首页 | 官方网站   微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   62篇
  免费   2篇
  国内免费   3篇
工业技术   67篇
  2021年   3篇
  2018年   1篇
  2016年   2篇
  2015年   2篇
  2014年   4篇
  2013年   6篇
  2012年   2篇
  2011年   4篇
  2010年   3篇
  2009年   1篇
  2008年   6篇
  2007年   1篇
  2006年   4篇
  2005年   4篇
  2004年   1篇
  2003年   5篇
  2002年   1篇
  2001年   2篇
  2000年   6篇
  1999年   6篇
  1996年   1篇
  1992年   1篇
  1987年   1篇
排序方式: 共有67条查询结果,搜索用时 15 毫秒
1.
Smartphones are being used and relied on by people more than ever before. The open connectivity brings with it great convenience and leads to a variety of risks that cannot be overlooked. Smartphone vendors, security policy designers, and security application providers have put a variety of practical efforts to secure smartphones, and researchers have conducted extensive research on threat sources, security techniques, and user security behaviors. Regrettably, smartphone users do not pay enough attention to mobile security, making many efforts futile. This study identifies this gap between technology affordance and user requirements, and attempts to investigate the asymmetric perceptions toward security features between developers and users, between users and users, as well as between different security features. These asymmetric perceptions include perceptions of quality, perceptions of importance, and perceptions of satisfaction. After scoping the range of smartphone security features, this study conducts an improved Kano-based method and exhaustively analyzes the 245 collected samples using correspondence analysis and importance satisfaction analysis. The 14 security features of the smartphone are divided into four Kano quality types and the perceived quality differences between developers and users are compared. Correspondence analysis is utilized to capture the relationship between the perceived importance of security features across different groups of respondents, and results of importance-satisfaction analysis provide the basis for the developmental path and resource reallocation strategy of security features. This article offers new insights for researchers as well as practitioners of smartphone security.  相似文献   
2.
The use of a surface developer, pyrocatechol, to process transmission electron microscope negatives has been shown to have significant advantages over the conventional D-19 process. The process described here is tolerant of a large margin of error in the electron exposure and produces a negative that not only retains details both in the highlight as well as the faint regions, but also preserves local contrast. These characteristics are particularly useful in convergent beam electron diffraction applications where one encounters a wide contrast range. Improved acuteness and an enhanced signal to noise ratio due to the prolonged exposures associated with this process have also been observed.  相似文献   
3.
Development of software intensive systems (systems) in practice involves a series of self-contained phases for the lifecycle of a system. Semantic and temporal gaps, which occur among phases and among developer disciplines within and across phases, hinder the ongoing development of a system because of the interdependencies among phases and among disciplines. Such gaps are magnified among systems that are developed at different times by different development teams, which may limit reuse of artifacts of systems development and interoperability among the systems. This article discusses such gaps and a systems development process for avoiding them.  相似文献   
4.
随着Oracle数据库应用的快速发展,越来越多的企业和机构选择OracleDeveloper作为集成式工具集进行大规模开发活动。在开发过程中根据客户的需要将OracleDeveloper表单中的数据导出到Excel等类型文档是开发人员经常遇到的问题之一。本文基于OracleDeveloper2000,分析比较了将表单中的数据导出到Excel文档中的两种方法,并对导出过程中的常见问题进行了深入探讨。  相似文献   
5.
王晓箴  于磊  刘宝旭 《计算机工程》2011,37(15):262-264
针对文件分配表文件系统数据的安全保障需求,基于符合统一可扩展固件接口(UEFI)规范的EFI开发套件2(EDK2)开源环境,提出一种固件层数据备份与恢复技术。利用EDK2提供协议接口读取硬盘分区数据,将获取的文件及目录信息备份为EFI镜像文件格式,数据恢复时反向写入目标分区。实验结果表明,该技术可解决传统数据备份对操作系统的过度依赖问题,其在固件层实现数据备份,实用性更强。  相似文献   
6.
陈丹  王星  何鹏  曾诚 《计算机科学》2016,43(Z6):476-479, 501
理解开发者的合作行为是促进开源社区协作开发的关键一步。已有文献主要对社区成员的加入与迁移展开研究,而对社区中已有开发者之间的实际合作行为关注甚少。主要从开发者的交互关系与个人技能两个角度出发,探析社区已有开发者如何建立新合作以及哪些因素影响他们的合作。应用Sourceforge.net平台公开的数据进行实验,结果表明不同的开发者的偏好合作模式不同,拓扑距离上的优势(“朋友的朋友”关系)对开发者间首次合作的影响不大,开发者之前的合作次数越多越有利于他们 再次建立合作,而开发环境(操作系统)与开发者(管理)经验对合作也有明显的影响。所得结论有助于提高开源社区已有开发者的合作意识,促进社区的稳定与可持续性。  相似文献   
7.
为了更好地应用WebMethods,该文提供了一个基于B2B项目的环境,用于对WebMethods的设计,实现,从而大大提高WebMethods的管理和操作以及易用性和可维护性。  相似文献   
8.
A pronounced degree of vertical imbalance in Australian fiscal federalism has placed increasing financial pressures on lower levels of government, including local government. This has led local government to seek additional ways of financing infrastructure development through developer charges. Due to the lower priority the Australian Bureau of Statistics has accorded local government statistics in recent years, it has been difficult to gauge the extent of use of developer charges as a revenue source. This paper attempts to review the evolution of developer contributions policy and describe the increasing importance of these charges in Australian local government, with special emphasis on New South Wales.  相似文献   
9.
The properties of three multilayer systems which are of potential importance in scientific photography are examined. Antireflecting systems of one and two layers are considered and the conditions under which single layer blooming is likely to be inadequate are mentioned. The use of multilayer stacks of quarter-wave layers as an alternative to the semi-transparent metal filmis discussed. Finally the properties of interference filters are compared with those of dye filters. Both silver + dielectric and all-dielectric interference filters are considered.  相似文献   
10.
驱动开发程序包(DDK)是TI公司提供的一套标准的DSP/BIOS驱动开发模型,基于此模型做视频驱动开发可简化驱动开发过程,增加代码的可移植性和兼容性。以TMS320DM642视频专用板为例,详述了视频驱动开发方法和开发过程,并以实例给出了调试结果。实践证明,基于TMS320DM642的DDK的视频驱动开发能为视频应用提供稳定的底层支持。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号