首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 62 毫秒
1.
个性化服务技术研究   总被引:8,自引:2,他引:8  
对个性化服务技术中的用户识别、用户描述文件、个性化推荐技术、个性化服务系统的体系结构及目前的研究方向进行了概述。从实现角度详细讨论了3种个性化推荐技术。个性化服务具有针对性,它的目的就是为了使用户更好地找到需要的信息,通过从用户访问网站的历史记录中得到用户的个人信息,利用个性化推荐的方法将信息推荐给用户。个性化推荐避免用户陷入信息的海洋,提高用户查询效率,使得用户可以得到他们真正想得到的信息,避免繁多的人工搜索。  相似文献   

2.
《A&S》2008,(12):118-119
二十年来,大立科技一直致力于不断提升技术和产品创新,为用户提供稳定可靠的产品、系统集成、完善的技术解决方案和优质服务;技术让用户放心,服务让用户满意,是大立人永远的追求。  相似文献   

3.
搜索引擎和文本过滤技术都是为了帮助用户快速、准确地获取用户需求的信息。在研究搜索引擎和文本过滤技术中的用户需求表达方法的基础上,提出了一种利用样本公共特征来表达用户需求的方法,结合网络上的搜索引擎和文本过滤技术,构建了一个面向产品设计的信息搜集系统。  相似文献   

4.
随着Internet/Intranet技术的迅猛发展,又一次掀起了计算机应用的热潮,中国Internet的建设已初具规模,各个单位也都在开始建设自己的Intranet。但是,人们在进入Inter-net和建设Intranet时,无一不考虑安全问题。本文从技术的角度出发,介绍一些基本的常用的安全技术,希望能对计算机网络安全的建设起到一些作用。口令口令识别口令识别是一种低成本、易实现的用户识别技术,在计算机系统内广泛地使用。在口令识别机制中,计算机系统给每个用户分配一个用户标识和一个口令。用户标识唯一确定一个用户,是公开的;口令用于证实用户,…  相似文献   

5.
谢勍 《微计算机应用》2006,27(1):98-100
介绍了在识别用户身份时,将数字水印技术和指纹识别技术相结合,实行对用户身份的双重认证,阐明了两者进行认证的过程。本文将数字水印与指纹识别技术相结合.设计了一种数字水印技术和指纹识别技术的双重个人身份识别系统。从而确保用户身份的合法性。  相似文献   

6.
系统集成是一个系统工程,它的主要目标是使整个网络系统能够连通并具有互操作性。这就要求集成商从技术到设备都要通盘考虑。因为用户毕竟不可能对细节问题都很熟悉,他们只能提出实现的目标和总的技术要求。系统集成商在进行系统集成的时候,不但要完成用户的要求,还要对用户进行讲解,进行交流,完善用户的目标和要求,使用户通过系统集成的过程,对整个产品及技术功能方面都有透彻的理解,这样,不但对系统集成高增加了信任感,而且对自身技术知识方面也会有所提高。一、用户儒术中心主楼中』已主楼放置主交换机和部分工作组交换机,整…  相似文献   

7.
用户对象技术是PB提供的面向对象技术的一个重要组成部分,利用用户对象技术可以实现许多用传统方法不易实现的功能。本文根据电子对抗仿真系统中战情管理模块的功能要求,详细介绍了基于PB用户对象技术实现战情编辑功能的方法。  相似文献   

8.
刘江 《程序员》2008,(8):109-110
Flex作为Adobe公司力推的Web2.0的标志技术,为用户提供了更加友好的交互服务,给用户以丰富的客户体验。Flex以其良好的用户技术,广泛的Flash平台支持,正日益受到人们的关注和学习。  相似文献   

9.
吴敌 《个人电脑》2009,15(2):25-25
在这个DVD刻录技术十分成熟的时代,如何让自己的产品拥有独特的亮点,是所有光存储厂商面临的问题。单纯的提升速度对于用户来说已经不具备太大的吸引力了。对于用户来说,越是成熟的产品,用户想要从产品上得到的就越多。正是面对用户日益增长的需求,ASUS推出了E-Green节能技术。目前ASUS的主流光存储产品均已配备了最新的E—Green技术,  相似文献   

10.
《国内外机电一体化技术》2007,10(4):F0004-F0004
世界一流的芯片设计和封装技术,专业的霍尔集成电路生产制造商,售前为用户选择适当的技术方案,售后为用户提供完善的服务。  相似文献   

11.
为了设计一种具有低成本、低功耗、易操作、功能强且可靠性高的煤矿井下安全分站,针对煤矿安全生产实际,文章提出了采用MCS-51系列单片机为核心、具有CAN总线通信接口的煤矿井下安全监控分站的设计方案;首先给出煤矿井下安全监控分站的整体构架设计,然后着重阐述模拟量输入信号处理系统的设计过程,最后说明单片机最小系统及其键盘、显示、报警、通信等各个组成部分的设计;为验证设计方案的可行性与有效性,使用Proteus软件对设计内容进行仿真验证,设计的煤矿井下安全监控分站具有瓦斯、温度等模拟量参数超标报警功能和电机开停、风门开闭等开关量指示功能;仿真结果表明:设计的煤矿井下安全监控分站具有一定的实际应用价值.  相似文献   

12.
In modern service-oriented architectures, database access is done by a special type of services, the so-called data access services (DAS). Though, particularly in data-intensive applications, using and developing DAS are very common today, the link between the DAS and their implementation, e.g. a layer of data access objects (DAOs) encapsulating the database queries, still is not sufficiently elaborated, yet. As a result, as the number of DAS grows, finding the desired DAS for reuse and/or associated documentation can become an impossible task. In this paper we focus on bridging this gap between the DAS and their implementation by presenting a view-based, model-driven data access architecture (VMDA) managing models of the DAS, DAOs and database queries in a queryable manner. Our models support tailored views of different stakeholders and are scalable with all types of DAS implementations. In this paper we show that our view-based and model driven architecture approach can enhance software development productivity and maintainability by improving DAS documentation. Moreover, our VMDA opens a wide range of applications such as evaluating DAS usage for DAS performance optimization. Furthermore, we provide tool support and illustrate the applicability of our VMDA in a large-scale case study. Finally, we quantitatively prove that our approach performs with acceptable response times.  相似文献   

13.
《Information & Management》2016,53(6):787-802
Discrepant technological events or situations that entail a problem, a misunderstanding or a difficulty with the Information Technology (IT) being employed, are common in the workplace, and can lead to frustration and avoidance behaviors. Little is known, however, about how individuals cope with these events. This paper examines these events by using a multi-method pragmatic approach informed by coping theory. The results of two studies – a critical incident study and an experiment – serve to build and test, respectively, a theoretical model that posits that individuals use a variety of strategies when dealing with these events: they experience negative emotions, make external attributions, and adopt engagement coping strategies directed at solving the event, eventually switching to a disengagement coping strategy when they feel they have no control over the situation. Furthermore, users’ efforts may result in ‘accidental’ learning as they try to overcome the discrepant IT events through engagement coping. The paper ends with a discussion of the results in light of existing literature, future opportunities for research, and implications for practice.  相似文献   

14.
Kim  K. H. 《Real-Time Systems》2004,26(1):9-28
Distributed real-time simulation is a young technology field but its practice is under increasing demands. In recent years the author and his collaborators have been establishing a new approach called the distributed time-triggered simulation (DTS) scheme which is conceptually simple and easy to use but widely applicable. The concept was initiated in the course of developing a new-generation object-oriented real-time programming scheme called the time-triggered message-triggered object (TMO) programming scheme. Some fundamental issues inherent in distributed real-time simulation that were learned during recent experimental studies are discussed along with some approaches for resolving the issues. An execution engine developed to support both the TMOs engaged in control computation and the TMOs engaged in DTS is also discussed along with its possible extensions that will enable significantly larger-scale DTSs.  相似文献   

15.
Zusammenfassung Mit zunehmender Größe der Softwaresysteme verschärfen sich die für die Software-Herstellung typischen Probleme: Beherrschen großer Objektmengen, Erhalten der Systemkonsistenz, Kontrolle der ständigen Änderungseinflüsse und Gewährleisten einer langen Lebensdauer. Die Disziplin Konfigurationsmanagement bildet den methodischen Ansatz, diese Probleme besser zu beherrschen. Software-Konfigurationsmanagement faßt die Herstellung von Softwaresystemen als eine Abfolge von kontrollierten Änderungen an gesicherten Zwischen- und Endergebnissen auf. Dargestellt werden die Objekte und Funktionen des Software-Konfigurationsmanagements sowie die hierfür in großen Software-Projekten benötigten Methoden, Instanzen und Hilfsmittel.  相似文献   

16.
正http://www.zju.edu.cn/jzus http://www.springerlink.com Aim The Journals of Zhejiang University-SCIENCE(A/B/C)are edited by the international board of distinguished Chinese and foreign scientists,and are aimed to present the latest developments and achievements in scientific research in China and  相似文献   

17.
正Brain-machine interfaces(BMIs)aim at building a direct communication pathway between the brain and an external device,and represent an area of research where significant progress has been made during the past decade.Based on BMIs,mind information can be read out by neural signals to control  相似文献   

18.
正http://www.zju.edu.cn/jzus http://www.springerlink.com Aim The Journals of Zhejiang University-SCIENCE(A/B/C)are edited by the international board of distinguished Chinese and foreign scientists,and are aimed to present the latest developments and achievements in scientific research in China and overseas to the world’s scientific circles,especially to stimulate  相似文献   

19.
20.
正http://www.zju.edu.cn/jzus http://www.springerlink.com Aim The Journals of Zhejiang University-SCIENCE(A/B/C)are edited by the international board of distinguished Chinese and foreign scientists,and are aimed to present the latest developments and achievements in scientific research in China and overseas to the world’s scientific circles,especially to stimulate  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号