Transparence Computing:Concept,Architecture and ExampleChinese Full Text
ZHANG Yao-xue (Department of Computer Science and Technology,Tsinghua University,Beijing 100084,China)
Abstract: This paper proposes a new pervasive computing paradigm:transparence computing.The hardware environment of this paradigm still consists of clients and servers.However,the clients should be computing devices designed with the transparence computing paradigm.These devices can be desktop or mobile one,such as PDA or mobile phone.The server of this paradigm is a machine with a hard disk,including a general PC.In transparence computing paradigm,no OS,middleware and any application program are installe... More
- Series:
(I) Electronic Technology & Information Science
- Subject:
Computer Software and Application of Computer
- Classification Code:
TP301
- Mobile Reading
Read on your phone instantly
Step 1
Scan QR Codes
"Mobile CNKI-CNKI Express" App
Step 2
Open“CNKI Express”
and click the scan icon in the upper left corner of the homepage.
Step 3
Scan QR Codes
Read this article on your phone.
- Download
- Online Reading
- AI Summary

Download the mobile appuse the app to scan this coderead the article.
Tips: Please download CAJViewer to view CAJ format full text.
Download: 1217 Page: 169-174 Pagecount: 6 Size: 144k
Citation Network
Related Literature
- Similar Article
- Reader Recommendation
- Associated Author
- [1]基于透明计算模式的I/O Server的设计[J]. 夏楠,张尧学,杨善林,王晓辉. 计算机工程. 2006(21)
- [2]透明计算系统中缓存性能的仿真分析与验证[J]. 韦理,张尧学,周悦芝. 清华大学学报(自然科学版). 2009(10)
- [3]透明计算跨越硬件限制[J]. 现代国企研究. 2015(05)
- [4]基于角色的透明计算应用权限控制模型[J]. 赵晓参,王国军. 微电子学与计算机. 2017(11)
- [5]“透明计算”时代[J]. 办公自动化. 2012(19)
- [6]计算机网络安全技术在电子商务运维中的有效应用[J]. 王欢. 信息记录材料. 2024(12)
- [7]大数据时代计算机网络安全技术探讨[J]. 顾永仁. 科技创新与应用. 2024(20)
- [8]大数据时代下计算机网络安全技术的优化策略[J]. 尤笑歌. 数字技术与应用. 2024(08)
- [9]分析高职英语教学中计算机网络的科学合理应用[J]. 朱惠娟. 中国新通信. 2022(23)
- [10]试析物联网对计算机网络技术发展的影响[J]. 段英杰. 信息记录材料. 2021(12)