首页 | 官方网站   微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   12篇
  免费   0篇
工业技术   12篇
  2013年   1篇
  1996年   1篇
  1981年   2篇
  1979年   1篇
  1978年   1篇
  1977年   3篇
  1976年   3篇
排序方式: 共有12条查询结果,搜索用时 15 毫秒
1.
Pooch  U.W. 《Computer》1976,9(8):13-13
During the past 10 years, there has been a considerable growth of interest in the problems of applying computer graphics techniques to practical use. This interest has created an increasing need for the applications of theoretical computer graphics methods to software and hardware systems that are cost-effective as well as user-oriented. A number of books have been published on the subject of computer graphics, and some rather cost-effective graphics devices have been designed and built for practical use. The latter has mainly been the result of microminiaturization technology of the last five years. Microprocessors, microcomputers, and microprogrammability have helped considerably in making cost-effective display devices a reality, the intelligence of such devices being limited only by the capability of the microprocessors. Applications of computer graphics have steadily increased in such areas as engineering, design, education, medicine/biomedicine, chemistry, business, analysis, computer-aided design, management, structural design, simulation, and communication.  相似文献   
2.
The computer's pervaiveness in the 1980's will demand even more professional talent, broader computer education, and perhaps even licensing of the computer professional. Industry, education, and professional groups must cooperate to meet these challenges.  相似文献   
3.
4.
Chattergy  R. Pooch  U.W. 《Computer》1977,10(4):40-45
One of the more critical problems in computing science today is the rapidly increasing cost of developing and maintaining software for new automated data systems. New software development is generally a standardized process whereby software evolves from an idea to a useful system operating on a computer. The traditional model for a software development project includes feasibility study, requirements analysis, system design, program design, coding, testing, documentation, and implementation. Program design, coding, and testing are relatively well defined activities, but they are rarely straightforward. Involving many iterations among the phases and the activities within the phases, these iterations are a result of the knowledge gained as the system is being generated. We will describe here a different approach to the software development process. This approach, called "top-down modular design," attempts to minimize the numerous iterations of the development cycle. The basic philosophy, similar to that of structured programming, has already been applied to a variety of applications but has not yet been utilized in the general process of constructing simulation programs.  相似文献   
5.
Pooch  U.W. 《Computer》1977,10(11):10-11
Networks of computers are making it possible to achieve computer-to-computer and terminal-to-computer communications that only a few years ago would have been impossible. Many of these networks are operational already, with more powerful ones seemingly in store for the future. This remarkable growth has opened new opportunities for designers, users, and managers–but it has posed some difficult problems for them as well. Knowledge of such network issues as topological design alternatives, common carrier communications services, value-added networks, hardware and software networking technology, cost factors, regulatory issues, measurement techniques, and network administration are of paramount importance. Hence this special issue.  相似文献   
6.
7.
8.
The need for increased security measures in computer systems and networks is apparent through the frequent media accounts of computer system and network intrusions. One attempt at increasing security measures is in the area of intrusion detection packages. These packages use a variety of means to detect intrusive activities and have been applied to both individual computer systems and networks. Cooperating security managers (CSM) is one such package. Applied to a network, CSM is designed to perform intrusion detection and reporting functions in a distributed environment without requiring a designated central site or server to perform the analysis of network audit data. In addition, it is designed to handle intrusions as opposed to simply detecting and reporting on them, resulting in a comprehensive approach to individual system and network intrusions. Tests of the initial prototype have shown the cooperative methodology to perform favourably  相似文献   
9.
10.
Abstract

Dot.com companies began to collapse early in 2000. Before the crash, investors would purchase stock in new technical companies without even looking at a business plan. Companies established in a programmer's family room were offering stock within months and investors were buying, creating thousands of “paper millionaires.” Financiers never bothered to investigate, for example, how long the company would have to remain in business before they could expect to make a profit. When the bubble burst, investors lost huge amounts of money. Between March 2000 and October 2002, the NASDAQ Composite lost 78 percent of its value as it fell from 5046.86 to 1114.11. Law firms specializing in bankruptcy were busier than ever before.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号