首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   56篇
  免费   0篇
无线电   2篇
一般工业技术   1篇
冶金工业   1篇
自动化技术   52篇
  2017年   1篇
  2015年   2篇
  2014年   1篇
  2013年   2篇
  2012年   1篇
  2010年   2篇
  2009年   7篇
  2008年   6篇
  2007年   6篇
  2006年   4篇
  2005年   10篇
  2004年   1篇
  2003年   5篇
  2002年   2篇
  2001年   2篇
  1999年   1篇
  1998年   2篇
  1997年   1篇
排序方式: 共有56条查询结果,搜索用时 62 毫秒
1.
2.
3.
Job Security     
Some consider unmaintainable code a tool that provides job security. At the low level, you can obtain such code through incorrect or inconsistent formatting, naming, and commenting. Complex and gratuitous coupling, lack of assertions, and failure to use a language's type system can further complicate the picture. At a higher level, deep and wide class hierarchies, lack of cohesion, and unhelpful package relationships can hinder maintainability. Finally, at the development process level, lack of version control, subpar build-and-release procedures, a lacking testing infrastructure, and the hiring of mediocre developers will hammer the last nails into a project's maintainability coffin.  相似文献   
4.
Spinellis  D. 《Computer》1999,32(9):114-116
The author describes a process of component mining. His source of candidate components, or his “mine”, is a set of highly respected components from an earlier generation: the famous Unix utilities. He shows how to identify the most promising of these candidates and re-encapsulate them in components that satisfy today's views of component based development, based on the principles of object technology  相似文献   
5.
Software development tools often fail to deliver on inflated promises. Rather than the predicted progression toward ever-increasing levels of abstraction, two simple trends have driven the evolution of currently available software development tools: integration at the source-code level and a focus on quality. Thus source code has become the bus that tools tap into for communicating with other tools. Also, focus has shifted from defect removal in the later phases to defect prevention in the earlier phases. In the future, tools are likely to support higher levels of abstraction, perhaps in the form of domain-specific languages communicated using XML.  相似文献   
6.
7.
Position-annotated photographs: A Geotemporal Web   总被引:3,自引:0,他引:3  
With the advent of digital cameras, photographs are no longer gathering dust, forgotten in old shoeboxes. Instead, they are lying unused in hard disk dircctories and on CDs. The Geotemporal Web system, belonging to the "capture and access" class of ubiquitous computing applications, addresses this phenomenon by automatically converting raw data from the typical vacation trip into a lively Web site. Exploiting the synergies of integrating different consumer-grade information appliances and publicly accessible databases, a GTWeb site presents a trip overview, timelines, maps, and annotated photographs.  相似文献   
8.
Development environments based on ActiveX controls and JavaBeans are marketed as ‘visual programming’ platforms; in practice their visual dimension is limited to the design and implementation of an application's graphical user interface (GUI). The availability of sophisticated GUI development environments and visual component development frameworks is now providing viable platforms for implementing visual programming within general‐purpose platforms, i.e. for the specification of non‐GUI program functionality using visual representations. We describe how specially designed reflective components can be used in an industry‐standard visual programming environment to graphically specify sophisticated data transformation pipelines that interact with GUI elements. The components are based on Unix‐style filters repackaged as ActiveX controls. Their visual layout on the development environment canvas is used to specify the connection topology of the resultant pipeline. The process of converting filter‐style programs into visual controls is automated using a domain‐specific language. We demonstrate the approach through the design and the visual implementation of a GUI‐based spell‐checker. Copyright © 2001 John Wiley & Sons, Ltd.  相似文献   
9.
10.
Despite the progressive switch to digital TV, there has not been any significant change to the value chain of the TV industry. At the same time, the introduction of novel information and communication technologies, such as the digital video recorder (DVR) and efficient Peer-to-Peer (P2P) content distribution, have been regarded as a threat to the established broadcast business players. Previous research has described these threats and has suggested competitive strategies, but it has not investigated the opportunities. This work aims to identify a framework of new business models that take advantage of the networked DVR. For this purpose, we examined the TV literature from diverse academic disciplines, such as mass communication, computer engineering and advertising research. We have also collaborated with network and multimedia engineers, with broadcasters, and we examined novel interactive television (ITV) prototypes. The findings suggest that the networked DVR could be exploited to provide personalized channels and that the dynamic advertising insertion could be introduced as an effective advertising format. In the light of these findings, the TV industry should consider the pro-active adoption and facilitation of the networked DVR infrastructure.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号