首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
2.
Hierarchical OLS regression of survey results from a random sample of 312 women bloggers reveals a statistically significant positive relationship between need for self-disclosure and seeing blogging as a way to express one’s own voice, mediated by need for affiliation and time spent blogging. In essence, women with a strong need to self-disclose information about themselves are more likely than other women to say they blog to express their own voice in the blogosphere, compared with blogging to connect with other people or to gain influence in the blogosphere. In contrast, for women who blog to connect with other people or gain influence in the blogosphere, the strongest predictors is time spent blogging, not needs that motivated them to blog. Results are discussed in relation to need theory.  相似文献   

3.
Why 360 ?     
如果要说谁是当下国内杀毒软件市场的搅局者,那么应该非奇虎360莫属.不过用搅局来形容也不甚精确,因为搅局这个词的言下之意是原本平静,现在是在原本就已硝烟四起的国内市场又来了奇虎360这样一个"不按套路出牌"的家伙,或许应该用火上浇油来形容才更加合适一些.  相似文献   

4.
Why not DES?     
The controversy over the security of DES arose in the mid-1970s when Martin Hellman and Whitfield Diffie suggested that the 56 bit cipher key was too short to prevent solution by exhaustive research. Aside from the question of cryptographic security there is the problem of a large number of persons utilizing the same cryptographic algorithm which increases greatly the possible economic returns which might be realized in breaking the system. The idea of a “standard” is contrary to good cryptographic practice. The federal government uses DES only for non-classified information.  相似文献   

5.
Why RTL ATPG?   总被引:2,自引:0,他引:2       下载免费PDF全文
Register Transfer Level(RTL)Automatic Test Pattern Generation(ATPG) has been of wide conceran for two decades .Meanwhile gate-level ATPG has made remarkable progress in dealing with large circuits.An argument is then posed.Do we need RTL ATPG in the case of gate-level ATPG capable of generating tests for large circuits? This paper attempts to answer this question .The necessity,difficulty,and major interests of RTL ATPG are reviewed.  相似文献   

6.
Why a ring?     
In a world increasingly populated with Ethernets and Ethernet-like nets there nevertheless continues to be a strong interest in rings of active repeaters for local data communication. This paper explores some of the engineering problems involved in designing a ring that has no central control. It then compares one ring design with the Ethernet on several different operational and subtle technical points of design, maintainability, and future prospects. On each of these points the ring possesses important or interesting advantages. At the same time, the most commonly cited advantage of a ring, “deterministic access time,” is shown to be illusory. The paper concludes that the data communication ring is a sound idea that will prove its value on operational rather than theoretical issues.  相似文献   

7.
The motivation for nonmonotonic logic is to produce a machine representation for default reasoning, broadly construed. In this paper we argue that all nonmonotonic logics have (by definition) inference rules that fail to preserve truth, and this fact leads to several undesirable features. In response to these problems, but recognizing the importance of the original motivation for nonmonotonic logic, we propose an alternative to nonmonotonic logic, which achieves nonmonotonicity of reasoning without abandoning in any way truth preserving inferences. This approach is based on a possible worlds framework, which we illustrate with a small Prolog program. Motivating this approach is an important distinction, which we believe the advocates of nonmonotonic logic to be ignoring: that between inferencing and making decisions, or equivalently that between inferencing and theory construction.  相似文献   

8.
9.
Cargill  C.F. 《Computer》2001,34(10):116-117
  相似文献   

10.
11.
12.
While the most accurate solution to off-line structure from motion (SFM) problems is undoubtedly to extract as much correspondence information as possible and perform batch optimisation, sequential methods suitable for live video streams must approximate this to fit within fixed computational bounds. Two quite different approaches to real-time SFM – also called visual SLAM (simultaneous localisation and mapping) – have proven successful, but they sparsify the problem in different ways. Filtering methods marginalise out past poses and summarise the information gained over time with a probability distribution. Keyframe methods retain the optimisation approach of global bundle adjustment, but computationally must select only a small number of past frames to process.  相似文献   

13.
14.
15.
16.
The purpose of this article is to show why consciousness and thought are not manifested in digital computers. Analyzing the rationale for claiming that the formal manipulation of physical symbols in Turing machines would emulate human thought, the article attempts to show why this proved false. This is because the reinterpretation of designation and meaning to accommodate physical symbol manipulation eliminated their crucial functions in human discourse. Words have denotations and intensional meanings because the brain transforms the physical stimuli received from the microworld into a qualitative, macroscopic representation for consciousness. Lacking this capacity as programmed machines, computers have no representations for their symbols to designate and mean. Unlike human beings in which consciousness and thought, with their inherent content, have emerged because of their organic natures, serial processing computers or parallel distributed processing systems, as programmed electrical machines, lack these causal capacities.  相似文献   

17.
18.
As the Internet rapidly changes the way we communicate and carry out our business, what are the challenges and opportunities for the cultural sector? Will national cultural identities be subsumed in an emerging global mono‐culture? What is the role of government in this situation? This paper discusses these questions and describes why and how the Australian Government responded with a new cultural online service ‐ Australia's Cultural Network <http://www.acn.net.au/> ‐ to provide a single access point for the general public and a resource exchange for those in the Australian cultural community wanting to make the transition to the growing online economy.  相似文献   

19.
Facebook users practice different strategies for managing their online self-presentation. Among the different available techniques, untagging is the most popular and frequently utilized. However, literature on the subject has not examined the untagging practices among adolescent Facebook users. In addition to this, there is no current knowledge of the differences between adolescent Facebook users who do and do not untag photos. The present study addresses this gap through a cross-sectional survey that involved 380 adolescent Facebook users (aged 12–18 years). The current study examines these differences in terms of adolescents' demographic attributes, digital imaging accessibility, online regret experience and management of digital photos. The study findings suggest that older males, extroverts, and those who perceive online information to be public, have more experience of taking and sharing photos, spend more time taking photos, practice strict protection of photos, demonstrate a negative perception of cloud storage, and rarely keep backups, are likely to untag photos. In addition to this, sociability and time lapse, in terms of realizing regretful experiences, significantly predicted the tendency among adolescents to untag photos. The study concludes by identifying various theoretical and practical implications of these findings.  相似文献   

20.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号