Design of eXtensible Markup Language schema document(XSD)plays an extremely important role in software development process and needs to be quantified for ease of reusability and *** this paper,Entropy Measure of Com...
详细信息
ISBN:
(纸本)9781612848396
Design of eXtensible Markup Language schema document(XSD)plays an extremely important role in software development process and needs to be quantified for ease of reusability and *** this paper,Entropy Measure of Complexity(EMC)metric is *** EMC metric measures how element and attribute types of XSD are inheritance to one *** EMC value leads to greater design *** the other hand,greater complexity values imply that many types of elements and attributes in XSD may be reused and *** is demonstrated with examples and validated theoretically and empirically through actual test cases.
Today,the world has made a lot of progress in the field of *** make us closer and help us to understand everything even *** way we humans communicate is much realistic when compared to the way the machines communicate...
详细信息
ISBN:
(纸本)9781612848396
Today,the world has made a lot of progress in the field of *** make us closer and help us to understand everything even *** way we humans communicate is much realistic when compared to the way the machines communicate or the way the computers ***,this defines that there exists a lot of communication gap between us,computers and *** this paper aims to fill this communication gap that exists between computers,machines and the human *** this paper,I present the idea of obtaining a complete interface device which bring all those three much closer.
Making use of traditional relation database research ways, the paper puts forward new concepts, that is time filtration operator and temporal view, based on the C-TrdM (CAI-Temporal Relation Data Model), introduces ...
详细信息
ISBN:
(纸本)9781612848372
Making use of traditional relation database research ways, the paper puts forward new concepts, that is time filtration operator and temporal view, based on the C-TrdM (CAI-Temporal Relation Data Model), introduces time filtration operation among tables with a original Key-Time method, solves temporal queries more effectively, and provides illustrations.
With the heterogeneous nature of grid, the number of users and resources is large, so far some research institutions have made different grid architecture model. The main architecture has five-level sandglass architec...
详细信息
Based on the analysis of the current embedded TCP/IP protocol research, this paper analyzes, improves and cuts the traditional TCP/IP protocol stack, and proposes a TCP/IP protocol stack program based on embedded syst...
详细信息
With the rapid development of the networks, the existing congestion control mechanisms of Internet can39;t satisfy the needs of high speed and long distance networks. So many new protocols have been proposed. This p...
详细信息
ISBN:
(纸本)9781612848372
With the rapid development of the networks, the existing congestion control mechanisms of Internet can't satisfy the needs of high speed and long distance networks. So many new protocols have been proposed. This paper illustratesseveral representative highspeed TCP protocols and compares their performances with each other. Through analysis and comparison, we get some useful conclusions for the further research of TCP protocols.
At present, as the high speed development of Internet, there are more and more information, some of them are false information. Law enforcement is difficult, but the network forensics method is not only cumbersome, bu...
详细信息
ISBN:
(纸本)9781612848372
At present, as the high speed development of Internet, there are more and more information, some of them are false information. Law enforcement is difficult, but the network forensics method is not only cumbersome, but also not easily admissible in the court. This paper based on the requirement of the network electronic forensics, put forward the network electronic forensics process model based on the requirements, and a clear network electronic forensics model of the system architecture in order to describe the basic principles that the network electronic forensics process should followed.
The seeking north principle of magnetic suspension gyroscope and the noise characteristics of gyro are introduced firstly. A method of eliminating disturbances based on heuristic threshold selection is put forward. Th...
详细信息
The definitions of time scales and the time transformations are very important for Global Navigation Satellite Systems (GNSSs) research. Different GNSSs use different internal reference time systems which include GPS ...
详细信息
There have been major modifications of some of the most prevalent Windows based web browsers, with all of them primarily focusing on performance, security and user interface. But their user interfaces are not yet deli...
详细信息
暂无评论