Meaning and Vision of Mimic Computing and Mimic Security Defense
To facilitate high-performance and high-security computing, a technology system based on mimic computing(MC)and mimic security defense(MSD)was proposed. The proposed system focused on both the multi-dimensional reconfigurable and functional architecture and the dynamic varied mechanism. An overview...
Saved in:
Main Author: | |
---|---|
Format: | Article |
Language: | zho |
Published: |
Beijing Xintong Media Co., Ltd
2014-07-01
|
Series: | Dianxin kexue |
Subjects: | |
Online Access: | http://www.telecomsci.com/zh/article/doi/10.3969/j.issn.1000-0801.2014.07.001/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1841529353558556672 |
---|---|
author | Jiangxing Wu |
author_facet | Jiangxing Wu |
author_sort | Jiangxing Wu |
collection | DOAJ |
description | To facilitate high-performance and high-security computing, a technology system based on mimic computing(MC)and mimic security defense(MSD)was proposed. The proposed system focused on both the multi-dimensional reconfigurable and functional architecture and the dynamic varied mechanism. An overview about the concept and mechanism of the MC and MSD was also introduced from the angles of meaning and vision. The science and engineering problems to be further addressed were given in the end. |
format | Article |
id | doaj-art-a761c3b123c3429ea501e79ed857e1ae |
institution | Kabale University |
issn | 1000-0801 |
language | zho |
publishDate | 2014-07-01 |
publisher | Beijing Xintong Media Co., Ltd |
record_format | Article |
series | Dianxin kexue |
spelling | doaj-art-a761c3b123c3429ea501e79ed857e1ae2025-01-15T03:19:05ZzhoBeijing Xintong Media Co., LtdDianxin kexue1000-08012014-07-01302759619918Meaning and Vision of Mimic Computing and Mimic Security DefenseJiangxing WuTo facilitate high-performance and high-security computing, a technology system based on mimic computing(MC)and mimic security defense(MSD)was proposed. The proposed system focused on both the multi-dimensional reconfigurable and functional architecture and the dynamic varied mechanism. An overview about the concept and mechanism of the MC and MSD was also introduced from the angles of meaning and vision. The science and engineering problems to be further addressed were given in the end.http://www.telecomsci.com/zh/article/doi/10.3969/j.issn.1000-0801.2014.07.001/mimic computingmimic security defensemulti-level reconfiguration |
spellingShingle | Jiangxing Wu Meaning and Vision of Mimic Computing and Mimic Security Defense Dianxin kexue mimic computing mimic security defense multi-level reconfiguration |
title | Meaning and Vision of Mimic Computing and Mimic Security Defense |
title_full | Meaning and Vision of Mimic Computing and Mimic Security Defense |
title_fullStr | Meaning and Vision of Mimic Computing and Mimic Security Defense |
title_full_unstemmed | Meaning and Vision of Mimic Computing and Mimic Security Defense |
title_short | Meaning and Vision of Mimic Computing and Mimic Security Defense |
title_sort | meaning and vision of mimic computing and mimic security defense |
topic | mimic computing mimic security defense multi-level reconfiguration |
url | http://www.telecomsci.com/zh/article/doi/10.3969/j.issn.1000-0801.2014.07.001/ |
work_keys_str_mv | AT jiangxingwu meaningandvisionofmimiccomputingandmimicsecuritydefense |