首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
Jackson  M. 《Computer》2006,39(10):65-71
Program verification assumes a formal program specification. In software-intensive systems, such specifications must depend on formalization of the natural, nonformal problem world. This formalization is inevitably imperfect, and poses major difficulties of structure and reasoning. Appropriate verification tools can help address these difficulties and improve system reliability  相似文献   

2.
SOFTWARE management is a term which inspires many different reactions from the broad range of practitioners in the field of data processing. The term has many dimensions ranging from the first and second line manager of a software development activity who plies his trade with little to fall back on other than his prior experience, and native skills and intuition. Contrast this with a senior executive who, because of lack of understanding of software management, is frustrated in trying to determine if his company can produce a software program on schedule and within budget. The data processing landscape is littered with examples of major software developments which faltered and then expired. That this situation should exist, after almost a quarter-century of experience with implementing these systems, is one of the enigmas of the rapidly expanding data processing industry.  相似文献   

3.
PLC和计算机间串行通讯方式及程序设计   总被引:8,自引:2,他引:8  
在PLC与计算机间通讯规约的基础上,具体解释了CQMl型PLC与计算机间通讯的通讯命令与响应命令格式,给出了PLC和计算机间通讯的两种通讯方法和使用这两种通讯方法是相应的程序设计。  相似文献   

4.
陆斌  任建存 《微机发展》2003,13(9):92-94
为了实现利用VisualBasic编程语言开发DirectX程序的目的,通过对VisualBasic及DirectX的相应特点介绍分析,提出和实现了用该语言完成DirectX的方法步骤,并通过程序示例的结论证明其达到了相应的应用程序效果。  相似文献   

5.
为了实现利用Visual Basic编程语言开发DirectX程序的目的,通过对Visual Basic及DirectX的相应特点介绍分析,提出和实现了用该语言完成DirectX的方法步骤,并通过程序示例的结论证明其达到了相应的应用程序效果.  相似文献   

6.
Practicing What We Preach: IEEE VR 2009 Virtual Program Committee Meeting   总被引:1,自引:0,他引:1  
This article reports on the experience of conducting the program committee (PC) meeting for the IEEE VR 2009 conference in Second Life. More than 50 PC members from around the globe met virtually over a two-day period to decide which papers to accept for presentation at the conference. Survey responses from 42 of the PC members indicate generally positive feelings toward this meeting format, although several alterations will help improve interaction between attendees in future meetings.  相似文献   

7.
The Tools We Use     
Spinellis  D. 《Software, IEEE》2007,24(4):20-21
What's the state of the art in the tools we use to build software? To answer this question, I let a powerful server build from source code about 7,000 open source packages over a period of a month. The packages I built form a subset of the FreeBSD operating system ports collection, comprising a wide spectrum of application domains: from desktop utilities and biology applications to databases and development tools. The collection is representative of modern software because, unlike say a random sample of SourceForge.net projects, FreeBSD developers have found these programs useful enough to port to FreeBSD.  相似文献   

8.
9.
通过对C+ + Builder(简称CB)及多媒体接口DirectX中DirectDraw的相应特点介绍分析,提出和实现了用该语言开发完成DirectDraw程序的方法步骤,并通过介绍相应的程序示例运行结果得到这种方法正确性的结论.  相似文献   

10.
陆斌 《微机发展》2003,13(Z1):98-101
通过对C Builder(简称CB)及多媒体接口DirectX中DirectDraw的相应特点介绍分析,提出和实现了用该语言开发完成DirectDraw程序的方法步骤,并通过介绍相应的程序示例运行结果得到这种方法正确性的结论。  相似文献   

11.
《数码精品世界》2013,(12):132-133
歌手:JasonMraz 歌手简介:杰森·玛耶兹,绰号男巫,美国创作歌手,以强大的现场演唱功力闻名乐坛。在发行了两张专辑后,他决定沉淀—下,在这休息的过程里,  相似文献   

12.
本文引用一个简单的语言说明如何验证一个程序的正确性,并且给出一个实例来进行验证,并指明了今后的研究方向。  相似文献   

13.
Abstract

According to Symantec's March 2005 threat report, spam, usually defined as junk or unsolicited e-mail, made up over 60 percent of all e-mail traffic during the reporting period from July to December 2004. By anyone's definition, that is a lot of junk e-mail. But, as security professionals know, spam is much more than an annoyance and can adversely affect system and data integrity. Moreover, its existence can be an indicator of a much larger issue.  相似文献   

14.
Networks dominate today’s computing landscape and commercial technical protection is lagging behind attack technology. As a result, protection programme success depends more on prudent management decisions than on the selection of technical safeguards. Managing Network Security takes a management view of protection and seeks to reconcile the need for security with the limitations of technology.  相似文献   

15.
编程的细节     
提出了编程就要注重程序细节的必要性,分析了编程注重细节的重要性,给出了培养注重细节的方法,并用了一个编程实例加以说明.  相似文献   

16.
17.
18.
本文首先分析了儿童的认知能力,然后从玩具设计中功能的整合化,造型的情趣化,设计色彩的明亮化,主题的鲜明化等方面,论述了影响儿童玩具设计的四个因素。  相似文献   

19.
学习Java应该注意的问题   总被引:1,自引:0,他引:1  
针对Java初学者对学好Java所存在的问题,从学习Java的学习方法和学习Java相关组件的顺序和方法,探讨学习Java应该注意的问题。  相似文献   

20.
冯大辉 《程序员》2008,(8):86-88
要想保证为用户持续提供高质量的Web应用服务,好的网站运维至关重要。本文讲述了网站可用性、监控机制、报警机制、容量规划、流程规范这五项运维工作涉及的方方面面。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号