欢迎访问行业研究报告数据库
当前位置:首页 > 行业导航

找到报告 5731 篇 当前为第 567 页 共 574

报告分类:外文技术报告

  • 5661.云计算策略

    [信息传输、软件和信息技术服务业] [2013-10-10]

    The DoD Cloud Computing Strategy has evolved to identify the most effective ways for the Department to capitalize on opportunities and take advantage of cloud computing benefits that accelerate IT delivery, efficiency, and innovation as an Enterprise. Prior drafts were informally coordinated and comments from across the Department were used to broaden the scope and depth of the current document; significant modifications and additions have been incorporated. In addition, DoD CIO and Defense Information Systems Agency (DISA) led a DoD Capability Assurance and Alignment Process (CAAP) Working Group to refine the approach and clarify required capabilities. The DoD Cloud Computing Strategy has been expanded to address use of commercial cloud services in the Department's multi-provider enterprise cloud environment. Adoption and implementation of commercially provided cloud services are being rapidly accelerated with the maturing of the Federal Cloud Computing Initiative, the Federal Risk and Authorization Management Program (Fed RAMP), and release of the 2012 National Defense Authorization Act.
    关键词:电子信息;云计算;策略
  • 5662.利用案桌和云计算环境来为一个移动分布式响应提高态势感知

    [信息传输、软件和信息技术服务业] [2013-10-10]

    Maintaining an accurate Common Operational Picture (COP) is a strategic requirement for efficient and successful missions in both disaster response and battlefield scenarios. Past practices include utilizing cellular, radio, and computer based communication methods and updating individual maps accordingly. A drawback of these practices has been interoperability of these devices as well as accurate reporting and documentation among different entities of the effort.
    关键词:电子信息;云计算;安卓;移动分布
  • 5663.云计算的发现:一种研究景观

    [信息传输、软件和信息技术服务业] [2013-10-10]

    The amalgamation of technology and service-based economy was the impetus of a new IT delivery model called "Cloud Computing." Unsurprisingly, the new model created a state of confusion; new concepts are mixed with old ones, and some old technologies are being reinvented. Today, many research areas and projects under the cloud umbrella need to be sorted and classified. Additionally, many gaps need to be categorized so that each research area can be tackled by its experts. It is important to learn from what already exists, and to be able to distinguish between what is new and what can be reused. Accordingly, this survey article presents a unified view of the Cloud Computing main concepts, characteristics, models, and architectures. Moreover, it presents a landscape of research in Cloud Computing by highlighting relevant disciplines and some diligent research projects. This helps identify the underlying research gaps and elaborates on the corresponding challenges.
    关键词:电子信息;云计算;研究
  • 5664.多学科计算流体动力学的软件设计策略

    [信息传输、软件和信息技术服务业] [2013-10-08]

    The multidisciplinary nature of rotary-wing aeromechanics poses a daunting challenge for the design of practical modeling and simulation software that is accurate, efficient, and maintainable. This paper describes the design strategy for the US Army's Helios software, which features a lightweight Python- language integration framework combined with well-defined interfaces to link together various multidisciplinary software components. This design facilitates the use of alternative component software within Helios, the addition of new component software into Helios, and the rapid introduction of new computational fluid dynamics technology within Helios. This paper also presents examples of Helios rotary-wing aeromechanics simulations that include simultaneous solutions for rotor dynamics and aerodynamics plus high resolution of the rotor wake system.
    关键词:电子信息;软件;设计策略
  • 5665.新图架构HPC机器的有效软件设计和开发

    [信息传输、软件和信息技术服务业] [2013-10-08]

    Software applications need to change and adapt as modern architectures evolve. Nowadays advancement in chip design translates to increased parallelism. Exploiting such parallelism is a major challenge in modern software engineering. Multicore processors are about to introduce a significant change in the way we design and use fundamental data structures. In this work we describe the design and programming principles of a software library of highly concurrent scalable and nonblocking data containers. In this project we have created algorithms and data structures for handling fundamental computations in massively multithreaded contexts, and we have incorporated these into a usable library with familiar look and feel. In this work we demonstrate the first design and implementation of a wait-free hash table. Our multiprocessor data structure design allows a large number of threads to concurrently insert, remove, and retrieve information. Non-blocking designs alleviate the problems traditionally associated with the use of mutual exclusion, such as bottlenecks and thread-safety. Lock-freedom provides the ability to share data without some of the drawbacks associated with locks, however, these designs remain susceptible to starvation. Furthermore, wait-freedom provides all of the benefits of lock-free synchronization with the added assurance that every thread makes progress in a finite number of steps. This implies deadlock-freedom, livelock-freedom, starvation-freedom, freedom from priority inversion, and thread-safety. The challenges of providing the desirable progress and correctness guarantees of wait-free objects makes their design and implementation difficult. There are few wait-free data structures described in the literature. Using only standard atomic operations provided by the hardware, our design is portable; therefore, it is applicable to a variety of data-intensive applications including the domains of embedded systems and supercomputers. Our experimental evaluation shows that our hash table design outperforms the most advanced locking solution, provided by Intel's TBB library, by 22.
    关键词:电子信息;软件;设计;架构;多核处理器;算法;数据结构
  • 5666.修正美国陆军信息系统漏洞的第三方软件

    [信息传输、软件和信息技术服务业] [2013-10-08]

    Information systems belonging to the DoD and U.S. Army experience cyber attacks on a daily basis. Increasingly, these attacks are targeting popular third-party applications, instead of focusing on vulnerabilities in Microsoft software. The DoD responded to this threat by adopting Citadel Hercules, which did not find a willing audience with the U.S. Army. Instead, the Army adopted Microsoft Systems Management Server (SMS), followed by System Center Configuration Manager (SCCM) 2007 to meet this threat. After more than five years, the rollout of SCCM to all organizations within the U.S. Army is still incomplete. This study provides an overview of the threats facing U.S. Army information systems and looks at how the Army has addressed this challenge in the past. Next, the study takes a system engineering approach to identifying an optimal tool for mitigating third-party vulnerabilities and suggests potential alternatives to SCCM. In addition, the study utilizes a cost benefit analysis approach to aid in evaluating the potential Return on Investment (ROI) provided by each tool. The purpose of this study is to answer the question: What is the most optimal solution for mitigating vulnerabilities in third-party applications on U.S. Army information systems.
    关键词:电子信息;软件;信息系统;漏洞
  • 5667.一个案例研究:使用云计算技术改善DHRA-DMDC物理访问软件DBIDS

    [信息传输、软件和信息技术服务业] [2013-10-08]

    The U.S government has created and been executing an Identity and Management (IdM) vision to support a global, robust, trusted and interoperable identity management capability that provides the ability to correctly identify individuals and non-person entities in support of DoD mission operations. Many Directives and Instructions have been issued to standardize the process to design, re-designed new and old systems with latest available technologies to meet the vision's requirements. In this thesis we introduce a cloud-based architecture for the Defense Biometric Identification System (DBIDS), along with a set of DBIDS Cloud Services that supports the proposed architecture. This cloud-based architecture will move DBIDS in the right direction to meet Dod IdM visions and goals by decoupling current DBIDS functions into DBIDS core services to create interoperability and flexibility to expand future DBIDS with new requirements. The thesis will show its readers how DBIDS Cloud Services will help Defense Manpower Data Center (DMDC) easily expanding DBIDS functionalities such as connecting to other DMDC services or federated services for vetting purposes. This thesis will also serve as a recommendation of a blue- print for DBIDS architecture to support new generation of DBIDS application. This is a step closer in moving DMDC Identity Enterprise Solution toward DoD IdM realizing vision and goals. The thesis also includes a discussion of how to utilize virtualized DBIDS workstations to address software-deployment and maintenance issues to resolve configuration and deployment issues which have been costly problems for DMDC over the years.
    关键词:电子信息;软件;云计算
  • 5668.TriBITS生命周期模型(版本1.0):计算科学与工程研究和应用数学软件的一个精益和敏捷的软件生命周期模型

    [信息传输、软件和信息技术服务业] [2013-10-08]

    Software lifecycles are becoming an increasingly important issue for computational science & engineering (CSE) software. The process by which a piece of CSE software begins life as a set of research requirements and then matures into a trusted high-quality capability is both commonplace and extremely challenging. Although an implicit lifecycle is obviously being used in any e ort, the challenges of this process-respecting the competing needs of research vs. production-cannot be overstated.
    关键词:电子信息;计算科学与工程(CSE)软件;生命周期;模型
  • 5669.降低软件密集型发展项目风险的创新方法

    [信息传输、软件和信息技术服务业] [2013-10-08]

    Since 1973, nearly 80of DoD ACAT I programs have experienced cost overruns, coupled with a four-out-of-five chance of not fielding capability to the warfighter on time. With the DoD acquisition reforms of the past two decades, the probability of program success (PoPS) rate is improving. To continue improving PoPS, program management tools and techniques need to develop and become institutionalized to monitor software-intensive-based capability control, and logic development efforts. A lack of sufficient tools to monitor software development costs and performance to the integrated baseline drives uncertainty and risk. The earned value management system (EVMS) approach lacks meaningful measures for software-intensive development programs and 'you can't control what you can't measure' (DeMarco, 1986, p. 58). Using commercially available (often freeware) tools, a robust set of automated managers can measure near real-time progress and identify trouble areas early in the software development process to allow meaningful correction to occur. This paper explores agile sprint development and continuous integration and test best practices, and the potential for an innovative approach of intertwining the two to reduce risk and increase PoPS. The presentation includes 20 briefing charts.
    关键词:电子信息;软件;创新;密集型
  • 5670.常见的误用评分系统(CMSS):度量软件功能滥用漏洞

    [信息传输、软件和信息技术服务业] [2013-10-08]

    The Common Misuse Scoring System (CMSS) is a set of measures of the severity of software feature misuse vulnerabilities. A software feature is a functional capability provided by software. A software feature misuse vulnerability is a vulnerability in which the feature also provides an avenue to compromise the security of a system. Such vulnerabilities are present when the trust assumptions made when designing software features can be abused in ways that violate security. Misuse vulnerabilities allow attackers to use for malicious purposes the functionality that was intended to be beneficial. CMSS can provide measurement data to assist organizations in making sound decisions on addressing software feature misuse vulnerabilities and in conducting quantitative assessments of the overall security posture of a system. This report defines proposed measures for CMSS and equations to be used to combine the measures into severity scores for each vulnerability. The report also provides examples of how CMSS measures and scores would be determined for selected software feature misuse vulnerabilities.
    关键词:电子信息;软件;系统;漏洞;CMSS
首页  上一页  ...  562  563  564  565  566  567  568  569  570  571  ...  下一页  尾页  
© 2016 武汉世讯达文化传播有限责任公司 版权所有 技术支持:武汉中网维优
客服中心

QQ咨询


点击这里给我发消息 客服员


电话咨询


027-87841330


微信公众号




展开客服