期刊文献+
共找到12篇文章
< 1 >
每页显示 20 50 100
RDF数据浏览的研究综述 被引量:2
1
作者 吴鸿汉 瞿裕忠 《计算机科学》 CSCD 北大核心 2009年第2期5-10,41,共7页
随着语义网的快速发展,目前Web上语义网数据已经达到相当的规模,成为重要的信息和知识来源。因此,RDF数据浏览的研究开始得到广泛关注。通过对比传统Web信息浏览和RDF数据浏览两个问题,指出RDF数据浏览的5个重要问题:确定浏览子图的模... 随着语义网的快速发展,目前Web上语义网数据已经达到相当的规模,成为重要的信息和知识来源。因此,RDF数据浏览的研究开始得到广泛关注。通过对比传统Web信息浏览和RDF数据浏览两个问题,指出RDF数据浏览的5个重要问题:确定浏览子图的模式、数据的收集、大规模数据的处理、数据的组织方式以及数据的呈现方式。基于这些挑战,我们调研了多个系统和不同的解决方案。最后,总结了目前的研究现况,讨论存在的挑战,并提出未来的研究方向。 展开更多
关键词 语义 RDF数据浏览 RDF数据组织 语义浏览
下载PDF
变杂志为“聚宝盆”
2
作者 宋妍 《互联网周刊》 2006年第14期48-49,共2页
从简单的杂志在线订阅,到数字化增值发行——浏览网发现,其手中庞大的杂志媒体资源原来是一个不断变大的“聚宝盆”
关键词 杂志 媒体资源 数字化 浏览网
下载PDF
基于技术实现的Android移动学习典型模式构建
3
作者 张丽萍 葛福鸿 《中国信息技术教育》 2015年第24期107-110,共4页
基于移动设备的移动学习作为一种全新的学习方式被应用于各类教育、学习中,为学习者提供了方便、实时、高效的学习。本文提出,基于Android系统的移动学习方式的实现流程构建了三种典型学习模式,并着重对各种学习方式的组成要素进行了深... 基于移动设备的移动学习作为一种全新的学习方式被应用于各类教育、学习中,为学习者提供了方便、实时、高效的学习。本文提出,基于Android系统的移动学习方式的实现流程构建了三种典型学习模式,并着重对各种学习方式的组成要素进行了深入的分析与研究,这对推广移动学习、改善学习现状、提高学习效率有重要的应用价值。 展开更多
关键词 移动学习模式 短信息服务 视频服务 无线浏览
下载PDF
Different Epidemic Models on Complex Networks 被引量:6
4
作者 ZHANG Hai-Feng Michael Small FU Xin-Chu 《Communications in Theoretical Physics》 SCIE CAS CSCD 2009年第7期180-184,共5页
Models for diseases spreading are not just limited to SIS or SIR. For instance, for the spreading of AIDS/HIV, the susceptible individuals can be classified into different cases according to their immunity, and simila... Models for diseases spreading are not just limited to SIS or SIR. For instance, for the spreading of AIDS/HIV, the susceptible individuals can be classified into different cases according to their immunity, and similarly, the infected individuals can be sorted into different classes according to their infectivity. Moreover, some diseases may develop through several stages. Many authors have shown that the individuals' relation can be viewed as a complex network. So in this paper, in order to better explain the dynamical behavior of epidemics, we consider different epidemic models on complex networks, and obtain the epidemic threshold for each ease. Finally, we present numerical simulations for each case to verify our results. 展开更多
关键词 epidemic threshold scale-free network diseases spreading multiple-staged infectivity rate
下载PDF
Virtual reality approach for 3D large model browsing on web site 被引量:1
5
作者 郭葆锋 《Journal of Chongqing University》 CAS 2005年第3期129-133,共5页
Using virtual reality for interactive design gives a designer an intuitive vision of a design and allows the designer to achieve a viable, optimal solution in a timely manner. The article discusses the process of maki... Using virtual reality for interactive design gives a designer an intuitive vision of a design and allows the designer to achieve a viable, optimal solution in a timely manner. The article discusses the process of making the Virtual Reality System of the Humble Administrator’s Garden. Translating building data to the Virtual Reality Modeling Language (VRML) is by far unsatisfactory. This creates a challenge for computer designers to do optimization to meet requirements. Five different approaches to optimize models have been presented in this paper. The other methods are to optimize VRML and to reduce the file size. This is done by keeping polygon counts to a minimum and by applying such techniques as object culling and level-of- detail switching. 展开更多
关键词 virtual reality 3D modeling OPTIMIZATION
下载PDF
Security enhancement of WAPI access authentication protocol (WAI) 被引量:2
6
作者 刘永磊 金志刚 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2012年第6期42-46,共5页
In this paper, the current known attack methods against WAI and the improvements of WAI called WAI' were analyzed. Through analyzing the unicast key agreement protocol in the WAI' by CPN model, the vulnerabilities o... In this paper, the current known attack methods against WAI and the improvements of WAI called WAI' were analyzed. Through analyzing the unicast key agreement protocol in the WAI' by CPN model, the vulnerabilities of WAI' were found out. The improvement of WAI' was made and a new protocol called WAI' - E was proposed. The WAI' -E was combined with the key exchange mechanism of Diffie-HeUman based on el- liptic curve cryptography. Moreover, by using CK mode, it is the fact that WAI'-E was SK-secure with PFS and was nrovided with inde^nendant sacuritv ,f cartifient~ mlthentientinn wn~ nravgd 展开更多
关键词 WLAN WLAN Authentication and Privacy Infrastructure Colored Petri Nets CK model
下载PDF
HTTP-sCAN:Detecting HTTP-Flooding Attack by Modeling Multi-Features of Web Browsing Behavior from Noisy Web-Logs 被引量:3
7
作者 WANG Jin ZHANG Min +2 位作者 YANG Xiaolong LONG Keping XU Jie 《China Communications》 SCIE CSCD 2015年第2期118-128,共11页
HTTP-flooding attack disables the victimized web server by sending a large number of HTTP Get requests.Recent research tends to detect HTTP-flooding with the anomaly-based approaches,which detect the HTTP-flooding by ... HTTP-flooding attack disables the victimized web server by sending a large number of HTTP Get requests.Recent research tends to detect HTTP-flooding with the anomaly-based approaches,which detect the HTTP-flooding by modeling the behavior of normal web surfers.However,most of the existing anomaly-based detection approaches usually cannot filter the web-crawling traces from unknown searching bots mixed in normal web browsing logs.These web-crawling traces can bias the base-line profile of anomaly-based schemes in their training phase,and further degrade their detection performance.This paper proposes a novel web-crawling tracestolerated method to build baseline profile,and designs a new anomaly-based HTTP-flooding detection scheme(abbr.HTTP-sCAN).The simulation results show that HTTP-sCAN is immune to the interferences of unknown webcrawling traces,and can detect all HTTPflooding attacks. 展开更多
关键词 IP network DDoS relative entropy cluster algorithm
下载PDF
Effective search with saliency-based matching and cluster-based browsing 被引量:4
8
作者 张晓宇 《High Technology Letters》 EI CAS 2013年第1期105-109,共5页
Similarity matching and this paper, a saliency-based information presentation are two matching algorithm is proposed key factors in information retrieval. In for user-oriented search based on the psychological studies... Similarity matching and this paper, a saliency-based information presentation are two matching algorithm is proposed key factors in information retrieval. In for user-oriented search based on the psychological studies on human perception, and major emphasis on the saliently similar aspect of objects to be compared is placed and thus the search result is more agreeable for users. After relevant results are obtained, the cluster-based browsing algorithm is adopted for search result presentation based on social network analysis. By organizing the results in clustered lists, the user can have a general understanding of the whole collection by viewing only a small part of results and locate those of major interest rapidly. Experimental results demonstrate the advantages of the proposed algorithm over the traditional work. 展开更多
关键词 information retrieval saliency-based matching human perception cluster-based browsing social network
下载PDF
Research of Marine Sensor Web Based on SOA and EDA 被引量:2
9
作者 JIANG Yongguo DOU Jinfeng +1 位作者 GUO Zhongwen HU Keyong 《Journal of Ocean University of China》 SCIE CAS 2015年第2期261-268,共8页
A great deal of ocean sensor observation data exists, for a wide range of marine disciplines, derived from in situ and remote observing platforms, in real-time, near-real-time and delayed mode. Ocean monitoring is rou... A great deal of ocean sensor observation data exists, for a wide range of marine disciplines, derived from in situ and remote observing platforms, in real-time, near-real-time and delayed mode. Ocean monitoring is routinely completed using sensors and instruments. Standardization is the key requirement for exchanging information about ocean sensors and sensor data and for comparing and combining information from different sensor networks. One or more sensors are often physically integrated into a single ocean ‘instrument' device, which often brings in many challenges related to diverse sensor data formats, parameters units, different spatiotemporal resolution, application domains, data quality and sensors protocols. To face these challenges requires the standardization efforts aiming at facilitating the so-called Sensor Web, which making it easy to provide public access to sensor data and metadata information. In this paper, a Marine Sensor Web, based on SOA and EDA and integrating the MBARI's PUCK protocol, IEEE 1451 and OGC SWE 2.0, is illustrated with a five-layer architecture. The Web Service layer and Event Process layer are illustrated in detail with an actual example. The demo study has demonstrated that a standard-based system can be built to access sensors and marine instruments distributed globally using common Web browsers for monitoring the environment and oceanic conditions besides marine sensor data on the Web, this framework of Marine Sensor Web can also play an important role in many other domains' information integration. 展开更多
关键词 ocean Sensor networks ocean observing systems marine sensor web web service SOA sensor web enablement(SWE) EDA
下载PDF
数据走起来 移动平台数据伴侣
10
作者 吴敌 李寒 《个人电脑》 2009年第5期67-81,共15页
移动计算平台近年来的普及率越来越高了,无论是笔记本也好,还是基于Atom平台的上网本也罢,移动计算平台让人们可以随时随地处理工作、电子邮件、上网浏览,乃至观看电影或是玩游戏。不过不管你用移动平台来干什么,你都需要相应的数据存... 移动计算平台近年来的普及率越来越高了,无论是笔记本也好,还是基于Atom平台的上网本也罢,移动计算平台让人们可以随时随地处理工作、电子邮件、上网浏览,乃至观看电影或是玩游戏。不过不管你用移动平台来干什么,你都需要相应的数据存储设备。 展开更多
关键词 移动计算平台 数据存储设备 浏览 移动平台 电子邮件 基础模块
下载PDF
飓风搜索
11
作者 张磊 《电子与电脑》 2002年第7期85-85,共1页
软件名称:飓风搜索通 软件作者:任良 文件大小:823KB 软件授权:免费软件 最新版本:4.90 使用平台:Win9x/Me/NT/2000 软件网址:http://www.renliang.com 虽然最近整个网络界经过一轮浮躁后,进入了低迷时期,但没有人会怀疑她灿烂的未来。
关键词 “飓风搜索通” 多勇浏览 计算机
下载PDF
Conflict detection in collaborative architectural pipe routing design based on constraint network
12
作者 苏孝钐 Tian Ling 《High Technology Letters》 EI CAS 2013年第2期117-124,共8页
This paper analyzes conflict features in architecture pipe routing,and builds a pipe routing design conflict model by taking into account of discrete nominal internal diameter selection of pipes,material costs,and con... This paper analyzes conflict features in architecture pipe routing,and builds a pipe routing design conflict model by taking into account of discrete nominal internal diameter selection of pipes,material costs,and conflict solution sequence.Considering pipe routing as an assembling process,a conflict detection approach for pipe routing in collaborative architectural design is proposed based on an aforementioned model.Constraint network is used to describe the relationship among pipe routing design parameters and constraints;design conflicts are detected by matching designers' input and constraint network;and detected design conflicts are reordered according to the number of pipe parameters in conflicts.In order to support the collaborative requirement of pipe routing design,a prototype system using browser/server architecture is developed.An illustrative example of water pipe routing in a room is used to show the effectiveness and efficiency of the approach. 展开更多
关键词 conflict detection constraint network piping routing collaborative design archi-tectural pipe routing
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部