InternetWWW at work a confirmatory study.docx
- 文档编号:26398192
- 上传时间:2023-06-19
- 格式:DOCX
- 页数:12
- 大小:24.64KB
InternetWWW at work a confirmatory study.docx
《InternetWWW at work a confirmatory study.docx》由会员分享,可在线阅读,更多相关《InternetWWW at work a confirmatory study.docx(12页珍藏版)》请在冰豆网上搜索。
InternetWWWatworkaconfirmatorystudy
Influenceofthemodeofgraphicalrepresentationontheperceptionofproductaestheticandemotionalfeatures:
Anexploratorystudy OriginalResearchArticle
InternationalJournalofIndustrialErgonomics
AbstractsofRecentArticlesandLiterature
Computers&Security
IntegrationofMicrosoftWindowsapplicationswithMDSplusdataacquisitionontheNationalSphericalTorusExperimentatthePrincetonPlasmaPhysicsLaboratory OriginalResearchArticle
FusionEngineeringandDesign
Web2.0andfolksonomiesinalibrarycontext OriginalResearchArticle
InternationalJournalofInformationManagement
Librarieshaveasocietalpurposeandthisrolehasbecomeincreasinglyimportantasnewtechnologiesenableorganizationstosupport,enableandenhancetheparticipationofusersinassuminganactiveroleinthecreationandcommunicationofinformation.Folksonomies,aWeb2.0technology,representsuchanexample.Folksonomiesresultfromindividualsfreelytaggingresourcesavailabletothemonacomputernetwork.InalibraryenvironmentfolksonomieshavethepotentialofovercomingcertainlimitationsoftraditionalclassificationsystemssuchastheLibraryofCongressSubjectHeadings(LCSH).Typicallimitationsofthistypeofclassificationsystemsinclude,forexample,therigidityoftheunderlyingtaxonomicalstructuresandthedifficultyofintroducingchangeinthecategories.Folksonomiesrepresentasupportingtechnologytoexistingclassificationsystemshelpingtodescribelibraryresourcesmoreflexibly,dynamicallyandopenly.Asareviewofthecurrentliteratureshows,theadoptionoffolksonomiesinlibrariesisnovelandlimitedresearchhasbeencarriedoutinthearea.ThispaperpresentsresearchintotheadoptionoffolksonomiesforaUniversitylibrary.AWeb2.0systemwasdeveloped,basedontherequirementscollectedfromlibrarystakeholders,andintegratedwiththeexistinglibrarycomputersystem.Anevaluationoftheworkwascarriedoutintheformofasurveyinordertounderstandthepossiblereactionsofuserstofolksonomiesaswellastheeffectsontheirbehavior.Thebroadconclusionofthisworkisthatfolksonomiesseemtohaveabeneficialeffectonusers’involvementasactivelibraryparticipantsaswellasencourageuserstobrowsethecatalogueinmoredepth.
ArticleOutline
1.Introduction
2.Background
2.1.Libraryclassificationsystems
2.2.Web2.0andlibrarysystems
2.3.Thecurrentsituation
3.Researchdesign
4.Systemdevelopment
4.1.Technologies
4.2.Requirementsimplementation
5.Evaluation
5.1.Questionnaire
5.2.Analysisofresults
6.Concludingdiscussion
References
Vitae
Towardoperationalizationof‘flow’inmathematicslearnware OriginalResearchArticle
ComputersinHumanBehavior
ThispaperaimstodesignanddevelopaDistributedVirtualGeographicEnvironment(DVGE)system.ADVGEsystemisanInternet-basedvirtual2Dand3Denvironmentthatprovidesuserswithasharedspaceandacollaborativeplatformforpublishingmultidimensionalgeo-data,andforsimulatingandanalyzingcomplexgeo-phenomena.Usersloggingintothesystemfromdifferentclientscansharedistributedgeo-informationresources,includinggeo-dataandgeo-models,andcancompletecollaborativetasks.WebservicetechnologyprovideseffectivesolutionsforconstructingDVGEsystemsbecauseofitsabilitytosupportmulti-platform,multi-architecture,andmulti-program-languageinteroperabilityontheInternet,butalsobecauseofitsabilitytoshareprograms,data,andsoftware.Thispaperanalyzesthecharacteristics,relevanttechnologies,andspecificationsofwebservices,suchasgridservices,OpenGeo-dataInteroperabilitySpecifications(OpenGIS),andGeographyMarkupLanguages(GML).ThearchitectureandworkingmechanismsoftheDVGEsystembasedonwebservicesarethenelaborated.TodemonstrateDVGEsystemsbasedonwebservices,weexamineacasestudyofwaterpollutioninYangzhouCity,JiangsuProvince,China,usingaprototypeDVGEsystemthatisdevelopedwithJbuilder9.0andJava3D1.0packages,andtheWeblogicplatform8.1.
ArticleOutline
1.Introduction
2.Backgroundandrelatedwork
2.1.VirtualGeographicEnvironment
2.2.Webservicesandgridservices
2.3.OpenGISandGML
2.4.Relatedwork
3.DistributedVGEsystemdesign
3.1.ThearchitectureoftheDVGEsystem
3.2.TheimplementationoftheDVGEsystem
3.2.1.Resourcedistributionandmanagement
3.2.2.Webservicescreation,deployment,andregistration
3.2.3.CollaborativeworkflowofDVGEsystem
4.Prototypesystemandrudimentaryapplications
4.1.Architectureoftheprototypesystem
4.2.Aprototypesystem
5.Discussion
6.Conclusions
References
DesignanddevelopmentofDistributedVirtualGeographicEnvironmentsystembasedonwebservices OriginalResearchArticle
InformationSciences
Lawoncrackingsecuritycodestoughened,AmyHarmon.TheUScopyrightofficehaspassedanewlawmakingitillegaltobreakthesecuritymethodsinplacetopreventthecopyingofdigitalmusic,booksandmovies.Thelawwillupdatetheexisting1998DigitalMillenniumCopyrightActandwillcomeintoeffectimmediately.ThedecisionwasopposedbygroupssuchasUniversities,programmersandlibrarieswhoarguethatcopyrightedworkshouldbearchivedandleantout.Programmersalsoclaimedthatreverse-engineeringwasavalidtechniqueinthecauseoflearninghowtechnologyworks.TheAssociationofAmericanUniversitieshasstatedthatinordertomaintaincivilliberties,theremustbebroadexemptionstoallowfor“fairuse”ofpurchasedcopyrighteddigitalgoods.TheTorontoStar,30October,E3.
Abstract
GamecouldholdkeytoNetsecurity,GarethCook.Accordingtotopmathematicians,thekeytocrackingencryptionalgorithmscouldbelinkedtothepopularMinesweepergamewhichcomesfreewiththeWindowsoperatingsystem.Theproblem,the‘PversusNPconjecture’,askswhysomeproblemsaresodifficulttosolveusingacomputer,whileotherscanbesolvedveryquickly.Problemslikeputtingalistintoalphabeticalorder,whichareeasilysolvedbyacomputerareclassifiedasPproblems,andthosewhichcannotareclassedasNP.AprominentspecialistchallengedtheconjectureinthespringeditionoftheMathematicalIntelligencerjournal,sayingthattheconjecturewouldbeprovedfalseiftheMinesweeperlogicgamecouldbecracked,foranysizedboard,usingacomputerprogram.Iftheconjectureistrue,thencertaintypesofproblemwillalwaysremaininsolublebycomputersandthecurrentsystemofencryptionalgorithmswillcontinuetobeconsideredtobesafe.TheClayMathematicalInstituteconsidersthemattertobesoimportantthattheyhaveofferedaUS$1millionprizeforasolution.Theimpactofsuchadiscoverywouldbetomathematicallymaptheboundarybeyondwhichcomputers,nomatterhowpowerful,cannotsucceed.TheBostonGlobe,1November,B1,B4.
Abstract
MOJproposesnewlawstocrackdownonhackers.TheJapaneseMinistryofJusticehasannouncedthatitintendstotoughenupTaiwan’sCriminalCodeasitrelatestohackers.Thosewhobreakintogovernment,militaryorfinancialinstitutionswouldfaceupto15yearjailsentences.OfficialsalsosaythatanyformofhackingovertheInternetshouldbemadeillegal.ThecodewilladdressholesinlegislationrelatingtocomputercrimesandwillalsocriminalizethedistributionofpornographyandsellingofprohibitedsubstanceswhileregulatingtheresponsibilitiesofISPs,pornographicwebsitesandthosewhichfacilitategambling.TheChinaPost,23October.
Abstract
Canada’scomputersecurityloopholescalledthreattoUS.DavidAkin.JamesAdams,seniorsecurityadvisortotheUS,toldthePopTech2000conferencethatCanadaisincapableofdefendingitselfagainstattacksagainstitstelecommunicationsandcomputernetworks.ThisendangerstheUSbecause“CanadaisessentiallythebackdoorintoAmerica”,duetotheamountofmajorUScorporationswhichhaveCanadianoffices.TheprivatesectorintheUSandCanadadonothavetherighttoshareinformationgleanedbythesecurityagencies,whichleavesitmorevulnerablethatthosefromcountrieslikeFrance,Israel,China,RussiaandIndia.Thecriticismcomesas30countriesincludingtheUS,butnotCanada,aregearinguptosimulateinformationwarfareattacks.AdamsalsowarnedagainstpurchasinghardwareandsoftwarefromFrance,China,IndiaorRussia,“WeknowwithoutanyquestionwhatsoeverthatalotofthingsthataresoldintheUnitedStates,beitafirewallorsomesoftware,areinfectedwithimplantsfromthesecountriessothatanythingthatgoesacrosstheirnetworks,orisstoredintheirprogramsissentbacktothecountryofmanufacture.”CanadianNationalPost,30October.
Abstract
Virusesthenextgeneration,KimZetter.Virusesaregettingfasterandmoreprolific.Theyhavebeenaroundsincetheearly60swhentheyinfectedthroughfloppydisks,the‘sneakernet’.Theycangoaroundtheworldinminutes,sentbyE-mail.Withthetrendwithinindustrytousethesameofftheshelfproducts—Windows,Word,Outlook—virusescanhitmillionsofmachinesinonefellswoop.RonMoritzatSymantec,ananti-viruscompany,said,“Iftheviruswriterseverthoughtthroughtheirprograms,wewouldseemuchmorevirulentvirusesthatwouldreallydodamage.”Thethreatisgrowingworse,andalthoughanti-virussoftwareisimportant,itcanonlytargetavirusonceithashitafewcomputers.Inthefuture,virusesarelikelytospreadwithoutyouhavingtoopenanE-mail—astagebeyondBubbleboyandKak.FredCohen,whocoinedthephrase‘computervirus’,describesmini-viruseswhichwilldodgedet
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- InternetWWW at work confirmatory study