首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 72 毫秒
1.
文章分析智能终端操作系统的市场格局、主流操作系统的发展模式和特点,重点阐述中国联通自主产权的TIOS(Trust Internet Operating System)智能终端操作系统的总体特点、技术架构和关键子系统技术特点,介绍围绕沃Phone的应用下载服务和开发者服务,最后展望未来TIOS的发展前景。  相似文献   

2.
目前沃Phone仅有2款手机、200个应用的事实,以及中国移动OPhone的前车之鉴,都表明沃Phone前景存在诸多不确定性。近日,中国联通推出了沃Phone及我国首个自主知识产权的智能终端操作系统。  相似文献   

3.
尚斌 《通信世界》2011,(28):9-9
沃Phone发展初期应针对中低端用户重点推广,加强补贴以促进销量,并以此刺激更多终端厂商加入沃Phone生态圈。在推出了两款沃Phone手机后,近日,中国联通透露,将扩大沃Phone产业化规模,加快推出沃Phone操作系统的平板电脑、互联网  相似文献   

4.
陈琳 《中国新通信》2011,13(5):62-63
工信部副部长奚国华、科技部副部长曹健林、中国联通董事长常小兵启动沃Phone发布仪式日前,中国联通宣布正式推出沃Phone及首个自主知识产权智能终端操作系统。工信部奚国华副部长、  相似文献   

5.
向坤 《通讯世界》2011,(5):55-55
继中国移动推出自主操作系统OPhone后,联通也推出了沃Phone。从操作系统的名字从传闻中的UPhone变为沃Phone,可以看出联通对沃这一3G品牌的自信,也希望借联通沃品牌在3G时代强势的东风,为联通构建一条基于沃品牌的完整产业链。  相似文献   

6.
没有自己的手机操作系统,就会受制于人,在移动互联网时代,这种形势显得更为急迫。中国联通拒走中国移动的老路,自主开发沃Phone移动平台,尽管姗姗来迟,却为国产手机的未来点燃了希望之灯经过三年的漫长等待,中国联通沃Phone及其操作系统终于粉墨登场。这是国内首个具有自主知识产权的手机操作系统,也意味着中国联通大  相似文献   

7.
通信月评     
《广东通信技术》2011,(3):79-79
1 运营商争夺操作系统,联通沃Phone对阵移动Ophone 中国联通日前推出全新手机操作系统平台沃Phone,该款平台是以Linux基础为内核的系统,具备了应用商店、互联网应用、3D硬件加速、屏幕多点触控、主屏幕widget、GPS等多种功能。兼容性强,支持WCDMA、  相似文献   

8.
《数字通信世界》2011,(3):39-39
2月28日,中国联通在北京正式推出沃Phone及我国首个自主知识产权的智能终端操作系统。工业和信息化部奚国华副部长、科技部曹健林副部长、中国联通陆益民总经理分别在发布会上致辞,奚国华、曹健林和常小兵共同启动了沃Phone及智能终端操作系统发布仪式。此外,来自发改委、国资委、工  相似文献   

9.
近年来,随着国内外网络用户隐私安全态势日趋严重,如何保障网络用户账户安全成为亟待解决的问题。针对现有网络认证系统面临的弱口令、"拖库"、"撞库"等安全挑战,文章提出"沃互联"统一认证解决方案,即基于SIM卡统一认证方案,为用户提供安全、便捷的认证能力。文章首先对现有网络认证系统存在的弊端进行阐述,然后对现有账户体系安全需求进行分析和讨论。根据安全需求,提出"沃互联"统一认证解决方案,介绍系统技术架构,展示系统核心模块功能、业务流程、应用场景。最后提出沃互联统一认证方案未来发展展望。  相似文献   

10.
绎过三年的漫长等待,中国联通沃Phone及其操作系统终于粉墨登场这是国内首个具有自主知识产权的手机操作系统,也意味着中国联通大举进攻移动互联网拉开了序幕. 科技部前部长徐冠华曾说,中国信息产业"缺芯少魂",这里的"魂"指的就是操作系统.尽管PC的"魂"今天依然缺失,智能手机却让国人看到了希望.2月28 日,中国联通举行了"沃Phone"新闻发布会,共有两个副部长以及十个院士出席,此事分量山此可见一斑.  相似文献   

11.
在非专业软件开发人员对软件开发的过程中会遇到软件设计方法与测试等方面的问题,对软件测试的关键技术以及深度软件开发的方法进行阐述,可以为非专业软件开发人员开发软件提供一定的指导.  相似文献   

12.
Test driven development (TDD) is increasing in information technology applications and product development; however, it has not been widely applied in embedded software development. Embedded developers face many challenges. TDD can help overcome some of these challenges, but TDD has to be adapted for embedded systems development. TDD is an important software development practice that can help embedded developers deliver higher quality products. The embedded TDD cycle can help take hardware availability off the software critical path, enabling steady progress with or without hardware. TDD can be used for embedded development in C and C++. Java may also be an option for some embedded systems, and Java is better suited for TDD, as the tools for Java support are much more advanced.  相似文献   

13.
彭鑫赵文耘  钱乐秋 《电子学报》2006,34(B12):2473-2477
构件的功能语义是复用者了解并判断构件可复用性的重要依据,因此必须在构件开发者和复用者共同的知识基础上进行构件描述.目前已有一些方法引入本体作为构件语义描述的基础,但仍然存在语义描述不够精确以及无法支持语义的组装推导等不足.引入了领域分析中提出的基于本体的领域特征模型作为构件语义描述基础,在此基础上给出了构件端口语义、静态语义、语义协议的定义以及语义组装算法.基于构件静态语义和组装算法可以在构件组装时进行语义合成,从而辅助开发者进行基于语义的构件适配和组装分析.  相似文献   

14.
史嫄 《电子测试》2016,(8):164-165
本文用SWOT分析法,探讨了西安F学院教师队伍建设具有的优势和劣势,以及所面临的机遇和威胁,并分别提出了SO、WO、ST、TW四种民办高校教师队伍建设策略.  相似文献   

15.
Software developers are trained to develop and design software applications that provide services to users. However, software applications sometimes collect users’ data without their knowledge. When applications collect and use users’ data without transparency, this leads to user privacy invasions because users do not expect the application to collect and use these information. Therefore, it is important that software developers understand users’ privacy expectations when designing applications in order to handle user data transparently in software applications. However, due to the lack of systematic approaches to extract user privacy requirements, developers end up designing applications either based on their assumptions on user privacy expectations, or relating to their own expectations of privacy as a user. Nevertheless, how accurate these perceived privacy expectations are against actual user expectations is not currently known. This research focuses on investigating developers’ privacy expectations from a user point of view against users’ privacy expectations. We also investigate developers’ assumptions on user privacy expectations against actual user privacy expectations. Our findings revealed that developers’ assumptions on user privacy expectations are close to their own expectations of privacy from a user point of view and that developers’ privacy expectations from a user point of view are significantly different from actual user privacy expectations. With this understanding, we provide recommendations for software developers to understand and acknowledge user expectations on privacy when they design and develop applications.  相似文献   

16.
Many developer recommendation tech-niques have been developed in the literature. Among exist-ing studies, most of them are performed based on exploring the historical commit repository. The thought behind them is that developers who submit similar historical commits relevant to the incoming issue are more probably to be the candidates for the current issue resolution. But whether such a thought is always useful for developer recommen-dation? This paper aims at this problem by conducting a set of empirical studies on four real open-source projects. The results show that, 1) historical commit messages do well reflect the historical experience of the maintenance task of developers and can be used for developer recom-mendation in most of the time; 2) the number of historical commits submitted by the recommended developer(s) and the similarity value used to select the relevant historical commits should be carefully considered to recommend de-velopers for issue resolution; 3) The e?ciency of issue res-olution process can be improved if some associated source code files relevant to this issue can be also recommended;and 4) developer recommendation techniques that rank the recommended developers based on the times of co-changed source code files cannot always produce correct recommen-dation results.  相似文献   

17.
介绍了开发MHP Java应用及其所处的环境特点,探讨了MHP应用程序开发人员在设计MHP应用软件时应注意与考虑的基本问题.  相似文献   

18.
Critics Say Web Services Need a REST   总被引:1,自引:0,他引:1  
A vocal group of developers critical of the orthodox Web Services stack is touting the use of a technology called REST, or Representational State Transfer Web Services. REST advocates a more streamlined (and familiar) XML-over-HTTP approach for exposing software functionality. Here are some of the issues being debated.  相似文献   

19.
《电子学报:英文版》2016,(6):1011-1018
We propose an approach called Bug report assignment with topic modeling and heterogeneous network analysis (BAHA) to automatically assign bug reports to developers.Existing studies adopt social network analysis to characterize the collaboration of developers.The networks used in these studies are all homogenous.In real practice of bug resolution,different developers collaborate on different bug reports that makes the homogenous network unable to capture this information.We use heterogeneous network to describe the relations between reporters,bug reports and developers to characterize developers' collaboration.Experiments on Eclipse JDT project show that BAHA outperforms the state of art methods on automatic bug report assignment.  相似文献   

20.
本文讨论了在开关电容(SC)滤波器中如何减少增益带宽积(GB)效应的问题,提出了一个减少GB效应的新的双二次拓扑结构,此结构对寄生电容不敏感,并且具有很低的无源W0,Q灵敏度。以低通SC滤波器为例,给出了减小GB效应的具体设计方法。并用设计实例和实验结果证明了所得结论的正确性。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号