首页 | 官方网站   微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 140 毫秒
1.
For decades, technologists have been promising the intelligent house. The vision is usually portrayed as a house filled with technology which will do the dweller's bidding and take all domestic drudgery out of their lives. The truly intelligent house is still some way off, but the emergence of broadband, availability of faster, smaller and ever cheaper computing equipment and a variety of wired and wireless network technologies are enabling technologies that bring this vision closer to reality. These technology trends lead to the concept that computing and other smart devices will become pervasive, fully networked and disappear into the infrastructure of the home. People will carry out their tasks unaware of the complexity of the infrastructure that supports their activities in much the same way as people today use mains electricity.This paper introduces these concepts and discusses the technological challenges to be overcome. We present our vision of the pervasive home environment where inhabitants can focus on tasks rather than the technology: I need to create X and send it to Y rather than I need to use this computer and this application which needs access to service A and resource B. Although this sounds simple, the environment needs to understand who I is, and who or what Y is. Appropriate permissions must be in place and resources allocated, if available. The most appropriate interface for the task and user must be determined.The pervasive, intelligent home will make available new ways to access and share information. It will herald new services, such as care and support of people in the home, entertainment, educational and security services. The final part of the paper discusses the commercial opportunities and challenges which must be met, not least the need for industry to agree on open standards and interfaces.  相似文献   

2.
In this paper the connection between massM, resistance and commute time for random walks on graphs is further explored, and the relation=2M · is proved. An extension of the result is made to multigraphs, which are an extension of the graph concept where a black box is treated like an edge.  相似文献   

3.
In this paper, we investigate the effect of using two different connection rules (growth and delayed attachment) on the topological properties of simulated networks. We show that comparable values of global variables (like the slope of the power law distribution of node frequency versus node degree) do not guarantee topological similarity, which can have considerable implications for network resilience to cumulative node failure. We present evidence that the decay of the giant component under stress can be approximated using a simple logistic function, the constants of which being determined by the connection rules. The relevance of these findings to present and future telecommunications networks is discussed, especially in terms of potential improvements to robustness.  相似文献   

4.
The Supply Chain     
One of the most visible examples of ubiquitous computing poised for implementation can be found in the retail industry. Radio frequency identification (RFID) tags are being billed as the replacement for barcoding, the all-pervasive technology which has underpinned supply chains for the past 35 years. The standards allow for up to thirty trillion, trillion, trillion unique addresses, and the ultimate goal is to create an Internet of things in which everyday physical items are networked together. Concerted research effort over the past five years has developed the technology and reduced cost to a point where deployment is now possible. However, the recent heated debate centred on spy chips has highlighted the fact that one person's ubiquitous computing is another person's Big Brother state.  相似文献   

5.
It is often said that there is a fundamental difference between current-mode and voltage-mode circuits. This conjecture is discussed in technical and philosophical terms, and it is shown that there is no such performance difference to be found, and that it is not possible to make a clear divide between voltage mode and current mode.And yet performance differences appear in the literature. It is shown that they come from the different design practices of the current-mode and the voltage-mode research groups. The conclusion of this paper is that the practical knowledge of the current-mode research groups should be re-integrated into main-stream IC design, and that all propaganda of the type current-mode is better than voltage-mode should be stopped immediately.  相似文献   

6.
BT, along with virtually every other IT-dependent business worldwide, is tackling a problem which is quite unique and if not corrected could be disastrous. The problem, sometimes known as the Year 2000 bug or millennium time bomb, has been caused by the use of two digits to represent the year in the majority of our systems and applications. The problem is technically not difficult to fix but the volume of changes occurring, and the need to potentially test every system to ensure that it is year 2000 proof, presents unique and challenging difficulties for integration and testing. Why this is the case, what problems need to be addressed, and an overview of some of the proposed integration and test strategies to tackle these problems, is the subject of this paper.  相似文献   

7.
This paper analyzes the possibilities and limitations of defect detection using fault model oriented test sequences. The analysis is conducted through the example of a short defect considering the static voltage test technique. Firstly, the problem of defect excitation and effect propagation is studied. It is shown that the effect can be either a defective effect or a defect-free effect depending on the value of unpredictable parameters. The concept of Analog Detectability Interval (ADI) is used to represent the range of the unpredictable parameters creating a defective effect. It is demonstrated that the ADIs are pattern dependent. New concepts (Global ADI, Covered ADI) are then proposed to optimize the defect detection taking into account the unpredictable parameters. Finally, the ability of a fault oriented test sequence to detect defect is discussed. In particular, it is shown that the test sequence generated to target the stuck-at faults can reasonably guarantee short defect detection till a limit given by the Analog Detectability Intervals.  相似文献   

8.
Back in January 1995 Clayton Christensen and Joseph Bower wrote an article, Disruptive Technologies: catching the wave, in the Harvard Business Review, in which they argued: No matter the industry, a corporation consists of business units with finite life spans: the technological and market bases of any business will eventually disappear. Good businesses will often be adept at managing a process of incremental improvement, but this kind of incremental change, what they call sustaining technologies, is not the focus of this paper but rather disruptive technologies, which change the rules and leave established businesses with nowhere to go.  相似文献   

9.
The key to providing a meaningful management view of the performance of complex systems lies in having a co-ordinated process for data collection, analysis and presentation. TeleMarketing Services, such as the Freefone service, provide a good example. Managers of diverse, remote subsystems receive summarised performance and customer service information, mostly in the form of simple graphs, in exchange for providing reliable data. The aim is to bring together a structured view of all the components, including a red-amber-green status table, for use by senior customer-facing staff. Generally, the analyses focus on capacity, forecast and measurement, covering a flexible range of parameters. Managers then have an early view of service degradation, potential capacity exhaustion, workload imbalance and resource wastage, enabling timely remedial action, fault clearance and system enhancements.  相似文献   

10.
Network computing   总被引:1,自引:0,他引:1  
Network computing represents a new computing paradigm in which all information, data and software applications reside on a network and are accessed on demand by users. This approach to computing offers the potential for users to access everything from anywhere, removing the constraints of localised storage of information and applications, and, based on evolving standards, allowing access from a range of information appliances. This paper introduces the basic ideas behind network computing, and examines a range of forms it could take. It describes the current status of commercial network computing approaches, with particular emphasis on the use of the Java language, and examines the associated benefits and technical issues. A prototype BT system, developed using Java client software and CORBA-based middleware, is described.  相似文献   

11.
Corporations are looking to harness the flexibility and ubiquity of IP as a means of automating key business transactions and increasing efficiency. As part of this eRevolution corporate businesses are looking at migrating new applications on to their existing IP infrastructures.Computer/telephony integration and unified messaging are applications that will drive forward the integration of voice and data networks for BT's corporate customers, enabling the use of a flexible, shared IP infrastructure for voice and data.While voice over IP is widely seen as the obvious way forward there are many issues to be resolved before this can deliver the anticipated benefits. This paper provides an insight into the building blocks required to enable the development/deployment of shared infrastructure, for quality of service (QoS) capable, unified, IP network solutions. It highlights the detailed understanding and careful design approach required (particularly in the complex area of network QoS) to engineer custom voice solutions as part of a unified IP network design based on today's technology. Emerging protocols and technology, which may turn the unified network dream into reaility, are identified.  相似文献   

12.
This paper presents an overview of the methodology used to model the resource allocation decisions of a research organisation using system dynamics. The resulting model combined the concept of aging chains and co-flows of System Dynamics with conventional spreadsheet analysis, and included representations of staff development and turnover; patent development and licensing revenue; and revenue from other sources. Using the model, senior management were able to evaluate the impact over the coming years of different resource allocation strategies.  相似文献   

13.
IP-based communications technology will enable people to work in a virtual way and from anywhere in the world. This is already true for data services and applications where IP has become the universal networking technology. Although voice over IP is still a relatively new technology, it has laid the path for new and innovative voice and multimedia communications. This paper looks at new and emerging technology that will tempt business and corporate organisations to adopt IP as a single communications infrastructure for both data and real-time communications.  相似文献   

14.
Current multi-party video- and audioconferencing systems limit natural communications between participants. People communicate by speech, facial expressions and body gestures. In interactions between three or more people, these communications channels are directed towards particular participants. Spatial proximity and gaze direction are therefore important elements for effective conversational interactions, and yet are largely unsupported in existing conferencing tools. Advanced audioconferencing systems do simulate presence in a shared environment by using virtual humans to represent the people taking part in a meeting, but the keyboard and mouse are used to direct conversations to specific people or to change the visual representation to simulate emotion.This paper describes an experimental implementation of virtual conferencing, which uses machine vision to control a realistic virtual human, with the objective of making virtual meetings more like physical ones. The computer vision system provides a more natural interface to the environment, while the realistic representation of users, with appropriate facial gestures and upper body movement, gives more natural visual feedback.  相似文献   

15.
The quality and consistency of customer service offered by telecommunications providers is now a key differentiator in the residential market-place. BT has introduced the SMART customer handling system to provide competitive advantage through worldclass levels of customer service. A large-scale, three-tier client/server system, SMART exploits the existing functionality, data and security mechanisms of an established mainframe system and adds ease-of-use, reduced error rates and a focus on service and selling. The development and deployment experiences of the SMART programme provide lessons in the delivery of large-scale distributed systems in a business-critical environment. The key issues of security, performance, resilience and operability are discussed and the solutions implemented for SMART are presented.  相似文献   

16.
A modified method to construct adiabatic logic is introduced. Advantages of this circuitry over most of the previous ones is that logic behaves in a static mode. In the present research the applicability of a one-phase power clock was studied. The functionality was guaranteed by having the power source frequency much higher than the logic frequency. The new logic gates do not differ much from any standard CMOS logic gates. The only difference is the use of diodes to form logical 1 and 0 states. The static nature of the introduced logic family makes possible to apply the charge recycling technic to other more complex digital circuits and systems. In measurements 77% power saving was achieved compared to a conventional CMOS logic.  相似文献   

17.
Failure caused by poor performance renders a system just as useless as failure caused by functional errors, and can be even more expensive to correct. For many years, performance in software systems has been achieved through a fix-it-later approach, using optimisation and tuning techniques. Recent evidence shows that, with the increased use of highly complex, multi-layered, client/server, distributed architectures, these techniques cannot be relied on to deliver even the level of performance required during early operation when workloads are small, let alone over extended periods. This paper describes some of the ways in which performance can be engineered into systems — examples of how these techniques have been used in recent BT projects are included.  相似文献   

18.
A bibliography on research work related to nullors and their applications in circuit analysis, synthesis and design, covering the period 1961–2000, is given.  相似文献   

19.
BT Middleware has been in production use since 1987. Every working day a user population of 60 000 people execute 25 million transactions on systems that generate in excess of 70% of BTs revenues. BT Middleware is installed on 32 production mainframe instances.BT Middleware provides both a development and run-time environment for applications that is controlled and manageable. Application standards can be enforced providing reuse of common code as well as common look and feel user interfaces. The use of BT Middleware has allowed the rapid implementation of leading edge solutions to pressing business requirements and Middleware is evolving to allow BTs operational support systems (OSS) to participate seamlessly in complex distributed architectures.The future for BTs OSS lies in their ability to integrate with new applications developed on open systems platforms. BT Middleware has been evolving to provide the required interconnection capabilities and now supports numerous batch and on-line interfaces via strategic infrastructure products. This paper describes the major Middleware infrastructure components developed and supported by BTs London Software Engineering Centre that allow the companys huge investment in OSS to be exploited in todays environment.  相似文献   

20.
A simple T network can be used in the feedback path of a conventional voltage feedback operational amplifier (VFOA) to avoid using a large feedback resistor. However detailed analysis shows that the bandwidth of amplifier will be degraded. In this paper, a capacitive compensation method for the T network is described which yields a significant improvement in closed-loop bandwidth of the amplifier.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号