共查询到20条相似文献,搜索用时 493 毫秒
1.
L. Rogers 《Journal of Computer Assisted Learning》1990,6(4):246-254
Abstract An investigative and exploratory approach to learning science is emphasised in the National Curriculum. This paper discusses the role of Information Technology in encouraging the methods of inquiry suited to this approach. It illustrates how the use of generic software for data-logging and data handling can permeate a broad range of science topics and fulfill the requirements of the National Curriculum for Information Technology capability. 相似文献
2.
Dumas Marlon García-Bañuelos Luciano Jääger Joosep Laud Peeter Matulevičius Raimundas Pankova Alisa Pettai Martin Pullonen-Raudvere Pille Toots Aivo Tuuling Reedik Yerokhin Maksym 《International Journal on Software Tools for Technology Transfer (STTT)》2022,24(2):183-203
International Journal on Software Tools for Technology Transfer - Privacy regulations, such as GDPR, impose strict requirements to organizations that store and process private data.... 相似文献
3.
Cognition, Technology & Work - The paper is motivated by a concern that the “drift” metaphor may trigger stereotyped responses to accidents such as recurring requirements for better... 相似文献
4.
Cognition, Technology & Work - There is widespread consensus that teamwork constitutes one of the key requirements in today’s multidisciplinary and highly complex system of delivering... 相似文献
5.
For construction projects involving transient ‘virtual organisations’ composed of non-collocated team-members, the adoption
of concurrent engineering principles is seen as vital. An important aspect of concurrent engineering in construction is the
need for an effective communications infrastructure between team members. Traditionally, such communication has been handled
through person-to-person meetings, however the complexity of construction projects has grown and, as a result, reliance on
new information and communications technologies is becoming increasingly necessary. Hence, within a concurrent engineering
setting, there is the need for an integrated information and collaboration environment that will create a persistent space
to support interaction between project personnel throughout all phases of construction projects. This joint initiative between
the Massachusetts Institute of Technology (MIT), Loughborough University, British Telecommunications plc. (BT) and Kajima
Corporation explores computer-supported mechanisms for enhancing distributed engineering collaboration. The goal of this paper
is to develop a set of requirements, a system architecture and a system prototype to facilitate computer-supported collaboration
among distributed teams. The prototype consists of a comprehensive working collaborative system built from the integration
of complementary standalone applications. These applications are the CAIRO system, developed at the Massachusetts Institute
of Technology and the Telepresence system developed by Loughborough University and BT. 相似文献
6.
Cognition, Technology & Work - Behavior-driven development (BDD) has gained popularity in agile software development as a means of specifying user requirements through user stories and... 相似文献
7.
高级加密标准(AES)算法的研究 总被引:6,自引:0,他引:6
本文重点介绍了高级加密标准算法的要求及评价标准,分析了最终的五个候选算法的特点及异同,并主要分析了被选为高级加密标准算法的Rijindael算法. 相似文献
8.
Judi Romijn 《Formal Aspects of Computing》2003,14(3):319-327
The physical layer of the IEEE 1394 (FireWire, i-Link) architecture contains a protocol for spanning a tree in the network
topology, which fails if the topology contains a loop. We show that the timing requirements for both the 1394-1995 and 1394a-2000
standards are too lenient: these allow for scenarios in which there is no loop in the topology, but the tree-spanning protocol
does detect one. The scenarios are found by the model checker UPPAAL.
Received August 2001/Accepted in revised form August 2001
Correspondence and offprint requests to: J. M. T. Romijn, Computing Science Department, Eindhoven University of Technology, PO Box 513, 5600 MB Eindhoven, The Netherlands.
Email: J.M.T.Romijn@tue.nl 相似文献
9.
10.
夏光峰 《数字社区&智能家居》2009,(3)
随着网络的建设和应用的推进,对网络管理提出了更高的要求,比较基于Snmp等技术的常规网络管理手段,Netflow是一种可以从更深层面了解网络应用状况、进行安全管理和规划的技术。从Netflow技术特点和体系架构的研究入手,通过实例介绍了在网络管理中应用Netflow和ntop探针的方法。 相似文献
11.
信息安全专业人才需求分析与高职培养定位 总被引:1,自引:0,他引:1
本文根据信息安全技术发展的方向和市场需求,调查分析并提出我国信息安全专业人才需求类型,提出了高职院校对信息安全专业的培养定位和所对应的岗位技能,以期对信息安全专业的建设与发展具有一定的指导作用。 相似文献
12.
Eliciting requirements for a proposed system inevitably involves the problem of handling undesirable information about customer's needs, including inconsistency, vagueness, redundancy, or incompleteness. We term the requirements statements involved in the undesirable information non-canonical software requirements. In this paper, we propose an approach to handling non-canonical software requirements based on Annotated Predicate Calculus (APC). Informally, by defining a special belief lattice appropriate for representing the stakeholder's belief in requirements statements, we construct a new form of APC to formalize requirements specifications. We then show how the APC can be employed to characterize non-canonical requirements. Finally, we show how the approach can be used to handle non-canonical requirements through a case study.
Kedian Mu received B.Sc. degree in applied mathematics from Beijing Institute of Technology, Beijing, China, in 1997, M.Sc. degree in probability and mathematical statistics from Beijing Institute of Technology, Beijing, China, in 2000, and Ph.D. in applied mathematics from Peking University, Beijing, China, in 2003. From 2003 to 2005, he was a postdoctoral researcher at Institute of Computing Technology, Chinese Academy of Sciences, China. He is currently an assistant professor at School of Mathematical Sciences, Peking University, Beijing, China. His research interests include uncertain reasoning in artificial intelligence, knowledge engineering and science, and requirements engineering.
Zhi Jin was awarded B.Sc. in computer science from Zhejiang University, Hangzhou, China, in 1984, and studied for her M.Sc. in computer science (expert system) and her Ph.D. in computer science (artificial intelligence) at National Defence University of Technology, Changsha, China. She was awarded Ph.D. in 1992. She is a senior member of China Computer Federation. She is currently a professor at Academy of Mathematics and System Sciences, Chinese Academy of Science. Her research interests include knowledge-based systems, artificial intelligence, requirements engineering, ontology engineering, etc. Her current research focuses on ontology-based requirements elicitation and analysis. She has got about 60 papers published, including co-authoring one book.
Ruqian Lu is a professor of computer science of the Institute of Mathematics, Chinese Academy of Sciences. His research interests include artificial intelligence, knowledge engineering and knowledge based software engineering. He designed the “Tian Ma” software systems that have been widely applied in more than 20 fields, including the national defense and the economy. He has won two first class awards from Chinese Academy of Sciences and a National second class prize from the Ministry of Science and Technology. He has also won the sixth Hua Lookeng Prize for Mathematics.
Yan Peng received B.Sc. degree in software from Jilin University, Changchun, China, in 1992. From June 2002 to December 2005, he studied for his M.E. in software engineering at College of Software Engineering, Graduate School of Chinese Academy of Sciences, Beijing, China. He was awarded M.E degree in 2006. He is currently responsible for CRM (customer relationship management) and BI (business intelligence) project in the BONG. His research interests include customer relationship management, business intelligence, data ming, software engineering and requirements engineering. 相似文献
13.
Mohammed Mawal A. Hassine Jameleddine Alshayeb Mohammad 《International Journal on Software Tools for Technology Transfer (STTT)》2022,24(6):889-910
International Journal on Software Tools for Technology Transfer - Goal models play a significant role in the early stages of the requirements engineering process. These models are subject to... 相似文献
14.
Applying the common criteria in systems engineering 总被引:1,自引:0,他引:1
The National Institute of Standards and Technology has proposed using the common criteria and system-level protection profiles (SLPPs) to specify security requirements in large systems, such as those used in air traffic management. This article summarizes experience with SLPP and security targets for the US Federal Aviation Administration's National Airspace System. The authors review the FAA efforts, highlight the problems encountered, and offer suggestions for future work, calling for more research on linking systems, software, and security requirements engineering with SLPP; clearer ties between security specifications and system certification; and better guidance on the appropriate use of SLPP as a prerequisite to widespread use. 相似文献
15.
利用精品资源共享平台建设《数据库技术及应用》课程拓展资源库,以就业岗位需求为目标,针对高职学生的特点,从企业级实际应用的具体技术问题出发,科学合理地设计案例项目。以“实用、够用”为准则组织适合岗位技能需求和高职学生实际水平的拓展资源,并结合技能鉴定和考证需要,设计各种认证资源。 相似文献
16.
17.
Katie Rotzell 《Computer Standards & Interfaces》1991,13(1-3):243-248
Versant Object Technology builds and sells a distributed Object Database Management System (ODBMS), called VERSANT. This position paper proposes transaction model and version model requirements in support of the kinds of distributed database processing that ODBMS applications require. Transaction model requirements address the long transactions required by many ODBMS applications, as well as the short transactions found in conventional DBMS products. Version model requirements suggest a minimal set of primitives which can be extended to support emerging standards and companies' specific models. 相似文献
18.
19.
20.
随着网络及信息化技术的发展,政府部门每时每刻都产生着大量的电子档案,与此同时,档案管理系统也有了很大的改变,从传统的单机系统逐步演变到网络应用系统。实际业务要求档案管理系统与现有的或将有的其它业务系统建立接口,以方便电子档案的收、管、用。如何构建一个模块化的、标准化的、松耦合的集成环境已越来越迫切地摆在了广大档案管理系统开发人员的面前。本文提出了一种基于SOA的架构的档案管理系统的总体设计方案,通过分析,说明了基于SOA架构的档案管理系统的优势,并对其建设意义进行了阐述。 相似文献