期刊文献+

基于Visual Basic的ASP组件的开发

Developing ASP Components Based on Visual Basic
下载PDF
导出
摘要 组件是对数据和方法的简单封装,组件有自己的属性和方法,使用组件可以实现拖放式编程、快速的属性处理以及真正的面向对象的设计。组件技术日益成为软件开发新技术。本文详细介绍了动态网页开发中使用ASP组件的优势,ASP组件的特点。开发的工具以及一般开发流程。并以文件读取ASP组件为例,对Visual Basic中组件的开发作了具体阐述,并应用于Web应用程序。本文对了解ASP组件构成,以及利用组件进行三层应用程序开发有很好的借鉴作用。 Component, which is the simple encapsulation of data and method, has its own attribute and methodology. It can be used to achieve drag-and-drop programming, instant attribute manipulation and genuine object-oriented programming, Component technique is becoming the technique of nowadays in the discipline of software develop-ment. This passage detailedly introduces advantages and characteristics of ASP components as well as design tools and general design procedures in dynamic web construction. With examples of data-input ASP component, the components development of Visual Basic have been amply described and introduced into Web Application,The passage presents sufficent and good references for comprehending the component composition of ASP and their application to 3-layer-prograrn-development.
作者 郭晓俐 GUO Xiao-li (Department of Computer Science, Yancheng Teach College, Yanchen 224001, China)
出处 《电脑知识与技术》 2007年第3期1290-1290,1323,共2页 Computer Knowledge and Technology
关键词 组件 COM 线程 VB ASP Component Corn Thread VB ASP
  • 相关文献

参考文献5

二级参考文献10

  • 1陈然孺.概率论与数理统计[M].合肥:中国科学技术大学出版社,1992..
  • 2Schneier B 吴世忠(译).应用密码学[M].北京:机械工业出版社,2000..
  • 3吴世忠(译),应用密码学,2000年
  • 4陈希孺,概率论与数理统计,1992年
  • 5Zhao Xiao-yu, Chen Gang. Ergodic matrix in image encryption[J]. SPIE,2002, 4875:394-401.
  • 6Kuo-Liang Chung, Lung-Chun Chang. Large encrypting binary images with higher security[J].Pattern Recognition Letters,1998,19:461-468.
  • 7Jui-Cheng Yen, Jiun-In Guo. A new image encryption algorithm and its VLSL architecture[A]. In:Proc 1999 IEEE Workshop on Signal Processing Systems Sips Design and Implementation[C]. China: Taipei, 1999.
  • 8Kuo C J, Chen M S. A new signal encryption technique and its attack study[A].In: IEEE International Confe-rence on Security Technology[C]. China: Taipei,1991.
  • 9卢朝阳,周幸妮.一种新的数据信息置乱算法[J].计算机工程与科学,1998,20(3):28-31. 被引量:15
  • 10王贵竹,李津生,洪佩琳.变进位记数制与伪随机序列的产生[J].中国科学技术大学学报,2000,30(4):438-443. 被引量:6

共引文献16

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部