首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 609 毫秒
1.
MPLS技术是一项具有多协议支持的技术,它综合利用了网络核心的交换技术和网络边缘的IP路由技术各自的优点,它将标记分配给多协议的数据桢以便在基于我展品信元的网络中传输。它能够提供现有传统IP路由技术所不能支持的要求保障QoS的业务,通过MPLS技术,我们可以提供各种新兴的增值业务,有效的实施流量工程和计费管理措施,扩展和完善更高等级的基础服务。  相似文献   

2.
Ubiquitous computing applications or widespread robots interactions execute in unforeseen environments and need to adapt to changeful available services, user needs, and variations of the environment. Context-awareness ability addresses such a need, enabling, through adaptation rules, applications to react to the perceived dynamic variations. Responses to adaptation have to be quick enough to maximize the time during which the application is coherent with its environment. Adaptation rules, associating variations of the environment to application reactions, are usually established at design time. However, in unforeseen and partially anticipated environments, we claim that adaptation rules have to be dynamically extensible to match previously unexpected variations. Our approach enables rule composition and ensures a deterministic result. We propose to use parameter adaptation to quickly respond to environmental variations and dynamic compositional adaptation to provide extensibility to the parameter adaptation. To foster even lower response times, we internalize context-awareness processing and decision into the application.  相似文献   

3.
Two experiments examined the extent to which U.S. viewers' perceptions that Blacks face structural limitations to success, support for the death penalty, and culpability judgments could be influenced by exposure to racialized crime news. Participants were exposed to a majority of Black suspects, a majority of White suspects, unidentified suspects, and noncrime news stories. In addition, participants' prior news viewing was assessed. In Study 1, heavy news viewers exposed to unidentified perpetrators were less likely than heavy news viewers exposed to noncrime stories to perceive that Blacks face structural limitations to success. In addition, heavy news viewers exposed to unidentified perpetrators were more likely than heavy news viewers exposed to noncrime stories to support the death penalty. In Study 2, participants exposed to a majority of Black suspects were more likely than participants exposed to noncrime stories to find a subsequent race-unidentified criminal culpable for his offense. In addition, heavy news viewers were more likely to exhibit the above effect than light news viewers. The methodological and theoretical implications of these findings are discussed in light of chronic activation and the priming paradigm.  相似文献   

4.
Technical communicators need to be prepared for the challenges of international communication. This tutorial focuses on the need for technical communication faculty to prepare students to be skilled intercultural communicators and to play a role on the translation team. The tutorial begins with a discussion of the importance of writing for translation in the international workplace and then presents specific assignments designed to instruct students in intercultural communication and give them experience writing for translation. In addition to introducing students to the cultural issues that impact the creation of documentation for international audiences, these assignments also serve to reinforce core skills recognized as vital to professional success in the field of technical communication. Taken together, these assignments can be used as the basis for a course in international technical communication. An appendix to the tutorial includes numerous resources available to faculty who want either to develop a course in international technical communication or to include some of the assignments in existing technical communication courses.  相似文献   

5.
The reluctance of people to report bad news can be a major contributor to the phenomenon of runaway software projects. If senior managers receive bad news sooner, they may be able to prevent runaway software projects through corrective action. Two factors that are known to impact predisposition to report bad news are organizational climate (whether reporting bad news is likely to result in reward or punishment) and information asymmetry (whether hiding bad news is likely to be possible over time). Using matching experiments in an individualistic (United States) and a collectivistic culture (Singapore), this study investigates how the individualism-collectivism dimension of national culture may moderate the impact of organizational climate and information asymmetry on human predisposition to report bad news. The results revealed that individualism appeared to amplify the impact of organizational climate on predisposition to report bad news (compared to collectivism) whereas collectivism appeared to amplify the impact of information asymmetry on predisposition to report bad news (compared to individualism). When deciding on whether to report bad news about software projects, people from an individualistic culture seemed to be more sensitive to organizational climate whereas people from a collectivistic culture seemed to pay greater attention to information asymmetry. These results have useful implications for practice and research involving cross-cultural software project teams. Beyond these implications, these results add a cultural dimension to our existing knowledge on software project management.  相似文献   

6.
The provision of efficient public safety services continues to be one of the high priority efforts to improve the quality of life in our nation. These efforts are too often equipment oriented without realizing the system input of providing better services in terms of benefit to the public as opposed to providers of the services. These services are multielement containing many items which can be quantified and qualitative aspects which are difficult to assess. The methodology presented herein is designed to specifically evaluate such multi-element systems in a logical manner. Its use expanded to other than emergency medical service systems will permit weak areas to be identified, develop comparisions and rank system elements as to their individual contributions to "bottom line" results, and to help establish priorities for allocation of funding resources.  相似文献   

7.
In the Paper, we proposed a threshold mult- proxy multi-signature with share verification.In the scheme,a subset of original signers allows a designated group to proxy signers to sign on behalf of the original group, A message m has to be signed of proxy signers who can represent the proxy group. Then, the proxy signature is sent to the verifier group.A subset of verifiers in the verifier group can also represent the group to authenticate the proxy signature.In othe words,some threshold values will be given to indicate the number of persons to represent a group to authorize the signing capability or to sign a messagye or to verify the proxy signature.  相似文献   

8.
坚持中国特色社会主义文化自信, 就是坚持对中国特色社会主义文化的认可、尊重、敬仰与传承、发扬、创新。坚持中国特色社会主义文化自信, 必须坚持习近平新时代中国特色社会主义思想在意识形态领域的指导地位, 全面把握和深刻理解中国特色社会主义文化的构成及其组成部分之间的内在逻辑关系, 坚持把中华优秀传统文化、革命文化和社会主义先进文化有机结合起来, 因应中国特色社会主义建设实践而不断进行创新, 增进文化认同。  相似文献   

9.
The reduction of chemical usage in semiconductor manufacturing has been a topic of wide discussion over the past several years. The aim of this study is to optimize plasma efficiency as chemical reactions by using the Taguchi method. In short, the function of plasma is to serve as an etchant that reacts with films. The results of the reaction are discharged. The main point of optimization was to use a main etchant to increase the amount of desirable main reaction and to decrease the amount of unreacted gas in order to keep the undesirable side reaction to a minimum. We found chemical vapor deposition cleaning conditions that improve plasma efficiency up to 200%, perfluorocompounds (PFC) gas usage to one-third, and PFC gas emission to 25%. We also found nitride etching conditions that improve plasma efficiency up to 350%, SF/sub 6/ usage to 25%, SF/sub 6/ emission to 22%, and selectivity to oxide up to 145% over the previous conditions.  相似文献   

10.
颜正恕 《信息技术》2007,31(3):110-114
介绍一种多可重复使用的智能机票的设计方案,利用目前成熟的RFID技术并结合GPS技术,为乘客提供一种在任何国家的机场,在语言不通的情况下,也能通过具有AGPS功能的手持设备读取存储在机票中的RFID芯片的内容,并将内容以二维电子地图的方式显示在设备上,并且利用机场GPS导航服务引导顾客到达他们想去的地方,这样不但可以使航空公司节省成本、提供高质量的机场服务而且可以解决机场分流问题,减少误机事件,提高经济效益。  相似文献   

11.
以PMBOK项目管理思想为基础,结合集成类IT项目的具体实践,经过多个项目摸索,寻找CMMI模型与集成类IT项目管理过程之间的映射关系.在此基础上进行归纳、总结、提炼,提出了一个初步的、基于CMMI模型的集成类IT项目管理体系架构.  相似文献   

12.
我心目中的下一代互联网   总被引:4,自引:0,他引:4  
雷震洲 《世界电信》2002,15(10):29-33
目前互联网面临着5大挑战:提供更强的通信能力,提供具有QoS保证的强势服务、实现互联网普遍服务,保证IPv4向IPv6的平滑过渡以及形成可盈利的商业模式。为了迎接上述挑战,下一代互联网至少要满足以下基本要求:具有巨大容量,具有海量地址空间,可承载多业务,提供开放式接口,服务功能与传送功能分开,允许平滑演进以及支持普遍的移动性。支撑下一代互联网的主要技术涉及:IPv6、光纤高速传输技术、光交换与智能光网、宽带接入、城域网技术、软交换技术、3G和后3G移动通信系统以及IP终端。  相似文献   

13.
《Microelectronic Engineering》1999,45(2-3):183-190
For the transition from 200- to 300-mm wafers, in addition to the technological challenges, there is the equivalent cost challenge to be met. The ultimate target is cost parity per unit area of silicon between 200 and 300 mm. The major blocking point to be cleared appears to be crystal pulling. The question of cost of crystal pulling is mainly related to the large crystal weights (>300 kg) and to the issue of crystal defects (crystal originated pits (COPs); voids in the Si crystal) generated by crystal pulling. An alternative route to address the defect problem is to use epitaxy to create a defect-free layer of Si for the active device regions. Close co-operation between wafer manufacturers and users is absolutely necessary to address these key issues. Furthermore, to contain cost, wafer makers and device manufacturers have to work together intensively to implement standardisation wherever possible and to avoid cost driving overspecifications (e.g. for front and backside particles or flatness).  相似文献   

14.
Distributed code assignments for CDMA packet radio networks   总被引:2,自引:0,他引:2  
Code-division multi-access (CDMA) techniques allow many users to transmit simultaneously in the same band without substantial interference by using approximately orthogonal (low cross-correlation) spread-spectrum waveforms. Two-phase algorithms have been devised to assign and reassign spread-spectrum codes to transmitters, to receivers and to pairs of stations in a large dynamic packet radio network in polynomial times. The purpose of the code assignments is to spatially reuse spreading codes to reduce the possibility of packet collisions and to react dynamically to topological changes. These two-phase algorithms minimize the time complexity in the first phase and minimize the number of control packets needed to be exchanged in the second phase. Therefore, they can start the network operation in a short time, then switch to the second phase with the goal of adapting to topological changes. A pairwise code-assignment scheme is proposed to assign codes to edges. Simulations based on well-controlled topologies (sparse topologies) show that the scheme requires much fewer codes than transmitter-based code assignment, while maintaining similar throughput performance  相似文献   

15.
Protecting poorly chosen secrets from guessing attacks   总被引:17,自引:0,他引:17  
In a security system that allows people to choose their own passwords, people tend to choose passwords that can be easily guessed. This weakness exists in practically all widely used systems. Instead of forcing users to choose secrets that are likely to be difficult for them to remember, solutions that maintain user convenience and a high level of security at the same time are proposed. The basic idea is to ensure that data available to the attacker is sufficiently unpredictable to prevent an offline verification of whether a guess is successful or not. Common forms of guessing attacks are examined, examples of cryptographic protocols that are immune to such attacks are developed, and a systematic way to examine protocols to detect vulnerabilities to such attacks is suggested  相似文献   

16.
PCS licensees have the flexibility to provide services that are most valuable to consumers in the same way that companies throughout our economy provide services that consumers demand. This is a sea change in FCC policy and it should be continued. Spectrum flexibility contains two primary components, service flexibility and technical flexibility. With service flexibility, a provider would be allowed to use spectrum to provide any service subject to the technical limitations of the frequency. With technical flexibility, a licensee would be allowed to use any technology to provide its service subject to limitations on interference to other users and regulations to prevent health effects. Both dimensions are important to achieve a competitive telecommunications world  相似文献   

17.
Mobile ad-hoc networks require nodes to cooperate in the relaying of data from source to destination. However, due to their limited resources, selfish nodes may be unwilling to forward packets, which can deteriorate the multi-hop connectivity. Different reputation-based protocols have been proposed to cope with selfishness in mobile ad-hoc networks. These protocols utilize the watchdog detection mechanism to observe the correct relaying of packets, and to compile information about potential selfish nodes. This information is used to prevent the participation of selfish nodes in the establishment of multi-hop routes. Despite its wide use, watchdog tends to overestimate the selfish behavior of nodes due to the effects of radio transmission errors or packet collisions that can be mistaken for intentional packet drops. As a result, the availability of valid multi-hop routes is reduced, and the overall performance deteriorates. This paper proposes and evaluates three detection techniques that improve the ability of selfishness prevention protocols to detect selfish nodes and to increase the number of valid routes.  相似文献   

18.
《Spectrum, IEEE》2003,40(1):47-50
Now the push is on to move beyond simply exchanging data and to allow software applications to employ other applications in the same way that a person might use multiple programs to achieve a task. For example, a person has no problem using a Web browser to download an image, another program to sharpen the image, and finally an e-mail program to send the image to someone else. This effort to expose functionality has ultimately resulted in plans to create so-called Web services These plans originated as companies tried to figure out distributed computing, which spreads heavy computational tasks over multiple computers in a network and yet makes the results appear to the end user as if they were the product of running an application on a single, superpowerful machine.  相似文献   

19.
文中分析了静电产生的原因、电路静电损伤机理及失效机制。制定了集成电路封装线系统性静电防护措施。其涉及到封装厂房环境静电防护、封装生产设备静电防护、工艺操作静电防护、电路包装和运输过程中的静电防护以及静电防护检测等多个环节。对这些环节的全面控制有利于消除静电对集成电路的损伤。  相似文献   

20.
The fabrication and performance of an InGaN light-emitting diode (LED) array based on a microring device geometry is reported. This design has been adopted in order to increase the surface area for light extraction and to minimize losses due to internal reflections and reabsorption. Electrical characteristics of these devices are similar to those of a conventional large-area LED, while the directed light extraction proves to be superior. In fact, these devices are found to be more efficient when operated at higher currents. This may be attributed to improved heat sinking due to the large surface area to volume ratio. The potential applications of these devices are also discussed.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号