共查询到20条相似文献,搜索用时 0 毫秒
1.
2.
为了给网站管理员提供有效的、半自动化的工具,帮助他们处理一些可能预见的问题,提出了一种采用逻辑语言实现自动推理验证网站信息的半自动化方法,并用逻辑编程语言prolog实现。基于用户最初制定的规则来检测网站所发布的信息,同时做出相应的处理,力求能最大限度地自动修复、完整网页内容。实验结果验证了该方法的有效性。 相似文献
3.
Mobile devices provide a variety of ways to access information resources available on the Web and a high level of adaptability
to different aspects of the context (such as the device capabilities, the network QoS, the user preferences, and the location)
is strongly required in this scenario. In this paper, we present a rule-based approach supporting the automatic adaptation
of content delivery in Web Information Systems. The approach relies on the general notions of profile and configuration. The
former is used to model a variety of context characteristics in a uniform way. The latter describes, in abstract terms, how
to build the various levels of a suitable Web interface (content, navigation and presentation). We propose an original notion
of adaptation rule that can be used to specify, in a declarative way, how to build a configuration that satisfies the requirements
of adaptation for a profile. The evaluation process defined for these rules supports: (1) the handling of many separately
specified adaptation requirements according to different aspects of the context, possibly not fixed in advance, and (2) their
integration into one coherent recipe for adaptation. We also describe the architecture and functionality of a prototype implementing
the proposed approach and illustrate experimental results supporting its flexibility and efficiency.
A preliminary version of this paper appears in the Proceedings of Seventh International Conference on Mobile Data Management (MDM’06) Nara, Japan, May 10–12, 2006. 相似文献
4.
In this paper, we describe a system, written in Haskell, for the automated verification of Web sites which can be used to specify (partial) correctness and completeness properties of a given Web site, and then automatically check whether these properties are actually fulfilled. It provides a rule-based, formal specification language which allows us to define syntactic/semantic conditions for the Web site by means of a user-friendly graphical interface as well as a verification facility for recognizing forbidden/incorrect patterns and incomplete/missing Web pages. 相似文献
5.
The article discusses how to create and use relational database backed Web sites which are protected from data corruption. A threaded discussion on the Internet is used as a typical database application in order to demonstrate the technique 相似文献
6.
《Journal of Computer and System Sciences》2007,73(3):442-474
We study data-driven Web applications provided by Web sites interacting with users or applications. The Web site can access an underlying database, as well as state information updated as the interaction progresses, and receives user input. The structure and contents of Web pages, as well as the actions to be taken, are determined dynamically by querying the underlying database as well as the state and inputs. The properties to be verified concern the sequences of events (inputs, states, and actions) resulting from the interaction, and are expressed in linear or branching-time temporal logics. The results establish under what conditions automatic verification of such properties is possible and provide the complexity of verification. This brings into play a mix of techniques from logic and model checking. 相似文献
7.
On social Web sites 总被引:1,自引:0,他引:1
Today hundreds of millions of Internet users are using thousands of social Web sites to stay connected with their friends, discover new “friends,” and to share user-created contents, such as photos, videos, social bookmarks, and blogs. There are so many social Web sites, and their features are evolving rapidly. There is controversy about the benefits of these sites, and there are social issues these sites have given rise to. There are lots of press articles, Wikipedia articles, and blogs—in varying degrees of authoritativeness, clarity and accuracy—about some of the social Web sites, uses of the sites, and some social problems, and business challenges faced by the sites. In this paper, we attempt to organize the status, uses, and issues of social Web sites into a comprehensive framework for discussing, understanding, using, building, and forecasting the future of social Web sites. 相似文献
8.
9.
10.
A large jump in a Web site's traffic may indicate success, but this increased interest could turn into a nightmare if the site is not prepared to handle the bigger load. Site resources (processors, storage boxes, load balancers, LANs, and the like) could see their utilization rise to levels that generate increasingly long response times. Eventually, one of these resources - the so-called bottleneck resource - will reach 100 percent utilization, pushing the site's throughput to its maximum point. When a Web site becomes overloaded, customers grow frustrated with long waits and rejected requests. This situation can lead to an undesirable loss of site-generated revenue and may even tarnish the reputation of organizations relying on Web sites to support mission-critical applications. In this article, I discuss how caching technologies can improve Web site performance and scalability. I'll provide some simple quantitative expressions to let designers understand the most important trade-offs. 相似文献
11.
Holger Busch 《Formal Methods in System Design》1994,5(1-2):7-33
Induction is indispensable for reasoning about parameterized logical models, as they arise in the context of hardware and software verification. Sophisticated heuristics for mechanizing induction proofs exist and have been successfully implemented in theorem provers for first-order logic. This article is a presentation of a complementary induction method that makes extensive use of the expressiveness of higher-order logic and higher-order unification facilities ofLAMBDA. Rather than hard-coded routines, rules are used that incarnate induction schemes in a concise way. By means of instantiatable meta-variables, these rules are more general and preserve the flexibility to gradually specify an induction scheme throughout a proof process, as more and more information is available, rather than fully determining the induction scheme right at the beginning. Safe inference mechanisms and general-purpose proof automation utilities in the proof checkerLAMBDA are well-suited for an interactive induction assistant that integrates automatic induction heuristics and at they same time accepts human guidance. 相似文献
12.
Legal contracts and litigation documents common to the American legal system were encoded in the eXtensible Markup Language (XML). XML also represents rules about the contracts and litigation procedure. In addition to an expert system tool that allows one to make inferences with that engine, a Graphical User Interface (GUI) generates the XML representing the rules. A rulebase is developed by marking up examples of the XML to be interpreted and the XML to be generated, analogously to Query By Example. This article provides a broader context of the synergy between XML and artificial intelligence by including discussions of: (1) the role of Artificial Intelligence in handling routine litigation; (2) how the use of XML enables legal expert systems to get their `input' without the user having to enter the same information again for the expert system;(3) the advantages of XML markup over other forms of markup for documents; (4) the relationship between XML and ontologies; (5) other projects using XML with rules or legal affairs. 相似文献
13.
Victor Vianu 《Annals of Mathematics and Artificial Intelligence》1997,19(1-2):215-259
The paper presents a survey of the main formal rule-based languages and semantics. Both procedural (fixpoint) and declarative (model-theoretic) semantics are defined and discussed, including inflationary and noninflationary fixpoint semantics, and the semi-positive, stratified and well-founded semantics. The relative expressive power and com-plexity of the various languages are provided. Nondeterministic rule-based languages are also discussed, and it is shown how nondeterminism can circumvent some difficulties concerning the expressive power of the deterministic languages. Finally, languages with value invention (in the spirit of object-creation in oodbs) are presented and issues of expressive power specific to such languages are discussed. 相似文献
14.
Personalization refers to the automatic adjustment of information content, structure, and presentation tailored to an individual user. Commercial Web sites increasingly employ personalization to help retain customers and reduce information overload. A Web site is personalized if a user can interact with the site in an expressive way to achieve his information-seeking goals. Thus, personalizing the user's interaction is the best way to achieve personalization. The paper discusses mixed initiative interaction and the use of XSLT for personalization. 相似文献
15.
16.
Elizabeth Würtz 《Journal of Computer-Mediated Communication》2005,11(1):274-299
The aim of this study is to explore and identify the strategies used by high‐context cultures in utilizing the Internet—a largely low‐context medium—for communication and marketing purposes. It is hypothesized that individuals in high‐context cultures are more likely to adopt the visual effects offered by the Internet to convey their messages efficiently than their low‐context counterparts. How might high‐context cultures make the most of the potentials offered by the Internet generation of today? Assuming that visual communication is a high priority in the design of high‐context Web sites, how do the visual methods used on Web sites vary according to the communication styles in different cultures? Using Hall’s high‐ and low‐context dimensions as the main parameters, an exploratory analysis of McDonald’s Web sites identified five different strategies by which visual communication is used to support high‐context communication traits. 相似文献
17.
The author presents a review of issues that are aggregated into five major categories: middleware, site scalability and availability, distributed applications, autonomic computing, and workload characterization. 相似文献
18.
The best prototype for designing a new user interface is your old user interface. The second best prototype is a competing product. Your competitors have invested significant resources in designing and implementing what they believe to be good user interfaces. You can glean much of what you need to create a new interface by examining products designed to solve similar problems. As with your own old user interface, you can analyze competing interfaces to see what works and what doesn't. You can also watch how users interact with competing products, and thus learn how they approach tasks. This, in essence, is competitive usability analysis. I recommend performing it very early in the usability engineering life-cycle-after you have visited the customer, gathered requirements, and defined the product vision, but before you design and prototype your new user interface 相似文献
19.
Overload protection is critical to E-commerce Web sites. This paper presents a profit-aware admission control mechanism for overload protection in E-commerce Web sites. Motivated by the observation [Measure Twice, Cut Once—Metrics For Online Retailers, 2006, (http://www.techexchange.com/thelibrary/online_retail_metrics.html)] that once a client made an initial purchase, the buy-to-visit ratio of the client escalates from less than 1% to nearly 21%, the proposed mechanism keeps track of the purchase records of clients and utilizes them to make admission control decisions. We build two hash tables with full IP address and network ID prefix, which maintain the purchase records of clients in fine-grain and coarse-grain manners, respectively. We classify those clients who made purchases before as premium customers and those clients without prior purchase behavior as basic customers. Under overload conditions, our mechanism differentiates premium customers from basic customers based on the record hash tables, and admits premium customers with much higher probability than basic customers. In favor of premium customers, our mechanism maximizes the revenues of E-commerce Web sites. We evaluate the efficacy of the profit-aware mechanism using the industry-standard TCP-W workloads. Our experimental results demonstrate that under overload conditions, the profit-aware admission control mechanism not only achieves higher throughput and lower response time, but also dramatically increases the revenue received by E-commerce Web sites. 相似文献
20.
《Security & Privacy, IEEE》2004,2(4):88
Criminals follow money. Today, more and more money is on the Internet: millions of people manage their bank, PayPal, or other accounts - and even their stock portfolios - on line. It's a tempting target - if criminals can access one of these accounts, they can steal a lot of money. And almost all these accounts are protected only by passwords.The solutions are not easy. The never-ending stream of Windows vulnerabilities limits the effectiveness of any customer-based software solution - digital certificates, plug-ins, and so on-and the case with which Malicious software can run on Windows limits other solutions' effectiveness. Point solutions might force attackers to change tactics, but won't solve the underlying insecurities. Computer security is an arms race, and money creates very motivated attackers. Unsolved, this type of security problem will change the way people interact with the Internet. It'll prove that the naysayers were right all along - the Internet isn't safe for electronic commerce. 相似文献