搜索结果: 1-8 共查到“计算机系统结构 access”相关记录8条 . 查询时间(0.203 秒)
山东大学计算机网络课件 Medium Access Control Sublayer。
Ohio Supercomputer Center releases open-source HPC access portal
Ohio Supercomputer Center open-source HPC access portal
2017/9/20
An innovative web-based portal for accessing high performance computing services has matured beyond the beta phase and now is available to HPC centers worldwide.The Ohio Supercomputer Center (OSC) has...
宁夏大学数学计算机学院计算机网络课件第四章 The Medium Access Control
宁夏大学 数学计算机学院 计算机网络 课件 第四章 The Medium Access Control
2015/8/24
宁夏大学数学计算机学院计算机网络课件第四章 The Medium Access Control。
Generalized access control strategies for integrated services token passing systems
Integrated services LAN application factory automation distributed computing multimedia communication
2015/8/12
The demand for integrated services local area networks is increasing at a rapid pace with the advent of many new and exciting applications: office and factory automation, distributed computing, and mu...
Efficient Scheduling Algorithm for QoS Support in High Speed Downlink Packet Access Networks
Scheduling Algorithm Quality of Service HSDPA
2010/2/2
In this paper, we propose APO, a new packet scheduling
scheme with Quality of Service (QoS) support for hybrid of
real and non-real time services in HSDPA networks. The APO
scheduling algorithm is ...
Network Access Control Configuration Management using Semantic Web Techniques
Security Configuration Network Access Control Ontology Risk Semantic Web
2014/3/11
Network Access Control requirements are typically implemented in practice as a series of hetero geneous security-mechanism-centric policies that span system services and application domains. For examp...
Scheduling Remote Access to Scientific Instruments in Cyberinfrastructure for Education and Research
Scheduling Remote Access to Scientific Instruments in Cyberinfrastructure for Education and Research
2012/12/3
While a grid represents a computing infrastructure for cross domain sharing of computational resources, the cyberinfrastructure, proposed by the US NSF BlueRibbon advisory panel, is expected to revolu...
Core Role-Based Access Control:Efficient Implementations by Transformations
access control complexity guarantees incrementalization optimization transformation
2012/12/3
This paper describes a transformational method applied to the core component of role-based access control (RBAC), to derive efficient implementations from a specification based on the ANSI standard fo...