排序方式: 共有28条查询结果,搜索用时 15 毫秒
1.
2.
We consider a processing network in which jobs arrive at a fork‐node according to a renewal process. Each job requires the completion of m tasks, which are instantaneously assigned by the fork‐node to m task‐processing nodes that operate like G/M/1 queueing stations. The job is completed when all of its m tasks are finished. The sojourn time (or response time) of a job in this G/M/1 fork‐join network is the total time it takes to complete the m tasks. Our main result is a closed‐form approximation of the sojourn‐time distribution of a job that arrives in equilibrium. This is obtained by the use of bounds, properties of D/M/1 and M/M/1 fork‐join networks, and exploratory simulations. Statistical tests show that our approximation distributions are good fits for the sojourn‐time distributions obtained from simulations. © 2008 Wiley Periodicals, Inc. Naval Research Logistics, 2008 相似文献
3.
比较分析了P2P系统中各种数据复制算法,并提出了一种基于LDPC编码的数据复制算法Dyre,数据块采用动态分配算法存储到节点中,在节点邻居中保存数据块的副本以提高数据块的有效性,数据块的数量过小时重建数据块。实验表明,即使节点的可靠性非常低,该算法也能够获得很高的数据可用性。 相似文献
4.
5.
Henry Prunckun 《Defense & Security Analysis》2014,30(2):176-184
Covert operations by underground groups, such as transnational terrorists, are not new and neither are the methods members of these groups use to communicate in their shadowy world. In this regard, one of the enduring myths is that the main means these covert operatives use to communicate within their cell structure are telephones and emails in their various manifestations. This article critically discusses the possible use of wireless transmissions by transnational terrorists as a reliable form of communications. To critically discuss this proposition, a force field analysis was used to assess the theory that radio is a viable option. Implications of this study's findings are considered in terms of the ramifications they have for defence and security policy. 相似文献
6.
Mathilde von Bülow Lecturer 《战略研究杂志》2013,36(4):703-729
Between 1957 and 1959 the West German company Telefunken and the Bonn government became prime targets in the French army's campaign against the Front de Libération Nationale's (FLN) efforts to establish communications networks. To the French military, the prevention of sales of Telefunken equipment to the FLN or its allies constituted a matter of strategic importance. To the Germans, it was an act of economic protectionism that exposed France's continued misgivings of Germany. The problem exerted a considerable strain between Paris and Bonn, and even threatened to harm German-Arab relations. The Telefunken affair thus highlights the Algerian war's international ramifications. It further reveals the responsibility of the French military in the internationalisation of that war. 相似文献
7.
8.
流媒体数据已经在互联网流量中占据极高的比例,P2P是目前支撑互联网流媒体数据分发的重要手段。本文提出一种新型的P2P Tracker实现方法——eTracker。该方法通过网络边缘的eTracker分布实现peer列表的保存,不但消除传统集中式Tracker的性能瓶颈,而且通过eTracker对本地peer的识别,优化了P2P系统的peer选择。 相似文献
9.
潜艇通信侦测与防御探讨 总被引:1,自引:0,他引:1
从通信对抗角度出发,简述了实现通信侦测的样式,重点论述了通信防御的主要技术手段。并结合潜艇兵力的特殊性,以提高其航渡隐蔽性为出发点,基于通信侦测与防御进行探讨。 相似文献
10.
首先简要介绍了美军反导指控系统和国防部体系结构框架(department of defense archi-tecture framework,DoDAF)的基本情况,确定了体系结构模型开发方法和步骤,然后利用Telelogic公司的system architect软件完成了作战视图、系统视图的分析与设计,为理解指控系统内在规律、开展指控系统顶层设计研究提供理论支持。 相似文献