共查询到20条相似文献,搜索用时 15 毫秒
1.
Over the past 25 years, we've made great advances in tooling, technologies, and techniques that make software design more concrete. But design still requires careful thought. 相似文献
2.
Location-Based Services: Back to the Future 总被引:5,自引:0,他引:5
Gainesville, Florida, 10 March 2 012. Today, the Mobile Location- Based Services Summit hosted a panel entitled "What Was Wrong with First-Generation Location-Based Services?" The panel chair, Sumi Helal of the University of Florida, invited two world-class experts in LBS history and technology to discuss the topic: Paolo Bellavista of the University of Bologna and Axel Kupper of the University of Munich. The panel discussed the popularity of today's LBSs and analyzed their distinguishing aspects in comparison with first-generation LBSs. The panel was anything but controversial, with all panelists in total agreement on what initially went wrong and why today's LBSs work. They analyzed how the failure unfolded to set the stage for a major paradigm shift in LBS business and technology and noted the milestones that shaped today's LBSs. 相似文献
4.
5.
Kwei-jay Lin 《Internet Computing, IEEE》2008,12(1):60-65
E-commerce is a big business with a growing market size and has been a major driving force in the IT industry for the past decade. Companies now need to provide online shopping or marketing Web presence to allow for direct customer connections. In this article, the author reviews some primary e-commerce technologies, including auctions, negotiation, recommender systems, automated shopping, and trading. This paper also looks at how Web 2.0 provides new e-commerce opportunities. 相似文献
6.
7.
This article focuses on the pendulum-like change in the way people read and use text, which was triggered by the introduction
of new reading and writing technologies in human history. The paper argues that textual features, which characterized the
ancient pre-print writing culture, disappeared with the establishment of the modern-day print culture and has been “revived”
in the digital post-modern era. This claim is based on the analysis of four cases which demonstrate this textual-pendulum
swing: (1) The swing from concrete iconic-graphic representation of letters and words in the ancient alphabet to abstract
phonetic representation of text in modern eras, and from written abstract computer commands “back” to the concrete iconic
representation in graphic user interfaces of the digital era; (2) The swing from scroll reading in the pre-print era to page
or book reading in the print era and “back” to scroll reading in the digital era; (3) The swing from a low level of authorship
in the pre-print era to a strong authorship perception in the print era, and “back” to a low degree of authorship in the digital
era; (4) The swing from synchronic representation of text in both visual and audio formats during the pre-print era to a visual
representation only in print, and “back” to a synchronic representation in many environments of the digital era. We suggest
that the print culture, which is usually considered the natural and preferred textual environment, should be regarded as the
exception. 相似文献
8.
提出了一种能够抵抗万能攻击者的安全网络编码算法。在敌人可以窃听所有节点和信道及污染zo个链路的情况下,该算法利用稀疏矩阵对信源信息进行矩阵变换,增强了信息的抗窃听能力,并利用列表译码法在信宿处进行译码,对污染攻击进行检测和排除。理论分析和仿真结果表明,该算法能够在多项式时间内设计完成,能够抵抗窃听和污染等安全性攻击,使得原本的随机网络编码以很高的概率达到弱安全的要求;同时提高了编码速率,减小了存储空间的占用。更重要的是,该算法仅在原随机编码体制的基础上对信源和信宿进行了修改,中间节点保持不变。 相似文献
9.
A considerable body of work on model-based software debugging (MBSD) has been published in the past decade. We summarise the underlying ideas and present the different approaches as abstractions of the concrete semantics of the programming language. We compare the model-based framework with other well-known Automated Debugging approaches and present open issues, challenges and potential future directions of MBSD. 相似文献
10.
In MBarka and Stern (2011) [3], we proposed a new algorithm to validate certificates in the past with the goals of it being simple to present, simple to implement and to fall back on standard algorithms with current time settings. This paper improves our algorithm through a much cleaner handling of time issues by defining a new notion, called revocation freshness, yielding a better fall-back on the standard algorithm. It also takes into account a practical “caution period” to lessen some of our previous hypothesis. 相似文献
11.
Jacobsen TJ 《Computers in healthcare》1992,13(13):48
The healthcare landscape is changing too rapidly to support the old ways. A better approach called "ends planning" demands clinicians become true decision makers in the planning process. 相似文献
12.
13.
14.
Ray Corrigan 《Information & Communications Technology Law》2008,17(3):199-220
The process of making decisions about the conception, design, development, deployment and regulation of complex information and communications technologies (ICT) systems with the potential to effect significant changes in society could be labelled ‘digital decision making’ (or DDM, for short). DDM is not the rational process that we might assume or wish it to be. It can even be difficult to define the boundaries of the social, political or technical environments to which the process applies. It depends on craft knowledge, power and agenda, politics and situational messiness, personal values, law and environment, and a host of other factors starkly illustrated by cases ranging from the Three Mile Island to the space shuttle Challenger disasters. Too often DDM leads to information systems failures, and it is time we started to learn from those past failures. 相似文献
15.
16.
17.
18.
19.
《Data Processing》1984,26(2):62-63
The trend towards homeworking is a return to the working methods of the days before the industrial revolution. It benefits those who would otherwise be unable to work, especially women, and it benefits employers as a larger workforce is now available to them. Several companies in the computer industry have been using homeworkers for programming and technical writing. Homeworking does not suit those who enjoy the social contact of the office environment. 相似文献