首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
现代软件开发方法普遍采用了UseCase驱动的方法。本文依据UML1.1规范,首先介绍UseCase的有关概念,然后介绍分析、设计和实现UseCase的过程,重点阐述UseCase的描述、细化和实现的有关细节,最后强调了分析、设计和实现UseCase过程中应该注意的一些问题。  相似文献   

2.
首先介绍了CBR(Case-based reasoning)推理中一个重要分支--基于文本案例的推理技术TCBR(Textual CBR)的产生背景.然后详细介绍了TCBR推理时采用的结构--实例提取网CRN(Case Retrieval Nets),描述案例的知识单元--信息实体的概念和特性,以及TCBR中如何进行实例提取、改编和学习.最后,对TCBR的改进研究、代表项目以及未来的发展方向作了概括性说明.  相似文献   

3.
电子档案管理系统的设计和开发   总被引:9,自引:0,他引:9  
以人事档案管理系统为例,介绍电子档案管理系统的设计思想和系统结构以及相关技术细节,并提出设计与开发中应注意的一些问题。  相似文献   

4.
J. Wellington. (2000). Teaching and learning secondary science: Contemporary issues and practical approaches. London: Routledge. ISBN 0–4152–1403–3  相似文献   

5.
National governments have a legitimate rôle to play in the development of national strategies to support electronic commerce. It is not always clear, however, what any electronic commerce legislation should incorporate or how regulation of electronic commerce should be implemented. This paper explores the strategic issues that underlie national electronic commerce strategies by following the passage of a particular piece of legislation (the UK's Regulation of Investigatory Powers Act, 2000) through Parliament. In identifying some of the arising strains with the interests of industry and civil society, this paper will discuss some of the legal, technological, economic, and political issues that may arise in other countries as they consider the policy habitat of electronic commerce.  相似文献   

6.
In this paper we comprehensively survey the concept and strategies for building a resilient and integrated cyber–physical system (CPS). Here resilience refers to a 3S-oriented design, that is, stability, security, and systematicness: Stability means the CPS can achieve a stable sensing-actuation close-loop control even though the inputs (sensing data) have noise or attacks; Security means that the system can overcome the cyber–physical interaction attacks; and Systematicness means that the system has a seamless integration of sensors and actuators. We will also explain the CPS modeling issues since they serve as the basics of 3S design. We will use two detailed examples from our achieved projects to explain how to achieve arobust, systematic CPS design: Case study 1 is on the design of a rehabilitation system with cyber (sensors) and physical (robots) integration. Case Study 2 is on the implantable medical device design. It illustrates the nature of CPS security principle. The dominant feature of this survey is that it has both principle discussions and practical cyber–physical coupling design.  相似文献   

7.
Two research projects are described that explore the use of spoken natural language interfaces to virtual reality (VR) systems. Both projects combine off-the-shelf speech recognition and synthesis technology with in-house command interpreters that interface to the VR applications. Details about the interpreters and other technical aspects of the projects are provided, together with a discussion of some of the design decisions involved in the creation of speech interfaces. Questions and issues raised by the projects are presented as inspiration for future work. These issues include: requirements for object and information representation in VR models to support natural language interfaces; use of the visual context to establish the interaction context; difficulties with referencing events in the virtual world; and problems related to the usability of speech and natural language interfaces in general.  相似文献   

8.
9.
Relationship has become an influential aspect for the success of IS/IT outsourcing projects. Although some studies have explored the issues of IS/IT outsourcing relationship in the past, these studies are limited to the private sectors. Whereas, studies implicate that the issues related to private and public sectors should be addressed differently. Therefore the main purpose of this study is to examine the IS/IT outsourcing relationship in the public sector by determining relationship quality factors. Based on the social exchange and the relational exchange theories a relationship model is proposed and hypotheses are tested. Ninety three IS/IT outsourcing projects in the public sector of Korea are examined and the results indicate that the outsourcing success is greatly determined by relationship quality. This study will serve as useful guidelines in understanding how to develop a successful IS/IT outsourcing relationships for IT practitioners in the public sector and the vendors undertaking those outsourced projects.  相似文献   

10.
随着网络技术的飞速发展,因计算机软件安全漏洞造成用户损失的案件屡屡发生,且呈现逐年上升趋势,但用户得到相应赔偿的司法判例却寥寥无几,究其根源在于我国现行法律尚未就这一领域进行专门的立法规制。本文通过回顾2007年引起广泛关注的“诺顿案”,针对计算机软件安全漏洞所涉及的法律问题及不同情形下的责任规制展开探讨,以明晰此类案件的法律适用,并期冀对我国立法的完善有所建言。  相似文献   

11.
European Community programs have been supporting agent-related projects for 15 years, initially on a relatively small scale but more recently through broader collaborative initiatives. One distinguishing feature of European programs is their emphasis on coordination and the support of value-adding activities that exceed the scope of specific projects. Another is the holistic approach, which ensures that technology isn't developed in a vacuum and that research is generally anchored in practical application contexts. The various agent projects are coordinated through initiatives such as the AgentLink network of excellence for agent-based computing. Three current projects funded by the European Commission suggest the breadth of agent-related issues: NIMIS, CASABA, and Mascada. The Networked Interactive Media in Schools (NIMIS) project aims to support young pupils in developing reading skills, notions of narrativity, and the ability to take a second- or third-person perspective across a range of situations. The Competitive Agents for Secure Business Applications (CASBA) project is intended to improve existing e-commerce services and develop new services to create a flexible electronic marketplace. The Holonic Manufacturing System consortium is using the holon concept in the Mascada project to develop a technology for manufacturing industries  相似文献   

12.
While organisations are increasingly interested in artificial intelligence (AI), many AI projects encounter significant issues or even fail. To gain a deeper understanding of the issues that arise during these projects and the practices that contribute to addressing them, we study the case of Consult, a North American AI consulting firm that helps organisations leverage the power of AI by providing custom solutions. The management of AI projects at Consult is a multi-method approach that draws on elements from traditional project management, agile practices, and AI workflow practices. While the combination of these elements enables Consult to be effective in delivering AI projects to their customers, our analysis reveals that managing AI projects in this way draw upon three core logics, that is, commonly shared norms, values, and prescribed behaviours which influence actors' understanding of how work should be done. We identify that the simultaneous presence of these three logics—a traditional project management logic, an agile logic, and an AI workflow logic—gives rise to conflicts and issues in managing AI projects at Consult, and successfully managing these AI projects involves resolving conflicts that arise between them. From our case findings, we derive four strategies to help organisations better manage their AI projects.  相似文献   

13.
刘宝川  张莉  刘桢炜  蒋竞 《软件学报》2024,35(5):2340-2358
GitHub是著名的开源软件开发社区,支持开发人员在开源项目中使用问题追踪系统来处理问题.在软件缺陷问题的讨论过程中,开发人员可能指出与该缺陷问题相关的其他项目问题(称为跨项目相关问题),为缺陷问题的修复提供参考信息.然而, GitHub平台中托管了超过2亿的开源项目和12亿个问题,导致人工识别和获取跨项目相关问题的工作极其耗时.提出为缺陷问题自动化推荐跨项目相关问题的方法 CPIRecom.为了构建预选集,采用项目之间历史相关问题对的数量和问题发布时间间隔筛选问题.其次,为了精准推荐,采用BERT预训练模型提取文本特征,分析项目特征.然后使用随机森林算法计算预选问题与缺陷问题的相关概率,最终根据相关概率排名得到推荐列表.模拟CPIRecom方法在GitHub平台的使用情况. CPIRecom方法的平均倒数排名达到0.603,前5项查全率达到0.715.  相似文献   

14.
This paper explains how the Alloy model-finding method has been used to check the specification of an electronic purse (also called smart card) system, called the Mondex case study, initially written in Z. After describing the payment protocol between two electronic purses, and presenting an overview of the Alloy model-finding method, this paper explains how technical issues about integers and conceptual issues about the object layout in Z have been tackled in Alloy, giving general methods that can be used in most case studies with Alloy. This work has also pointed out some significant bugs in the original Z specification such as reasoning bugs in the proofs, and proposes a way to solve them. J. C. P. Woodcock  相似文献   

15.
The technology to create secure digital signatures is proven and workable on PC-level hardware, as well as on mainframes. the issues currently restraining widespread use of digital signatures are primarily legal. This tutorial survey first identifies the functions a digital signature should ideally perform by tracing an example Internet-based electronic business transaction. After an overview of the technology that provides the required functionality, this article presents the current legal status of digital signature use, including a number of unresolved liability issues, and summarizes some precautions for digital signature use.  相似文献   

16.
Although electronic commerce cannot yet support secure financial transactions, some financial institutions have already begun to conduct business online. This article reviews the experiences of one financial services provider in setting objectives for and establishing an Internet presence. Integral to the process is a checklist of strategic, tactical, and practical management issues that must be resolved before an Internet connection is made.  相似文献   

17.
云计算安全问题研究综述   总被引:18,自引:0,他引:18  
随着云计算的蓬勃发展,越来越多的企业和个人将他们的存储和计算需求付诸于云端.然而云计算的安全仍不容忽视,是当前的一个研究热点.对近年来云计算安全相关的研究成果进行总结,主要集中于数据安全,身份认证以及访问控制策略方面.也介绍了与可信计算技术相结合的云计算安全的相关研究框架和项目.根据这些研究成果,认为将可信计算与云计算思想相结合,建立"可信云计算"是未来云计算安全研究的一个重要方向.并且在最后提出了"可信云计算"发展的几个可能的研究主题.  相似文献   

18.
本文探讨了电子商务纠纷中电子证据的基本问题,对电子证据的真实性、收集与保全、法律地位与法律效力问题进行了深入分析,提出了应对这些问题的方法和措施,以期对法律实践产生指导意义。  相似文献   

19.
随着数据信息的积累,如何从这些海量信息中有效地提取所需要的知识成为当前数据挖掘的重要内容。聚类作为数据挖掘的重要工具,通过将数据划分成多个类,使得类内数据尽可能相似,而类间数据的相似度尽可能小,已成为研究热点。本文总结在数据挖掘中的聚类算法,针对聚类中所存在的问题进行归纳,并对未来的研究进行了展望。  相似文献   

20.
This paper investigates Critical Success Factors (CSFs) in Enterprise Application Integration (EAI). An initial set of CSFs for EAI projects was created based on a review and synthesis of the literature in the general area of integration, including Enterprise Resource Planning (ERP) projects. A case analysis, involving a large financial services provider integrating its consumer banking systems, was used to validate the CSFs. The findings resulted in a more structured and holistic CSF model which identifies three broad groups of CSFs, namely (1) top management support, (2) overall integration strategy, and (3) EAI project planning and execution. Although EAI projects share many of the same CSFs as ERP projects and other information systems projects, issues related to the selection of the right EAI tool and emphasis on technology planning and enterprise architecture are distinguishing features of EAI projects. Some of practical implications of the research are that EAI projects require personnel with specific skills and expertise, business integration should precede technology integration, that availability of adapters is an important criteria in EAI tool selection and that some custom adapter development may be unavoidable if custom applications need to be integrated.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号