InternetWWW at work a confirmatory study.docx

上传人:b****5 文档编号:26398192 上传时间:2023-06-19 格式:DOCX 页数:12 大小:24.64KB
下载 相关 举报
InternetWWW at work a confirmatory study.docx_第1页
第1页 / 共12页
InternetWWW at work a confirmatory study.docx_第2页
第2页 / 共12页
InternetWWW at work a confirmatory study.docx_第3页
第3页 / 共12页
InternetWWW at work a confirmatory study.docx_第4页
第4页 / 共12页
InternetWWW at work a confirmatory study.docx_第5页
第5页 / 共12页
点击查看更多>>
下载资源
资源描述

InternetWWW at work a confirmatory study.docx

《InternetWWW at work a confirmatory study.docx》由会员分享,可在线阅读,更多相关《InternetWWW at work a confirmatory study.docx(12页珍藏版)》请在冰豆网上搜索。

InternetWWW at work a confirmatory study.docx

InternetWWWatworkaconfirmatorystudy

 

Influenceofthemodeofgraphicalrepresentationontheperceptionofproductaestheticandemotionalfeatures:

Anexploratorystudy  OriginalResearchArticle

InternationalJournalofIndustrialErgonomics

 

AbstractsofRecentArticlesandLiterature  

Computers&Security

 

IntegrationofMicrosoftWindowsapplicationswithMDSplusdataacquisitionontheNationalSphericalTorusExperimentatthePrincetonPlasmaPhysicsLaboratory  OriginalResearchArticle

FusionEngineeringandDesign

 

Web2.0andfolksonomiesinalibrarycontext  OriginalResearchArticle

InternationalJournalofInformationManagement

Librarieshaveasocietalpurposeandthisrolehasbecomeincreasinglyimportantasnewtechnologiesenableorganizationstosupport,enableandenhancetheparticipationofusersinassuminganactiveroleinthecreationandcommunicationofinformation.Folksonomies,aWeb2.0technology,representsuchanexample.Folksonomiesresultfromindividualsfreelytaggingresourcesavailabletothemonacomputernetwork.InalibraryenvironmentfolksonomieshavethepotentialofovercomingcertainlimitationsoftraditionalclassificationsystemssuchastheLibraryofCongressSubjectHeadings(LCSH).Typicallimitationsofthistypeofclassificationsystemsinclude,forexample,therigidityoftheunderlyingtaxonomicalstructuresandthedifficultyofintroducingchangeinthecategories.Folksonomiesrepresentasupportingtechnologytoexistingclassificationsystemshelpingtodescribelibraryresourcesmoreflexibly,dynamicallyandopenly.Asareviewofthecurrentliteratureshows,theadoptionoffolksonomiesinlibrariesisnovelandlimitedresearchhasbeencarriedoutinthearea.ThispaperpresentsresearchintotheadoptionoffolksonomiesforaUniversitylibrary.AWeb2.0systemwasdeveloped,basedontherequirementscollectedfromlibrarystakeholders,andintegratedwiththeexistinglibrarycomputersystem.Anevaluationoftheworkwascarriedoutintheformofasurveyinordertounderstandthepossiblereactionsofuserstofolksonomiesaswellastheeffectsontheirbehavior.Thebroadconclusionofthisworkisthatfolksonomiesseemtohaveabeneficialeffectonusers’involvementasactivelibraryparticipantsaswellasencourageuserstobrowsethecatalogueinmoredepth.

ArticleOutline

1.Introduction

2.Background

2.1.Libraryclassificationsystems

2.2.Web2.0andlibrarysystems

2.3.Thecurrentsituation

3.Researchdesign

4.Systemdevelopment

4.1.Technologies

4.2.Requirementsimplementation

5.Evaluation

5.1.Questionnaire

5.2.Analysisofresults

6.Concludingdiscussion

References

Vitae

 

Towardoperationalizationof‘flow’inmathematicslearnware  OriginalResearchArticle

ComputersinHumanBehavior

ThispaperaimstodesignanddevelopaDistributedVirtualGeographicEnvironment(DVGE)system.ADVGEsystemisanInternet-basedvirtual2Dand3Denvironmentthatprovidesuserswithasharedspaceandacollaborativeplatformforpublishingmultidimensionalgeo-data,andforsimulatingandanalyzingcomplexgeo-phenomena.Usersloggingintothesystemfromdifferentclientscansharedistributedgeo-informationresources,includinggeo-dataandgeo-models,andcancompletecollaborativetasks.WebservicetechnologyprovideseffectivesolutionsforconstructingDVGEsystemsbecauseofitsabilitytosupportmulti-platform,multi-architecture,andmulti-program-languageinteroperabilityontheInternet,butalsobecauseofitsabilitytoshareprograms,data,andsoftware.Thispaperanalyzesthecharacteristics,relevanttechnologies,andspecificationsofwebservices,suchasgridservices,OpenGeo-dataInteroperabilitySpecifications(OpenGIS),andGeographyMarkupLanguages(GML).ThearchitectureandworkingmechanismsoftheDVGEsystembasedonwebservicesarethenelaborated.TodemonstrateDVGEsystemsbasedonwebservices,weexamineacasestudyofwaterpollutioninYangzhouCity,JiangsuProvince,China,usingaprototypeDVGEsystemthatisdevelopedwithJbuilder9.0andJava3D1.0packages,andtheWeblogicplatform8.1.

ArticleOutline

1.Introduction

2.Backgroundandrelatedwork

2.1.VirtualGeographicEnvironment

2.2.Webservicesandgridservices

2.3.OpenGISandGML

2.4.Relatedwork

3.DistributedVGEsystemdesign

3.1.ThearchitectureoftheDVGEsystem

3.2.TheimplementationoftheDVGEsystem

3.2.1.Resourcedistributionandmanagement

3.2.2.Webservicescreation,deployment,andregistration

3.2.3.CollaborativeworkflowofDVGEsystem

4.Prototypesystemandrudimentaryapplications

4.1.Architectureoftheprototypesystem

4.2.Aprototypesystem

5.Discussion

6.Conclusions

References

 

DesignanddevelopmentofDistributedVirtualGeographicEnvironmentsystembasedonwebservices  OriginalResearchArticle

InformationSciences

 

Lawoncrackingsecuritycodestoughened,AmyHarmon.TheUScopyrightofficehaspassedanewlawmakingitillegaltobreakthesecuritymethodsinplacetopreventthecopyingofdigitalmusic,booksandmovies.Thelawwillupdatetheexisting1998DigitalMillenniumCopyrightActandwillcomeintoeffectimmediately.ThedecisionwasopposedbygroupssuchasUniversities,programmersandlibrarieswhoarguethatcopyrightedworkshouldbearchivedandleantout.Programmersalsoclaimedthatreverse-engineeringwasavalidtechniqueinthecauseoflearninghowtechnologyworks.TheAssociationofAmericanUniversitieshasstatedthatinordertomaintaincivilliberties,theremustbebroadexemptionstoallowfor“fairuse”ofpurchasedcopyrighteddigitalgoods.TheTorontoStar,30October,E3.

Abstract

GamecouldholdkeytoNetsecurity,GarethCook.Accordingtotopmathematicians,thekeytocrackingencryptionalgorithmscouldbelinkedtothepopularMinesweepergamewhichcomesfreewiththeWindowsoperatingsystem.Theproblem,the‘PversusNPconjecture’,askswhysomeproblemsaresodifficulttosolveusingacomputer,whileotherscanbesolvedveryquickly.Problemslikeputtingalistintoalphabeticalorder,whichareeasilysolvedbyacomputerareclassifiedasPproblems,andthosewhichcannotareclassedasNP.AprominentspecialistchallengedtheconjectureinthespringeditionoftheMathematicalIntelligencerjournal,sayingthattheconjecturewouldbeprovedfalseiftheMinesweeperlogicgamecouldbecracked,foranysizedboard,usingacomputerprogram.Iftheconjectureistrue,thencertaintypesofproblemwillalwaysremaininsolublebycomputersandthecurrentsystemofencryptionalgorithmswillcontinuetobeconsideredtobesafe.TheClayMathematicalInstituteconsidersthemattertobesoimportantthattheyhaveofferedaUS$1millionprizeforasolution.Theimpactofsuchadiscoverywouldbetomathematicallymaptheboundarybeyondwhichcomputers,nomatterhowpowerful,cannotsucceed.TheBostonGlobe,1November,B1,B4.

Abstract

MOJproposesnewlawstocrackdownonhackers.TheJapaneseMinistryofJusticehasannouncedthatitintendstotoughenupTaiwan’sCriminalCodeasitrelatestohackers.Thosewhobreakintogovernment,militaryorfinancialinstitutionswouldfaceupto15yearjailsentences.OfficialsalsosaythatanyformofhackingovertheInternetshouldbemadeillegal.ThecodewilladdressholesinlegislationrelatingtocomputercrimesandwillalsocriminalizethedistributionofpornographyandsellingofprohibitedsubstanceswhileregulatingtheresponsibilitiesofISPs,pornographicwebsitesandthosewhichfacilitategambling.TheChinaPost,23October.

Abstract

Canada’scomputersecurityloopholescalledthreattoUS.DavidAkin.JamesAdams,seniorsecurityadvisortotheUS,toldthePopTech2000conferencethatCanadaisincapableofdefendingitselfagainstattacksagainstitstelecommunicationsandcomputernetworks.ThisendangerstheUSbecause“CanadaisessentiallythebackdoorintoAmerica”,duetotheamountofmajorUScorporationswhichhaveCanadianoffices.TheprivatesectorintheUSandCanadadonothavetherighttoshareinformationgleanedbythesecurityagencies,whichleavesitmorevulnerablethatthosefromcountrieslikeFrance,Israel,China,RussiaandIndia.Thecriticismcomesas30countriesincludingtheUS,butnotCanada,aregearinguptosimulateinformationwarfareattacks.AdamsalsowarnedagainstpurchasinghardwareandsoftwarefromFrance,China,IndiaorRussia,“WeknowwithoutanyquestionwhatsoeverthatalotofthingsthataresoldintheUnitedStates,beitafirewallorsomesoftware,areinfectedwithimplantsfromthesecountriessothatanythingthatgoesacrosstheirnetworks,orisstoredintheirprogramsissentbacktothecountryofmanufacture.”CanadianNationalPost,30October.

Abstract

Virusesthenextgeneration,KimZetter.Virusesaregettingfasterandmoreprolific.Theyhavebeenaroundsincetheearly60swhentheyinfectedthroughfloppydisks,the‘sneakernet’.Theycangoaroundtheworldinminutes,sentbyE-mail.Withthetrendwithinindustrytousethesameofftheshelfproducts—Windows,Word,Outlook—virusescanhitmillionsofmachinesinonefellswoop.RonMoritzatSymantec,ananti-viruscompany,said,“Iftheviruswriterseverthoughtthroughtheirprograms,wewouldseemuchmorevirulentvirusesthatwouldreallydodamage.”Thethreatisgrowingworse,andalthoughanti-virussoftwareisimportant,itcanonlytargetavirusonceithashitafewcomputers.Inthefuture,virusesarelikelytospreadwithoutyouhavingtoopenanE-mail—astagebeyondBubbleboyandKak.FredCohen,whocoinedthephrase‘computervirus’,describesmini-viruseswhichwilldodgedet

展开阅读全文
相关资源
猜你喜欢
相关搜索

当前位置:首页 > 小学教育 > 英语

copyright@ 2008-2022 冰豆网网站版权所有

经营许可证编号:鄂ICP备2022015515号-1