After the modern models for network computing are analyzed, their weak spots of the representation of serving resources are pointed. And a new interface model which can specify a computing resource more precisely and comprehensively is designed in order to improve the interaction of computers themselves so that the software resources can be searched and shared automatically.
1 Stang D J, Moon Sylvia(著),程佩青等(译).计算机网络安全奥秘.北京:电子工业出版社,1994
(Cheng Pei-qing et al(translation). Secrets of Computer Network Security. Beijing: Publishing House of Electronic Industry, 1994)
2 Andrew S Tanenboum. Computer Network(3rd Edition). Englewood Cliffs: Prentice-Hall International Inc., 1996
3 Quisquater J J, Girault M. Chinese Lotto as an exhaustive code-breaking machine. IEEE Computer Magazine, 1991,24(11):14~22
4 RFC1831. Remote Procedure Call Protocol Specification Version 2, 1995
5 RFC1832. XDR: External Data Representation Standard, 1995