<正>Dear Distinguished Delegates and Guests: The Organizing Committee warmly welcomes our distinguished delegates and Guests to attend 2012ieee3rdinternationalconference on softwareengineering and service Scien...
<正>Dear Distinguished Delegates and Guests: The Organizing Committee warmly welcomes our distinguished delegates and Guests to attend 2012 ieee 3rd international conference on software engineering and service science (icsess2012),to be held on
Aiming at solving gun management hidden trouble when privates on duty, a new tear gas grenade which launches without barrels was putting forward. MATLAB software simulation technology applied for programming and testi...
详细信息
This paper introduces the technical background about RFID and J2EE, and discusses how to build the equipment monitoring system using RFID and J2EE. This paper focuses on the hardware and software design of the RFID ta...
详细信息
This paper presents a design scheme of the new model of the impact pneumatic cylinder, and analyzes its key part such as direction-control valves, piston rod and so on. An experimental model-machine is manufactured an...
详细信息
This paper designs and develops a pipe planning CAD system based on MATLAB and UG software. The geometric information of planning space and terminals are extracted by using UG/Open GRIP. The pipe and cable path planni...
详细信息
There are many unpredictable factors in physical environment, detecting targets and wireless sensor networks. Adjusting and Optimizing is required for wireless sensor network application. A large supermarket applicati...
详细信息
This paper proposes a modeling framework on how to specify security preferences and importance of softwareservices, and compute a quantifiable value. Our approach advocates for an automatic calculation of the res...
详细信息
This paper proposes a modeling framework on how to specify security preferences and importance of softwareservices, and compute a quantifiable value. Our approach advocates for an automatic calculation of the results of compliances between user's security preferences and the provider's capabilities in terms of security properties.
We attempted to use video data to observe and analyze the current state of hospital service. The goals of our study are to obtain the critical information not written in an initial requirement documents, and to remove...
详细信息
Model is the description and specification of software functions, structure, behaviour and its environment. One of the most important things is to strive to achieve automatically built software according to domain mod...
详细信息
ISBN:
(纸本)9781479928606
Model is the description and specification of software functions, structure, behaviour and its environment. One of the most important things is to strive to achieve automatically built software according to domain model, to verify the software in developing is better than that of software requirements. This paper integrates domain-specific modeling and web service techniques with model-driven development, then proposes a unified approach, SODSMI to build the executable domain-specific model to achieve the target of model-driven development. In this paper, a case study to construct an online shopping system is introduced for demonstrating the proposed approach.
In so many worldly applications, there exists a need to perform spell checking. Spell checking of many words at once is the invention of this work. It is a requirement in activities like: book spell checking before pu...
详细信息
暂无评论