首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 62 毫秒
1.
本文在开源(Open Source)项目Jakarta Lucene的基础上,结合多种开源文档格式分析工具,设计和实现了一种可扩展的全文检索框架,该框架可高效地对XML、HTML、MS Word、PDF等格式的文档进行全文检索.整个框架完全基于开源工具包,可以有效地对信息系统的开发进行支持.  相似文献   

2.
jini 《程序员》2005,(7):31-32
1999年,IBM与Novell签订合作协议,成功地提供电子商务的解决方案给予原先使用NetWare的用户。同年更是推出了WebSphere Application Server3.0,并且推出WebSphere Studio与VisualAge for Java让工程师可以快速开发相关的程序。2001年,IBM更是宣布将应用服务器、开发工具整合在一起,与DB2、Tivoli及Lotus结合成为一套共通解决方案,如今、IBM更是并入了Rational Rose(UML tools)让开发流程更是完整化。  相似文献   

3.
基于XML的开放式WebGIS的系统设计   总被引:1,自引:0,他引:1  
基于XML的开放式WebGIS的系统设计是解决传统WebGIS数据共享、服务互操作问题的好方法.本文分析了基于XML的开放式WebGIS系统的设计目标,提出了一个基于XML技术的WebGIS系统设计方案.  相似文献   

4.
"道德底线不似法律底线,没有明文规定,也没有强制性,是相对软性的东西,每个人心中都会有一些自认为神圣庄严的情感或信仰。那么我们只能够将其设定为‘不引起多数人的审美反感’、‘不伤害多数人的情感’、‘不损害多数人的利益’。""互联网拆除的不仅仅是进行表达时所可能遇到的障碍,它还拆除声音达致自己的受众的障碍。"  相似文献   

5.
计算机网络信息安全面临的问题和对策   总被引:1,自引:0,他引:1  
计算机的广泛应用把人类带入了一个全新的时代,特别是计算机网络的社会化,已经成为了信息时代的主要推动力.目前,全世界的军事、经济、社会、文化各个方面都越来越依赖于计算机网络,人类社会对计算机的依赖程度达到了空前的纪录.由于计算机网络的脆弱性,这种高度的依赖性使国家的经济和国防安全变得十分脆弱,一旦计算机网络受到攻击而不能正常工作,甚至瘫痪,整个社会就会陷入危机.  相似文献   

6.
婚姻与电脑     
茶余饭后的人们总是需要谈资的,而需求的力量往往巨大.所以对于"报纸"的发明和"狗仔队"的产生也就很好解释了,说来每年都有些网络大热话题作为热门话题,不过一般都逃不出什么品牌电脑的促销风暴,还有就是什么名流、富豪榜和个人年终奖的猜想.而在2008年,一场发生在著名主持人张斌和胡紫薇间"婚姻事件"  相似文献   

7.
<正>2007年11月1日,美国国家仪器公司(NI)在北京喜来登长城饭店成功举办了测量、控制和设计领域的年度盛会—NIDays 2007,这已经是NI公司连续第9年在中国地区举办这样的行业技术会议了。来自全国范围内各行各业的600多位用户、12家合作伙伴以及十多家媒体  相似文献   

8.
美国阿姆斯壮国际公司(Armstrong Intemational,Inc.)成立于1900年,是一家具有百年历史的国际公司,北京康森阿姆斯壮机械有限公司系中美合资生产型企业,由美国阿姆斯壮国际公司(Armstrong Intemational Inc)和北京拓峰科技开发有限责任公司共同投资建立,目前的北京康森阿姆斯壮继承了母公司的业务,主要从事蒸汽系统节能产品的生产制造,用户遍布全国,覆盖了包括石油、石化、冶金、化工、制药、机械、电子、电力、橡胶、造纸、食品等诸多行业.  相似文献   

9.
5月12日,一场突如其来的大地震袭击了四川省及其周边一些地区,这场大地震,夺去了数万人的生命,也牵动了国家和亿万人民群众的心。灾害发生后,全体中国人民众志成城,在罕见的特大地震面前表现出钢铁般的意志和战胜灾害的决心。党和国家领导人对抗震救灾工作迅速作出重要指示,温家宝总理灾后四个小时,不顾随时可能发生的余震,亲临救  相似文献   

10.
一、传统保存方案的缺陷 传统的工程图样和资料的保存归档形式是通过纸质或胶片的形式进行的,很多企业都用专门的仓库保管这些珍贵的技术资料.这些资料的内容相当广泛,包括机械设计、建筑设计、工程设计、测绘及地图等各行业的信息.资料的介质也有不同的分类,包括硫酸纸、纸质蓝图、白图及胶片等.  相似文献   

11.
《计算机科学》2007,34(4):148-148
Recent years have seen rapid advances in various grid-related technologies, middleware, and applications. The GCC conference has become one of the largest scientific events worldwide in grid and cooperative computing. The 6th international conference on grid and cooperative computing (GCC2007) Sponsored by China Computer Federation (CCF),Institute of Computing Technology, Chinese Academy of Sciences (ICT) and Xinjiang University ,and in Cooperation with IEEE Computer Soceity ,is to be held from August 16 to 18, 2007 in Urumchi, Xinjiang, China.  相似文献   

12.
为了设计一种具有低成本、低功耗、易操作、功能强且可靠性高的煤矿井下安全分站,针对煤矿安全生产实际,文章提出了采用MCS-51系列单片机为核心、具有CAN总线通信接口的煤矿井下安全监控分站的设计方案;首先给出煤矿井下安全监控分站的整体构架设计,然后着重阐述模拟量输入信号处理系统的设计过程,最后说明单片机最小系统及其键盘、显示、报警、通信等各个组成部分的设计;为验证设计方案的可行性与有效性,使用Proteus软件对设计内容进行仿真验证,设计的煤矿井下安全监控分站具有瓦斯、温度等模拟量参数超标报警功能和电机开停、风门开闭等开关量指示功能;仿真结果表明:设计的煤矿井下安全监控分站具有一定的实际应用价值.  相似文献   

13.
本文分析了法律数据库的结构和特点,介绍了采用面向对象设计方法和超文本数据库技术开发和实现法律信息库系统将作为重要网络资源之一为不同用户进行法律咨询服务。  相似文献   

14.
In modern service-oriented architectures, database access is done by a special type of services, the so-called data access services (DAS). Though, particularly in data-intensive applications, using and developing DAS are very common today, the link between the DAS and their implementation, e.g. a layer of data access objects (DAOs) encapsulating the database queries, still is not sufficiently elaborated, yet. As a result, as the number of DAS grows, finding the desired DAS for reuse and/or associated documentation can become an impossible task. In this paper we focus on bridging this gap between the DAS and their implementation by presenting a view-based, model-driven data access architecture (VMDA) managing models of the DAS, DAOs and database queries in a queryable manner. Our models support tailored views of different stakeholders and are scalable with all types of DAS implementations. In this paper we show that our view-based and model driven architecture approach can enhance software development productivity and maintainability by improving DAS documentation. Moreover, our VMDA opens a wide range of applications such as evaluating DAS usage for DAS performance optimization. Furthermore, we provide tool support and illustrate the applicability of our VMDA in a large-scale case study. Finally, we quantitatively prove that our approach performs with acceptable response times.  相似文献   

15.
16.
17.
正SCIENCE CHINA Information Sciences(Sci China Inf Sci),cosponsored by the Chinese Academy of Sciences and the National Natural Science Foundation of China,and published by Science China Press,is committed to publishing highquality,original results of both basic and applied research in all areas of information sciences,including computer science and technology;systems science,control science and engineering(published in Issues with odd numbers);information and communication engineering;electronic science and technology(published in Issues with even numbers).Sci China Inf Sci is published monthly in both print and electronic forms.It is indexed by Academic OneFile,Astrophysics Data System(ADS),CSA,Cabells,Current Contents/Engineering,Computing and Technology,DBLP,Digital Mathematics Registry,Earthquake Engineering Abstracts,Engineering Index,Engineered Materials Abstracts,Gale,Google,INSPEC,Journal Citation Reports/Science Edition,Mathematical Reviews,OCLC,ProQuest,SCOPUS,Science Citation Index Expanded,Summon by Serial Solutions,VINITI,Zentralblatt MATH.  相似文献   

18.
正Erratum to:J Zhejiang Univ-Sci C(ComputElectron)2014 15(7):551-563doi:10.1631/jzus.C1300320The original version of this article unfortunately contained mistakes.Algorithm 6 should be as follows:Algorithm 6 FGKFCM-F clustering Input:(1)X={x_1,x_2,…,x_N},,x_iR~d,i=1,2,…,N,the dataset;(2)C,1C≤N,the number of clusters;(3)ε0,the stopping criterion;  相似文献   

19.
20.
《Information & Management》2016,53(6):787-802
Discrepant technological events or situations that entail a problem, a misunderstanding or a difficulty with the Information Technology (IT) being employed, are common in the workplace, and can lead to frustration and avoidance behaviors. Little is known, however, about how individuals cope with these events. This paper examines these events by using a multi-method pragmatic approach informed by coping theory. The results of two studies – a critical incident study and an experiment – serve to build and test, respectively, a theoretical model that posits that individuals use a variety of strategies when dealing with these events: they experience negative emotions, make external attributions, and adopt engagement coping strategies directed at solving the event, eventually switching to a disengagement coping strategy when they feel they have no control over the situation. Furthermore, users’ efforts may result in ‘accidental’ learning as they try to overcome the discrepant IT events through engagement coping. The paper ends with a discussion of the results in light of existing literature, future opportunities for research, and implications for practice.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号