期刊文献+

基于CORBA-DCOM的分布式测试系统开发策略

Exploitation strategy of distributed measurement system based on CORBA-DCOM
下载PDF
导出
摘要 为充分利用目前两种主流中间件技术CORBA、DCOM的各自优势,用以构建高性能分布式测试系统,探讨了CORBA、DCOM的特点,研究了它们在分布式测试系统中的应用,提出了基于CORBA-DCOM的测试系统分布式开发策略,探索出了一种经济、实用的方法解决了这种策略所面临的关键技术即CORBA、DCOM的桥接问题。 CORBA and DCOM are two main kinds of middleware technology. In order to take full advantages of their merits, a high performance distributed measurement system was constructed. The characteristics of CORBA and DCOM were discussed, and their applications in distributed measurement system were researched. Then, an exploitation strategy of distributed measurement system based on CORBA-DCOM is provided and one kind of economic and practical way was explored to bridge CORBA and DCOM, which was the core technique that must be settled in the strategy application.
出处 《中国测试技术》 2008年第4期55-58,共4页 CHINA MEASUREMENT & TESTING TECHNOLOGY
基金 四川省自然科学基金项目(01LA27)
关键词 CORBA DCOM 分布式 测试 系统 CORBA DCOM Distributed Measurement System
  • 相关文献

参考文献11

二级参考文献29

  • 1贾惠芹,刘君华.构造基于WEB的远程测控网络模型[J].仪器仪表学报,2001,22(z2):307-308. 被引量:17
  • 2王成,孟晨,刘金宁,张健.组件技术在分布式自动测试系统软件设计中的应用[J].计算机工程,2004,30(23):190-192. 被引量:1
  • 3夏锐,肖明清,朱小平,苟新禹.并行测试技术在自动测试系统中的应用[J].计算机测量与控制,2005,13(1):7-10. 被引量:41
  • 4费凌,黎亚元,龚浦泉.数控系统测试技术及装置的研制[J].四川工业学院学报,1995,14(4):11-18. 被引量:1
  • 5[1]Richard Heady,George Luger,Arthur Maccabe et al.The architecture of a network level intrusion detection system[R].Technical Report CS90-20,Department of Computer Science,University of New Mexico,990
  • 6[2]J PAnderson.Computer Security Threat Monitoring and Surveillance [R].Technical report,James P Anderson Co.,Fort Washington,Penn sylvania, 1980
  • 7[3]Dorothy E Denning. An intrusion-detection model [J].IEEE Transac tions on Software Engineering, 1987; 13 (2): 222~232
  • 8[4]Teresa L,Jagannathan R,Lee R et al.IDES:The enhanced prototype, a real-time intrusion detection system[R].Menlo Park,CA:SRI Inter national ,Computer Science, 1988
  • 9[5]Crosbie M,Spafford G.Applying genetic programming to intrusion de tection [R].Purdue University:Department of Computer Sciences,Coast Laboratory, 1997
  • 10[6]L Todd Heberlein.Network Security Monitor Final Report [DB/OL]. http:∥seclab.cs.ucdavis.edu/papers/NSM-fi nal.pdf, 1993

共引文献37

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部