首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
2.
3.
《Computer Fraud & Security》2001,2001(12):17-18
“A date that shall live in infamy.”
Franklin D. Roosevelt (1882–1945)1As I have said more than once in this column: the more things change, the more they stay the same. The recent events bring that home more than ever.  相似文献   

4.
For some reason, one of the least talked about information systems security (InfoSec) related topics is InfoSec applied to Internet Service Providers (ISPs). Well, it’s about time there was more discussion on this topic and something done to enhance their InfoSec profile — and, all you ISPs, please don’t even mention self-policing! You had your shot at that and did little if anything to protect our information, or our privacy!  相似文献   

5.
It should come as no surprise to company managers that they are responsible for the protection of company assets. In today’s information dependent and information-based companies, it should also not come as a surprise that these assets include information. 99.9% of company managers would agree that these are facts of business life today. It would be 100% except that there are always some managers that we have all met in our careers that just don’t seem to get it. So, I allot the 0.1% to those managers that just don’t get it.  相似文献   

6.
Today, because of computer networks and especially the Internet, many people are talking about privacy — the right to keep your personal information private. However, like InfoSec, everyone is talking about it but it is still a low priority for businesses and government agencies. In fact, for some, obtaining private information is a lucrative business and often a necessity in the competitive world for customers.  相似文献   

7.
Fred Cohen 《Network Security》2001,2001(10):16-18
Networks dominate today's computing landscape and commercial technical protection is lagging behind attack technology. As a result, protection programme success depends more on prudent management decisions than on the selection of technical safeguards. Managing Network Security takes a management view of protection and seeks to reconcile the need for security with the limitations of technology.  相似文献   

8.
In last month’s column we discussed the topic of InfoSec officer and online privacy. It is an important subject and possibly more important than protecting the ‘crown jewels’ of the corporation. Some reading the column maybe thought that yes, it was important, but I had overdone it a bit — life and death and all that sort of rot. Well, like it or not, it is true. Once more, look at history and what compiled lists of personal information in the wrong hands led to in the past. Just ask any of the Jewish people who lived in Europe in the 1930s and 1940s.  相似文献   

9.
10.
历史上以及世界各民族男子穿都有穿"裙子"的现象,现代设计师把男性的裙子带上T台,为人们带来了新的着装方式,给我们的审美带来了新鲜空气。一些时尚男士们已经开始穿着得体裙子为男性开辟着装新风范。所以不管是历史传承还是颠覆传统,男子穿裙子终归是美丽的。  相似文献   

11.
Embedded and embodied approaches to cognition urge that (1) complicated internal representations may be avoided by letting features of the environment drive behavior, and (2) environmental structures can play an enabling role in cognition, allowing prior cognitive processes to solve novel tasks. Such approaches are thus in a natural position to oppose the ??thesis of linguistic structuring??: The claim that the ability to use language results in a wholesale recapitulation of linguistic structure in onboard mental representation. Prominent examples of researchers adopting this critical stance include Andy Clark, Michael Wheeler, and Mark Rowlands. But is such opposition warranted? Since each of these authors advocate accounts of mental representation that are broadly connectionist, I survey research on formal language computation in artificial neural networks, and argue that results indicate a strong form of the linguistic structuring thesis is true: Internal representational systems recapitulate significant linguistic structure, even on a connectionist account of mental representation. I conclude by sketching how my conclusion can nonetheless be viewed as consistent with and complimentary to an embedded/embodied account of the role of linguistic structure in cognition.  相似文献   

12.
In this column, we will take a somewhat different approach from previous columns. Instead of dealing with one issue, we’ll discuss several. If you prefer this approach, let us know. If you prefer the other, let us know. If you don’t care either way, let us know. If we don’t hear from you, I will take that as an overwhelming approval from you, our favourite customers, that you think I should do it the way I want to do it.  相似文献   

13.
继承、颠覆与超越——计算摄影   总被引:1,自引:0,他引:1  
计算摄影是利用计算机及软件方法结合现代传感器、现代光学等技术创造出新型摄影设备及应用的综合技术.计算摄影在继承已有摄影技术的基础上,通过对传统摄影技术中各个部件、工作过程甚至是原理上的改进与革新,突破了现有摄影技术的种种限制,成为摄影技术的又一次革命.计算摄影是一个涉及众多学科的交叉研究领域,针对同一个问题有很多不同的角度和方法.为了全面了解计算摄影这个新兴领域,以计算相机原理为线索,从计算场景、计算光学、计算传感器以及计算处理4个方面介绍了计算摄影研究的热点问题和实例.最后总结了目前计算摄影现状及发展趋势.  相似文献   

14.
薛晗  马宏绪 《计算机仿真》2007,24(11):159-162,175
围棋死活求解非常消耗计算资源,博弈树的节点数随分支因子和深度的增加而呈指数级增长,使得传统的完全遍历博弈树的搜索不足以胜任.文中提出了一种基于模糊聚类的神经网络方法,利用模式识别和模糊属性检测,为涉及到外部劫争、循环规避、哈希置换、证明树等多方面问题的围棋博弈死活求解,构建了基于神经网络的棋型聚类分析器,快速又有效地极大减小了博弈树的分支因子,节约了死活求解所耗费的计算时间和内存空间.实验证明取得了比较理想的结果,研究表明把自学习能力赋予程序是提高计算机围棋博弈性能的有效途径.  相似文献   

15.
In this paper, I explore the implications of Fodor’s attacks on the Computational Theory of Mind (CTM), which get their most recent airing in The Mind Doesn’t Work That Way. I argue that if Fodor is right that the CTM founders on the global nature of abductive inference, then several of the philosophical views about the mind that he has championed over the years founder as well. I focus on Fodor’s accounts of mental causation, psychological explanation, and intentionality.  相似文献   

16.
科学技术是生产力,这是马克思主义历来的观点。早在一百多年前,马克思就说过,机器生产的发展要求自觉地应用自然科学。一个时代的科学技术不仅是那个时代发展生产力最活跃的因素,也必然是那个时代先进文化的代表。  相似文献   

17.
互联网,正在颠覆时代   总被引:1,自引:0,他引:1  
科学技术是生产力,这是马克思主义历来的观点。早在一百多年前,马克思就说过,机器生产的发展要求自觉地应用自然科学。一个时代的科学技术不仅是那个时代发展生产力最活跃的因素,也必然是那个时代先进文化的代表。  相似文献   

18.
针对回归测试中存在的一些问题,设计了一个基于subversion的回归测试工具;整个系统中利用subversion的对比功能实现自动分离回归测试中更改代码的功能,同时还集成了Dependency Finder和String Template两个开源工具来分别实现该工具中依赖分层算法和测试用例自动生成等主要功能;通过仿真实验发现,该工具很好地解决了回归测试中存在的分离被更改代码困难以及繁重的人工编写测试用例的问题,在一定程度上减轻了回归测试中测试人员的劳动强度,并且通过依赖分层算法的应用,提高了回归测试的效率。  相似文献   

19.
20.
为了提高软件技术有关专业项目实训的教学效果,增强学生的团队协作开发能力,使学生能更快地适应企业工作环境,在分析Subversion版本控制技术特点的基础上,阐述应用Subversion改进软件项目实训教学的具体方法。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号