首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   4篇
  免费   0篇
  国内免费   1篇
教育   1篇
信息传播   4篇
  2013年   2篇
  2007年   1篇
  2006年   1篇
  2005年   1篇
排序方式: 共有5条查询结果,搜索用时 134 毫秒
1
1.
Design, implementation, and re-engineering of operating systems are still an ambitious undertaking. Despite, or even because, of the long history of theory and practice in this field, adapting existing systems to environments of different conditions and requirements as originally specified or assumed, in terms of functional and/or non-functional respects, is anything but simple. Especially this is true for the embedded systems domain which, on the one hand, calls for highly specialized and application-aware system abstractions and, on the other hand, cares a great deal for easily reusable implementations of these abstractions. The latter aspect becomes more and more important as embedded systems technology is faced with an innovation cycle decreasing in length. Software for embedded systems needs to be designed for variability, and this is in particular true for the operating systems of this domain. The paper discusses dimensions of variability that need to be considered in the development of embedded operating systems and presents approaches that aid construction and maintenance of evolutionary operating systems. CR subject classification  C.3; D.2.11; D.2.13; D.4.7  相似文献   
2.
Abstract

ILL activity is governed by local, state, and national agreements and codes. Chapter 2 discusses the importance of national and statewide ILL codes of conduct, and also covers laws and regulations (confidentiality, the PATRIOT Act, HIPAA) germane to interlibrary loan.  相似文献   
3.
信息抽取系统的研究现状   总被引:16,自引:0,他引:16  
对信息抽取的概念和发展状况做了论述,介绍了国内外信息抽取系统发展状况,指出了存在的问题以及相应的解决方案,最后对中文信息抽取系统的建设提出了几点建议。  相似文献   
4.
从上个世纪末到本世纪初,智能网技术得到了迅猛发展和广泛应用,它不但给成千上万的用户带来方便,而且为运营商带来了无限商机。本文以如何使用智能网技术实现号码携带业务为例,系统地介绍了智能网技术运用方法。  相似文献   
5.
Confidentiality breaches of health information can affect every person who seeks medical care. To better understand this phenomenon, breaches of confidentiality by employees in a health care organization were examined and compared to the perceived confidentiality maintenance actions of the organization's health care providers. The study, using observation and interviews of a health promotion department, supported Brann and Mattson's (2004) typology of confidentiality breaches, provided evidence for another type of communicative breach, and revealed inconsistencies between health care providers' actions and their perceptions of those actions. Future research should address the prevalence of such discrepancies in other health contexts and its impact on patient care.  相似文献   
1
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号