ImageVerifierCode 换一换
格式:DOCX , 页数:20 ,大小:39.66KB ,
资源ID:11169005      下载积分:3 金币
快捷下载
登录下载
邮箱/手机:
温馨提示:
快捷下载时,用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)。 如填写123,账号就是123,密码也是123。
特别说明:
请自助下载,系统不会自动发送文件的哦; 如果您已付费,想二次下载,请登录后访问:我的下载记录
支付方式: 支付宝    微信支付   
验证码:   换一换

加入VIP,免费下载
 

温馨提示:由于个人手机设置不同,如果发现不能下载,请复制以下地址【https://www.bdocx.com/down/11169005.html】到电脑端继续下载(重复下载不扣费)。

已注册用户请登录:
账号:
密码:
验证码:   换一换
  忘记密码?
三方登录: 微信登录   QQ登录  

下载须知

1: 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。
2: 试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。
3: 文件的所有权益归上传用户所有。
4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
5. 本站仅提供交流平台,并不能对任何下载内容负责。
6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

版权提示 | 免责声明

本文(文献翻译范例供参考1016.docx)为本站会员(b****7)主动上传,冰豆网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知冰豆网(发送邮件至service@bdocx.com或直接QQ联系客服),我们立即给予删除!

文献翻译范例供参考1016.docx

1、文献翻译范例供参考1016 英文翻译分 院 海 运 学 院 专 业 物 流 管 理 届 别 2012届 学 号 084771115 姓 名 雷远航 指导教师 刘桂云 2011 年 10 月 31日The Internet of Things: The Death of a Traditional Database?Keith G. JefferyDirector IT & International Strategy, Science and Technology Facilities Council, Rutherford Appleton Laboratory,Harwell Scienc

2、e and Innovation Campus, Chilton, Didcot, Oxfordshire OX11 0QX UKAbstractTraditional database research has developed technology to ensure that the database even when distributed represents the world of interest with integrity and a consistent state. Important concepts have been developed and proven.

3、 However, the internet of things challenges all this. Very large numbers of nodes handle volumes that are vast, the speed is fast and the data/information space is global indeed with space data universal. This poses challenges. What does the concept of a state mean when the information map of the re

4、al world of interest is represented across millions of nodes, many of which are updating in real-time? What does a transaction look like when the data being updated is spread across hundreds or thousands of nodes with differing update policies? Worse, how does one roll back or compensate a transacti

5、on? We have already seen database research applied to semi-structured data, to streamed data, and real-time applications. Is it possible for these techniques to be applied to the internet of things? The internet of things opens up more opportunities for security compromises. How do we develop trust

6、band security techniques across multiple policies? How do we prevent the unauthorized use of private information yet permit authorized use? We need dynamic trust, security, and privacy management. Do we need a new theoretical framework?KeywordsDatabase, Future internet, Integrity, Process, State, Tr

7、ansaction, Workflow. 1. IntroductionThere is much activity in Europe and the world on predicting the future of information and communication technology (ICT). There are roadmapping exercises for R and D in various domains to meet that predicted future. The EC has set up expert groups and/or Projects

8、 covering GRIDs, CLOUDs, Service-Oriented Architectures, quantum and bio-computing, new materials, humancomputer interaction, and cognitive technology among others. There is much discussion of Web2.0 and beyond. The Internet of Things (http:/ en.wikipedia.org/wiki/Internet_of_Things) is a strong the

9、me with a recent EC (European Commission) conference (May 2009) dedicated to it. The formation of the FIA (Future Internet Assembly) underpins the groundswell of enthusiasm for this idea, and Issue 77 of ERCIM News 1 has Future Internet Technology as the special theme, with a foreword by Viviane Red

10、ing, EC Commissioner for Information Society and Media, emphasizing the importance. Europe is establishing an e-Infrastructure and the US is establishing its Cyberinfrastructure.Database researchers (with a few notable exceptions) have not been very prominent in these discussions. This is surprising

11、, as the movement toward takeup of these new technologies by the business world pioneered in the research field will require, at the least, interoperation with the existing database technology, and most likely a further wholesale evolutionary or revolutionary developmentof the database technology, t

12、o adapt to the new environment. Database research has moved to include semi-structured data and its processing and managing of data streams. There is work on schema matching and mapping for interoperation (sometimes in the context of Dataspaces), and on domain ontologies. There is still ongoing work

13、 on web-database interfaces, modeling, and systems development. Work on performance or query optimization with new algorithms continues, as does optimized storage architecture including P2P (Peer to Peer).Where are the advances in database research matching and/or contributing to the huge advances i

14、n (among others) social networking, content creation and repurposing, gaming, sensor systems, robotics, autonomic systems, visualization, user interaction, systems and software development, and service-oriented architecture?2. A VisionThe vision has its roots in 2 with subsequent refinements 3,4 lea

15、ding to an analysis and synthesis performed in 2008 and updated in 2009 by ERCIM (www.ercim.org). It is based on the architecture proposed for the UK e-Science program 2 and is represented in Figure 1.Let us imagine a possible state in 20 years time. The problems facing Europe and the world (from co

16、ntinent through country to individual person scale) are large, complex, and require unprecedented scientific, mathematical, and IT skills for their solution.There is a fast, reliable, inexpensive e-infrastructure providing all communication services. Persons are connected to the e-infrastructure via

17、 personal computer devices that are continuously online. The networking components of the e-infrastructure invisibly provide optimal connectivity in terms of performance, reliability, cost, and security. The e-infrastructure physically senses, detects, records, and curates everything, using all the

18、computers, storage devices, networks, and sensors. Subject to security, privacy, ownership and commercial rights all computational, storage, detector, and communication facilities are available to everyone. Detectors and subsystems will occur in all environments, across all industries and social ser

19、vices, as also in the home environment. Subsystems are embedded within the e-infrastructure for example control systems for utilities including personaltransport. Other subsystems will be robotic for agriculture, manufacturing, healthcare, and other applications. This e-infrastructure vision has maj

20、or implications:1. There is a continuing and accelerating need for ever faster, smaller, cheaper, and more energy-efficient (and less heat-producing) devices. At some point biologically-inspired systems will dominate and will compete/cooperate with quantum-based technologies.2. New intelligent mater

21、ials will be developed, which will allow artifacts to be constructed internet-ready. These will range from agricultural products through to manufactured products.3. The open availability of everything simplifies the physical access and improves the performance,Including reducing latency, but will de

22、mand everincreasing performance, scalability, reliability, and self-management.4. The middleware of the e-infrastructure bears heavy responsibilities: (a) for providing the self* characteristics (self-managing, self-tuning, self- repairing) of a reliable e-infrastructure; (b) for identification, aut

23、horization, trust, security, privacy, and access control; (c) for hiding the complexity through virtualization and abstraction, thus providing homogeneous access to and utilization of heterogeneous facilities.The i-infrastructure relies on the underlying e-infrastructure and converts the data (struc

24、tured, semi-structured, and unstructured) to information. The i-infrastructure provides the processing capabilities to collect, structure, manage, describe, and manipulate the information. It provides computational modeling/simulation facilities to generate new information. The processing capabiliti

25、es will be Service-Oriented Knowledge Utilities (SOKUs) which are discoverable/composable and dynamically tunable, based on properties described by their metadata. There is a massive Amount of content: From structured verified data and information through to personally authored social networking art

26、ifacts, and from data streams generated by detectors through to entertainment and education material. The volumes of data and information will preclude shipping data to processors with appropriate software; rather we shall need to ship software to the data.The k-Infrastructure manages knowledge; all

27、owing differing semantic descriptions over a formal syntax in the i-layer. This is the domain where humans or data mining extract knowledge from information by deduction or induction, where that knowledge is codified and stored for use in optimizing the e- and i- layers, and for interfacing to intel

28、ligent applications and intelligent user interfaces in the overlying application layer.Relying on this e-, i-, and k-infrastructure are applications. They also will be constructed from SOKUs. The SOKUs will have functional characteristics and their nonfunctional characteristics (including performanc

29、e, security, and use-condition aspects) will be determined by a well-defined interface to the e-infrastructure. Such architecture allows extensive re-use of well-tried components and the rapid development of applications, using them and additional new services specifically for a particular applicati

30、on. The applications will range from games and edutainment through to B2C (Businesstocustomer) and B2B (business-to-business) transactions within an E2E (enterprise-to-enterprise) environment and on to advanced R and D activities. Decision-making will be based not just on structured information and

31、knowledge induction and deduction utilizing information, but also on simulations. These applications will be available (under appropriate conditions determined by the restrictive metadata) to everyone. Some applications will be general and widely applicable ranging from entertainment and games throu

32、gh cooperative working/socializing to information management and analysis. These are likely to be pre-composed and optimized for efficiency. Some applications will be highly specialized for particular industrial/commercial sectors or for social sectors such as healthcare and environment; these will be constructed dynamically at demand-time.The end-user will interact with the applications via a set of personalized devices including robots providing services. Each device-based service will have associated role-based profiles (meta

copyright@ 2008-2022 冰豆网网站版权所有

经营许可证编号:鄂ICP备2022015515号-1