首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 0 毫秒
1.
2.
Software maintenance engineers devote a significant amount of work to repairing user-identified errors. But user, maintainer, and manager perceptions of an error's importance can vary, and bug-repair assignment policies can adversely affect those perceptions.  相似文献   

3.
针对目前大型分布式服务中出现的一系列负载问题,提出了一套基于分布式锁、海量数据服务和一致性哈希算法,来实现分布式软负载均衡的重试框架。该框架提供了分布式海量重试任务服务,并支持水平自由扩展,具有自管理和高并发的特征,能有效地保证服务执行的正确性和高效性。  相似文献   

4.
This article first identifies and exactly defines “cookies” and “Web bugs.” the contents (code) of cookies and Web bugs are next examined through several examples. the useful business value of cookies and Web bugs is examined, followed by a discussion of the threats, invasion of privacy, and other issues. Finally, the powerful possibilities through the synchronization of Web bugs and cookies working together (even in Word documents) are examined.  相似文献   

5.
6.
基于网格服务的带分支的实时监控复制技术及实现   总被引:4,自引:0,他引:4  
数据复制在网格应用中具有非常重要的作用。OGSA-RTMR是在OGSA-DAI的基础上,集成分布式数据查询工具OGSA-DQP开发的带分支的实时监控复制系统。它不仅可以动态地生成复制方案、启动、终止复制任务,而且可以实时监控复制任务的执行状态。文章就其体系结构及工作原理进行了阐述。  相似文献   

7.
Chua  C.E.H. Wareham  J. 《Computer》2004,37(10):31-37
Online auctions constitute one of the most successful Internet business models. However, auction fraud has become far and away the largest component of all Internet fraud, posing a threat to the model's future. Traditional government organizations such as the Federal Trade Commission and the Secret Service in the US, as well as new agencies such as Internet Fraud Watch and the Internet Fraud Complaint Center, have joined auction businesses in trying to develop new mechanisms to fight this problem. We propose empowering auction communities to integrate their work with that of governments and auction institutions. Our methodology leverages news reports and auction transactions.  相似文献   

8.
The proliferation of the online business transaction has led to a large number of incidents of identity theft, which have incurred expensive costs to consumers and e-commerce industries. Fighting identity theft is important for both online business and consumers. Although the practical significance of fighting identity theft has been of great interest, empirical studies on identity theft are very limited. Drawing upon coping behavior theories, this study examines two types of coping behaviors to fight identity theft (i.e., conventional coping and technological coping). Following structural equation modeling approach, we test the model using data collected from 117 subjects through a survey. The results reveal that both conventional coping and technological coping are effective to defend against identity theft. Technological coping is determined by an individual's conventional coping, self-efficacy, perceived effectiveness of coping, and social influence. This study presents a timely empirical study on identity theft, and provides valuable insights for consumers, government agencies, and e-commerce industries.  相似文献   

9.
王彤  王良 《现代计算机》2007,(12):33-36
在大型软件测试中,发现的Bug数是一个随机时间序列,没有固定的数量规律,但可以借助数学模型研究Bug的数量关系.通过对实际的大型软件开发项目中的Bug数的整理和分析,建立了ARMA(p,q)模型,使用该模型可以预测Bug数,并从中发现软件开发过程中存在的质量控制问题.  相似文献   

10.
李条 《工业控制计算机》2006,19(2):62-62,64
简要介绍数码监控设备工作原理,及常出现的故障,分析原因,探讨解决问题的方法.  相似文献   

11.
本文讨论了GM于2006年9月推出的新一代Corsa的推广设计策略。2006年,在面临品牌识别困难和财政问题的双重危机下,GM通过重塑Corsa小车,成功的夺回了超级迷你车型市场第一的位置。  相似文献   

12.
随着USB设备的普及应用,U盘病毒的威胁必将长期存在。为了有效防范和清除U盘病毒,需要分层次使用不同的方法,包括关闭系统自动播放功能、手动创建autorun.inf文件、设置U盘为不可写状态、综合运用通用型杀毒软件与专用型杀毒软件等,本文对这些技巧进行了简要介绍。  相似文献   

13.
John Gantz and Jack M. Rochester. Pirates of the Digital Millennium: How the Intellectual Property Wars Damage

Our Personal Freedoms, Our Jobs, and the World Economy, Upper Saddle River, NJ: Prentice Hall Financial Times (2005), 294 pp.

Thomas R. Peltier, Justin Peltier, and John Blackley. Information Security Fundamentals, Boca Raton, FL: Auerbach Publications (2005), 262 pp.

Paul Reid. Biometrics for Network Security, Upper Saddle River, NJ: Prentice Hall PTR (2004), 252 pp.

Robert M. Slade. Software Forensics, New York: McGraw-Hill (2004), 215 pp.  相似文献   

14.
By responding to automated hacker attacks with automated vulnerability assessment, IT groups level the battlefield. In so doing, they take proactive steps to protect their networks, customers, data assets, and business continuity.  相似文献   

15.
A Variational Approach to Remove Outliers and Impulse Noise   总被引:2,自引:0,他引:2  
We consider signal and image restoration using convex cost-functions composed of a non-smooth data-fidelity term and a smooth regularization term. We provide a convergent method to minimize such cost-functions. In order to restore data corrupted with outliers and impulsive noise, we focus on cost-functions composed of an ?1 data-fidelity term and an edge-preserving regularization term. The analysis of the minimizers of these cost-functions provides a natural justification of the method. It is shown that, because of the ?1 data-fidelity, these minimizers involve an implicit detection of outliers. Uncorrupted (regular) data entries are fitted exactly while outliers are replaced by estimates determined by the regularization term, independently of the exact value of the outliers. The resultant method is accurate and stable, as demonstrated by the experiments. A crucial advantage over alternative filtering methods is the possibility to convey adequate priors about the restored signals and images, such as the presence of edges. Our variational method furnishes a new framework for the processing of data corrupted with outliers and different kinds of impulse noise.  相似文献   

16.
Abstract

While obvious security threats like fast-spreading worms have a tendency to garner news headlines, other stealthy security risks threaten businesses every day. Increasing amounts of spyware and adware programs have the ability to facilitate the disclosure of business information and risk privacy, confidentiality, integrity, and system availability. Corporations usually accumulate a vault of information that could cause serious problems if it were shared with the wrong contacts or, even worse, taken. Spyware's evolution from simple cookies to a range of sophisticated user-tracking systems has left many businesses without the control over their proprietary data and operations.  相似文献   

17.
This study examined firefighters’ sleep quantity and quality throughout multi-day wildfire suppression, and assessed the impact of sleep location, shift length, shift start time and incident severity on these variables. For 4 weeks, 40 volunteer firefighters’ sleep was assessed using wrist actigraphy. Analyses revealed that the quantity of sleep obtained on fire days was restricted, and pre- and post-sleep fatigue ratings were higher, compared to non-fire days. On fire days, total sleep time was less when: (i) sleep location was in a tent or vehicle, (ii) shifts were greater than 14 h and (iii) shifts started between 05:00 and 06:00 h. This is the first empirical investigation providing objective evidence that firefighters’ sleep is restricted during wildfire suppression. Furthermore, sleep location, shift length and shift start time should be targeted when designing appropriate controls to manage fatigue-related risk and preserve firefighters’ health and safety during wildfire events.

Practitioner Summary: During multi-day wildfire suppression, firefighters’ sleep quantity was restricted, and pre- and post-sleep fatigue ratings were higher, compared to non-fire days. Furthermore, total sleep time was less when: (i) sleep occurred in a tent/vehicle, (ii) shifts were >14 h and (iii) shifts started between 05:00 and 06:00 h.  相似文献   


18.
Since its initial outbreak, scientists have sought to control the severe acute respiratory syndrome epidemic (SARS). So far, though, these SARS researchers have paid too little attention to the complex relationships between the epidemic, the environment, and our Information and Knowledge Age society. Fortunately, information technology can help scientists investigate the epidemic's cause and unveil its relevant principles and rules. The ideal Internet-based eco-environment management system would integrate ecological environment evaluation, data collection and publication, simulation, forecasting, and situation monitoring. It could help governments make decisions based on the current ecological and epidemiological situation, forecast developments, and evaluate the eco-environment. Professional workers in various regions could store and publish information in the system and thus make that data immediately available to people in other regions.  相似文献   

19.
针对水库溢洪道除险加固设计展开了探讨,结合具体的工程实例,详细阐述和分析了溢洪道的除险加固设计,以期能为相关方面的需要提供有益的参考和借鉴。  相似文献   

20.
This paper describes the use of a parametric system for generating garden plans that replicate selected socio-spatial characteristics and aesthetic properties of traditional Chinese private gardens (TCPGs). To achieve this, the spatial characteristics of three historic TCPGs are first mathematically derived using connectivity analysis, a variation of a space syntax technique. The data developed through this process is then used to shape the rules of a parametric system to generate new garden plans with similar spatial connectivity values and structures. While these new plans capture some of the socio-spatial features of the TCPG, the other important characteristic of these gardens is a particular level of visual complexity. Using fractal analysis, the characteristic visual complexity of the newly generated garden plans is then compared with the historic cases, to assess the success of the system in aesthetic terms. Through this three-stage process (syntactical derivation, parametric generation and fractal analysis) the paper demonstrates a method for capturing selected spatial and aesthetic properties in a parametric system and also provides new tools for landscape design in the context of specific historical sites and approaches.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号