Добірка наукової літератури з теми "Simple Object Access Protocol (Computer network protocol)"

Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями

Оберіть тип джерела:

Ознайомтеся зі списками актуальних статей, книг, дисертацій, тез та інших наукових джерел на тему "Simple Object Access Protocol (Computer network protocol)".

Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.

Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.

Статті в журналах з теми "Simple Object Access Protocol (Computer network protocol)"

1

Hussein, Mahmoud, Ahmed I. Galal, Emad Abd-Elrahman, and Mohamed Zorkany. "Internet of Things (IoT) Platform for Multi-Topic Messaging." Energies 13, no. 13 (June 30, 2020): 3346. http://dx.doi.org/10.3390/en13133346.

Повний текст джерела
Анотація:
IoT-based applications operate in a client–server architecture, which requires a specific communication protocol. This protocol is used to establish the client–server communication model, allowing all clients of the system to perform specific tasks through internet communications. Many data communication protocols for the Internet of Things are used by IoT platforms, including message queuing telemetry transport (MQTT), advanced message queuing protocol (AMQP), MQTT for sensor networks (MQTT-SN), data distribution service (DDS), constrained application protocol (CoAP), and simple object access protocol (SOAP). These protocols only support single-topic messaging. Thus, in this work, an IoT message protocol that supports multi-topic messaging is proposed. This protocol will add a simple “brain” for IoT platforms in order to realize an intelligent IoT architecture. Moreover, it will enhance the traffic throughput by reducing the overheads of messages and the delay of multi-topic messaging. Most current IoT applications depend on real-time systems. Therefore, an RTOS (real-time operating system) as a famous OS (operating system) is used for the embedded systems to provide the constraints of real-time features, as required by these real-time systems. Using RTOS for IoT applications adds important features to the system, including reliability. Many of the undertaken research works into IoT platforms have only focused on specific applications; they did not deal with the real-time constraints under a real-time system umbrella. In this work, the design of the multi-topic IoT protocol and platform is implemented for real-time systems and also for general-purpose applications; this platform depends on the proposed multi-topic communication protocol, which is implemented here to show its functionality and effectiveness over similar protocols.
Стилі APA, Harvard, Vancouver, ISO та ін.
2

HONG, PENGYU, SHENG ZHONG, and WING H. WONG. "UBIC2 — TOWARDS UBIQUITOUS BIO-INFORMATION COMPUTING: DATA PROTOCOLS, MIDDLEWARE, AND WEB SERVICES FOR HETEROGENEOUS BIOLOGICAL INFORMATION INTEGRATION AND RETRIEVAL." International Journal of Software Engineering and Knowledge Engineering 15, no. 03 (June 2005): 475–85. http://dx.doi.org/10.1142/s0218194005001951.

Повний текст джерела
Анотація:
The Ubiquitous Bio-Information Computing (UBIC2) project aims to disseminate protocols and software packages to facilitate the development of heterogeneous bio-information computing units that are interoperable and may run distributedly. UBIC2 specifies biological data in XML formats and queries data using XQuery. The UBIC2 programming library provides interfaces for integrating, retrieving, and manipulating heterogeneous biological data. Interoperability is achieved via Simple Object Access Protocol (SOAP) based web services. The documents and software packages of UBIC2 are available at .
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Al-Musawi, Nawras A., and Dhiah Al-Shammary. "Static Hilbert convex set clustering for web services aggregation." Indonesian Journal of Electrical Engineering and Computer Science 32, no. 1 (October 1, 2023): 372. http://dx.doi.org/10.11591/ijeecs.v32.i1.pp372-380.

Повний текст джерела
Анотація:
<span>Web services' high levels of duplicate textual structures have caused network bottlenecks and congestion. Clustering and then aggregating similar web services as one compressed message can potentially achieve network traffic reduction. In this paper, a static Hilbert clustering as new model for clustering web services based on convex set similarity is proposed. Mathematically, the proposed model calculates similarity among simple object access protocol (SOAP) messages and then cluster them based on higher similarity values. Next, each cluster is aggregated as a compact message. The experiments have explained the proposed model performance as it has outperformed the convention clustering strategies in both compression ratio and clustering time. The best results have been achievable by the proposed model has reached up to (15) with fixed-length and up to (21) with Huffman.</span>
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Al-Musawi, Nawras A., and Dhiah Al-Shammary. "Dynamic Hilbert clustering based on convex set for web services aggregation." International Journal of Electrical and Computer Engineering (IJECE) 13, no. 6 (December 1, 2023): 6654. http://dx.doi.org/10.11591/ijece.v13i6.pp6654-6662.

Повний текст джерела
Анотація:
<div align=""><span lang="EN-US">In recent years, web services run by big corporations and different application-specific data centers have all been embraced by several companies worldwide. Web services provide several benefits when compared to other communication technologies. However, it still suffers from congestion and bottlenecks as well as a significant delay due to the tremendous load caused by a large number of web service requests from end users. Clustering and then aggregating similar web services as one compressed message can potentially achieve network traffic reduction. This paper proposes a dynamic Hilbert clustering as a new model for clustering web services based on convex set similarity. Mathematically, the suggested models compute the degree of similarity between simple object access protocol (SOAP) messages and then cluster them into groups with high similarity. Next, each cluster is aggregated as a compact message that is finally encoded by fixed-length or Huffman. The experiment results have shown the suggested model performs better than the conventional clustering techniques in terms of compression ratio. The suggested model has produced the best results, reaching up to 15 with fixed-length and up to 20 with Huffman</span></div>
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Selvan, Satiaseelan, and Manmeet Mahinderjit Singh. "Adaptive Contextual Risk-Based Model to Tackle Confidentiality-Based Attacks in Fog-IoT Paradigm." Computers 11, no. 2 (January 24, 2022): 16. http://dx.doi.org/10.3390/computers11020016.

Повний текст джерела
Анотація:
The Internet of Things (IoT) allows billions of physical objects to be connected to gather and exchange information to offer numerous applications. It has unsupported features such as low latency, location awareness, and geographic distribution that are important for a few IoT applications. Fog computing is integrated into IoT to aid these features to increase computing, storage, and networking resources to the network edge. Unfortunately, it is faced with numerous security and privacy risks, raising severe concerns among users. Therefore, this research proposes a contextual risk-based access control model for Fog-IoT technology that considers real-time data information requests for IoT devices and gives dynamic feedback. The proposed model uses Fog-IoT environment features to estimate the security risk associated with each access request using device context, resource sensitivity, action severity, and risk history as inputs for the fuzzy risk model to compute the risk factor. Then, the proposed model uses a security agent in a fog node to provide adaptive features in which the device’s behaviour is monitored to detect any abnormal actions from authorised devices. The proposed model is then evaluated against the existing model to benchmark the results. The fuzzy-based risk assessment model with enhanced MQTT authentication protocol and adaptive security agent showed an accurate risk score for seven random scenarios tested compared to the simple risk score calculations.
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Polgar, Jana. "Using WSRP 2.0 with JSR 168 and 286 Portlets." International Journal of Web Portals 2, no. 1 (January 2010): 45–57. http://dx.doi.org/10.4018/jwp.2010010105.

Повний текст джерела
Анотація:
WSRP—Web Services for Remote Portlets—specification builds on current standard technologies, such as WSDL (Web Services Definition Language), UDDI (Universal Description, Discovery and Integration), and SOAP (Simple Object Access Protocol). It aims to sol
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Mitts, H�kan, and Harri Hans�n. "A simple and efficient routing protocol for the UMTSA Access network." Mobile Networks and Applications 1, no. 2 (June 1996): 167–81. http://dx.doi.org/10.1007/bf01193335.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Zientarski, Tomasz, Marek Miłosz, Marek Kamiński, and Maciej Kołodziej. "APPLICABILITY ANALYSIS OF REST AND SOAP WEB SERVICES." Informatics Control Measurement in Economy and Environment Protection 7, no. 4 (December 21, 2017): 28–31. http://dx.doi.org/10.5604/01.3001.0010.7249.

Повний текст джерела
Анотація:
Web Services are common means to exchange data and information over the network. Web Services make themselves available over the Internet, where technology and platform are independent. These web services can be developed on the basis of two interaction styles such as Simple Object Access Protocol (SOAP) and Representational State Transfer Protocol (REST). In this study, a comparison of REST and SOAP web services is presented in terms of their applicability in diverse areas. It is concluded that in the past both technologies were equally popular, but during the rapid Internet development the REST technology has become the leading one in the area of access to Internet services.
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Ge, Jian Xia, and Wen Ya Xiao. "Network Layer Network Topology Discovery Algorithm Research." Applied Mechanics and Materials 347-350 (August 2013): 2071–76. http://dx.doi.org/10.4028/www.scientific.net/amm.347-350.2071.

Повний текст джерела
Анотація:
Along with the development of the network information age, people on the dependence of the computer network is more and more high, the computer network itself the security and reliability of becomes very important, the network management put forward higher request. This paper analyzes two algorithms of the network layer topology discovery based on the SNMP and ICMP protocol, based on this, this paper puts forward a improved algorithm of the comprehensive two algorithm, and makes the discovery process that has a simple, efficient, and has a strong generalization, and solved in the discovery process met the subnet judge, multiple access routers identification.
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Ge, Jian Xia, and Wen Ya Xiao. "Network Layer Network Topology Discovery Algorithm Research." Applied Mechanics and Materials 380-384 (August 2013): 1327–32. http://dx.doi.org/10.4028/www.scientific.net/amm.380-384.1327.

Повний текст джерела
Анотація:
Along with the development of the network information age, people on the dependence of the computer network is more and more high, the computer network itself the security and reliability of becomes very important, the network management put forward higher request. This paper analyzes two algorithms of the network layer topology discovery based on the SNMP and ICMP protocol, based on this, this paper puts forward a improved algorithm of the comprehensive two algorithm, and makes the discovery process that has a simple, efficient, and has a strong generalization, and solved in the discovery process met the subnet judge, multiple access routers identification.
Стилі APA, Harvard, Vancouver, ISO та ін.

Дисертації з теми "Simple Object Access Protocol (Computer network protocol)"

1

Abu-Ghazaleh, Nayef Bassam. "Optimizing communication performance of web services using differential deserialization of SOAP messages." Diss., Online access via UMI:, 2006.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Head, Michael Reuben. "Analysis and optimization for processing grid-scale XML datasets." Diss., Online access via UMI:, 2009.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Scarlato, Michele. "Sicurezza di rete, analisi del traffico e monitoraggio." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2012. http://amslaurea.unibo.it/3223/.

Повний текст джерела
Анотація:
Il lavoro è stato suddiviso in tre macro-aree. Una prima riguardante un'analisi teorica di come funzionano le intrusioni, di quali software vengono utilizzati per compierle, e di come proteggersi (usando i dispositivi che in termine generico si possono riconoscere come i firewall). Una seconda macro-area che analizza un'intrusione avvenuta dall'esterno verso dei server sensibili di una rete LAN. Questa analisi viene condotta sui file catturati dalle due interfacce di rete configurate in modalità promiscua su una sonda presente nella LAN. Le interfacce sono due per potersi interfacciare a due segmenti di LAN aventi due maschere di sotto-rete differenti. L'attacco viene analizzato mediante vari software. Si può infatti definire una terza parte del lavoro, la parte dove vengono analizzati i file catturati dalle due interfacce con i software che prima si occupano di analizzare i dati di contenuto completo, come Wireshark, poi dei software che si occupano di analizzare i dati di sessione che sono stati trattati con Argus, e infine i dati di tipo statistico che sono stati trattati con Ntop. Il penultimo capitolo, quello prima delle conclusioni, invece tratta l'installazione di Nagios, e la sua configurazione per il monitoraggio attraverso plugin dello spazio di disco rimanente su una macchina agent remota, e sui servizi MySql e DNS. Ovviamente Nagios può essere configurato per monitorare ogni tipo di servizio offerto sulla rete.
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Pather, Maree. "A framework for promoting interoperability in a global electronic market-space." Thesis, 2005. http://hdl.handle.net/10500/2510.

Повний текст джерела
Анотація:
The primary contributions to the area of electronic business integration, propounded by this thesis, are (in no particular order):  A novel examination of global Business-to-Business (B2B) interoperability in terms of a "multiplicity paradox" and of a "global electronic market-space" from a Complex Systems Science perspective.  A framework for an, integrated, global electronic market-space, which is based on a hierarchical, incremental, minimalist-business-pattern approach. A Web Services-SOA forms the basis of application-to-application integration within the framework. The framework is founded in a comprehensive study of existing technologies, standards and models for secure interoperability and the SOA paradigm. The Complex Systems Science concepts of "predictable structure" and "structural complexity" are used consistently throughout the progressive formulation of the framework.  A model for a global message handler (including a standards-based message-format) which obviates the common problems implicit in standard SOAP-RPC. It is formulated around the "standardized, common, abstract application interface" critical success factor, deduced from examining existing models. The model can be used in any collaboration context.  An open standards-based security model for the global message handler. Conceptually, the framework comprises the following:  An interoperable standardized message format: a standardized SOAP-envelope with standardized attachments (8-bit binary MIME-serialized XOP packages).  An interoperable standardized message-delivery infrastructure encompassing an RPC-invoked message-handler - a Web service, operating in synchronous and/or asynchronous mode, which relays attachments to service endpoints.  A business information processing infrastructure comprised of: a standardized generic minimalist-business-pattern (simple buying/selling), comprising global pre-specifications for business processes (for example, placing an order), standardized specific atomic business activities (e.g. completing an order-form), a standardized document-set (including, e.g. an order-form) based on standardized metadata (common nomenclature and common semantics used in XSD's, e.g. the order-form), the standardized corresponding choreography for atomic activities (e.g. acknowledgement of receipt of order-form) and service endpoints (based on standardized programming interfaces and virtual methods with customized implementations).
Theoretical Computing
PHD (INFORMATION SYSTEMS)
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Fornasier, Patric Computer Science &amp Engineering Faculty of Engineering UNSW. "An empirical investigation of SSDL." 2007. http://handle.unsw.edu.au/1959.4/40514.

Повний текст джерела
Анотація:
The SOAP Service Description Language (SSDL) is a SOAP-centric language for describing Web Service contracts. SSDL focuses on message abstraction as the building block for creating service-oriented applications and provides an extensible range of protocol frameworks that can be used to describe and formally model Web Service interactions. SSDL's natural alignment with service-oriented design principles intuitively suggests that it encourages the creation of applications that adhere to this architectural paradigm. Given the lack of tools and empirical data for using SSDL as part of Web Services-based SOAs, we identified the need to investigate its practicability and usefulness through empirical work. To that end we have developed Soya, a programming model and runtime environment for creating and executing SSDL-based Web Services. On the one hand, Soya provides straightforward programming abstractions that foster message-oriented thinking. On the other hand, it leverages contemporary tooling (i.e. Windows Communication Foundation) with SSDL-related runtime functionality and semantics. In this thesis, we describe the design and architecture of Soya and show how it makes it possible to use SSDL as an alternative and powerful metadata language without imposing unrealistic burdens on application developers. In addition, we use Soya and SSDL in a case study which provides a set of initial empirical results with respect to SSDL's strengths and drawbacks. In summary, our work serves as a knowledge framework for better understanding message-oriented Web Service development and demonstrates SSDL's practicability in terms of implementation and usability.
Стилі APA, Harvard, Vancouver, ISO та ін.

Книги з теми "Simple Object Access Protocol (Computer network protocol)"

1

Livingston, Dan. Advanced SOAP for Web professionals. Upper Saddle River, NJ: Prentice Hall, 2002.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Ray, Randy J. Programming Web services with Perl. Sebastopol, CA: O'Reilly, 2003.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Mellquist, Peter Erik. SNMP++: An object-oriented approach to developing network management applications. Upper Saddle River, NJ: Prentice Hall PTR, 1998.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Scribner, Kenn, and Mark Stiver. Understanding SOAP: The Authoritative Solution. Sams, 2000.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Englander, Robert. Java and SOAP. O'Reilly Media, Incorporated, 2002.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Seely, Scott, and Kent Sharkey. SOAP: Cross Platform Web Services Development Using XML. Pearson Education, 2001.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Seely, Scott, and Kent Sharkey. SOAP: Cross Platform Web Services Development Using XML. Pearson Education, 2001.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Tidwell, Doug, James Snell, and Pavel Kulchenko. Programming Web Services with SOAP. O'Reilly Media, Incorporated, 2001.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Tidwell, Doug, James Snell, and Pavel Kulchenko. Programming Web Services with SOAP. O'Reilly Media, Inc., 2001.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Tidwell, Doug, James Snell, and Pavel Kulchenko. Programming Web Services with Soap. O'Reilly Media, Incorporated, 2001.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.

Частини книг з теми "Simple Object Access Protocol (Computer network protocol)"

1

Al-Bahadili, Hussein, and Haitham Y. Adarbah. "Modeling of TCP Reno with Packet-Loss and Long Delay Cycles." In Simulation in Computer Network Design and Modeling, 257–83. IGI Global, 2012. http://dx.doi.org/10.4018/978-1-4666-0191-8.ch012.

Повний текст джерела
Анотація:
The Transport Control Protocol (TCP) is the dominant transport layer protocol in the Internet Protocol (IP) suite, as it carries a significant amount of the Internet traffic, such as Web browsing, file transfer, e-mail, and remote access. Therefore, huge efforts have been devoted by researchers to develop suitable models that can help with evaluating its performance in various network environments. Some of these models are based on analytical or simulation approaches. This chapter presents a description, derivation, implementation, and comparison of two well-known analytical models, namely, the PFTK and PLLDC models. The first one is a relatively simple model for predicting the performance of the TCP protocol, while the second model is a comprehensive and realistic analytical model. The two models are based on the TCP Reno flavor, as it is one of the most popular implementations on the Internet. These two models were implemented in a user-friendly TCP Performance Evaluation Package (TCP-PEP). The TCP-PEP was used to investigate the effect of packet-loss and long delay cycles on the TCP performance, measured in terms of sending rate, throughput, and utilization factor. The results obtained from the PFTK and PLLDC models were compared with those obtained from equivalent simulations carried-out on the widely used NS-2 network simulator. The PLLDC model provides more accurate results (closer to the NS-2 results) than the PFTK model.
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Yau, Wei-Chuen, and G. S. V. Radha Krishna Rao. "Web Services Security in E-Business." In Electronic Business, 2115–30. IGI Global, 2009. http://dx.doi.org/10.4018/978-1-60566-056-1.ch131.

Повний текст джерела
Анотація:
Web services enable the communication of application- to-application in a heterogeneous network and computing environment. The powerful functionality of Web services has given benefits to enterprise companies, such as rapid integrating between heterogeneous e-business systems, easy implementation of e-business systems, and reusability of e-business services. While providing the flexibility for e-business, Web services tend to be vulnerable to a number of attacks. Core components of Web services such as simple object access protocol (SOAP), Web services description language (WSDL), and universal description, discovery, and integration (UDDI) can be exploited by malicious attacks due to lack of proper security protections. These attacks will increase the risk of e-business that employs Web services. This chapter aims to provide a state-of-the-art view of Web services attacks and countermeasures. We examine various vulnerabilities in Web services and then followed by the analysis of respective attacking methods. We also discuss preventive countermeasures against such attacks to protect Web services deployments in e-business. Finally, we address future trends in this research area.
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Yau, Wei-Chuen, and G. S. V. Radha Krishna Rao. "Web Services Security in E-Business." In Web Services Security and E-Business, 165–83. IGI Global, 2007. http://dx.doi.org/10.4018/978-1-59904-168-1.ch009.

Повний текст джерела
Анотація:
Web services enable the communication of application-to-application in a heterogeneous network and computing environment. The powerful functionality of Web services has given benefits to enterprise companies, such as rapid integrating between heterogeneous e-business systems, easy implementation of e-business systems, and reusability of e-business services. While providing the flexibility for e-business, Web services tend to be vulnerable to a number of attacks. Core components of Web services such as simple object access protocol (SOAP), Web services description language (WSDL), and universal description, discovery, and integration (UDDI) can be exploited by malicious attacks due to lack of proper security protections. These attacks will increase the risk of e-business that employs Web services. This chapter aims to provide a state-of-the-art view of Web services attacks and countermeasures. We examine various vulnerabilities in Web services and then followed by the analysis of respective attacking methods. We also discuss preventive countermeasures against such attacks to protect Web services deployments in e-business. Finally, we address future trends in this research area.
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Prakash, Abhinav, and Dharma Prakash Agarwal. "Data Security in Wired and Wireless Systems." In Handbook of Research on Modern Cryptographic Solutions for Computer and Cyber Security, 1–27. IGI Global, 2016. http://dx.doi.org/10.4018/978-1-5225-0105-3.ch001.

Повний текст джерела
Анотація:
The issues related to network data security were identified shortly after the inception of the first wired network. Initial protocols relied heavily on obscurity as the main tool for security provisions. Hacking into a wired network requires physically tapping into the wire link on which the data is being transferred. Both these factors seemed to work hand in hand and made secured communication somewhat possible using simple protocols. Then came the wireless network which radically changed the field and associated environment. How do you secure something that freely travels through the air as a medium? Furthermore, wireless technology empowered devices to be mobile, making it harder for security protocols to identify and locate a malicious device in the network while making it easier for hackers to access different parts of the network while moving around. Quite often, the discussion centered on the question: Is it even possible to provide complete security in a wireless network? It can be debated that wireless networks and perfect data security are mutually exclusive. Availability of latest wideband wireless technologies have diminished predominantly large gap between the network capacities of a wireless network versus a wired one. Regardless, the physical medium limitation still exists for a wired network. Hence, security is a way more complicated and harder goal to achieve for a wireless network (Imai, Rahman, & Kobara, 2006). So, it can be safely assumed that a security protocol that is robust for a wireless network will provide at least equal if not better level of security in a similar wired network. Henceforth, we will talk about security essentially in a wireless network and readers should assume it to be equally applicable to a wired network.
Стилі APA, Harvard, Vancouver, ISO та ін.

Тези доповідей конференцій з теми "Simple Object Access Protocol (Computer network protocol)"

1

Li, Kuang-Yu J., and B. Keith Jenkins. "A Collisionless Wavelength-Division Multiple Access Protocol for Free-Space Cellular Hypercube Parallel Computer Systems." In Optical Computing. Washington, D.C.: Optica Publishing Group, 1995. http://dx.doi.org/10.1364/optcomp.1995.otha3.

Повний текст джерела
Анотація:
The performance of a MIMD parallel computer is critically impacted by the interconnection network performance, which in turn is determined by the network topology, implementation hardware, and communication protocol. Cellular hypercube (CH) interconnection networks, with emphasis on a symmetric cellular hypercube (SCH) network, were studied for the system discussed in this paper because they can exploit the communication locality observed in parallel applications [1], are reasonably scalable due to their O(logN) connectivities, and can be implemented with moderate requirements on the number of wavelength channels needed. While free-space optics can realize highly parallel CH networks [2], little progress has been made in designing an efficient protocol for optical data communication. In this paper a CH interconnection system based on a collisionless wavelength-division multiple access with reroute (WDMA-R) protocol is proposed. This system incorporates space-, time-, and wavelength-multiplexing to achieve dense communication, simple control, and multiple access. Analytic models based on semi-Markov processes were employed to analyze this protocol. The performance of the protocol in terms of network throughput and data packet delay is evaluated and compared to other protocols.
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Bang, Je-Sung, Jai-Kyung Lee, Seung-Ho Han, Seong-Whan Park, Jun-Ho Choi, Tae-Hee Lee, and Tae-Woo Kwon. "Integration of PDM System and Web-Based CAE Supporting System for Small and Medium Enterprises." In ASME 2007 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. ASMEDC, 2007. http://dx.doi.org/10.1115/detc2007-35019.

Повний текст джерела
Анотація:
A web-based Computer-Aided Engineering (CAE) supporting system is integrated with a Product Data Management (PDM) system for Small and Medium Enterprises (SMEs) suffering from the lack of building hardware, software and related experts. An analysis of current business models and worksite requirements provides an improved process model and data to be shared between the PDM system and the CAE supporting system. Since all engineering tasks such as geometric modeling, mesh generation, static stress and vibration analysis, and fatigue durability analysis are automated in the CAE supporting system, the user in charge of the CAE have only to configure the concerned values of design variables and result data through the web page. The existing Change Management module of the PDM system is modified for seamless data exchange, i.e. sending the Engineering Change Order (ECO) data to the CAE supporting system and receiving the CAE result data back. The bi-directional data transfers between the PDM system and the CAE supporting system is made possible by adaptors based on the Simple Object Access Protocol (SOAP). The current approach will be very helpful for SMEs that only have the PDM system and have no adequate infrastructure for CAE.
Стилі APA, Harvard, Vancouver, ISO та ін.
Ми пропонуємо знижки на всі преміум-плани для авторів, чиї праці увійшли до тематичних добірок літератури. Зв'яжіться з нами, щоб отримати унікальний промокод!

До бібліографії