Nowadays the research on user model built in digital library for personalization service is lack of the collection of user context information. The paper analyses the Contextualized Attention Metadata(CAM), and constr...
详细信息
Aiming at the problems of incomplete description, ambiguity and inconsistency in traditional UML activity diagram of software developments, this paper proposes a formalization analysis method. It introduces to describ...
详细信息
From the perspective of systems engineering, this paper analyzes the composition, structure, functions and characteristics of the tourism system and presents that the tourism system is a complex one which consists of ...
详细信息
The GAMIT is a kind of GPS data-processing software together developed by the MIT and the SIO. In this paper, it mainly introduces the updated GAMIT's functions, installation process, and the simplified usage with...
详细信息
Web personalizing servicesystem is the result of the development of the modern network technology. It based on data mining that can support information-collecting, information-analyzing or personalizing homepage serv...
详细信息
Comparing Spencer's question and Apple's question on the service of knowledge, this article thinks that knowledge has changed from scientific knowledge to service knowledge, that is to say, knowledge becomes a...
详细信息
This paper studies the problem of scheduling preemptable queries with relative consistency constraints when the absolute consistency for real-time data objects is preserved. The single query schedule problem is studie...
详细信息
This paper constructed the model of knowledge chain (KC) and analyzed each part's function, unified the knowledge chain and the knowledge management, constructed the knowledge management frame based on KC. Through...
详细信息
This paper presents design of the Differentiated service (referred as Diffserv) in the framework of TMS in Ethernet switch of three layers. and several scheduler such as SP, WRR, WRR-SP and WRR-MBD is supported, espec...
详细信息
With the prevalent trend of computer and network in our country, the problem of security about internet information is becoming more and more outstanding. This article analyses the factors about the hidden security tr...
详细信息
暂无评论