共查询到20条相似文献,搜索用时 31 毫秒
1.
《Software, IEEE》2002,19(6):21-27
You can't make money selling software. At least, that's what many firms that view software as an ancillary component to their business think. This article presents basic information on the Balanced Scorecard performance management methodology as well as critical success factors and common pitfalls. A BSC matrix and a supporting strategy map for a small software development organization are also presented. 相似文献
2.
Ramamritham K. Sahni S. Baru M. Bahuman C. Chandran A. Joshi M. Bahuman A. 《Internet Computing, IEEE》2008,12(2):62-70
As in many regions of the world, people in rural India often lack access to knowledge that's more readily available to people in urban areas. Although rural telecenters are becoming more common, developing content that's presented in local languages, relevant to users, and delivered in an immediately usable form is a challenge here and in rural areas across the globe. To address this, an agricultural portal for rural farmers in India uses innovative database systems and information retrieval techniques. In so doing, it both improves service and addresses connection costs and constraints. 相似文献
3.
There's a security problem with many Internet authentication systems that's never talked about: there's no way to terminate the authentication. 相似文献
4.
Coordination between nodes in open distributed computer systems is a general problem that's becoming increasingly relevant as massive peer-to-peer (P2P) systems are being deployed on the Internet. A major subproblem is establishing and maintaining cooperation between nodes. To solve this problem, we created a simple algorithm, SLACER (a selfish link-based adaptation for cooperation excluding rewiring). When executed in a P2P network's nodes, SLACER self-organizes the network into a robust artificial social network (ASN) with small-world characteristics and high cooperation. 相似文献
5.
Even for LANs without collision-detection hardware, this implementation of StarMod offers improvements of from 1.1 to 7.8 over pointto-point message transmission-and that's the worst-case gain. 相似文献
6.
基于流技术的EVOD教育视频点播系统 总被引:2,自引:0,他引:2
分析了普通视频点播系统的不足,提出了一种适合于远程教育的教育视频点播解决方案,并应用该思想开发了基于Real,ASF,MOV等三种主流格式视频的EVOD系统,同时给出了基于Real技术的实现代码。 相似文献
7.
2007年12月6日,Rails 2.0正式发布,创始人David Heinemeier Hansson(DHH)在blog上写道:Rails 2.0是Rails框架发展史上的里程碑。我投入在Ruby on Rails框架开发方面总计有四年半多的时间,并且Rails目前的开发参与者也越来越多。对这几年我们所做出的努力和坚持的信念,我感到非常的满意。David有没有言过其实呢?让我们来听听自应用Rails的一线Web开发人员的声音。 相似文献
8.
9.
夏文忠 《电脑编程技巧与维护》2009,(10):34-36
Log4J可以非常灵活、方便地实现Java日志输出的各种功能,熟练地掌握Log4J可以使信息调试事半功倍。通过Log4J在学生管理系统开发过程之中的运用,讲解了Log4J的使用方法。 相似文献
10.
11.
In this article, we describe an adaptation proxy we developed as a part of a Kontti research project at VTT Information Technology that lets mobile users access Web content that's not directly targeted to mobile user agents. More and more content is now available on the Internet, and there's a growing need for mobile users to be able to access it. Thus the authors describe the adaptation proxy, which lets mobile users access Web content that's not directly targeted to user agents of mobile devices. The adaptation proxy can adapt Extensible Hypertext Markup Language (XHTML) documents into XHTML mobile profile (XHTML MP) and Wireless Markup Language (WML), and can perform media adaptation. At the system's core is an adaptation framework to which new source and target XML languages can be introduced with relatively little effort. 相似文献
12.
EVoD教育视频点播系统的设计与实现 总被引:6,自引:0,他引:6
分析了普通视频点播系统的不足,提出了一种适合于远程教育的教育视频点播解决方案并在实践中得到了应用,给出了基于QuickTime的部分代码。 相似文献
13.
14.
关联规则挖掘Apriori算法的改进 总被引:3,自引:0,他引:3
在分析研究关联规则挖掘Apriori算法及其若干改进算法的基础上,对Apriori算法做了进一步地改进,提出一种基于条件判断的新思想.改进后的算法根据条件采用了事务压缩与候选项压缩的相结合的方式,减小了不必要的开销,从而提高了挖掘速度. 相似文献
16.
《Software, IEEE》2006,23(5):11-13
Agreeing on a reasonable exception-handling style for your application and following a consistent set of exception-handling practices is crucial to implementing software that's easy to work with, comprehend, evolve, and refactor. Demystifying exception-handling design requires writing about proven techniques, guidelines, and patterns. 相似文献
17.
Many Web 2.0 services offer Web 2.0 APIs for developers to use. In this article, I review one of the security mechanisms that's often included in such Web 2.0 APIs - the use of API keys - and some of the deployment issues associated with their use. 相似文献
18.
19.
Together, the articles in this issue indicate a breakthrough in AI--as our field explores new ways to utilize intelligent systems' powerful tools on the ever-expanding, continually changing information space that's the World Wide Web. This article is part of a special issue on AI, Agents, and the Web. 相似文献