首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 250 毫秒
1.
PDM中工作流的过程定义工具的设计和实现   总被引:1,自引:0,他引:1  
本文介绍了一种基于Web的PDM工作流过程定义工具。该工具能按照Wf MC的接口规范生成标准的XPDL,实现了工作流过程定义的标准化和开放性。该工具开发中使用了J2EE、Oracle、XMLHTTP、VML、WSC、HTC、BeanShell等技术。  相似文献   

2.
IPv6技术是随着互联网发展而迅速崛起的技术.本文描述了IPv6技术出现的原因,分析比较了IPv4技术与IPv6技术,指出了IPv4技术的不足之处及IPv6技术的特点,介绍了IPv6技术研究的现状,说明了IPv6技术的典型应用,最后,对IPv6技术未来发展前景进行了展望.  相似文献   

3.
蓝牙技术是通信技术的革命性变革。本文首先概括地介绍了蓝牙技术的概念及特点,在此基础上,阐述了蓝牙技术的系统构成,然后,分析了蓝牙技术的主要应用,提出了蓝牙技术的发展现状,最后,对蓝牙技术的发展前景进行了展望。  相似文献   

4.
Internet Push技术的分析与展望   总被引:25,自引:3,他引:22  
Internet Push技术是第三代浏览器的核心技术,是近年出现的减少Internet上信息过载和高效获取信息资源的新技术,时下最热门的电子商务、网上营销等都应用了Push技术,在介绍Push技术产生背景,要领的基础上,分析了Push技术的实现方式,阐述了Push技术发展的技术基础,如频道技术、IP多播技术等,在分析了Push技术陷入困境的原因后,讨论了Push技术的发展趋势。  相似文献   

5.
从现行信息需求出发,介绍了数据集成技术发展的必要性,讨论了已有的数据集成技术,分析了这些技术的优缺点,介绍了网格技术、本体技术两个新的异构数据集成技术。在此基础上给出了本体技术和中间件相结合数据集成解决方案。最后,提出了数据集成方法的发展方向。  相似文献   

6.
P2P技术是随着互联网发展而迅速崛起的技术.该文描述了P2P技术出现的原因,分析比较了P2P技术与C/S技术,介绍了P2P技术的特点、P2P技术研究的现状,说明了P2P技术的典型应用,客观的交待了P2P技术存在的问题,最后,对P2P未来发展前景进行了展望.  相似文献   

7.
随着信息技术的发展,计算机通信技术与网络技术取得了迅速发展。计算机通信技术与网络技术的应用范围也越来越广。这些技术的应用有效提升了计算机使用效率。通过描述计算机通信技术与网络技术,重点讲述了计算机移动技术、宽带技术以及多媒体技术,技术使用推动社会稳健发展。  相似文献   

8.
P2P技术是随着互联网发展而迅速崛起的技术。该文描述了P2P技术出现的原因,分析比较了P2P技术与C/S技术,介绍了P2P技术的特点、P2P技术研究的现状,说明了P2P技术的典型应用,客观的交待了P2P技术存在的问题,最后,对P2P未来发展前景进行了展望。  相似文献   

9.
条码技术的发展及应用   总被引:3,自引:0,他引:3  
文章综述了条码的发展、研究历史和条码主要识别技术,详细阐述了光电条码识别技术和图像式条码识别技术的原理,并列举了条码技术的典型的应用。最后,根据现阶段的技术情况,指出了条码技术未来的发展趋势。  相似文献   

10.
分析了构建民用航空器测试技术体系的需求,提出了民用航空器测试技术体系架构,并分析了测试技术需求层、测试技术实现层、测试技术产品层、测试技术标准层、测试技术验证层和测试技术应用层等要素的实施途径,明确了民用航空器测试技术体系的构建方法,希望研究成果对于构建民用航空器测试技术体系有一定的指导作用。  相似文献   

11.
为了设计一种具有低成本、低功耗、易操作、功能强且可靠性高的煤矿井下安全分站,针对煤矿安全生产实际,文章提出了采用MCS-51系列单片机为核心、具有CAN总线通信接口的煤矿井下安全监控分站的设计方案;首先给出煤矿井下安全监控分站的整体构架设计,然后着重阐述模拟量输入信号处理系统的设计过程,最后说明单片机最小系统及其键盘、显示、报警、通信等各个组成部分的设计;为验证设计方案的可行性与有效性,使用Proteus软件对设计内容进行仿真验证,设计的煤矿井下安全监控分站具有瓦斯、温度等模拟量参数超标报警功能和电机开停、风门开闭等开关量指示功能;仿真结果表明:设计的煤矿井下安全监控分站具有一定的实际应用价值.  相似文献   

12.
In modern service-oriented architectures, database access is done by a special type of services, the so-called data access services (DAS). Though, particularly in data-intensive applications, using and developing DAS are very common today, the link between the DAS and their implementation, e.g. a layer of data access objects (DAOs) encapsulating the database queries, still is not sufficiently elaborated, yet. As a result, as the number of DAS grows, finding the desired DAS for reuse and/or associated documentation can become an impossible task. In this paper we focus on bridging this gap between the DAS and their implementation by presenting a view-based, model-driven data access architecture (VMDA) managing models of the DAS, DAOs and database queries in a queryable manner. Our models support tailored views of different stakeholders and are scalable with all types of DAS implementations. In this paper we show that our view-based and model driven architecture approach can enhance software development productivity and maintainability by improving DAS documentation. Moreover, our VMDA opens a wide range of applications such as evaluating DAS usage for DAS performance optimization. Furthermore, we provide tool support and illustrate the applicability of our VMDA in a large-scale case study. Finally, we quantitatively prove that our approach performs with acceptable response times.  相似文献   

13.
《Information & Management》2016,53(6):787-802
Discrepant technological events or situations that entail a problem, a misunderstanding or a difficulty with the Information Technology (IT) being employed, are common in the workplace, and can lead to frustration and avoidance behaviors. Little is known, however, about how individuals cope with these events. This paper examines these events by using a multi-method pragmatic approach informed by coping theory. The results of two studies – a critical incident study and an experiment – serve to build and test, respectively, a theoretical model that posits that individuals use a variety of strategies when dealing with these events: they experience negative emotions, make external attributions, and adopt engagement coping strategies directed at solving the event, eventually switching to a disengagement coping strategy when they feel they have no control over the situation. Furthermore, users’ efforts may result in ‘accidental’ learning as they try to overcome the discrepant IT events through engagement coping. The paper ends with a discussion of the results in light of existing literature, future opportunities for research, and implications for practice.  相似文献   

14.
《计算机科学》2007,34(4):148-148
Recent years have seen rapid advances in various grid-related technologies, middleware, and applications. The GCC conference has become one of the largest scientific events worldwide in grid and cooperative computing. The 6th international conference on grid and cooperative computing (GCC2007) Sponsored by China Computer Federation (CCF),Institute of Computing Technology, Chinese Academy of Sciences (ICT) and Xinjiang University ,and in Cooperation with IEEE Computer Soceity ,is to be held from August 16 to 18, 2007 in Urumchi, Xinjiang, China.  相似文献   

15.
Kim  K. H. 《Real-Time Systems》2004,26(1):9-28
Distributed real-time simulation is a young technology field but its practice is under increasing demands. In recent years the author and his collaborators have been establishing a new approach called the distributed time-triggered simulation (DTS) scheme which is conceptually simple and easy to use but widely applicable. The concept was initiated in the course of developing a new-generation object-oriented real-time programming scheme called the time-triggered message-triggered object (TMO) programming scheme. Some fundamental issues inherent in distributed real-time simulation that were learned during recent experimental studies are discussed along with some approaches for resolving the issues. An execution engine developed to support both the TMOs engaged in control computation and the TMOs engaged in DTS is also discussed along with its possible extensions that will enable significantly larger-scale DTSs.  相似文献   

16.
Zusammenfassung Mit zunehmender Größe der Softwaresysteme verschärfen sich die für die Software-Herstellung typischen Probleme: Beherrschen großer Objektmengen, Erhalten der Systemkonsistenz, Kontrolle der ständigen Änderungseinflüsse und Gewährleisten einer langen Lebensdauer. Die Disziplin Konfigurationsmanagement bildet den methodischen Ansatz, diese Probleme besser zu beherrschen. Software-Konfigurationsmanagement faßt die Herstellung von Softwaresystemen als eine Abfolge von kontrollierten Änderungen an gesicherten Zwischen- und Endergebnissen auf. Dargestellt werden die Objekte und Funktionen des Software-Konfigurationsmanagements sowie die hierfür in großen Software-Projekten benötigten Methoden, Instanzen und Hilfsmittel.  相似文献   

17.
正http://www.zju.edu.cn/jzus http://www.springerlink.com Aim The Journals of Zhejiang University-SCIENCE(A/B/C)are edited by the international board of distinguished Chinese and foreign scientists,and are aimed to present the latest developments and achievements in scientific research in China and  相似文献   

18.
正Brain-machine interfaces(BMIs)aim at building a direct communication pathway between the brain and an external device,and represent an area of research where significant progress has been made during the past decade.Based on BMIs,mind information can be read out by neural signals to control  相似文献   

19.
正http://www.zju.edu.cn/jzus http://www.springerlink.com Aim The Journals of Zhejiang University-SCIENCE(A/B/C)are edited by the international board of distinguished Chinese and foreign scientists,and are aimed to present the latest developments and achievements in scientific research in China and overseas to the world’s scientific circles,especially to stimulate  相似文献   

20.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号