期刊文献+
共找到745篇文章
< 1 2 38 >
每页显示 20 50 100
Blockchain with Explainable Artificial Intelligence Driven Intrusion Detection for Clustered IoT Driven Ubiquitous Computing System
1
作者 Reda Salama Mahmoud Ragab 《Computer Systems Science & Engineering》 SCIE EI 2023年第9期2917-2932,共16页
In the Internet of Things(IoT)based system,the multi-level client’s requirements can be fulfilled by incorporating communication technologies with distributed homogeneous networks called ubiquitous computing systems(... In the Internet of Things(IoT)based system,the multi-level client’s requirements can be fulfilled by incorporating communication technologies with distributed homogeneous networks called ubiquitous computing systems(UCS).The UCS necessitates heterogeneity,management level,and data transmission for distributed users.Simultaneously,security remains a major issue in the IoT-driven UCS.Besides,energy-limited IoT devices need an effective clustering strategy for optimal energy utilization.The recent developments of explainable artificial intelligence(XAI)concepts can be employed to effectively design intrusion detection systems(IDS)for accomplishing security in UCS.In this view,this study designs a novel Blockchain with Explainable Artificial Intelligence Driven Intrusion Detection for IoT Driven Ubiquitous Computing System(BXAI-IDCUCS)model.The major intention of the BXAI-IDCUCS model is to accomplish energy efficacy and security in the IoT environment.The BXAI-IDCUCS model initially clusters the IoT nodes using an energy-aware duck swarm optimization(EADSO)algorithm to accomplish this.Besides,deep neural network(DNN)is employed for detecting and classifying intrusions in the IoT network.Lastly,blockchain technology is exploited for secure inter-cluster data transmission processes.To ensure the productive performance of the BXAI-IDCUCS model,a comprehensive experimentation study is applied,and the outcomes are assessed under different aspects.The comparison study emphasized the superiority of the BXAI-IDCUCS model over the current state-of-the-art approaches with a packet delivery ratio of 99.29%,a packet loss rate of 0.71%,a throughput of 92.95 Mbps,energy consumption of 0.0891 mJ,a lifetime of 3529 rounds,and accuracy of 99.38%. 展开更多
关键词 Blockchain internet of things ubiquitous computing explainable artificial intelligence CLUSTERING deep learning
下载PDF
基于Pervasive Computing技术的外语网络交互模态话语构想 被引量:4
2
作者 周文娟 《现代教育技术》 CSSCI 2011年第6期91-95,共5页
文章以"Pervasive Computing"为技术支撑,以"系统功能语言学"为理论研究框架,以外语教学领域的模态话语研究为表现形式,探索创建多模态视野下的外语网络交互教学模态,即供交际双方或多方信息全球实时传达、同步立... 文章以"Pervasive Computing"为技术支撑,以"系统功能语言学"为理论研究框架,以外语教学领域的模态话语研究为表现形式,探索创建多模态视野下的外语网络交互教学模态,即供交际双方或多方信息全球实时传达、同步立体交互的多模态教学模式。 展开更多
关键词 pervasive computing 话语语境 网络交互 模态构想
下载PDF
Trust Based Pervasive Computing 被引量:2
3
作者 LI Shiqun Shane Balfe +1 位作者 ZHOU Jianying CHEN Kefei 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1477-1480,共4页
Pervasive computing environment is a distributed and mobile space. Trust relationship must be established and ensured between devices and the systems in the pervasive computing environment. The trusted computing (TC... Pervasive computing environment is a distributed and mobile space. Trust relationship must be established and ensured between devices and the systems in the pervasive computing environment. The trusted computing (TC) technology introduced by trusted computing group is a distributed-system-wide approach to the provisions of integrity protection of resources. The TC's notion of trust and security can be described as conformed system behaviors of a platform environment such that the conformation can be attested to a remote challenger. In this paper the trust requirements in a pervasive/ubiquitous environment are analyzed. Then security schemes for the pervasive computing are proposed using primitives offered by TC technology. 展开更多
关键词 trusted computing pervasive computing pervasive computing security
下载PDF
Development of Ubiquitous Simulation Service Structure Based on High Performance Computing Technologies 被引量:2
4
作者 Sang-Hyun CHO Jeong-Kil CHOI 《Journal of Materials Science & Technology》 SCIE EI CAS CSCD 2008年第3期374-378,共5页
The simulation field became essential in designing or developing new casting products and in improving manufacturing processes within limited time, because it can help us to simulate the nature of processing, so that ... The simulation field became essential in designing or developing new casting products and in improving manufacturing processes within limited time, because it can help us to simulate the nature of processing, so that developers can make ideal casting designs. To take the prior occupation at commercial simulation market, so many development groups in the world are doing their every effort. They already reported successful stories in manufacturing fields by developing and providing the high performance simulation technologies for multipurpose. But they all run at powerful desk-side computers by well-trained experts mainly, so that it is hard to diffuse the scientific designing concept to newcomers in casting field. To overcome upcoming problems in scientific casting designs, we utilized information technologies and full-matured hardware backbones to spread out the effective and scientific casting design mind, and they all were integrated into Simulation Portal on the web. It professes scientific casting design on the NET including ubiquitous access way represented by "Anyone, Anytime, Anywhere" concept for casting designs. 展开更多
关键词 Parallel computation Message passing interface (MPI) Shared memory processing (SMP) CLUSTERING ubiquitous
下载PDF
Energy-efficient and security-optimized AES hardware design for ubiquitous computing 被引量:2
5
作者 Chen Yicheng Zou Xuecheng Liu Zhenglin Han Yu Zheng Zhaoxia 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2008年第4期652-658,共7页
Ubiquitous computing must incorporate a certain level of security. For the severely resource constrained applications, the energy-efficient and small size cryptography algorithm implementation is a critical problem. H... Ubiquitous computing must incorporate a certain level of security. For the severely resource constrained applications, the energy-efficient and small size cryptography algorithm implementation is a critical problem. Hardware implementations of the advanced encryption standard (AES) for authentication and encryption are presented. An energy consumption variable is derived to evaluate low-power design strategies for battery-powered devices. It proves that compact AES architectures fail to optimize the AES hardware energy, whereas reducing invalid switching activities and implementing power-optimized sub-modules are the reasonable methods. Implementations of different substitution box (S-Boxes) structures are presented with 0.25μm 1.8 V CMOS (complementary metal oxide semiconductor) standard cell library. The comparisons and trade-offs among area, security, and power are explored. The experimental results show that Galois field composite S-Boxes have smaller size and highest security but consume considerably more power, whereas decoder-switch-encoder S-Boxes have the best power characteristics with disadvantages in terms of size and security. The combination of these two type S-Boxes instead of homogeneous S-Boxes in AES circuit will lead to optimal schemes. The technique of latch-dividing data path is analyzed, and the quantitative simulation results demonstrate that this approach diminishes the glitches effectively at a very low hardware cost. 展开更多
关键词 encryption and decryption power analysis model inhomogeneous S-Boxes ubiquitous computing advanced encryption standard.
下载PDF
A PRIVACY-PRESERVING AUTHENTICATION SCHEME USING BIOMETRICS FOR PERVASIVE COMPUTING ENVIRONMENTS 被引量:1
6
作者 Yao Lin Kong Xiangwei +2 位作者 Wu Guowei Fan Qingna Lin Chi 《Journal of Electronics(China)》 2010年第1期68-78,共11页
In pervasive computing environments,users can get services anytime and anywhere,but the ubiquity and mobility of the environments bring new security challenges.The user and the service provider do not know each other ... In pervasive computing environments,users can get services anytime and anywhere,but the ubiquity and mobility of the environments bring new security challenges.The user and the service provider do not know each other in advance,they should mutually authenticate each other.The service provider prefers to authenticate the user based on his identity while the user tends to stay anonymous.Privacy and security are two important but seemingly contradictory objectives.As a result,a user prefers not to expose any sensitive information to the service provider such as his physical location,ID and so on when being authenticated.In this paper,a highly flexible mutual authentication and key establishment protocol scheme based on biometric encryption and Diffie-Hellman key exchange to secure interactions between a user and a service provider is proposed.Not only can a user's anonymous authentication be achieved,but also the public key cryptography operations can be reduced by adopting this scheme.Different access control policies for different services are enabled by using biometric encryption technique.The correctness of the proposed authentication and key establishment protocol is formally verified based on SVO logic. 展开更多
关键词 PRIVACY SECURITY Biometric encryption pervasive computing Environments(PCEs)
下载PDF
An Indoor Ubiquitous Computing Environment Based on Location-awareness 被引量:1
7
作者 蒲芳 孙道清 +2 位作者 曹奇英 蔡海滨 李永宁 《Journal of Donghua University(English Edition)》 EI CAS 2006年第4期76-79,共4页
To provide the right services or information to the right users, at the right time and in the right place in ubiquitous computing environment, an Indoor Ubiquitous Computing Environment based on Location-Awareness, IU... To provide the right services or information to the right users, at the right time and in the right place in ubiquitous computing environment, an Indoor Ubiquitous Computing Environment based on Location-Awareness, IUCELA, is presented in this paper. A general architecture of IUCELA is designed to connect multiple sensing devices with location-aware applications. Then the function of location-aware middleware which is the core component of the proposed architecture is elaborated. Finally an indoor forum is taken as an example scenario to demonstrate the security, usefulness, flexibility and robustness of IUCELA. 展开更多
关键词 计算机技术 局域网 网络平台 中间设备
下载PDF
Assessing Level of Ubiquitous Computing Services for Ubiquitous Business Design 被引量:1
8
作者 KWON Ohbyung 《Journal of Electronic Science and Technology of China》 2004年第3期140-145,共6页
We are entering into a new era of enterprise computing that is characterized by an emphasis on broadband convergence, knowledge sharing, and calm services. Some people refer to this as the 'ubiquitous network'... We are entering into a new era of enterprise computing that is characterized by an emphasis on broadband convergence, knowledge sharing, and calm services. Some people refer to this as the 'ubiquitous network' business model because its focus is on a high degree of connectivity between a company and its customers, suppliers, and channel partners. Moreover, immediate access to ideas, goods, and services will be of greater value than the traditional model of permanent and ponderous possession. This paper illustrates how ubiquitous computing technology can be combined with legacy computer-based information systems, along with thoughts on relevant issues of ubiquitous commerce. We also propose a model for how to assess levels of ubiquitous computing services. 展开更多
关键词 ubiquitous computing service AHP ubiquitous business
下载PDF
UCIMssp:Ubiquitous Computing Identification Mechanism Based on SPKI/SDSI and P2P 被引量:1
9
作者 孙道清 蒲芳 曹奇英 《Journal of Donghua University(English Edition)》 EI CAS 2008年第4期475-483,共9页
Ubiquitous computing systems typically have lots of security problems in the area of identification supply by means of classical Public Key Infrastructure(PKI)methods.The limited computing resources,the disconnection ... Ubiquitous computing systems typically have lots of security problems in the area of identification supply by means of classical Public Key Infrastructure(PKI)methods.The limited computing resources,the disconnection network,the classification requirements of identification,the requirement of trust transfer and cross identification,the bidirectional identification,the security delegation and the privacy protection etc are all these unsolved problems.In this paper,UCIMssp,a new novel ubiquitous computing identification mechanism based on SPKI/SDSI and Peer-to-Peer(P2P)is presented.SPKI-based authorization is exploited in UCIMssp to solve the above problems in the small-scale ubiquitous computing environment.The DHT and flooding technology of P2P overlay network over the Internet is expanded to solve the routing search in the large-scale ubiquitous computing environment.The architecture of ubiquitous computing environment,the validation of identification requisition,the identification authorization processes and the identification supply processes etc of UCIMssp are described in the paper.The performance analysis shows that UCIMssp is a suitable security solution used in the large-scale ubiquitous computing environment. 展开更多
关键词 识别系统 网络安全 SPKI/SDSI 预防措施
下载PDF
Ubiquitous Computing Identity Authentication Mechanism Based on D-S Evidence Theory and Extended SPKI/SDSI 被引量:1
10
作者 孙道清 曹奇英 《Journal of Donghua University(English Edition)》 EI CAS 2008年第5期564-570,共7页
Ubiquitous computing systems typically have lots of security problems in the area of identity authentication by means of classical PKI methods. The limited computing resources, the disconnection network, the classific... Ubiquitous computing systems typically have lots of security problems in the area of identity authentication by means of classical PKI methods. The limited computing resources, the disconnection network, the classification requirements of identity authentication, the requirement of trust transfer and cross identity authentication, the bi-directional identity authentication, the security delegation and the simple privacy protection etc are all these unsolved problems. In this paper, a new novel ubiquitous computing identity authentication mechanism, named UCIAMdess, is presented. It is based on D-S Evidence Theory and extended SPKI/SDSI. D-S Evidence Theory is used in UCIAMdess to compute the trust value from the ubiquitous computing environment to the principal or between the different ubiquitous computing environments. SPKI-based authorization is expanded by adding the trust certificate in UCIAMdess to solve above problems in the ubiquitous computing environments. The identity authentication mechanism and the algorithm of certificate reduction are given in the paper to solve the multi-levels trust-correlative identity authentication problems. The performance analyses show that UCIAMdess is a suitable security mechanism in solving the complex ubiquitous computing problems. 展开更多
关键词 计算机网络 网络安全 防火墙 网络检测系统
下载PDF
A Generic Service Architecture for Secure Ubiquitous Computing Systems
11
作者 Shudong Chen Johan Lukkien Richard Verhoeven 《International Journal of Communications, Network and System Sciences》 2012年第1期50-65,共16页
The development of ubiquitous computing systems benefits tremendously from the service-oriented computing concept in seamless interoperation of heterogeneous devices. However, architectures, services interfaces and ne... The development of ubiquitous computing systems benefits tremendously from the service-oriented computing concept in seamless interoperation of heterogeneous devices. However, architectures, services interfaces and network implementation of the existing service-oriented systems differ case by case. Furthermore, many systems lack the capability of being applied to resource constrained devices, for example, sensors. Therefore, we propose a standardized approach to present a service to the network and to access a networked service, which can be adopted by arbitrary types of devices. In this approach, services are specified and exposed through a set of standardized interfaces. Moreover, a virtual community concept is introduced to determine a secure boundary within which services can be freely discovered, accessed and composed into applications;a hierarchical management scheme is presented which enables the third party management of services and their underlying resources. In this way, application control logic goes into the network and environment context is dealt with intelligently by the system. A prototype system is developed to validate our ideas. Results show the feasibility of this open distributed system software architecture. 展开更多
关键词 GENERIC PROGRAMMING Service ORIENTATION ubiquitous computing Virtual Community CONTEXT-AWARE RESOURCE Management
下载PDF
Solving the Challenges of Pervasive Computing
12
作者 Syed Muqsit Shaheed Jalil Abbas +1 位作者 Asif Shabbir Fayyaz Khalid 《Journal of Computer and Communications》 2015年第9期41-50,共10页
Modern research emphasizes Pervasive Computing change faces, learning cultures, structures, communications, intellectual properties, information securities, data presentations and web dis-plays to make attraction for ... Modern research emphasizes Pervasive Computing change faces, learning cultures, structures, communications, intellectual properties, information securities, data presentations and web dis-plays to make attraction for human interaction. Pervasive systems have a broad range of applica-tions but it is relatively challenging for pervasive applications to meet emergence into existing physical environment and newly built structure requirements. Due to their interaction to gather information and change the environment via activating devices independently is highlighted. Se-curity of the pervasive devices and applications which control our activities has primary importance and will be destroyed, if the pervasive system operations are not secure. There is a need to improve the security measures for data to travel rapidly, unbroken, unchanged and invisible by deceptive recipients. Pervasive Computing allows users to get information and services access anytime and anywhere but need to discuss issues and solutions to deliver secure information with privacy and trust. Possible solutions for these challenges of Pervasive Computing interaction between human are emphasized. A collection of papers and articles have been collected in order to investigate the previous study of Pervasive Computing interaction and its challenges. Is it possible for us to understand what the scientific world will be close to generate new avenues? Expectations of future bring new openings for user interaction with systems, data, information and the environments in which they live, work and play. 展开更多
关键词 pervasive computing INTERACTION Human computer INTERACTION CHALLENGES Security TRUST PRIVACY
下载PDF
Decision Making in Internet of Vehicles Using Pervasive Trusted Computing Scheme
13
作者 Geetanjali Rathee Razi Iqbal Adel Khelifi 《Computers, Materials & Continua》 SCIE EI 2021年第8期2755-2769,共15页
Pervasive schemes are the significant techniques that allow intelligent communication among the devices without any human intervention.Recently Internet of Vehicles(IoVs)has been introduced as one of the applications ... Pervasive schemes are the significant techniques that allow intelligent communication among the devices without any human intervention.Recently Internet of Vehicles(IoVs)has been introduced as one of the applications of pervasive computing that addresses the road safety challenges.Vehicles participating within the IoV are embedded with a wide range of sensors which operate in a real time environment to improve the road safety issues.Various mechanisms have been proposed which allow automatic actions based on uncertainty of sensory and managed data.Due to the lack of existing transportation integration schemes,IoV has not been completely explored by business organizations.In order to tackle this problem,we have proposed a novel trusted mechanism in IoV during communication,sensing,and record storing.Our proposed method uses trust based analysis and subjective logic functions with the aim of creating a trust environment for vehicles to communicate.In addition,the subjective logic function is integrated with multi-attribute SAW scheme to improve the decision metrics of authenticating nodes.The trust analysis depends on a variety of metrics to ensure an accurate identification of legitimate vehicles embedded with IoT devices ecosystem.The proposed scheme is determined and verified rigorously through various IoT devices and decision making metrics against a baseline solution.The simulation results show that the proposed scheme leads to 88%improvement in terms of better identification of legitimate nodes,road accidents and message alteration records during data transmission among vehicles as compared to the baseline approach. 展开更多
关键词 pervasive computing vehicular networks SECURITY TRUST decision schemes trusted internet of vehicles big data
下载PDF
Agent-Oriented Architecture for Ubiquitous Computing in Smart Hyperspace
14
作者 Yichao JIN Ruchuan WANG +1 位作者 Haiping HUANG Lijuan SUN 《Wireless Sensor Network》 2010年第1期74-84,共11页
Agent-oriented approach is increasingly showing its magic power in a diversity of fields, specifically, ubiquitous computing and smart environment. Meanwhile, it is considered the next creative issue is to interconnec... Agent-oriented approach is increasingly showing its magic power in a diversity of fields, specifically, ubiquitous computing and smart environment. Meanwhile, it is considered the next creative issue is to interconnect and integrate isolated smart spaces in real world together into a higher level space known as a hyperspace. In this paper, an agent-oriented architecture, which involves the techniques of mobile agents, middleware, and embedded artificial intelligence, is proposed. Detailed implementations describe our efforts on the design of terminal device, user interface, agents, and AI 展开更多
关键词 AGENT-ORIENTED ubiquitous computing SMART HYPERSPACE MIDDLEWARE Embedded Artificial INTELLIGENCE
下载PDF
Policy Based Self-Adaptive Scheme in Pervasive Computing
15
作者 Jian Quan OUYANG Dian Xi SHI +2 位作者 Bo DING Jin FENG Huai Min WANG 《Wireless Sensor Network》 2009年第1期48-55,共8页
Nowadays, application systems in pervasive computing have to be self-adaptive, which means adapting themselves to dynamic environments. Our aim is to enable systematic development of self-adaptive compo-nent-based app... Nowadays, application systems in pervasive computing have to be self-adaptive, which means adapting themselves to dynamic environments. Our aim is to enable systematic development of self-adaptive compo-nent-based applications. The paper first introduces a novel policy based framework for self-adaptive scheme in pervasive computing. Then the proposed policy ontology and policy language are well expressive and eas-ily extensible to support the design of policy which is based on the Separation of Concerns principle. Fur-thermore, the context-driven event channel decouples the communication between the suppliers and con-sumers for asynchronous communication. The proposed framework can provide both a domain-independent and a flexible self-adaptation solution. 展开更多
关键词 POLICY ONTOLOGY SELF-ADAPTIVE POLICY Language pervasive computing
下载PDF
Ubiquitous Computing in the Library:Indiana State University Library's Experience
16
作者 Ralph B.Gabbard Judith Tribble +1 位作者 Paul Asay Chris Hayes 《现代图书情报技术》 CSSCI 北大核心 2002年第S1期161-167,共7页
1 Introduction New technologies and other developments haye changedthe information seeking behaviors of the academic communityand the general public.Nowhere is this more evident than inthe exponential growth of the Wo... 1 Introduction New technologies and other developments haye changedthe information seeking behaviors of the academic communityand the general public.Nowhere is this more evident than inthe exponential growth of the World Wide Web and cellularphone usage.Responding to these user needs and newtechnologies,libraries are moving from being InformationWarehouses to becoming Information Portals.Full-text。 展开更多
关键词 年刊 连续出版物 ubiquitous computing in the Library 《现代图书情报技术》 Access PDA CARD USB
下载PDF
Improving Vehicular Mobility in Urban Traffic Using Ubiquitous Computing
17
作者 J. A. Castán S. Ibarra Martínez +3 位作者 J. Laria Menchaca M. G. Treviño Berrones J. Pérez Cobos E. Castán Rocha 《Journal of Computer and Communications》 2016年第10期57-62,共6页
The paper introduces a novel paradigm to use ubiquitous computing in urban traffic control as a methodology to include the benefits of considering physical elements implicated in the environment. This promising idea a... The paper introduces a novel paradigm to use ubiquitous computing in urban traffic control as a methodology to include the benefits of considering physical elements implicated in the environment. This promising idea arises from previous results in the literature, where ubiquitous computing achieves significant and promising results in diverse scenarios. Some works in the state-of- the-art clearly state that traditional traffic light signals are not capable of offering higher service levels when they should control the vehicular mobility because of different constraints. In this sense, the paper proposes an adaptation of the main ideas of ubiquitous computing as a metaphor to facilitate the interaction between users and traffic infrastructures in order to improve the users’ experience on the road. 展开更多
关键词 ubiquitous computing Urban Traffic Control Intelligent Transport System
下载PDF
Pervasive Computing Location-aware Model Based on Ontology
18
作者 蒲芳 蔡海滨 +2 位作者 曹奇英 孙道清 李彤 《Journal of Donghua University(English Edition)》 EI CAS 2008年第3期277-281,共5页
In order to integrate heterogeneous location-aware systems into pervasive computing environment,a novel pervasive computing location-aware model based on ontology is presented.A location-aware model ontology(LMO)is co... In order to integrate heterogeneous location-aware systems into pervasive computing environment,a novel pervasive computing location-aware model based on ontology is presented.A location-aware model ontology(LMO)is constructed.The location-aware model has the capabilities of sharing knowledge,reasoning and adjusting the usage policies of services dynamically through a unified semantic location manner.At last,the work process of our proposed location-aware model is explained by an application scenario. 展开更多
关键词 总体设计 系统设计 计算机技术 实验研究
下载PDF
LUCA:Lightweight Ubiquitous Computing Architecture
19
作者 孙道清 曹奇英 《Journal of Donghua University(English Edition)》 EI CAS 2009年第3期300-308,共9页
Lightweight ubiquitous computing security architecture was presented. Lots of our recent researches have been integrated in this architecture. And the main current researches in the related area have also been absorbe... Lightweight ubiquitous computing security architecture was presented. Lots of our recent researches have been integrated in this architecture. And the main current researches in the related area have also been absorbed. The main attention of this paper was providing a compact and realizable method to apply ubiquitous computing into our daily lives under sufficient secure guarantee. At last,the personal intelligent assistant system was presented to show that this architecture was a suitable and realizable security mechanism in solving the ubiquitous computing problems. 展开更多
关键词 计算体系结构 轻量级 安全体系结构 智能辅助系统 普适计算 安全保障 安全机制 架构
下载PDF
Scenario-based Participatory Design for Pervasive Computing
20
作者 刘志强 丁鹏 盛焕烨 《Journal of Shanghai Jiaotong university(Science)》 EI 2007年第2期204-210,共7页
Lots of pervasive computing researchers are working on how to realize the user-centered intelligent pervasive computing environment as Mark Weiser figured out.Task abstraction is the fundamentation of configuration fo... Lots of pervasive computing researchers are working on how to realize the user-centered intelligent pervasive computing environment as Mark Weiser figured out.Task abstraction is the fundamentation of configuration for pervasive application.Based on task-oriented and descriptive properties of scenario,a scenario-based participatory design model was proposed to realize the task abstraction.The design model provided users and domain experts a useful mechanism to build the customized applications by separating system model into domain model and design model.In this design model,domain experts,together with users,stakeholders focus on the logic rules(domain model)and programmers work on the implementation(design model).In order to formalize the model description,a human-agent interaction language to transform users' goals and domain rules into executable scenarios was also discussed.An agent platform-describer used to link design and implementation of scenarios was developed to realize the configuration of applications according to different requirements.The demand bus application showed the design process and the usability of this model. 展开更多
关键词 深入计算 共享设计 建筑体系结构 任务提取
下载PDF
上一页 1 2 38 下一页 到第
使用帮助 返回顶部