共查询到20条相似文献,搜索用时 15 毫秒
1.
Program verification assumes a formal program specification. In software-intensive systems, such specifications must depend on formalization of the natural, nonformal problem world. This formalization is inevitably imperfect, and poses major difficulties of structure and reasoning. Appropriate verification tools can help address these difficulties and improve system reliability 相似文献
2.
《IEEE transactions on pattern analysis and machine intelligence》1978,(4):307-308
SOFTWARE management is a term which inspires many different reactions from the broad range of practitioners in the field of data processing. The term has many dimensions ranging from the first and second line manager of a software development activity who plies his trade with little to fall back on other than his prior experience, and native skills and intuition. Contrast this with a senior executive who, because of lack of understanding of software management, is frustrated in trying to determine if his company can produce a software program on schedule and within budget. The data processing landscape is littered with examples of major software developments which faltered and then expired. That this situation should exist, after almost a quarter-century of experience with implementing these systems, is one of the enigmas of the rapidly expanding data processing industry. 相似文献
3.
4.
为了实现利用VisualBasic编程语言开发DirectX程序的目的,通过对VisualBasic及DirectX的相应特点介绍分析,提出和实现了用该语言完成DirectX的方法步骤,并通过程序示例的结论证明其达到了相应的应用程序效果。 相似文献
5.
为了实现利用Visual Basic编程语言开发DirectX程序的目的,通过对Visual Basic及DirectX的相应特点介绍分析,提出和实现了用该语言完成DirectX的方法步骤,并通过程序示例的结论证明其达到了相应的应用程序效果. 相似文献
6.
Lindeman Robert W. Reiners Dirk Steed Anthony 《Computer Graphics and Applications, IEEE》2009,29(2):80-83
This article reports on the experience of conducting the program committee (PC) meeting for the IEEE VR 2009 conference in Second Life. More than 50 PC members from around the globe met virtually over a two-day period to decide which papers to accept for presentation at the conference. Survey responses from 42 of the PC members indicate generally positive feelings toward this meeting format, although several alterations will help improve interaction between attendees in future meetings. 相似文献
7.
What's the state of the art in the tools we use to build software? To answer this question, I let a powerful server build from source code about 7,000 open source packages over a period of a month. The packages I built form a subset of the FreeBSD operating system ports collection, comprising a wide spectrum of application domains: from desktop utilities and biology applications to databases and development tools. The collection is representative of modern software because, unlike say a random sample of SourceForge.net projects, FreeBSD developers have found these programs useful enough to port to FreeBSD. 相似文献
8.
9.
陆斌 《计算机技术与发展》2003,13(Z1)
通过对C+ + Builder(简称CB)及多媒体接口DirectX中DirectDraw的相应特点介绍分析,提出和实现了用该语言开发完成DirectDraw程序的方法步骤,并通过介绍相应的程序示例运行结果得到这种方法正确性的结论. 相似文献
10.
通过对C Builder(简称CB)及多媒体接口DirectX中DirectDraw的相应特点介绍分析,提出和实现了用该语言开发完成DirectDraw程序的方法步骤,并通过介绍相应的程序示例运行结果得到这种方法正确性的结论。 相似文献
11.
12.
本文引用一个简单的语言说明如何验证一个程序的正确性,并且给出一个实例来进行验证,并指明了今后的研究方向。 相似文献
13.
《Information Security Journal: A Global Perspective》2013,22(3):2-4
Abstract According to Symantec's March 2005 threat report, spam, usually defined as junk or unsolicited e-mail, made up over 60 percent of all e-mail traffic during the reporting period from July to December 2004. By anyone's definition, that is a lot of junk e-mail. But, as security professionals know, spam is much more than an annoyance and can adversely affect system and data integrity. Moreover, its existence can be an indicator of a much larger issue. 相似文献
14.
Fred Cohen 《Network Security》2002,2002(1):16-18
Networks dominate today’s computing landscape and commercial technical protection is lagging behind attack technology. As a result, protection programme success depends more on prudent management decisions than on the selection of technical safeguards. Managing Network Security takes a management view of protection and seeks to reconcile the need for security with the limitations of technology. 相似文献
15.
16.
17.
18.
本文首先分析了儿童的认知能力,然后从玩具设计中功能的整合化,造型的情趣化,设计色彩的明亮化,主题的鲜明化等方面,论述了影响儿童玩具设计的四个因素。 相似文献
19.
学习Java应该注意的问题 总被引:1,自引:0,他引:1
针对Java初学者对学好Java所存在的问题,从学习Java的学习方法和学习Java相关组件的顺序和方法,探讨学习Java应该注意的问题。 相似文献