期刊文献+
共找到15篇文章
< 1 >
每页显示 20 50 100
组织结构虚拟化是中小企业发展的成功之路 被引量:1
1
作者 张成斌 吴春修 《经济师》 北大核心 2002年第12期141-142,共2页
计算机和网络通信技术的迅猛发展 ,不仅深刻地影响并改变着传统的经济交易方式 ,以及人的生活工作方式 ,更重要的是它正在极大地影响和变革企业的组织结构模式。企业组织结构是企业对工作任务进行分工、分组和协调合作的方式。组织结构... 计算机和网络通信技术的迅猛发展 ,不仅深刻地影响并改变着传统的经济交易方式 ,以及人的生活工作方式 ,更重要的是它正在极大地影响和变革企业的组织结构模式。企业组织结构是企业对工作任务进行分工、分组和协调合作的方式。组织结构的合理与否 ,直接影响着组织功能的发挥。因此 ,企业管理能否成功或者它的结构是否有效 ,两者都取决于企业组织是否能根据时代的要求作出适度的调整。文章指出 ,占我国企业总数 99%的中小型企业 ,如何面对新经济的挑战 ,按照时代发展的要求 ,作出前瞻性的企业组织再造规划———虚拟化企业组织结构 ,是确保企业在市场竞争中处于优势地位的关键。 展开更多
关键词 组织结构虚拟 中小企业 中国 市场竞争
下载PDF
利用虚拟化应用结构提升高校信息服务质量 被引量:1
2
作者 马骁 《医学教育探索》 2009年第4期468-470,共3页
目前大多数应用服务还停留在单服务器、单应用系统的状态。每部署一个应用系统就需要增加新的硬件设备并且带来很多附加的成本。应用系统迁移到虚拟化应用结构当中,将有效地提高设备利用率,降低购买成本和运营成本,同时对部署和运营管... 目前大多数应用服务还停留在单服务器、单应用系统的状态。每部署一个应用系统就需要增加新的硬件设备并且带来很多附加的成本。应用系统迁移到虚拟化应用结构当中,将有效地提高设备利用率,降低购买成本和运营成本,同时对部署和运营管理以及灾备等多方面都带来诸多的好处。 展开更多
关键词 虚拟应用结构 应用信息系统 VMWARE
下载PDF
未来互联网虚拟化研究 被引量:16
3
作者 余涛 毕军 吴建平 《计算机研究与发展》 EI CSCD 北大核心 2015年第9期2069-2082,共14页
目前的互联网基于"端到端"原则设计,并且由许多目标与策略迥异的互联网服务提供商共同创建和维护.若想升级互联网体系结构,需要得到他们全体的一致同意,因此几乎不可能在互联网上部署全新的网络结构和协议.为了避免互联网结... 目前的互联网基于"端到端"原则设计,并且由许多目标与策略迥异的互联网服务提供商共同创建和维护.若想升级互联网体系结构,需要得到他们全体的一致同意,因此几乎不可能在互联网上部署全新的网络结构和协议.为了避免互联网结构出现僵化,人们提出可用网络虚拟化方法增加互联网范式的多样性.通过在一个公共的基底网络上引入多种不同的互联网结构,互联网虚拟化可以促进互联网创新并推动更多种类的新应用出现.分别从互联网体系结构和实验平台2个方面,对过去和当前正在进行的有关未来互联网的虚拟化研究进行分析、归类和概述,并总结未来互联网虚拟化研究的发展趋势. 展开更多
关键词 网络虚拟 虚拟网络 网络虚拟化结构 软件定义网络 未来互联网体系结构
下载PDF
桌面虚拟化信息安全的分析探究 被引量:2
4
作者 唐琳 孙叶 唐姝彦 《信息系统工程》 2016年第1期141-141,共1页
互联网的高速发展使虚拟与现实的边界日趋模糊,虚拟桌面的信息安全一直是科技工作者研究的重点问题之一,本文主要就桌面虚拟化的结构、病毒监测、入侵检测、数据信息等方面进行了系统的分析。
关键词 虚拟桌面 信息安全 虚拟化结构
下载PDF
P2P网络中结构化模型研究
5
作者 孙绰 《计算机光盘软件与应用》 2012年第7期83-84,共2页
本文对P2P网络进行了简要介绍,提出了目前P2P网络中结构化路由算法面临的几个问题,对P2P网络中的结构化模型进行了分析,并对其存在问题以及完善方向进行了一定探索。
关键词 P2P网络 HeteroChord 虚拟双层结构模型
下载PDF
大规模网络化仿真时间管理方法的设计与实现
6
作者 王月 李宏伟 孙黎阳 《计算机工程》 CAS CSCD 北大核心 2011年第S1期273-277,共5页
研究网络化仿真中时间管理实现结构新需求,分析对比传统时间管理实现结构,提出一种虚拟化中心分组式仿真运行支撑平台时间管理实现结构,该结构不仅能满足传统层次式时间管理服务优点,而且能支持仿真任务共同体动态按需构建与运行。利用... 研究网络化仿真中时间管理实现结构新需求,分析对比传统时间管理实现结构,提出一种虚拟化中心分组式仿真运行支撑平台时间管理实现结构,该结构不仅能满足传统层次式时间管理服务优点,而且能支持仿真任务共同体动态按需构建与运行。利用该结构对时间管理进行开发实现,并通过实验对其性能进行验证,实验结果证明,使用该结构进行时间管理开发,可以有效避免通信网络传输瓶颈,适用于栅格网下大规模仿真。 展开更多
关键词 时间管理 大规模仿真 层次式 虚拟中心结构
下载PDF
Research on Visualization of Long-staple Cotton Growth in Southern Xinjiang
7
作者 司春景 席亚军 《Agricultural Science & Technology》 CAS 2011年第11期1738-1740,共3页
Base on the related researches at home and abroad, using systematic analysis principle mathematical modeling techniques, analysis model of organ collection properties, root structure model, mechanism model of spatial ... Base on the related researches at home and abroad, using systematic analysis principle mathematical modeling techniques, analysis model of organ collection properties, root structure model, mechanism model of spatial form of organs and dynamic model of plant topological structure in line with the growth of long-staple cotton are constructed, and three-dimensional dynamic simulation of long-staple cotton in southern Xinjiang is finally achieved. The system can promote people's understanding and perception on growth process of long-staple cotton in southern Xinjiang, which provides support for analysis of relationship between structure and function of long-staple cotton, design of ideal plant and regulation of growth model. 展开更多
关键词 Virtual growth VISUALIZATION FACTORS Topological structure
下载PDF
未来互联网虚拟化研究
8
作者 刘辉辉 张弛 +1 位作者 曲峰 胡汉贤 《科学家》 2016年第1期34-35,共2页
互联网的原则设计一直都坚持着"端到端",是通过各种各样风格不一的互联网供应商共同创建与维护的,如果想要让互联网体系升级改变,要通过所有的供应商一致认可才行,所以要想在互联网上进行网络结构的重新部署是几乎不可能的。为了让互... 互联网的原则设计一直都坚持着"端到端",是通过各种各样风格不一的互联网供应商共同创建与维护的,如果想要让互联网体系升级改变,要通过所有的供应商一致认可才行,所以要想在互联网上进行网络结构的重新部署是几乎不可能的。为了让互联网结构僵化的局面不出现,人们提出了用网络虚拟化的方式来增加互联网的多样性。主要是在一个公用的基底网络上加入不同的互联网结构,互联网的创新与进步最佳的方式就是进行互联网虚拟化,带动更多种类的应用进入互联网中。 展开更多
关键词 网络虚拟 虚拟网络 网络虚拟化结构
原文传递
网络时代的银行业
9
作者 李旭旦 《广东职业技术师范学院学报》 2001年第3期20-23,共4页
互联网的神话使传统产业受到了前所未有的挑战,银行业也不例外,本文从通货电子化、银行非中介化、经营全能化、竞争多元化、组织结构虚拟化等方面进行了粗线条的探索。
关键词 网络时代 银行业 通货电子 银行非中介 经营全能 组织结构虚拟 竞争多元
下载PDF
Survivable Virtual Network Mapping Using Optimal Backup Topology in Virtualized SDN 被引量:14
10
作者 WANG Zhiming WU Jiangxing WANG Yu QI Ning LAN Julong 《China Communications》 SCIE CSCD 2014年第2期26-37,共12页
Software-Defined Network architecture offers network virtualization through a hypervisor plane to share the same physical substrate among multiple virtual networks. However, for this hypervisor plane, how to map ... Software-Defined Network architecture offers network virtualization through a hypervisor plane to share the same physical substrate among multiple virtual networks. However, for this hypervisor plane, how to map a virtual network to the physical substrate while guaranteeing the survivability in the event of failures, is extremely important. In this paper, we present an efficient virtual network mapping approach using optimal backup topology to survive a single link failure with less resource consumption. Firstly, according to whether the path splitting is supported by virtual networks, we propose the OBT-I and OBT-II algorithms respectively to generate an optimal backup topology which minimizes the total amount of bandwidth constraints. Secondly, we propose a Virtual Network Mapping algorithm with coordinated Primary and Backup Topology (VNM-PBT) to make the best of the substrate network resource. The simulation experiments show that our proposed approach can reduce the average resource consumption and execution time cost, while improving the request acceptance ratio of VNs. 展开更多
关键词 software-defined network virtualnetwork mapping SURVIVABILITY optimalbackup topology path splitting backupsharing
下载PDF
SDSA: A Framework of a Software-Defi ned Security Architecture 被引量:3
11
作者 LIU Yanbing LU Xingyu +1 位作者 JIAN Yi XIAO Yunpeng 《China Communications》 SCIE CSCD 2016年第2期178-188,共11页
The fact that the security facilities within a system are closely coupled and the security facilities between systems are unconnected results in an isolated protection structure for systems, and gives rise to a seriou... The fact that the security facilities within a system are closely coupled and the security facilities between systems are unconnected results in an isolated protection structure for systems, and gives rise to a serious challenge to system security integrations and system controls. Also, the need for diversified services and flexible extensions of network security asks for more considerations and contribu?tions from the perspective of software engineering in the process of designing and constructing security systems. Based on the essence of the virtualization technique and the idea of software-defined networks, we in this paper propose a novel software-defi ned security architecture for systems. By abstracting the traditional security facilities and techniques, the proposed security architecture provides a new, simple, effective, and programmable framework in which security operations and security controls can be decoupled, and thereby reduces the software module sizes, decreases the intensity of software deve?lopments, and improves the security extensibility of systems. 展开更多
关键词 information security networksecurity security architecture software-definedsecurity
下载PDF
Shape optimization of plate with static and dynamic constraints via virtual laminated element 被引量:1
12
作者 李芳 徐兴 凌道盛 《Journal of Zhejiang University Science》 EI CSCD 2003年第2期202-206,共5页
The virtual laminated element method (VLEM) can resolve structural shap e optimization problems with a new method. According to the characteristics of V LEM , only some characterized layer thickness values need be def... The virtual laminated element method (VLEM) can resolve structural shap e optimization problems with a new method. According to the characteristics of V LEM , only some characterized layer thickness values need be defined as design v ariables instead of boundary node coordinates or some other parameters determini ng the system boundary. One of the important features of this method is that it is not necessary to regenerate the FE(finite element) grid during the optimizati on process so as to avoid optimization failures resulting from some distortion grid elements. Th e thickness distribution in thin plate optimization problems in other studies be fore is of stepped shape. However, in this paper, a continuous thickness distrib ution can be obtained after optimization using VLEM, and is more reasonable. Fur thermore, an approximate reanalysis method named ″behavior model technique″ ca n be used to reduce the amount of structural reanalysis. Some typical examples are offered to prove the effectiveness and practicality of the proposed method. 展开更多
关键词 Optimum design Virtual laminated element method(V LEM) Behavior model technique Structural reanalysis
下载PDF
Scalable group management in large-scale virtualized clusters
13
作者 Zhou Wei Wang Lei +2 位作者 Meng Dan Yuan Lin Zhan Jianfeng 《High Technology Letters》 EI CAS 2011年第3期263-271,共9页
To save cost, more and more users choose provision resources at the granularity of virtual machines in cluster systems, especially data centres. Maintaining a consistent member view is the foundation of reliable clust... To save cost, more and more users choose provision resources at the granularity of virtual machines in cluster systems, especially data centres. Maintaining a consistent member view is the foundation of reliable cluster managements, and it also raises several challenge issues for large scale cluster systems deployed with virtual machines (which we call virtualized clusters). In this paper, we introduce our experience in design and implementation of scalable member view management on large-scale virtual clusters. Our research contributions include three-aspects : 1 ) we propose a scalable and reliable management infrastructure that combines a peer-to-peer structure and a hierarchy structure to maintain a consistent member view in virtual clusters; 2 ) we present a light-weighted group membership algorithm that can reach the consistent member view within a single round of message exchange; 3 ) we design and implement a scalable membership service that can provide virtual machines and maintain a consistent member view in virtual clusters. Our work is verified on Dawning 5000A, which ranked No. 10 of Top 500 super computers in November, 2008. 展开更多
关键词 virtualized clusters consistent member view scalable group membership SGMS
下载PDF
基于iSCSI协议的IP网络安全存储结构设计探讨 被引量:2
14
作者 李丽琳 刘柱文 《网络安全技术与应用》 2011年第2期7-9,共3页
iSCSI协议定义了在IP网络上传输SCSI命令、数据和状态的规则和方法,使得基于iSCSI协议的安全存储结构比传统的基于FC协议的存储在多方面都有明显的优势。设计新的基于iSCSI协议的安全存储结构时,要在能够发挥该网络存储优势的同时兼顾保... iSCSI协议定义了在IP网络上传输SCSI命令、数据和状态的规则和方法,使得基于iSCSI协议的安全存储结构比传统的基于FC协议的存储在多方面都有明显的优势。设计新的基于iSCSI协议的安全存储结构时,要在能够发挥该网络存储优势的同时兼顾保护IP网络的安全,以便新系统能够应用于需要构建基于iSCSI协议的安全存储结构并且对安全性较高的企业单位。研究采用外挂式存储虚拟化结构,实现IP网络安全存储要求。 展开更多
关键词 ISCSI协议 IP网络安全存储 外挂式存储虚拟化结构
原文传递
TWC and AWG based optical switching structure for OVPN in WDM-PON 被引量:2
15
作者 白晖峰 陈雨新 王秦 《Optoelectronics Letters》 EI 2015年第2期130-133,共4页
With the rapid development of optical elements with large capacity and high speed, the network architecture is of great importance in determing the performance of wavelength division multiplexing passive optical netwo... With the rapid development of optical elements with large capacity and high speed, the network architecture is of great importance in determing the performance of wavelength division multiplexing passive optical network (WDM-PON). This paper proposes a switching struc^re based on the tunable wavelength converter (TWC) and the ar- rayed-waveguide grating (AWG) for WDM-PON, in order to provide the function of opitcal virtual private network (OVPN). Using the tunable wavelength converter technology, this switch structure is designed and works between the optical line terminal (OLT) and optical network units (ONUs) in the WDM-PON system. Moreover, the wavelength assignment of upstream/downstream can be realized and direct communication between ONUs is also allowed by privite wavelength channel. Simulation results show that the proposed TWC and AWG based switching structure is able to achieve OVPN function and to gain better performances in terms of bite error rate (BER) and time delay. 展开更多
关键词 Arrayed waveguide gratings Network architecture Optical communication Optical waveguides Switching Switching systems Telecommunication networks Time delay Virtual private networks WAVEGUIDES Wavelength division multiplexing
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部