首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 60 毫秒
1.
《微型计算机》2007,(2Z):182-183
电流,工业声响,街头噪音,唱片,合成器,电脑软件,舞池,欲望,节奏,原始未来,虚幻,频率,秘密,星空与大海,后工业的蝴蝶穿过酸雨腐蚀的田野,抖落身上冰冷的金属粉尘,在风格森林的钢胸铁肺之后,在流萤与碎影中寻回失传已久的彩虹……[编者按]  相似文献   

2.
原创新势力     
Lailai是一个人物,爱幻想,爱思考,没有嘴巴,回为Lailai不爱多说话,不喜欢是是非非,也没有耳朵,因为Lailai不在乎别人的看法,走自己的路,独立,自由,眼神很顺利,因为Lailai要用它来分辨这世间的一切美和丑,双手发达,因为Lailai热爱劳动,热爱生活,  相似文献   

3.
近年来,能插在电脑上使用的玩意儿越来越多,比如数码相机,打印机,扫描仪,游戏杆,读卡器,MP3播放器,无线耳机收发器,微型硬盘等等,数不胜数,随着即插即用功能的出现,在电脑上添加新设备也越来越简单,但新添加的设备会请求使用系统资源,因此添加的设备越多,出现资源冲突的可能性也越高。结果呢?系统可能会变慢,死机,无法启动。  相似文献   

4.
招聘启事     
叶泊 《现代计算机》2008,(11):125-125
一家大公司在报纸上刊登了招聘公关的启事,要求非常高:女性,未婚,没有男友,22周岁,身高一米七,名牌大学中文系本科毕业,长相甜美,笑起来有酒窝,身材苗条,腰围一尺八,乌黑长发,没有染过,气质优雅,有大家闺秀的风范……  相似文献   

5.
MAES系列通用专家系统的结构及使用方法   总被引:2,自引:0,他引:2  
叙述一种国内自主开发的专家系统开发工具,可以替代进口的专家系统。它可应用于工业,农业,军事,医疗,交通,旅游,环保,气象,航空等领域,实现诊断,计划,设计,咨询,管理,市场预测,投标等。  相似文献   

6.
随着元旦的钟声敲响,一年一度的寒促拉开了大幕,各家电脑公司的门口彩旗飘飘,歌声飞扬,扬声器传出来的叫卖声此起彼伏。到了这样一种环境,面对着巧立名目花样繁多的优惠,不由你不动心,不由你不追随商家的诱惑步步深入。品牌电脑促销赠送礼邪乎,除了软件大礼包,手写板一类小玩意,扫描仪,打印机,电脑桌,摄像头,数码相机,甚至电冰箱和手机,要什么有什么,什么好送就送什么,有的赠品是免费相送,有的赠品只要加多少多少钱,就可换成更高性能的产品,花样百出。这些赠品对消费者是否真的有益?带着这个问题,我走进了几家电脑公司。  相似文献   

7.
作为对图像等信息进行切换和控制等作用的矩阵系统,是整个闭路电视的核心部分,起着承上启下的作用,目前,矩阵系统的应用范围越业越广,除了传统的公安系统,道路交通系统,机场,城市治安监控,监狱看所所等领域之外,在小区,学校,政府机构,电力电信,医院,铁路等领域也有较多的应用。[编者按]  相似文献   

8.
平平圭 《电脑》2002,(7):106-106
我用自己的电脑写文章、听歌曲、上网,常常在不经意间,电脑屏幕跳出来一个“非法操作”框,“XX程序执行了非法操作,即将关闭。”于是,写好一半的文章,得停下,正听得起劲的歌曲,不能再听了,上网呢,免了吧。而常常,碰到这种情况,我是无可奈何的,能处理就处理一下,不能处理,就只有投降了。那种感觉,真是糟透了。懊恼、烦燥、愤怒,可是又无可奈何。有问题就要解决,痛定思痛,我请教了一些朋友,又翻了翻书,终于明白了其中的道理,其实,“非法操作”这种情况并不可怕,只要稍加处理是完全可以避免的。造成“非法操作”的原…  相似文献   

9.
《首都信息化》2004,(5):1-1
近日,北京市信息化工作领导小组召开第五次会议,北京市委副书记,市长,北京市信息化工作领导小组组长王岐山在会上强调,要按照全面,协调,可持续的科学发展观要求,加快推进信息化建设,转变信息化建设的增长方式,整合现有资源,打破条块分割,  相似文献   

10.
游侠Joser 《软件》2004,(10):4-9
我们都是普通得不能再普通的人,我们每天每天穿梭在钢筋水泥的丛林中,忙碌奔波,看上去,我们和大多数人没有什么不同,我们起床,我们吃早饭,我们上班,我们跟上司和同事争论,我们吃午饭,我们接着上班,我们下班,天黑了,我们一边吃晚饭,一边抱怨工作的辛苦,我们看电视,我们看书,我们睡觉,为明天的重复行为储备精力,日复一日,周而复始,我们拥有那么相似的人生……这是我想要的人生吗?不,我很肯定,我不想要这样沉闷的生活,我知道,你也跟我一样。那么,让我们在阳光里,蓝天下,草地上,大声地喊出来:我的人生我作主!  相似文献   

11.
为了设计一种具有低成本、低功耗、易操作、功能强且可靠性高的煤矿井下安全分站,针对煤矿安全生产实际,文章提出了采用MCS-51系列单片机为核心、具有CAN总线通信接口的煤矿井下安全监控分站的设计方案;首先给出煤矿井下安全监控分站的整体构架设计,然后着重阐述模拟量输入信号处理系统的设计过程,最后说明单片机最小系统及其键盘、显示、报警、通信等各个组成部分的设计;为验证设计方案的可行性与有效性,使用Proteus软件对设计内容进行仿真验证,设计的煤矿井下安全监控分站具有瓦斯、温度等模拟量参数超标报警功能和电机开停、风门开闭等开关量指示功能;仿真结果表明:设计的煤矿井下安全监控分站具有一定的实际应用价值.  相似文献   

12.
In modern service-oriented architectures, database access is done by a special type of services, the so-called data access services (DAS). Though, particularly in data-intensive applications, using and developing DAS are very common today, the link between the DAS and their implementation, e.g. a layer of data access objects (DAOs) encapsulating the database queries, still is not sufficiently elaborated, yet. As a result, as the number of DAS grows, finding the desired DAS for reuse and/or associated documentation can become an impossible task. In this paper we focus on bridging this gap between the DAS and their implementation by presenting a view-based, model-driven data access architecture (VMDA) managing models of the DAS, DAOs and database queries in a queryable manner. Our models support tailored views of different stakeholders and are scalable with all types of DAS implementations. In this paper we show that our view-based and model driven architecture approach can enhance software development productivity and maintainability by improving DAS documentation. Moreover, our VMDA opens a wide range of applications such as evaluating DAS usage for DAS performance optimization. Furthermore, we provide tool support and illustrate the applicability of our VMDA in a large-scale case study. Finally, we quantitatively prove that our approach performs with acceptable response times.  相似文献   

13.
《Information & Management》2016,53(6):787-802
Discrepant technological events or situations that entail a problem, a misunderstanding or a difficulty with the Information Technology (IT) being employed, are common in the workplace, and can lead to frustration and avoidance behaviors. Little is known, however, about how individuals cope with these events. This paper examines these events by using a multi-method pragmatic approach informed by coping theory. The results of two studies – a critical incident study and an experiment – serve to build and test, respectively, a theoretical model that posits that individuals use a variety of strategies when dealing with these events: they experience negative emotions, make external attributions, and adopt engagement coping strategies directed at solving the event, eventually switching to a disengagement coping strategy when they feel they have no control over the situation. Furthermore, users’ efforts may result in ‘accidental’ learning as they try to overcome the discrepant IT events through engagement coping. The paper ends with a discussion of the results in light of existing literature, future opportunities for research, and implications for practice.  相似文献   

14.
Kim  K. H. 《Real-Time Systems》2004,26(1):9-28
Distributed real-time simulation is a young technology field but its practice is under increasing demands. In recent years the author and his collaborators have been establishing a new approach called the distributed time-triggered simulation (DTS) scheme which is conceptually simple and easy to use but widely applicable. The concept was initiated in the course of developing a new-generation object-oriented real-time programming scheme called the time-triggered message-triggered object (TMO) programming scheme. Some fundamental issues inherent in distributed real-time simulation that were learned during recent experimental studies are discussed along with some approaches for resolving the issues. An execution engine developed to support both the TMOs engaged in control computation and the TMOs engaged in DTS is also discussed along with its possible extensions that will enable significantly larger-scale DTSs.  相似文献   

15.
Zusammenfassung Mit zunehmender Größe der Softwaresysteme verschärfen sich die für die Software-Herstellung typischen Probleme: Beherrschen großer Objektmengen, Erhalten der Systemkonsistenz, Kontrolle der ständigen Änderungseinflüsse und Gewährleisten einer langen Lebensdauer. Die Disziplin Konfigurationsmanagement bildet den methodischen Ansatz, diese Probleme besser zu beherrschen. Software-Konfigurationsmanagement faßt die Herstellung von Softwaresystemen als eine Abfolge von kontrollierten Änderungen an gesicherten Zwischen- und Endergebnissen auf. Dargestellt werden die Objekte und Funktionen des Software-Konfigurationsmanagements sowie die hierfür in großen Software-Projekten benötigten Methoden, Instanzen und Hilfsmittel.  相似文献   

16.
正http://www.zju.edu.cn/jzus http://www.springerlink.com Aim The Journals of Zhejiang University-SCIENCE(A/B/C)are edited by the international board of distinguished Chinese and foreign scientists,and are aimed to present the latest developments and achievements in scientific research in China and  相似文献   

17.
正Brain-machine interfaces(BMIs)aim at building a direct communication pathway between the brain and an external device,and represent an area of research where significant progress has been made during the past decade.Based on BMIs,mind information can be read out by neural signals to control  相似文献   

18.
正http://www.zju.edu.cn/jzus http://www.springerlink.com Aim The Journals of Zhejiang University-SCIENCE(A/B/C)are edited by the international board of distinguished Chinese and foreign scientists,and are aimed to present the latest developments and achievements in scientific research in China and overseas to the world’s scientific circles,especially to stimulate  相似文献   

19.
20.
正http://www.zju.edu.cn/jzus http://www.springerlink.com Aim The Journals of Zhejiang University-SCIENCE(A/B/C)are edited by the international board of distinguished Chinese and foreign scientists,and are aimed to present the latest developments and achievements in scientific research in China and overseas to the world’s scientific circles,especially to stimulate  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号