共查询到20条相似文献,搜索用时 0 毫秒
1.
为了观察网络用户浏览行为以研究用户偏爱的浏览模式集和个人兴趣,本文采用频繁链表结合存取树的增量式结构,使用捕获的网络用户浏览轨迹构建、更新该结构并使用同类合并的思想挖掘该结构以获得用户偏爱浏览模式集。实验通过对比本算法与GSP算法在同一测试集上的更新和挖掘情况,证明本算法在准确度和效率上都大幅领先。同时,该算法也为后续的长期观察研究提供了理论基础。 相似文献
2.
3.
4.
5.
WebExpress: A client/intercept based system for optimizing Web browsing in a wireless environment 总被引:1,自引:0,他引:1
Housel Barron C. Samaras George Lindquist David B. 《Mobile Networks and Applications》1998,3(4):419-431
This paper describes an application model and software technology that makes it possible to run World Wide Web applications
in wide area wireless networks. Web technology in conjunction with today's mobile devices (e.g., laptops, notebooks, personal
digital assistants) and the emerging wireless technologies (e.g., digital cellular, packet radio, CDPD) offer the potential
for unprecedented access to data and applications by mobile workers. Yet, the limited bandwidth, high latency, high cost,
and poor reliability of today's wireless wide-area networks greatly inhibits (to the point of infeasibility) supporting such
applications over wireless networks. This paper presents the Client/Intercept computational model that makes it possible to run such distributed applications efficiently in wide area wireless networks.
Furthermore, it presents WebExpress, a client/intercept based system for optimizing Web browsing, that reduces data volume and latency of wireless communications
by intercepting the HTTP data stream and performing various optimizations including: file caching, forms differencing, protocol
reduction, and the elimination of redundant HTTP header transmission. This paper describes these optimizations and presents
some experimental results.
This revised version was published online in June 2006 with corrections to the Cover Date. 相似文献
6.
7.
《Proceedings of the IEEE. Institute of Electrical and Electronics Engineers》1982,70(9):1129-1130
A few basic facts regarding the analysis of a certain class of circuit problems are discussed. Some bounds on the existence of an iterative solution are presented via contraction mapping. The analysis of a simple differential amplifier is used as an example. 相似文献
8.
The explosive growth of the Web requires servers to be extensible and configurable. This article describes our adaptive Web server, OpenWebServer, which uses the Reflection architectural pattern. The server supports the dynamic adoption of functionality, such as introducing additional protocols, modifying execution policies, and tuning system performance. This is achieved by specifying and coordinating metaobjects that represent various aspects within the Web server. We present a Java version of OpenWebServer, and describe its design using Reflection and other design patterns: Singleton, Bridge, Mediator, Observer, and Decorator. These patterns provide a better-factored design and allow the Web server to evolve continually beyond static and monolithic servers 相似文献
9.
本文介绍了WWW流量模型的建立方法和过程,得到了WWW流量模型的数学表达式,并通过实例对该模型进行了验证. 相似文献
10.
Ever-increasing computing power and connectivity bandwidth, together with falling storage costs, are resulting in an overwhelming amount of data of various types being produced, exchanged, and stored. Consequently, information search and retrieval has emerged as a key application area. Text-based search is the most active area, with applications that range from Web and local network search to searching for personal information residing on one's own hard-drive. Speech search has received less attention perhaps because large collections of spoken material have previously not been available. However, with cheaper storage and increased broadband access, there has been a subsequent increase in the availability of online spoken audio content such as news broadcasts, podcasts, and academic lectures. A variety of personal and commercial uses also exist. As data availability increases, the lack of adequate technology for processing spoken documents becomes the limiting factor to large-scale access to spoken content. In this article, we strive to discuss the technical issues involved in the development of information retrieval systems for spoken audio documents, concentrating on the issue of handling the errorful or incomplete output provided by ASR systems. We focus on the usage case where a user enters search terms into a search engine and is returned a collection of spoken document hits. 相似文献
11.
Sebastian Reich 《Circuits, Systems, and Signal Processing》1991,10(3):343-359
An existence and uniqueness theory is developed for general nonlinear and nonautonomous differential-algebraic equations (DAEs) by exploiting their underlying differential-geometric structure. A DAE is called regular if there is a unique nonautonomous vector field such that the solutions of the DAE and the solutions of the vector field are in one-to-one correspondence. Sufficient conditions for regularity of a DAE are derived in terms of constrained manifolds. Based on this differential-geometric characterization, existence and uniqueness results are stated for regular DAEs. Furthermore, our notions are compared with techniques frequently used in the literature such as index and solvability. The results are illustrated in detail by means of a simple circuit example. 相似文献
12.
Furuichi S. 《IEEE transactions on information theory / Professional Technical Group on Information Theory》2005,51(10):3638-3645
The uniqueness theorem for Tsallis entropy was presented in H. Suyari, IEEE Trans. Inf. Theory, vol. 50, pp. 1783-1787, Aug. 2004 by introducing the generalized Shannon-Khinchin axiom. In the present correspondence, this result is generalized and simplified as follows: Generalization : The uniqueness theorem for Tsallis relative entropy is shown by means of the generalized Hobson's axiom. Simplification: The uniqueness theorem for Tsallis entropy is shown by means of the generalized Faddeev's axiom 相似文献
13.
Andrzej Banaszuk 《Circuits, Systems, and Signal Processing》1993,12(3):375-390
In the present paper we study the problem of the existence and uniqueness of solutions of implicit systems considered on a finite interval of time. We consider two kinds of existence problems: input-acceptance and input-acceptance when the boundary conditions of a corresponding trajectory are set to zero, and two kinds of uniqueness problems: output uniqueness and output uniqueness when the boundary conditions of the corresponding trajectory are unknown. Geometric conditions for all of these notions are given, and the duality of these notions is studied.This research was supported by NSF Grant ECS-8805932. 相似文献
14.
Struts框架方便了中小型Web程序的开发。在Struts框架下应用Business Proxy,DAO等模式,实现了Web系统中表现层、逻辑层、数据持久层之间的松耦合,不仅使业务逻辑更加清晰,还使系统具有结构合理,易于开发、复用和维护的特点。结合项目实例对Struts的原理进行了分析,重点介绍了工厂方法,Business Proxy,DAO等模式的特点及基本构造,并对这些模式在实际应用中遇到的问题提出了具体的解决办法。 相似文献
15.
On management technologies and the potential of Web services 总被引:8,自引:0,他引:8
From the early days of management research and standardization in the late 1980's, there has always been a quest for a management technology that would be general enough to be used for network, system, service, and distributed application management; efficient in terms of information retrieval time, computational resources required, and management traffic incurred; and easy to use in order to reduce development time and operational costs. From protocol-based approaches such as OSI management and SNMP, attention shifted to distributed object and Web-based approaches. Recently, XML-based approaches and, in particular, Web services have been emerging as a promising Internet-based technology that might also be used for management. In this article we survey first the key aspects of protocol and distributed object approaches to management. We subsequently examine Web services as a distributed object approach to management, and consider its suitability, usability, and performance in comparison to SNMP and CORBA. 相似文献
16.
Time-hopping patterns can be constructed from simple difference sets. By studying such constructions, it has been proven that whenever n -2, n -1, or n +1 is a prime power, then time-hopping patterns that have n terms can be constructed and are of length less than n 2. By computation it is shown that such patterns can have length less than n 2-n 1.44 for all n ⩽150. It is also shown that time-hopping patterns for n terms can have length less than n 2+O(n 1.55) for all n 相似文献
17.
18.
傅明丽 《信息技术与信息化》2014,(3):28-30
随着现代信息技术的发展,使得基于Web技术的网络教学成为现代教育技术改革与发展的方向。本文分析了网络教学平台的技术特点,主要针对基于Web技术的网络多媒体教学平台的设计思路以及主要技术的实现方法进行了一些探讨。 相似文献
19.
The radiation properties of parasitic loop counterpoise antennas are investigated in detail. It is found that the parasitic loop concept can be used advantageously to reduce considerably the undesirable effects produced in loop counterpoise antenna patterns due to the counterpoise edge diffraction effects. Results of extensive numerical and experimental investigation of various aspects of the parasitic loop counterpoise antenna patterns are reported. The method of design of such antennas is also discussed. Three such new antennas are proposed which appear to be capable of bringing out superior performance from the present-day VOR system. 相似文献
20.
《IEEE transactions on information theory / Professional Technical Group on Information Theory》1971,17(4):445-452
Some recognizers for stochastic time-varying patterns with additive noise are studied. As in binary communication channels with fading, it is supposed that the fluctuation of a pattern (or signal) may be approximated by a stationary Gaussian autoregressive process with known parameters. Each measurement belongs to either of two classes: the pattern plus noise or noise alone. Under these assumptions, optimum dichotomizers with supervized learning are discussed. To the nonsupervised problems, the decision-directed approach and the modified-decision-directed approach are applied. Also some experimental results are presented. 相似文献