期刊文献+

Web环境下数据过滤方法研究 被引量:1

Research on Web-based Information System Data Filtering Method
下载PDF
导出
摘要 网络技术的发展使得Web环境下的信息系统迅速增加。传统开发模式中,系统数据过滤代码不能复用、处理效率低,并且开发工作量大,影响系统开发效率。本文提出了新的数据过滤方法,把数据过滤程序与系统功能页面分离,将过滤程序文件布置到服务器端。要过滤的数据由数据过滤函数一次性进行数据过滤并反馈数据过滤结果以及提示信息。该数据过滤方法实现了信息系统数据过滤的灵活定制和软件复用,减少了开发人员的重复工作。 The development of networking causes the information systems to increase rapidly under the Web environment. In the traditional development pattern, the filtering codes of system data can not be reused and he processed in low efficiency so that the system development efficiency is affected. This article proposes a new filtering method which separates the data filtering program from the function page of the system and' arranges the filtering program to Server. The data filtering function filters the data once only, then feedbacks the result as well as the prompting message. This data faltering method realizes the flexible customization of the information system data and software reuse, which reduces the porsonnel's repetition work.
作者 冯锋
出处 《计算机与现代化》 2008年第9期6-9,共4页 Computer and Modernization
基金 宁夏自然科学基金资助项目(NZ0824) 宁夏大学科研基金资助项目(ZR200708)
关键词 WEB环境 信息系统 数据过滤服务 Web-basod information systems data filtering service
  • 相关文献

参考文献9

  • 1邢东山,沈钧毅.Web使用挖掘的数据采集[J].计算机工程,2002,28(1):39-41. 被引量:11
  • 2Robert V Bomder. Testing Object-Oriented System: Models, Patterns, and Tools [ M ]. Mass., Addison Wesley Longman, 2000.
  • 3Kamik Neeran, Tripathi Anand. Security in the Ajanta Mobile Agent System[ D ]. Department of Computer Science, University of Minnesota, May 1999.
  • 4Pei J, Han J W, Mortazaviasl B, et al. Mining access pattern efficiently from Web logs [ C ]// Knowledge Discovery and Data Mining, Proceedings-Current Issues and New Applications. Berlin, Germany: Springer Verlag, 2.000 : 396- 407.
  • 5Jansen A. Intrusion detection with mobile agents [ J ]. Computer Communications, 2002,25 : 1392-1401.
  • 6Stefansson Gunnar. Business-to-business data sharing: A source for integration of supply chains [ J ]. International Journal of Production Economics ,2002,75 (2) : 135-146.
  • 7Yurcik W, Doss D. Achieving fault-tolerant software with rejuvenation and reconfiguration[ J]. IEEE Software,2001, 77(8) :48-52.
  • 8Park J S, Sandhu R, Ahn G. Role-based access control on the Web [ J ]. ACM Transactions on Information and Systems Security,2001,4( 1 ) :37-57.
  • 9Sandhu R, Coyne E J, Feinstein H L, et al. Role-based Web control models [ J ]. IEEE Computer, 1996,29 ( 2 ) : 38-47.

二级参考文献5

  • 1Srivastava J,Cooley R, Deshpande M,et al. Web Usage Mining:Discovery and Applications of Usage Patterns from Web Data,Appear in SIGKDD Explorations,2000, 1(2)
  • 2Cooley R, Mobasher B,Srivastava J.Data Preparation for Mining World Wide Web Browsing Pattems. Knowledge and Information Systems,1999,1(1)
  • 3Bü chner A G,Mulvenna M D.Discovering Intemet Marketing Intelligence through Online Analytical Web Usage MiningACM SIGMOD, 1998,27(4): 54-61
  • 4Cooley R,Mobasher B,Srivastava J.GrouPing Web Page References into Transactions for Mining World Wide Web Browsing Patterns.in Proceedings of the 1997 IEEE Knowledge and Data Engineering Exchange Workshop (KDEX-97), 1997-11
  • 5Shahabi C,Zarkesh A,Adibi J,et al. Knowledge Discovery from Users Web-page Navigation. In Proceedings of the IEEE RIDE97 Workshop,1997-04

共引文献10

同被引文献11

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部