Transparent computing in scholar.google
2015-1-18 13:11
阅读:8283
用scholar google随便查了一下张尧学院士的关于透明计算
(transparent computing)的论文,大致结果为: 高引用的文章不多,基本都是
10 - 40次。
====================
Y Zhang, Y Zhou - Ubiquitous Intelligence and Computing, 2006 - Springer
Abstract Due to the research and technological advances, ubiquitous or pervasive
computing is emerging rapidly as an exciting new discipline to provide computing and
communication services all the time and everywhere. While with many ongoing initiatives, ...
computing is emerging rapidly as an exciting new discipline to provide computing and
communication services all the time and everywhere. While with many ongoing initiatives, ...
4VP: a novel meta OS approach for streaming programs in ubiquitous computing
Y Zhang, Y Zhou - … Networking and Applications, 2007. AINA'07 …, 2007 - ieeexplore.ieee.org
... in Ubiquitous Computing Yaoxue Zhang and Yuezhi Zhou Department of Computer Science
and Technology Tsinghua University, Beijing 100084, PR China cszyx,zhouyz@tsinghua.edu.
cn ... The next section introduces the basic motivation and concept of transparent computing. ...
and Technology Tsinghua University, Beijing 100084, PR China cszyx,zhouyz@tsinghua.edu.
cn ... The next section introduces the basic motivation and concept of transparent computing. ...
NSAP—A network storage access protocol for transparent computing [J]
W KUANG, Y ZHANG, Y ZHOU, G XU… - Journal of Tsinghua …, 2009 - en.cnki.com.cn
A reliable and efficient network storage access protocol is essential for transparent
computing. Current protocols, such as TFTP, FTP, and iSCSI, can not be employed when the
system experiences severe environmental demands and function limits. Therefore, a ...
computing. Current protocols, such as TFTP, FTP, and iSCSI, can not be employed when the
system experiences severe environmental demands and function limits. Therefore, a ...
Transparence computing: Concept, architecture and example [J]
Z Yaoxue - Acta Electronica Sinica, 2004 - en.cnki.com.cn
... 6, XIA Nan1,ZHANG Yaoxue2,YANG Shanlin1,WANG Xiaohui2(1.Institute of Computer Network
Systems,Hefei University of ... and Technology,Tsinghua University,Beijing 100084);CSDT:Method
for Data Transfer Between Client Devices of Transparent Computing Systems[J ...
Systems,Hefei University of ... and Technology,Tsinghua University,Beijing 100084);CSDT:Method
for Data Transfer Between Client Devices of Transparent Computing Systems[J ...
Manageable multimedia network computer
YX Zhang, YK Peng, YZ Zhou, CH Fang - Acta Electron Sin, 2003 - en.cnki.com.cn
... 7, XIA Nan1,ZHANG Yaoxue2,YANG Shanlin1,WANG Xiaohui2(1.Institute of Computer Network
Systems,Hefei University of ... and Technology,Tsinghua University,Beijing 100084);CSDT:Method
for Data Transfer Between Client Devices of Transparent Computing Systems[J ...
Systems,Hefei University of ... and Technology,Tsinghua University,Beijing 100084);CSDT:Method
for Data Transfer Between Client Devices of Transparent Computing Systems[J ...
Research challenges and perspectives on Wisdom Web of Things (W2T)
…, JH Ma, RH Huang, JM Liu, YY Yao, YX Zhang… - The Journal of …, 2013 - Springer
... YX Zhang Key Laboratory of Pervasive Computing, Ministry of Education, Tsinghua National
Laboratory for Information Science and Technology ... Transparent computing technologies [55,
71–73, 85] ensure the effective deployment and publishing of resources/services on these ...
Laboratory for Information Science and Technology ... Transparent computing technologies [55,
71–73, 85] ensure the effective deployment and publishing of resources/services on these ...
Information security underlying transparent computing: Impacts, visions and challenges
Y Zhang, LT Yang, Y Zhou, W Kuang - Web Intelligence and Agent …, 2010 - IOS Press
The rapid development of computer network technologies and social informationalization
has brought many new opportunities and challenges in information security. With improved
information and service sharing enjoyed by more and more people, how to strengthen the ...
has brought many new opportunities and challenges in information security. With improved
information and service sharing enjoyed by more and more people, how to strengthen the ...
转载本文请联系原作者获取授权,同时请注明本文来自龚明科学网博客。
链接地址:https://wap.sciencenet.cn/blog-709494-860548.html?mobile=1
收藏
当前推荐数:1
推荐人:
推荐到博客首页
网友评论1 条评论