Test design is the key of software testing. In order to improve utilization of test suite effectively, a reasonable and flexible architecture should be introduced to collaborate, manage and utilize the abundant test s...
详细信息
Honeypot is a type of information system, purposely built to attract and deceive computer intruders and malicious programs. For making it easier to deploy and more difficult to discern a cooperative deploy honeynet(CD...
详细信息
In relation to the lack of design and innovative approach in conceptual design for the current prototype system, a parallel evolutionary strategy based on self-adaptive learning mechanism is developed to realize gener...
详细信息
A new 3D platform is build in the self developed WebCAD system, used for multiple user collaborative design. As an extension of the WebCAD system, the collaborative 3D CAD system proposes a collaborative Boolean opera...
详细信息
Workforce management is an important issue for human involved collaboration. When multiple urgent events simultaneously happen at different places with unexpected requirements, administrators should schedule workforce...
详细信息
For most of its existence, the field of computer science has been lucky enough to avoid ethical dilemmas by virtue of its relatively benign nature. the subdisciplines of programming methodology research, microprocesso...
详细信息
ISBN:
(纸本)9783642149917
For most of its existence, the field of computer science has been lucky enough to avoid ethical dilemmas by virtue of its relatively benign nature. the subdisciplines of programming methodology research, microprocessor design, and so forth have little room for the greater questions of human harm. Other, more recently developed sub-disciplines, such as data mining, social network analysis, behavioral profiling, and general computer security, however, open the door to abuse of users by practitioners and researchers. It is therefore the duty of the men and women who chart the course of these fields to set rules for themselves regarding what sorts of actions on their part are to be considered acceptable and what should be avoided or handled with caution out of ethical concerns. this paper deals solely withthe issues faced by computer security researchers, be they vulnerability analysts, privacy system designers, malware experts, or reverse engineers.
Heterogeneous CAD data exchange is very important in collaborative product development and also extremely difficult. Feature-based data exchange has many advantages than traditional geometry-based data exchange. Accor...
详细信息
Nowadays, all of library management systems for CDs attached to books are running independently: independent devices, independent systems, and making CD images independently. that brings huge waste of investment and l...
详细信息
the software industry has recognized the importance of teamwork as a driver for good projects results. However teamwork is not an easy goal to reach, because there is a large list of variables affecting the process. E...
详细信息
By using the distributed thought developed a hierarchical framework for the operational command and control system, the framework implements the top-level structure, the network architecture and the distributed transa...
详细信息
暂无评论