首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 26 毫秒
1.
基于INTERNET的分布式组件GIS集成的实现方法   总被引:12,自引:0,他引:12       下载免费PDF全文
信息共享是提高地理信息系统应用深度和广度、走向社会化的必由之路。基于INTERNET的分布式、组件化开发为GIS信息资源的共享开辟了广阔的应用领域。简要介绍和比较了几种软件组件模型在GIS系统开发中的应用,并提出了一个经改进的基于INTERNET的分布式组件GIS应用模型  相似文献   

2.
高信度信息系统初探   总被引:1,自引:0,他引:1  
该文介绍了高信度信息系统(TrustworthyInformationSystem)的基本概念,提出了一种高信度信息系统的技术框架。从高信度网络、高信度计算平台、高信度软件和高信度信息四个方面描述了高信度信息系统的主要研究领域及其关键技术。  相似文献   

3.
地理信息工程软件体系结构研究*   总被引:5,自引:1,他引:4       下载免费PDF全文
获取、存储、分析、处理地理信息的遥感图像处理系统软件、地理信息系统软件、关系数据库软件被称为地理信息工程软件。通过分析这三种软件的功能特点,认为建立集成化的地理信息工程软件结构非常必要。在此基础上提出了基于客 户/服务器结构的系统软件体系结构,具体分析了基于元数据管理系统和应用程序接口(API)的两种地理信息工程软件集成方式。  相似文献   

4.
针对目前IT软件供应商在企业软件定制开发和实施中的困境,结合软件工程的特点,提出了一种基于软件构件化、模块化开发企业软件的模式,从而抛弃了传统的代码式软件开发模式中的大工作量和费用,并对实施的可行性提出了相应的建议,值得在IT软件供应商软件开发中推广。  相似文献   

5.
结合近几年实训教学中借助导学软件和多媒体网络教室软件驾驭课堂的实训教学效果,探索出《大学计算机信息技术》课程交互式实训教学模式。  相似文献   

6.
软件构件的可复用性质量度量*   总被引:1,自引:0,他引:1  
依据国家信息产业部有关制定构件质量度量标准的要求,研究并提出了对软件构件可复用性有着直接影响的六个子特性(接口成熟性、独立性、易组装性、通用性、演化兼容性和可复用依从性)以及软件构件可复用性质量度量和构件可信度使用质量度量方案,并给出了它们相应的度量元素和量化方法.  相似文献   

7.
Information Technology and Management - Knowledge and understanding about system design are very important for the development and maintenance of any software system due to certain deadlines and...  相似文献   

8.
Information security breaches frequently exploit software flaws or vulnerabilities, causing significant economic losses. Considerable debate exists about how to disclose such vulnerabilities. A coherent theoretical framework helps identify the key data elements needed to develop a sensible way of handling vulnerability disclosure  相似文献   

9.
R作为统计领域广泛使用的一种统计软件,具有开源、免费、灵活的诸多优点,编程语言强大,但用到面向对象的缔程方法却不多。本文通过对R中面向对象编程的研究,使读者进一步的了解R软件。  相似文献   

10.
The objective of this paper is to analyze free software for the design, analysis, modelling, and simulation of an unmanned aerial vehicle (UAV). Free software is the best choice when the reduction of production costs is necessary; nevertheless, the quality of free software may vary. This paper probably does not include all of the free software, but tries to describe or mention at least the most interesting programs. The first part of this paper summarizes the essential knowledge about UAVs, including the fundamentals of flight mechanics and aerodynamics, and the structure of a UAV system. The second section generally explains the modelling and simulation of a UAV. In the main section, more than 50 free programs for the design, analysis, modelling, and simulation of a UAV are described. Although the selection of the free software has been focused on small subsonic UAVs, the software can also be used for other categories of aircraft in some cases; e.g. for MAVs and large gliders. The applications with an historical importance are also included. Finally, the results of the analysis are evaluated and discussed—a block diagram of the free software is presented, possible connections between the programs are outlined, and future improvements of the free software are suggested.  相似文献   

11.
本文根据目前管理信息系统软件开发所存在的问题,综合介绍一种利用表驱动程序生成器技术生成中、小型管理信息系统的集成通用型管理信息系统软件的设计原理、实现技术、系统功能及特点等。  相似文献   

12.
In the debate over the assessment of software reliability (or safety), as applied to critical software, two extreme positions can be discerned: the ‘statistical’ position, which requires that the claims of reliability be supported by statistical inference from realistic testing or operation, and the ‘perfectionist’ position, which requires convincing indications that the software is free from defects. These two positions naturally lead to requiring different kinds of supporting evidence, and actually to stating the dependability requirements in different ways, not allowing any direct comparison. There is often confusion about the relationship between statements about software failure rates and about software correctness, and about which evidence can support either kind of statement. This note clarifies the meaning of the two kinds of statement and how they relate to the probability of failure-free operation, and discusses their practical merits, especially for high required reliability or safety. © 1998 John Wiley & Sons, Ltd.  相似文献   

13.
ORP(Open Runtime Platform)是一个高性能的MRTE(Managed Runtime Environment)软件开发环境,MIDP(Mobile Information Device Profile)是我们作为ORL(Open Runtime Library)的一部分在该环境中开发的类库。在开发该类库的时候要充分考虑类库的整体设计和性能。我们在编写的过程中,总结出了一些关于如何设计和实现有关MIDP类库的经验,并给出了具体实例来阐述其中需要注意的一些原则。  相似文献   

14.
Accurate data about accident costs motivate top managers to improve safety in production. The problem has been, however, to specify costs reliably and easily. This article presents the computer-aided module for calculating accident costs in the TATU-Safety Information System developed by the Finnish Institute of Occupational Health. The module computes the direct costs and company-controlled total costs of accidents. The calculation is based on the accident consequence tree (ACT) method. The software provides information about accident costs to motivate accident prevention. The authors explain the system design of the software and its use in cost calculation. © 1997 John Wiley & Sons, Inc.  相似文献   

15.
We argue that the intimate relationship between computer architecture and software has produced a professional mindset that is unsuited to the newer, knowledge-based business paradigms. Major software projects are ending in failure or do not yield their maximum potential and we suggest reasons why this is the case. In conclusion, we propose that Management Information Systems Curricula need to be revised to provide students with exposure to and practice in a variety of thinking styles. Organisations must change their structures and management styles if they are serious about managing knowledge. In making our case we briefly review the development of information systems as a discipline and the role of methodologies in the articulation of its paradigm. We end our paper with suggestions for future research.  相似文献   

16.
基于MIM的软件度量扩展模型对软件可维护性的度量   总被引:2,自引:0,他引:2  
赵金伟  郝克刚  葛玮 《计算机应用》2007,27(6):1430-1433
主要研究基于实用软件度量(PSM)的软件度量过程模型MIM,提出了一个扩展模型,给出模型的形式化描述和建模步骤。在实践中,把这种新的扩展模型应用于软件的可维护性度量中,取得了较好的效果,进一步证明了此模型提出的可行性与实用性。  相似文献   

17.
Boehm  B. Huang  L. Jain  A. Madachy  R. 《Software, IEEE》2004,21(3):54-61
In most organizations, proposed investments in software dependability compete for limited resources with proposed investments in software and system functionality, response time, adaptability, speed of development, ease of use, and other system capabilities. The lack of good return-on-investment models for software dependability makes determining the overall business case for dependability investments difficult. So, with a weak business case, investments in software dependability and the resulting system dependability are frequently inadequate. Dependability models will need to support stakeholders in determining their desired levels for each dependability attribute and estimating the cost, value, and ROI for achieving those. At the University of Southern California, researchers have developed software cost- and quality-estimation models and value-based software engineering processes, methods, and tools. We used these models and the value-based approach to develop an Information Dependability Attribute Value Estimation model (iDAVE) for reasoning about software dependability's ROI.  相似文献   

18.
Is a cancelled project a bad project? After surveying about 8,000 IT projects, the Standish Group reported that about 30 percent of all projects were cancelled (“Charting the Seas of Information Technology”, 1994). Capers Jones reports that the average cancelled project in the US is about a year behind schedule and has consumed 200 percent of its expected budget by the time it's cancelled (Assessment and Control of Software Risks, Yourdon Press, 1994). Jones estimates that work on cancelled projects comprises about 15 percent of total US software efforts, amounting to as much as $14 billion per year in 1993 dollars. In spite of these grim statistics, cancelling a project is, in itself, neither good nor bad. Cancelling a project later than necessary is bad. The trick is to perform the minimum amount of work necessary to determine that the project should be cancelled  相似文献   

19.
Siponen  M.T. 《IT Professional》2005,7(5):49-51
Although unauthorized copying of software is regarded as illegal in more and more countries, ordinary computer users continue to intermittently engage in the practice. The issue of whether unauthorized copying of computer software is morally justified and additionally, whether developers and software companies can truly own software, has become increasingly relevant in the era of information society. These questions not only cover the ontological foundations of software as a form of intellectual property rights, but also the social and economic effects of free versus proprietary software. Such questions also lead to further debate about whether is it justifiable to copy a program that you yourself would never buy (Weckert, 1997), or whether it is justifiable to copy legally purchased software for relatives, family, or friends without compensating the software producer (Birsch, 2003).  相似文献   

20.
Information about the evolution of a software architecture can be found in the source basis of a project and in the release history data such as modification and problem reports. Existing approaches deal with these two data sources separately and do not exploit the integration of their analyses. In this paper, we present an architecture analysis approach that provides an integration of both kinds of evolution data. The analysis applies fact extraction and generates specific directed attributed graphs; nodes represent source code entities and edges represent relationships such as accesses, includes, inherits, invokes, and coupling between certain architectural elements. The integration of data is then performed on a meta-model level to enable the generation of architectural views using binary relational algebra. These integrated architectural views show intended and unintended couplings between architectural elements, hence pointing software engineers to locations in the system that may be critical for on-going and future maintenance activities. We demonstrate our analysis approach using a large open source software system.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号