A variety of security risks in the employment of college graduates in the process of social transformation was analyzed and summarized as followings: the security risks in the job recruitments, job security risks in i...
详细信息
Rich context available creates varied applications on mobile device and makes end-user possible to customize personalized context-aware application. Meanwhile, problems arise that how to realize the service compositio...
详细信息
With the acceptance of service-oriented architecture (SOA) in many application domains and rapidly growing number of available services, it is now a challenge to effectively compose services to meet users' needs. ...
详细信息
Based on the qualitative representation of logistics reputation grades, fuzzy mathematics methods are proposed to describe the grades and other variables according to the fuzzy characteristics of them. Moreover, some ...
详细信息
The essence of the core competence of enterprises is a dynamic knowledge system, whose forming process is a kind of process of knowledge obtaining, preservation, accumulation, spreading, sharing, application and innov...
详细信息
The basic concepts of network collaborative learning, theoretical grounds and social significance are mainly discussed in this article. With online collaborative learning practice, we summarized the advantages and dis...
详细信息
The study of personalized recommendation in E-commerce has become the hot topic in the study of E-commerce application. This thesis puts forward a method of personalized recommendation evaluation in E-commerce based o...
详细信息
This paper proposes a chaos-based true random number generator using image as nondeterministic entropy sources. Logistic map is applied to permute and diffuse the image to produce a random sequence after the image is ...
详细信息
Paging query efficiency of massive data directly relates to the execution efficiency of application system in oracle database. Presented an optimized solution for paging query in oracle 10g database, which includes ma...
详细信息
By analysis of the network attacks, three stages structure model and immunity parameters of network attacks are modeled, the evaluation tactic of immunity attacks are proposed, and the network attacks model based on i...
详细信息
暂无评论