首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到10条相似文献,搜索用时 24 毫秒
1.
Trusted computing is a new technology for building secure system in recent years. TCG (Trusted Computing Group) has drafted a series of specifications on trusted computer. More and more hardware and software have been developed by manufactures, and trusted computer shows many advantages to protcct information security. In the period of designing secure platform, TCG specifications arc analyzed and some deficiency is found in them. This paper presents the main idea of TCG specifications and gives some suggestions on three neglected problems: compatibility with old applications, security policy and mechanism of self recovery.  相似文献   

2.
《微型电脑应用》2009,25(12):I0001-I0003
Expert Forum
The Developing Trend of Technology in Software Industry
YAN Jun-wei (CIMS Research Center, Tongji University, Shanghai 200092, China )
Abstract: According to national planning for the electronic information industry and software industry, it is stated that software industry has a nuclear place and strategic task in the near three years. Now, the development of software industry presents the characteristics of technology, management and performance. The open, fuse and network from technical characteristics are discussed. It is included that open trend with open-original code software, fuse trend in the name of intelligent software products and "Industry Software" products and network trend with an importance. In large many of key technologies, the paper mainly discusses the developing trend of component-ware, middle-ware and embedded software and so on.
Keywords: Software industry; Industry development technology; Open-original software; Embedded software  相似文献   

3.
Market watchers are splashing criticisms and suspicions over the trusted computing, declaring that it will be many years before large numbers of companies and individuals benefit from this technology. This paper investigates a majority of TCG (Trusted Computing Group) members, classifies their products as TPM chips, TCG enabled hardware and software. The data are collected from both literature and websites. It indicates that the trusted computing technology in China is considerable on chips and hardware. As for TCG enabled software, there still have many obstacles for Chinese to combat.  相似文献   

4.
The Internet technology has already changed the Information Society in profound ways, and will continue to do so. Nowadays many people foresee that there is a similar trajectory for the next generation of Internet - Grid Technology. As an emerging computational and networking infrastructure, Grid Computing is designed to provide pervasive, uniform and reliable access to data, computational and human resources distributed in a dynamic, heterogeneous environment. On the other hand, the development of Geographic Information System (GIS) has been highly influenced by the evolution of information technology such as the Internet, telecommunications, software and various types of computing technology. In particular, in the distributed GIS domain, the development However, due to the closed and centralized has made significant impact in the past decade. legacy of the architecture and the lack of interoperability, modularity, and flexibility, current distributed GIS still cannot fully accommodate the distributed, dynamic, heterogeneous and speedy development in network and computing environments. Hence, the development of a high performance distributed GIS system is still a challenging task.
So, the development of Grid computing technology undoubtedly provides a unique opportunity for distributed GIS, and a Grid Computing based GIS paradigm becomes inevitable. This paper proposes a new computing platform based distributed GIS framework - the Grid Geographic Information System (G^2IS).  相似文献   

5.
Today’s software systems need to support complex business operations and processes.The development of the web-based software systems has been pushing up the limits of traditional software engineering methodologies and technologies as they are required to be used and updated almost real-time,so that users can interact and share the same applications over the internet as needed.These applications have to adapt quickly to the diversified and dynamic changing requirements in the physical,technological,economical and social environments.As a consequence,we are expecting a major paradigm shift in software engineering to reflect such changes in computing environment in order to better address the fundamental needs of organisations in this new era.Existing software technologies,such as model driven development,business process engineering,online(re-)configuration,composition and adaptation of managerial functionalities are being repurposed to reduce the time taken for software development by reusing software codes.The ability to dynamically combine contents from numerous web sites and local resources,and the ability to instantly publish services worldwide have opened up entirely new possibilities for software development.In retrospect to the ten years applied research on Internetware,we have witnessed such a paradigm shift,which brings about many changes to the developmental experience of conventional web applications.Several related technologies,such as cloud computing,service computing,cyber-physical systems and social computing,have converged to address this emerging issue with emphasis on different aspects.In this paper,we first outline the requirements that the Internetware software paradigm should meet to excel at web application adaptation;we then propose a requirement model driven method for adaptive and evolutionary applications;and we report our experiences and case studies of applying it to an enterprise information system.Our goal is to provide high-level guidelines to researchers and practitioners to meet the challenges of building adaptive industrial-strength applications with the spectrum of processes,techniques and facilities provided within the Internetware paradigm.  相似文献   

6.
Visual information is highly advantageous for the evolutionary success of almost all animals.This information is likewise critical for many computing tasks,and visual computing has achieved tremendous successes in numerous applications over the last 60 years or so.In that time,the development of visual computing has moved forwards with inspiration from biological mechanisms many times.In particular,deep neural networks were inspired by the hierarchical processing mechanisms that exist in the visual cortex of primate brains(including ours),and have achieved huge breakthroughs in many domainspecific visual tasks.In order to better understand biologically inspired visual computing,we will present a survey of the current work,and hope to offer some new avenues for rethinking visual computing and designing novel neural network architectures.  相似文献   

7.
佟立峰 《计算机科学》2003,30(10):99-102
The environments in which embedded software run are different in that they may run on different processors, have different input devices, and display graphics on a variety of video devices. In addition, it usually has limited computing and storing capability which require embedded GUI toolkit simple and flexible. According to the characteristics and the requirements of embedded environment, this story shows an embedded GUI toolkit and some design concerns, that is, applying design patters to design embedded GUI Toolkit to achieve high portability,extensibility and flexibility.  相似文献   

8.
Survey of information security   总被引:3,自引:0,他引:3  
The 21st century is the age of information when information becomes an important strategic resource. The information obtaining, processing and security guarantee capability are playing critical roles in comprehensive national power, and information security is related to the national security and social stability. Therefore, we should take measures to ensure the information security of our country. In recent years, momentous accomplishments have been obtained with the rapid development of information security technology. There are extensive theories about information security and technology. However, due to the limitation of length, this article mainly focuses on the research and development of cryptology, trusted computing, security of network, and information hiding, etc.  相似文献   

9.
复合型嵌入式软件人才培养模式探索与实践(英文)   总被引:1,自引:1,他引:0  
Today,the development of information technology is rapid,embedded software has been an increasing number of applications in various fields;the followed question of embedded software talents training bottlenecks has been paid more attention.The complex embedded software talents training mode is a new training model.Through exploration and practice,Software Technology Institute of Dalian Jiaotong University has accumulated a wealth of experience and achieved many results.This paper analyzes the problems of the traditional educational methods of the embedded major,discusses the way to build the complex embedded software talents training model and it's operational mechanism,and describes characteristics of the model.  相似文献   

10.
Preface          下载免费PDF全文
I am extremely pleased to have been able to organize the assembly of the set of papers contained in this special issue of the International Journal of Software and Informatics, honoring the career of Prof. Barry W. Boehm. The papers contained in this special issue were all contributed by friends, colleagues, and admirers of Prof. Boehm, and were presented during a special Symposium held in Beijing, China on April 26 and 27, 2011, under the sponsorship of the Institute of Software, Chinese Academy of Sciences and the International Journal of Software and Informatics. The range of the subjects of these papers matches the extraordinary breadth of interests and influences of Prof. Boehm and his work. The natures of the papers range from those that make very specific technical contributions to those that are conceptual and analytical, to those that are visionary. The subject matter of the papers addresses software measurement, software management, specific software development phases, and software processes, among other topics. All cite the specific influences, inspirations, and contributions of Prof. Boehm to the work, thereby serving as documented testimony to the far ranging influence that Prof. Boehm has had upon software engineering thought and software development practice. In "Measuring Agility and Architectural Integrity", a paper that focuses on measurement, a longstanding interest of Prof. Boehm''s, Walker Royce tackles the difficult issue of how to quantify agility that nevertheless does not jeopardize the structural integrity of software. Ross Jeffery''s paper, "Software Development Cost Modeling and Estimation Through a UNSW Lens", focuses on the measurement and estimation of a different software issue, namely cost, an area in which Prof. Boehm has made some of his most fundamental and long-lasting contributions (e.g. with his COCOMO models). Neil G. Siegel''s paper, "Organizing Projects Around the Mitigation of Risks Arising from System Dynamic Behavior", shows how appropriate use of software measurement can help to mitigate risk. Risk mitigation is another issue that has been a strong and central focus of Prof. Boehm and his work, as it is a core issue behind his famous Spiral Model of software development. Another set of papers addresses the ways in which Prof. Boehm and his ideas have been broadly inspirational. In my own paper, "A Process Programmer Looks at the Spiral Model: A Tribute To the Deep Insights of Barry W. Boehm", I demonstrate how Prof. Boehm, through the Spiral Model, elucidates some profound insights about the fundamental nature of software and its development. The paper suggests that the community may have only scratched the surface of the important implications that could be drawn from the ideas behind the Spiral Model. Lori A. Clarke, in her paper, "Environment Support for Improving Software Development Processes: A Vision Influenced by the Work of Barry W. Boehm", similarly indicates how papers and ideas presented by Prof. Boehm have provided inspiration and foundations for her own work in the development and integration of software analysis tools. The application of these tools to new software domains, such as process software, is further evidence of the far-reaching impact of Prof. Boehm''s work. Two papers provide further development of Prof. Boehm''s long-held interest in the importance of software and system requirements and the difficulty of eliciting them. In "Attentiveness: Design for Reactivity at Scale", Gregory S. Hartman and William L. Scherlis explore these themes. Their paper suggests that better, more complete requirements specifications might result from focusing on attentiveness, a type of requirement whose importance has been overlooked. In "On ''The Right'' Software", Dines Bjorner presents a rigorous approach to developing software and system requirements tied directly to a correspondingly rigorous approach to domain specification. Bjorner draws a strong and important parallel to Prof. Boehm''s own insights about requirements, thereby strengthening both views, and attesting to the profundity of Prof. Boehm''s views on this crucial area of software engineering. Finally, two papers take philosophical and visionary views of software engineering, each in its own way, indicating how Prof. Boehm''s ideas and work stimulated and nourished the visionary thinking. Dieter Rombach''s paper, Empirical Software Engineering Models: Can They Become the Equivalent of Physical Laws in Traditional Engineering?" suggests the possibility of developing a solid conceptual foundation for software engineering. He suggests that this more solid conceptual foundation could derive from a focus on empirical software models, an area pioneered by Prof. Boehm. In "Polyphonic Aspects of Software Process: Looking for Philosophical Foundation of Software Engineering", Kouichi Kishida''s thoughts range broadly across Western and Eastern literature and philosophy in search of the proper philosophical foundation for software engineering. Along the way Kishida touches often upon how Prof. Boehm''s ideas helped to provide guidance for his search. This paper is an eloquent treatise on how effectively grappling with deep and difficult problems, as Prof. Boehm has done, can lead to improvements in practice, the discovery of deeper issues and truths, and to stimulating the imaginations and visions of others. Ultimately, this volume can only hint and suggest at the breadth and depth of the ideas and work of our colleague, Prof. Barry W. Boehm. It is offered in the hope that the papers themselves will educate and stimulate, but also in the hope that they will also encourage the reader to follow the many references in these papers to explore in more depth the work of Prof. Boehm. I would like to thank the authors of these papers for their excellent contributions to this Special Issue of the International Journal of Software and Informatics. In addition I would like to express my sincere thanks to Prof. Ruqian Lu, the Editor-in-Chief of the International Journal of Software and Informatics, for giving me the great honor of serving as the Editor of this Special Issue. I would also like to express my very sincere thanks to Ms. Mei Fang for her outstanding leadership of the editorial work needed to prepare these papers for publication, which has allowed the publication of this volume on a very demanding schedule. Finally, on behalf of a very grateful software engineering community, I would like to thank our friend, colleague, and leader, Prof. Barry W. Boehm, for his tireless work and amazing contributions to the formation, nurturing, and maturation of our community. This Special Issue is a small, but very earnest measure of our esteem for Prof. Boehm and his work. Leon J. Osterweil  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号