首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 62 毫秒
1.
张少华  李渝曾 《控制与决策》1999,14(11):536-540
提出一种考虑用户需求不确定性的可选择期货合同模型,并从用户角度给出了确定相应各种合同参数的方法,算例分析表明了该方法的合理性。该方法适用于用户的合同定价决策。  相似文献   

2.
考虑到供电公司的风险偏好及用户的可中断电量,应用委托代理及机制设计理论建立了一种用户类型离散的可中断负荷合同模型。分析和算例结果表明,无论供电公司的风险偏好如何,该合同模型均能引导用户披露真实信息,实现电力资源的有效配置,且供电公司能从中节约供电成本。因此,激励性可中断负荷合同不仅能提高用户需求弹性.还有助于供电公司回...  相似文献   

3.
通过在Schnorr签名中嵌入用户的身份信息设计了一个公平的合同签署协议。与已有的没有嵌入用户身份信息的合同签署协议相比,该协议具有更好的公平性。另外本协议还引入了n个离线的半可信第三方,分析表明这不仅实现了签名者隐私的保护,还有效地降低了签名者中的一方与离线半可信第三方合谋来获取另一方签名的概率,它的理论基础是公开可验证秘密分享。  相似文献   

4.
通过在Schnorr签名中嵌入用户的身份信息设计了一个公平的合同签署协议。与已有的没有嵌入用户身份信息的合同签署协议相比,该协议具有更好的公平性。另外本协议还引入了n个离线的半可信第三方,分析表明这不仅实现了签名者隐私的保护,还有效地降低了签名者中的一方与离线半可信第三方合谋来获取另一方签名的概率,它的理论基础是公开可验证秘密分享。  相似文献   

5.
介绍了一种通用报表的动态生成方法,这不仅为用户提供了便利的使用功能,而且也为开发者指出一条简洁、灵活、实用、可维护性强的报表生成途径。按该方法编制的GREPO程序应用于外贸合同管理系统之中取得了良好的效果。  相似文献   

6.
信息互联网的快速发展推进了电子商务的广泛应用,用户身份被盗用、电子合同的易篡改性严重影响了网上电子交易的公平性与安全性.对于交易主体来说,如何确认交易对方的数据身份未被冒用,如何确认交易的电子合同为对方发送且未被截获篡改是需要首要解决的关键问题.通过结合用户身份认证、电子合同加密传输、公证处参与公证等方法进行电子签约服务平台的设计,确保用户身份的唯一性、传输数据的完整性和不可篡改性、签约过程的可追溯性,实现了平台使用的公平公正性.  相似文献   

7.
11月3曰获悉,陕西移动通讯公司与北电网络签订了价值达2700万美元的合同,用于扩容陕西省GSM 900无线网络。届时其网络支持用户数将增加50%。西安市的用户也能增长40多万,达到近80万用户的规模。据悉,该项目预计于1999年底完成。  相似文献   

8.
随着网格商业化的不断深入,网格计算要求:服务提供者和消费者间在组合服务中需达成端对端的高服务质量协议,高可靠性的组合服务协商机制和保障机制在网格计算中扮演着越来越重要的角色。所提出的网格合同计算模型,在组合服务过程中提供统一的用户接口,使交易双方自动动态协商满足每个单独服务的服务质量约束条件。在网格合同计算模型中,利用代理技术实现了自治网格合同计算协商机制,该协商机制遵循改进的两阶段提交FIPA协议。在服务合同中导入了软服务合同SSC和硬服务合同HSC概念,并指出动态绑定服务之前所生成的软服务合同SSC仅仅起到占位符的作用,只有在绑定时通过“硬化”才获得真实的服务承诺。  相似文献   

9.
到网络游戏中去做广告   总被引:1,自引:0,他引:1  
这个年代,我们注定无法逃避麦当劳的品牌广告,即便是遁到网上,即便是躲进网络游戏中去。 9月17日 ,美国 Electronic Arts公司与英特尔和麦当劳签署了数百万美元规模的网上广告合同。通过该合同,当用户在玩该公司即将在秋季推出的人气游戏网络版“模拟人生网络版(The Sims Online)”时,将会看到英特尔公司和麦当劳公司的商品和商标。  相似文献   

10.
云服务已经渗透到各行各业,如何保证其良性发展,如何让用户获得应有的服务质量成为摆在眼前的重要问题。服务等级协议作为一种服务提供商与用户之间协商并签订的一个具有法律约束力的合同,规定了在服务提供过程中双方所承担的商务条款,该协议的研究对云服务的健康持续发展有着重要意义。  相似文献   

11.
为了设计一种具有低成本、低功耗、易操作、功能强且可靠性高的煤矿井下安全分站,针对煤矿安全生产实际,文章提出了采用MCS-51系列单片机为核心、具有CAN总线通信接口的煤矿井下安全监控分站的设计方案;首先给出煤矿井下安全监控分站的整体构架设计,然后着重阐述模拟量输入信号处理系统的设计过程,最后说明单片机最小系统及其键盘、显示、报警、通信等各个组成部分的设计;为验证设计方案的可行性与有效性,使用Proteus软件对设计内容进行仿真验证,设计的煤矿井下安全监控分站具有瓦斯、温度等模拟量参数超标报警功能和电机开停、风门开闭等开关量指示功能;仿真结果表明:设计的煤矿井下安全监控分站具有一定的实际应用价值.  相似文献   

12.
In modern service-oriented architectures, database access is done by a special type of services, the so-called data access services (DAS). Though, particularly in data-intensive applications, using and developing DAS are very common today, the link between the DAS and their implementation, e.g. a layer of data access objects (DAOs) encapsulating the database queries, still is not sufficiently elaborated, yet. As a result, as the number of DAS grows, finding the desired DAS for reuse and/or associated documentation can become an impossible task. In this paper we focus on bridging this gap between the DAS and their implementation by presenting a view-based, model-driven data access architecture (VMDA) managing models of the DAS, DAOs and database queries in a queryable manner. Our models support tailored views of different stakeholders and are scalable with all types of DAS implementations. In this paper we show that our view-based and model driven architecture approach can enhance software development productivity and maintainability by improving DAS documentation. Moreover, our VMDA opens a wide range of applications such as evaluating DAS usage for DAS performance optimization. Furthermore, we provide tool support and illustrate the applicability of our VMDA in a large-scale case study. Finally, we quantitatively prove that our approach performs with acceptable response times.  相似文献   

13.
《Information & Management》2016,53(6):787-802
Discrepant technological events or situations that entail a problem, a misunderstanding or a difficulty with the Information Technology (IT) being employed, are common in the workplace, and can lead to frustration and avoidance behaviors. Little is known, however, about how individuals cope with these events. This paper examines these events by using a multi-method pragmatic approach informed by coping theory. The results of two studies – a critical incident study and an experiment – serve to build and test, respectively, a theoretical model that posits that individuals use a variety of strategies when dealing with these events: they experience negative emotions, make external attributions, and adopt engagement coping strategies directed at solving the event, eventually switching to a disengagement coping strategy when they feel they have no control over the situation. Furthermore, users’ efforts may result in ‘accidental’ learning as they try to overcome the discrepant IT events through engagement coping. The paper ends with a discussion of the results in light of existing literature, future opportunities for research, and implications for practice.  相似文献   

14.
Kim  K. H. 《Real-Time Systems》2004,26(1):9-28
Distributed real-time simulation is a young technology field but its practice is under increasing demands. In recent years the author and his collaborators have been establishing a new approach called the distributed time-triggered simulation (DTS) scheme which is conceptually simple and easy to use but widely applicable. The concept was initiated in the course of developing a new-generation object-oriented real-time programming scheme called the time-triggered message-triggered object (TMO) programming scheme. Some fundamental issues inherent in distributed real-time simulation that were learned during recent experimental studies are discussed along with some approaches for resolving the issues. An execution engine developed to support both the TMOs engaged in control computation and the TMOs engaged in DTS is also discussed along with its possible extensions that will enable significantly larger-scale DTSs.  相似文献   

15.
Zusammenfassung Mit zunehmender Größe der Softwaresysteme verschärfen sich die für die Software-Herstellung typischen Probleme: Beherrschen großer Objektmengen, Erhalten der Systemkonsistenz, Kontrolle der ständigen Änderungseinflüsse und Gewährleisten einer langen Lebensdauer. Die Disziplin Konfigurationsmanagement bildet den methodischen Ansatz, diese Probleme besser zu beherrschen. Software-Konfigurationsmanagement faßt die Herstellung von Softwaresystemen als eine Abfolge von kontrollierten Änderungen an gesicherten Zwischen- und Endergebnissen auf. Dargestellt werden die Objekte und Funktionen des Software-Konfigurationsmanagements sowie die hierfür in großen Software-Projekten benötigten Methoden, Instanzen und Hilfsmittel.  相似文献   

16.
正http://www.zju.edu.cn/jzus http://www.springerlink.com Aim The Journals of Zhejiang University-SCIENCE(A/B/C)are edited by the international board of distinguished Chinese and foreign scientists,and are aimed to present the latest developments and achievements in scientific research in China and  相似文献   

17.
正Brain-machine interfaces(BMIs)aim at building a direct communication pathway between the brain and an external device,and represent an area of research where significant progress has been made during the past decade.Based on BMIs,mind information can be read out by neural signals to control  相似文献   

18.
正http://www.zju.edu.cn/jzus http://www.springerlink.com Aim The Journals of Zhejiang University-SCIENCE(A/B/C)are edited by the international board of distinguished Chinese and foreign scientists,and are aimed to present the latest developments and achievements in scientific research in China and overseas to the world’s scientific circles,especially to stimulate  相似文献   

19.
20.
正http://www.zju.edu.cn/jzus http://www.springerlink.com Aim The Journals of Zhejiang University-SCIENCE(A/B/C)are edited by the international board of distinguished Chinese and foreign scientists,and are aimed to present the latest developments and achievements in scientific research in China and overseas to the world’s scientific circles,especially to stimulate  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号