首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 0 毫秒
1.
2.
Scripting: higher level programming for the 21st Century   总被引:7,自引:0,他引:7  
《Computer》1998,31(3):23-30
  相似文献   

3.
张钟华 《测控技术》2002,21(Z1):17-19,22
电磁计量是计量技术中极为重要的组成部分.20世纪中电磁计量的量子基准取得了长足的进步,形成了以约瑟夫森量子电压标准、量子化霍尔电阻标准和单电子隧道电流标准为三个顶点的"量子三角形",使电学计量的准确度大幅度提高.在新世纪中,电磁计量的量子基准将进一步发展,服务领域渗透到各个方面.  相似文献   

4.
Emma  Philip 《Micro, IEEE》2007,27(1):136-135
What's the difference between ignorance and indifference? If you are one the rare few who don't know and don't care, then you have the kind of open-mindedness that may allow you to rethink entrepreneurial inventing for the 21st century.  相似文献   

5.
Historically, compilers have operated by applying a fixed set of optimizations in a predetermined order. We call such an ordered list of optimizations a compilation sequence. This paper describes a prototype system that uses biased random search to discover a program-specific compilation sequence that minimizes an explicit, external objective function. The result is a compiler framework that adapts its behavior to the application being compiled, to the pool of available transformations, to the objective function, and to the target machine. This paper describes experiments that attempt to characterize the space that the adaptive compiler must search. The preliminary results suggest that optimal solutions are rare and that local minima are frequent. If this holds true, biased random searches, such as a genetic algorithm, should find good solutions more quickly than simpler strategies, such as hill climbing.  相似文献   

6.
2020年,新冠肺炎在全球爆发,全球医疗系统受到巨大考验,新冠肺炎患者隐私数据安全是医疗信息系统中极其重要的一环.疫情期间,中国新冠肺炎患者隐私数据泄露的案例层出不穷,给患者带来巨大的困扰.采用委托拜占庭容错机制(dBFT)提出了结合区块链的重大疫情患者隐私数据保护方案.方案以联盟链为基础,将政府机构、医疗机构和民众等...  相似文献   

7.
主持人:本专栏曾介绍过2003年8月OND newsletter采访英国电信首席技术官Matthew Bross先生关于“21世纪网络”计划基本情况的访谈信息(见本刊2004年4月期)。英国电信希望通过这个计划,重新组织网络结构和企业运作流程,致力于减少网络运营成本,加速新业务推出速度,改善传统电信运营公司的形象。可以说,这是一个目前在全球传统电信运营商中唯一见到的一个“激进”的网络改造计划。  相似文献   

8.
Vajapeyam  S. Valero  M. 《Computer》2001,34(4):47-50
The computer architecture arena faces exciting challenges as it attempts to meet the design goals and constraints that new markets, changing applications and fast-moving semiconductor technology impose  相似文献   

9.
As we enter the 21st Century, we will be faced with many challenges brought on by technology. Let’s look at the possible future and the environment where computer and technology crimes and frauds of the future will breed along the Internet, as well as its challenges to security and law enforcement professionals.  相似文献   

10.
The deluge of data that future applications must process—in domains ranging from science to business informatics—creates a compelling argument for substantially increased R&D targeted at discovering scalable hardware and software solutions for data-intensive problems.  相似文献   

11.
Last month we discussed the scale of the problem of cybercrime and found that it was international in scope and very costly to business. We also looked at the type of criminals that were cyber-perpetrators. From this, it became apparent that by far the greatest threat comes from employees, consultants and contractors working within businesses, rather than from those attempting to obtain access from outside. In this article, we will look at some of the more serious cybercrimes that are being practiced against businesses, starting with perhaps the serious of them all, ‘netspionage’.  相似文献   

12.
大数据为商业创新和社区服务带来了巨大利益.然而,由于大数据分析技术挖掘出的信息可能超出人们想象,隐私问题备受关注.介绍大数据分析方法及支撑架构,剖析大数据的安全与隐私保护相关技术,并提出一种基于云存储的大数据隐私保护方案.  相似文献   

13.
本文叙述了IFAC'93世界大会的盛况,简要地介绍了本次大会所反映的当今控制与自动化学科的内涵,焦点及应用实况。作者预防控制与自动化将向着智能控制与智能自动化方向发展,所以智能控制必将成为21世纪的控制技术。  相似文献   

14.
信息技术和医疗健康信息化的不断发展使医疗数据大规模涌现,为数据分析、数据挖掘、智能诊断等更深层次的应用提供了条件.医疗数据集庞大且涉及大量病人隐私,如何在使用医疗数据的同时保护病人隐私极具挑战性.目前应用于医疗领域的隐私保护技术主要以匿名化技术为主,但当攻击者具有强大的背景知识时,此类方法无法兼顾数据集的隐私性和可用性...  相似文献   

15.
This article focuses on ways in which the Federal government is addressing long-range implications of the digital economy. First, it attempts to set some context and then briefly describes the Clinton-Gore Administration's Information Technology for the 21st Century Initiative (IT2), which includes research on the social and economic implications of information technology. Finally, it identifies some of the key areas of research within the scope of that initiative.  相似文献   

16.
王玮 《信息网络》2005,(7):1-4,8
20世纪末以来,信息技术发展迅速,日益广泛的信息化带来了许多新的生产模式和生活理念。如今人们对于电子邮件(E-mail)、电子商务(E-business)、电子政务(E-government)等“e”化事物早已不再陌生。而科技的进步永远能够不断带来惊喜,随着无所不在的计算技术(ubiquitous computing)及移动通信技术的发展成熟,人们开始考虑用“u”(ubiquitous,意指“无所不在的”)来取代原先的“e”,描述21世纪“无所不在的”信息社会。  相似文献   

17.
21世纪中国计算机安全展望   总被引:1,自引:0,他引:1  
20年前,开创中国计算机安全监察工作的历史重任落到公安部的肩上。20年来,在国家外交部,中国人民解放军总参谋部,中央机要和保密部门的密切协助下。克服了各种困难,不断拓展工作,壮大了队伍,宣传了观念,并且从1994年开始,走上了法制化的道路,确定了公安部在这项工作中的主管职能。规定了各信息化相关部门的职责。如今一个全国计算机安全工作体系正在逐步建立,计算机安全观念正变得家喻户晓。我国党和国家领导人已经以行动表明:中国在加强国际计算机安全方面起着倡导者的角色。我国  相似文献   

18.
The single most significant event for my office during the last year was a European Initiative, the adoption on 24 October 1995 of the EU General Directive on Data Protection (95/46/EC). As information flows and business patterns make geographical boundaries inappropriate in setting standards applying to automatic processing, so harmonization at international level becomes of increasing significance. This applies to informal arrangements as well as to the law, and initiatives to improve the scope for cooperation between European Data Protection and Privacy Commissioners have also been significant. One of the areas on which cooperative working is beginning to bear fruit, and which is clearly of interest to those involved in IT security, is the work being done to encourage and develop the use of Privacy Enhancing Technologies (PETS). Beyond the limits of the EU, but in a European context, initiatives designed to improve cooperation between Police Forces (Europol) and Customs (CIS) have had an impact on our work.  相似文献   

19.
20.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号