can also be applicable for other similar binary hash trees. 展开更多
关键词 authenticated skip list max heap membership proof STACK algorithms
下载PDF
Understanding BitTorrent Through Real Measurements
3
作者 Wojciech Mazurczyk Pawe Kopiczko 《China Communications》 SCIE CSCD 2013年第11期107-118,共12页
In this paper, we present the resuks of the BitTorrent measurement study. Two sources of BitTorrent data were utilised: meta- data files and the logs of one of the currently most popular BitTorrent clients--gTorrent.... In this paper, we present the resuks of the BitTorrent measurement study. Two sources of BitTorrent data were utilised: meta- data files and the logs of one of the currently most popular BitTorrent clients--gTorrent. Experimental data were collected for fifteen days from the popular torrent-discovery site thepiratebay.org (more than 30 000 torrents were captured and analysed). During this pe- riod the activity and logs of an unmodified version of μTorrent client downloading ses- sions were also captured. The obtained ex- perimental results are swarm-oriented, which allows us to look at BitTorrent and its users from an exchanged resources perspective. Moreover, comparative analysis of the clients' connections with and without the μTP proto- col is carried out to verify the extent to which μTP improves BitTorrent transmissions. To the authors' best knowledge, none of the previous studies have addressed these issues. 展开更多
关键词 BitTorrent traffic analysis meas-urement study meta-data files μTorrent μTP
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部