首页 | 官方网站   微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 531 毫秒
1.
简要分析了现在自动化软件测试系统的需求和JMX网络管理体系结构,在此基础上提出了使用JMX框架来构建的软件自动化测试模型的方法,最后结合JMX规范和实现方法,分析了基于JMX的软件自动化测试模型的优势。  相似文献   

2.
简要分析了现在自动化软件测试系统的需求和JMX网络管理体系结构,在此基础上提出了使用JMX框架来构建的软件自动化测试模型的方法,最后结合JMX规范和实现方法,分析了基于JMX的软件自动化测试模型的优势。  相似文献   

3.
随着业务的丰富,移动互联网的管理正变得日益困难和复杂。该文在分析典型业务的基础上,讨论了业务提供模式的变化,提出了移动互联网业务模型、管理模型及核心管理信息模型。最后介绍了实验室基于JMX的业务平台管理原型系统,它实现了文章提出的管理模型。  相似文献   

4.
简单介绍了JMX规范,在此基础上,讨论了使用JMX体系结构建立网络管理程序的一般方法,最后结合JMX规范和实现方法,分析基于JMX网络管理系统的优势。  相似文献   

5.
分布工作流过程模型及其实现   总被引:3,自引:2,他引:1       下载免费PDF全文
为构建跨组织分布工作流管理系统,满足现代企业信息分布性、自治性和异构性的要求,提出一种分布的工作流过程模型,基于该模型采用Web Services和JMX技术,构造一个原型系统——CODWfMS,能够实现跨组织同步、异步调用等,实现真正意义上的平台独立和语言独立,并给出相关问题的解决方案。  相似文献   

6.
网络的迅速发展对现有网络管理系统的优化提出了迫切的需求。实时监控是网管程序的基础功能。指标的实时监控在网络流量、系统开销、对新设备的监控等方面存在很多问题,JMX技术是解决这些问题的有效方法。因此提出了一种利用JMX技术来改进网络管理系统中实时监控管理的一个实现模型。此模型有效地解决了实时监控中的网络拥塞、指标管理混乱、客户端负载过重等问题。  相似文献   

7.
高岭  李洪亮 《计算机工程》2005,31(19):125-126,132
JMX是新的Java平台标准扩展,它支持现有的SNMP网络管理协议。Java DMK是建立在JMX架构之上Java系列的一个部分,并与该架构兼容。在探讨JMX/JDMK技术提供的分级代理方法的基础上,设计出SNMP分级代理体系,以构建灵活、有效及分布的仍以SNMP为基础的网络管理系统。  相似文献   

8.
王通 《微处理机》2006,27(5):91-93
结合作者在J2EE和资源管理方面的知识介绍了JMX这个基于Java技术的开源资源管理系统,并结合当前使用非常广泛的开源J2EE服务器--jBoss,介绍了JMX在J2EE中的应用.还分析了基于JMX实现JBoss服务器的部署器架构,SNMP适配器服务,使读者对于JMX的理解有了一个现实的土壤.  相似文献   

9.
Web应用服务器是为事务性Web应用提供一系列运行时服务的分布式系统。它既要管理多种不同类型的资源,又要集成以往成熟的网络管理协议和系统,因此,如何统一有效地管理Web应用服务器的资源、应用和服务成为实现Web应用服务的一个难点。为此,本文基于JMX(Java^TM Management Extensions)技术,提出了一种可扩展管理模型,该模型具有较好的灵活性和开放性,可扩展能力强。同时.本文还给出了实现该模型的若干关键技术包括可扩展管理内核的实现技术、资源远程管理技术、服务可扩展管理技术。目前该模型已在我们研制的Web应用服务器WebFrame2.0中成功实现。  相似文献   

10.
随着网络管理技术的迅速发展,异构环境之间的网络管理成为了一个突出的问题.作者首先分析了当前几种常见的网络管理技术及其特点,接着介绍了JMX(Java Management Extensions)技术以及基于JMX来实现异构环境下的网络管理方法.最后用JMX技术具体实现了一个网络监控管理系统.  相似文献   

11.
《计算机科学》2007,34(4):148-148
Recent years have seen rapid advances in various grid-related technologies, middleware, and applications. The GCC conference has become one of the largest scientific events worldwide in grid and cooperative computing. The 6th international conference on grid and cooperative computing (GCC2007) Sponsored by China Computer Federation (CCF),Institute of Computing Technology, Chinese Academy of Sciences (ICT) and Xinjiang University ,and in Cooperation with IEEE Computer Soceity ,is to be held from August 16 to 18, 2007 in Urumchi, Xinjiang, China.  相似文献   

12.
为了设计一种具有低成本、低功耗、易操作、功能强且可靠性高的煤矿井下安全分站,针对煤矿安全生产实际,文章提出了采用MCS-51系列单片机为核心、具有CAN总线通信接口的煤矿井下安全监控分站的设计方案;首先给出煤矿井下安全监控分站的整体构架设计,然后着重阐述模拟量输入信号处理系统的设计过程,最后说明单片机最小系统及其键盘、显示、报警、通信等各个组成部分的设计;为验证设计方案的可行性与有效性,使用Proteus软件对设计内容进行仿真验证,设计的煤矿井下安全监控分站具有瓦斯、温度等模拟量参数超标报警功能和电机开停、风门开闭等开关量指示功能;仿真结果表明:设计的煤矿井下安全监控分站具有一定的实际应用价值.  相似文献   

13.
本文分析了法律数据库的结构和特点,介绍了采用面向对象设计方法和超文本数据库技术开发和实现法律信息库系统将作为重要网络资源之一为不同用户进行法律咨询服务。  相似文献   

14.
In modern service-oriented architectures, database access is done by a special type of services, the so-called data access services (DAS). Though, particularly in data-intensive applications, using and developing DAS are very common today, the link between the DAS and their implementation, e.g. a layer of data access objects (DAOs) encapsulating the database queries, still is not sufficiently elaborated, yet. As a result, as the number of DAS grows, finding the desired DAS for reuse and/or associated documentation can become an impossible task. In this paper we focus on bridging this gap between the DAS and their implementation by presenting a view-based, model-driven data access architecture (VMDA) managing models of the DAS, DAOs and database queries in a queryable manner. Our models support tailored views of different stakeholders and are scalable with all types of DAS implementations. In this paper we show that our view-based and model driven architecture approach can enhance software development productivity and maintainability by improving DAS documentation. Moreover, our VMDA opens a wide range of applications such as evaluating DAS usage for DAS performance optimization. Furthermore, we provide tool support and illustrate the applicability of our VMDA in a large-scale case study. Finally, we quantitatively prove that our approach performs with acceptable response times.  相似文献   

15.
16.
17.
正SCIENCE CHINA Information Sciences(Sci China Inf Sci),cosponsored by the Chinese Academy of Sciences and the National Natural Science Foundation of China,and published by Science China Press,is committed to publishing highquality,original results of both basic and applied research in all areas of information sciences,including computer science and technology;systems science,control science and engineering(published in Issues with odd numbers);information and communication engineering;electronic science and technology(published in Issues with even numbers).Sci China Inf Sci is published monthly in both print and electronic forms.It is indexed by Academic OneFile,Astrophysics Data System(ADS),CSA,Cabells,Current Contents/Engineering,Computing and Technology,DBLP,Digital Mathematics Registry,Earthquake Engineering Abstracts,Engineering Index,Engineered Materials Abstracts,Gale,Google,INSPEC,Journal Citation Reports/Science Edition,Mathematical Reviews,OCLC,ProQuest,SCOPUS,Science Citation Index Expanded,Summon by Serial Solutions,VINITI,Zentralblatt MATH.  相似文献   

18.
正Erratum to:J Zhejiang Univ-Sci C(ComputElectron)2014 15(7):551-563doi:10.1631/jzus.C1300320The original version of this article unfortunately contained mistakes.Algorithm 6 should be as follows:Algorithm 6 FGKFCM-F clustering Input:(1)X={x_1,x_2,…,x_N},,x_iR~d,i=1,2,…,N,the dataset;(2)C,1C≤N,the number of clusters;(3)ε0,the stopping criterion;  相似文献   

19.
20.
《Information & Management》2016,53(6):787-802
Discrepant technological events or situations that entail a problem, a misunderstanding or a difficulty with the Information Technology (IT) being employed, are common in the workplace, and can lead to frustration and avoidance behaviors. Little is known, however, about how individuals cope with these events. This paper examines these events by using a multi-method pragmatic approach informed by coping theory. The results of two studies – a critical incident study and an experiment – serve to build and test, respectively, a theoretical model that posits that individuals use a variety of strategies when dealing with these events: they experience negative emotions, make external attributions, and adopt engagement coping strategies directed at solving the event, eventually switching to a disengagement coping strategy when they feel they have no control over the situation. Furthermore, users’ efforts may result in ‘accidental’ learning as they try to overcome the discrepant IT events through engagement coping. The paper ends with a discussion of the results in light of existing literature, future opportunities for research, and implications for practice.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号