工学 >>> 计算机科学技术 >>> 计算机软件 >>> 软件理论 操作系统与操作环境 程序设计及其语言 编译系统 数据库 软件开发环境与开发技术 软件工程 计算机软件其他学科
搜索结果: 1-15 共查到计算机软件 using相关记录42条 . 查询时间(0.34 秒)
服务设计的过程是一个需要充分调动相关人员高度参与的过程。相关人员包括:我们的客户即服务的享受着,包括企业的高管即服务资源的协调者,包括服务人员即服务的最终提供者等等。每类角色的相关利益点不同,而好的服务设计需要充分考虑不同角色的相关利益,将商业、客户需求、员工效率等要求在服务设计过程中进行较好的平衡。因此,服务设计师在这个过程中需要扮演一个好的利益关系协调者,需要充分引入各类角色参与服务设计的过程...
There is a tension in program analysis between precision and eciency. In constraint-based program analysis, at one extreme methods based on uni cation of equality constraints over terms are very fast...
Inconsistency checking is a method for detecting software errors that relies only on examining multiple uses of a value. We propose that inconsistency inference is best understood as a variant of the ...
Containers are general-purpose data structures that provide functionality for inserting, reading, removing, and iterating over elements. Since many applications written in modern programming languages...
We introduce exotypes, user-defined types that combine the flexibility of meta-object protocols in dynamically-typed languages with the performance control of low-level languages. Like objects in dyna...
We present a framework for computing context-free language reachability properties when parts of the program are missing. Our framework infers candidate specifications for missing program pieces that ...
Global algorithms currently represent the state-of-the-art in dense stereo matching. These methods first set up an energy function.The energy function is then subject to optimization, which is t...
With technology advances, the number of cores integrated on a chip and their speed of operation is increasing. This, in turn is leading to a significant increase in chip temperature. Temperature gradi...
The presence of abrupt changes, such as impulsive and load disturbances, commonly occur in applications,but make the state estimation problem considerably more difficult than in the standard setting w...
Programmers generally attempt to perform useful work. If they performed an action, it was because they believed it served some purpose. Redundant operations violate this belief. However, in the past r...
Memory corruption errors lead to non-deterministic, elusive crashes. This paper describes ARCHER (ARray CHeckER) a static, effective memory access checker. ARCHER usespath-sensitive, interprocedural s...
This paper explores z-ranking, a technique to rank error reports emitted by static program checking analysis tools. Such tools often use approximate analysis schemes, leading to false error reports. T...
This paper shows how to use model checking to find serious errors in file systems. Model checking is a formal verification technique tuned for finding corner-case errors by comprehensively exploring t...
Many current systems allow data produced by potentially malicious sources to be mounted as a file system. File system code must check this data for dangerous values or invariant violations before usin...
High number of geological phenomena – outcropping Pliocene rocks (Red Series), former and recent mud volcanoes, hydrothermal brines rich in Pb and Zn – which can provide significant information to un...

中国研究生教育排行榜-

正在加载...

中国学术期刊排行榜-

正在加载...

世界大学科研机构排行榜-

正在加载...

中国大学排行榜-

正在加载...

人 物-

正在加载...

课 件-

正在加载...

视听资料-

正在加载...

研招资料 -

正在加载...

知识要闻-

正在加载...

国际动态-

正在加载...

会议中心-

正在加载...

学术指南-

正在加载...

学术站点-

正在加载...