Through research on computer online course instruction reform, based on the fact that computer network technology application is widely used and the technology is updating very fast as well as the analysis on interact...
详细信息
Visual C++ is a powerful development kit for designing Windows application program, Excel is one of the most widely used office application software, which has good mathematical analysis and computation functions. In ...
详细信息
In recent years, research efforts have been aimed at providing methodologies and techniques for secure software engineering. In this direction, UMLsec is proposed as a standard extension of UML for expressing security...
详细信息
In recent years, research efforts have been aimed at providing methodologies and techniques for secure software engineering. In this direction, UMLsec is proposed as a standard extension of UML for expressing security-relevant information. This paper scrutinizes this proposed method for security requirements specification and develops a different basic methodology that can be used for the stated purpose. The paper demonstrates that security considerations need completeness and continuity of specifications to avoid gaps or breaks in the logical sequence of events in systems. Accordingly, the paper presents a flow-based systematic diagramming scheme suitable for these features. We demonstrate the concepts with examples.
To predict the throughput of the cluster tool and simulate the system operation process, the paper develops a simulation platform, named as ClusterSim. ClusterSim provides the easy-to-use interface to accept user...
详细信息
To predict the throughput of the cluster tool and simulate the system operation process, the paper develops a simulation platform, named as ClusterSim. ClusterSim provides the easy-to-use interface to accept user's input about the cluster tool configuration. The results that ClusterSim runs include the wafer foundation period, the lot period, chamber utilization, and others. The output of ClusterSim is verified using Perkinson's model. The result indicates this platform is valid. ClusterSim provides an effective tool for users to analyze the cluster tool performance and validate feasibility of some routine recipe.
Artificial neural network is a theory and technology developing speedily in intelligence research area of computer in recent years, which is applied in modeling of computer system simulation due to no need of establis...
详细信息
There have been major modifications of some of the most prevalent Windows based web browsers, with all of them primarily focusing on performance, security and user interface. But their user interfaces are not yet deli...
详细信息
There have been major modifications of some of the most prevalent Windows based web browsers, with all of them primarily focusing on performance, security and user interface. But their user interfaces are not yet deliberate in making the web browsing experience optimal on a characteristically small touchscreen of slate PCs. This paper presents a proficient and convenient user interface design for web browsers on Windows based slate PCs, by making an effective usage of the smaller touchscreens.
On a CMP (Chip Multi-Processor) architecture, cache sharing impacts threads non-uniformly, where some threads may be slowed down significantly, while others are not. This may cause severe performance problems such as ...
详细信息
ISBN:
(纸本)9781612848396
On a CMP (Chip Multi-Processor) architecture, cache sharing impacts threads non-uniformly, where some threads may be slowed down significantly, while others are not. This may cause severe performance problems such as throughput decreasing, cache thrashing. This paper proposes an architectural support predicting method (ASPM) to predict interthread cache contention, and schedules threads based on the results of the predicting on the CMP architecture. The architectural support consists of novel tagging which is remembering each cache line's interval time of reaccessing. The ASPM is very little loss of accuracy basis at low overhead (<1%). We use this method for CMP scheduling, and find the performance is improving 9% on average.
Rough Set theory represents a promising technique to handle imperfect knowledge, which has found interesting extensions and various applications. This paper presents a note on rough set theory that will be useful for ...
详细信息
With the popularization of mobile Internet, the mobile electronic tax with 3G network, basing on the wireless communication technology, is becoming the hot spot of taxation informatization in China. This paper closely...
详细信息
The economic development model of Mountainous Valley areas was put forward by Beijing government in order to fit in with the needs of ecosystems conserve and socio-economic development in mountain areas. It had achiev...
详细信息
The economic development model of Mountainous Valley areas was put forward by Beijing government in order to fit in with the needs of ecosystems conserve and socio-economic development in mountain areas. It had achieved remarkable results in practice. The basic content and the problems faced by the model were both described in this paper. Based on theory of regional economic development, the paper proposed the development thought of "multi-point and one line" and "A line with multi-center" space layout and relative safeguard measures of valley areas. This research can provide reference for relevant departments to formulate economic development policies. (C) 2011 Published by Elsevier Ltd. Selection and/or peer-review under responsibility of conference ESIAT2011 Organization Committee.
暂无评论