![](https://csdnimg.cn/release/downloadcmsfe/public/img/no-data.51c5211b.png)
![](https://csdnimg.cn/release/downloadcmsfe/public/img/good-course.ff455529.png)
- 地理信息系统导论课后题参考答案.pdf地理信息系统导论课后题参考答案.pdf
5 3961浏览
免费 - Cloud Security and Privacy: An Enterprise Perspective on Risks and ComplianceYou may regard cloud computing as an ideal way for your company to control IT costs, but do you know how private and secure this service really is? Not many people do. With Cloud Security and Privacy, you’ll learn what’s at stake when you trust your data to the cloud, and what you can do to keep your virtual infrastructure and web applications secure. Ideal for IT staffers, information security and privacy practitioners, business managers, service providers, and investors alike, this book offers you sound advice from three well-known authorities in the tech security world. You’ll learn detailed information on cloud computing security that-until now-has been sorely lacking. Review the current state of data security and storage in the cloud, including confidentiality, integrity, and availability Learn about the identity and access management (IAM) practice for authentication, authorization, and auditing of the users accessing cloud services Discover which security management frameworks and standards are relevant for the cloud Understand the privacy aspects you need to consider in the cloud, including how they compare with traditional computing models Learn the importance of audit and compliance functions within the cloud, and the various standards and frameworks to consider
5 96浏览
免费 - The mathematica book (5th edition)the guild book for a beginer to access mathematica!! Especially when u treat mathematica as a programming language...
5 98浏览
免费 - Apress.Beginning.Android.2.2010.pdf■Contents at a Glance .................... iv ■Contents...................... v ■About the Author........................ xiii ■Acknowledgments ......................xiv ■Preface.......................xv ■Chapter 1: The Big Picture ................... 1 ■Chapter 2: Projects and Targets ................ 5 ■Chapter 3: Creating a Skeleton Application ............... 17 ■Chapter 4: Using XML-Based Layouts.................. 23 ■Chapter 5: Employing Basic Widgets ................... 29 ■Chapter 6: Working with Containers.................... 39 ■Chapter 7: Using Selection Widgets............... 59 ■Chapter 8: Getting Fancy with Lists............... 75 ■Chapter 9: Employing Fancy Widgets and Containers ........... 95 ■Chapter 10: The Input Method Framework .............. 117 ■Chapter 11: Applying Menus.................. 125 ■Chapter 12: Fonts...................... 137 ■Chapter 13: Embedding the WebKit Browser................. 141 ■Chapter 14: Showing Pop-Up Messages.................. 149 ■Chapter 15: Dealing with Threads ............... 155 ■Chapter 16: Handling Activity Life Cycle Events ............ 167 ■Chapter 17: Creating Intent Filters .................... 171 ■Chapter 18: Launching Activities and Subactivities ............ 177 ■Chapter 19: Handling Rotation..................... 185 ■Chapter 20: Working with Resources ................ 197 ■Chapter 21: Using Preferences .................... 213 ■Chapter 22: Managing and Accessing Local Databases ............ 225 ■Chapter 23: Accessing Files................... 237 ■Chapter 24: Leveraging Java Libraries.............. 245 ■Chapter 25: Communicating via the Internet................. 253 ■Chapter 26: Using a Content Provider................ 259 ■Chapter 27: Building a Content Provider ................. 265 ■Chapter 28: Requesting and Requiring Permissions ........... 275 ■Chapter 29: Creating a Service .................... 279 ■Chapter 30: Invoking a Service.................... 285 ■Chapter 31: Alerting Users via Notifications.................. 289 ■Chapter 32: Accessing Location-Based Services................. 295 ■Chapter 33: Mapping with MapView and MapActivity............... 301 ■Chapter 34: Handling Telephone Calls ............... 311 ■Chapter 35: Development Tools ................... 315 ■Chapter 36: Handling Multiple Screen Sizes.................. 331 ■Chapter 37: Dealing with Devices................ 353 ■Chapter 38: Handling Platform Changes.................. 359 ■Chapter 39: Where Do We Go from Here? ................ 367 ■Index ....................... 369
0 128浏览
免费 - IEEE Std 802.15.4™-2003IEEE Std 802.15.4-2003 This standard defines the protocol and interconnection of devices via radio communication in a personal area network (PAN). The standard uses carrier sense multiple access with a collision avoidance medium access mechanism and supports star as well as peer-to-peer topologies. The media access is contention based; however, using the optional superframe structure, time slots can be allocated by the PAN coordinator to devices with time critical data. Connectivity to higher performance networks is provided through a PAN coordinator. This standard specifies two PHYs: an 868/915 MHz direct sequence spread spectrum (DSSS) PHY and a 2450 MHz DSSS PHY. The 2450 MHz PHY supports an over-the-air data rate of 250 kb/s, and the 868/915 MHz PHY supports over-the-air data rates of 20 kb/s and 40 kb/s. The PHY chosen depends on local regulations and user preference. This standard contains state-of-the-art material. The area covered by this standard is undergoing evolution. Revisions are anticipated to this standard within the next few years to clarify existing material, to correct possible errors, and to incorporate new related material. Details on the contents of this standard are provided on the following pages. Information on the current revision state of this and other IEEE 802® standards may be obtained from: Secretary, IEEE-SA Standards Board 445 Hoes Lane P.O.Box 1331 Piscataway, NJ 08855-1331 USA Participants At the time the draft of this standard was sent to sponsor ballot, the IEEE P802.15™ Working Group had the following voting members: Robert F. Heile, Chair James D. Allen, Vice Chair Patrick W. Kinney, Secretary Michael D. McInnis, Assistant Secretary and Editor Ian C. Gifford, Task Group 1 Chair Stephen J. Shellhammer, Task Group 2 Chair John R. Barr, Task Group 3 Chair Patrick W. Kinney, Task Group 4 Chair Phil Jamieson, Task Group 4 Vice Chair José A. Gutierrez, Task Group 4 Editor-in-Chief Marco Naeve, Task Group 4 Secretary Monique Bourgeois, MAC Technical Editor Said Moridi, PHY Technical Editor Phil Jamieson, Layer Management Technical Editor
5 181浏览
免费 - 云计算论文下载,供学习研究参考云计算论文下载,供学习研究参考 英文原文论文
4 69浏览
免费 - ACCESS实例教程很不错的ACESS2003实例教程。真的很不错的。
5 136浏览
免费 - cognos accessmanagercognos access manager 权限配置文件
0 69浏览
免费 - Access Path Selection in a Relational Database Management SystemIn a high level query and data manipulation language such as SQL, requests are stated non-procedurally, without reference to access paths. This paper describes how System R chooses access paths for both simple (single relation) and complex queries (such as joins), given a user specification of desired data as a boolean expression of predicates. System R is an experimental database management system developed to carry out research on the relational model of data. System R was designed and built by members of the IBM San Jose Research Laboratory.
0 224浏览
免费 - Access 2003 完全指南(PDF)Access 2003 完全指南(PDF)
4 83浏览
免费 - Wiley.An.Introduction.To.Mathematical.Models.In.Ecology.And.Evolution.Time.And.Space.2nd.Edition.May.2009.eBook-ELOHiMProduct Description Students often find it difficult to grasp fundamental ecological and evolutionary concepts because of their inherently mathematical nature. Likewise, the application of ecological and evolutionary theory often requires a high degree of mathematical competence. This book is a first step to addressing these difficulties, providing a broad introduction to the key methods and underlying concepts of mathematical models in ecology and evolution. The book is intended to serve the needs of undergraduate and postgraduate ecology and evolution students who need to access the mathematical and statistical modelling literature essential to their subjects. The book assumes minimal mathematics and statistics knowledge whilst covering a wide variety of methods, many of which are at the fore-front of ecological and evolutionary research. The book also highlights the applications of modelling to practical problems such as sustainable harvesting and biological control.
0 244浏览
免费 - cisco access listcisco access list fdfasfsfsfsffsf
4 106浏览
免费 - access2007 宝典access2007宝典,非常不错的教材
1 92浏览
免费 - JBoss4.2.0官方集群文档Clustering allows us to run an applications on several parallel servers (a.k.a cluster nodes). The load is distributed across different servers, and even if any of the servers fails, the application is still accessible via other cluster nodes. Clustering is crucial for scalable enterprise applications, as you can improve performance by simply adding more nodes to the cluster. The JBoss Application Server (AS) comes with clustering support out of the box. The simplest way to start a JBoss server cluster is to start several JBoss instances on the same local network, using the run -c all command for each instance. Those server instances, all started in the all configuration, detect each other and automatically form a cluster. In the first section of this chapter, I discuss basic concepts behind JBoss's clustering services. It is important that you understand those concepts before reading the rest of the chapter. Clustering configurations for specific types of applications are covered after this section.
4 99浏览
免费 - 09年07月ACM通讯09年07月ACM通讯 核心内容介绍:08年图灵奖获得者Barbara Liskov专访 Barbara Liskov, a professor at the Massachusetts Institute of Technology (MIT) and winner of the 2008 ACM A.M. Turing Award, has worked throughout her career to make software systems more accessible, reliable, and secure. We caught up with her recently to discuss a few of her most important accomplishments— and to find out what she’s working on now.
0 48浏览
免费 - (2009 Wiley)WiMAX Evolution:Emerging Technologies and ApplicationsThe next big step in the evolution of the Internet is ubiquitous availability enabled through mobile Internet. This revolutionary step is poised to increase the value of the Internet enormously as it will create a fundamental shift in the use of the Internet by bringing the Internet to the users as opposed to users having to go to the Internet. For this vision to become a reality, a number of requirements need to be met. First and foremost, affordable and ubiquitous mobile Internet access needs to be provided using the mobile cellular concept. This is poised to be fulfilled thanks to mobile WiMAX. Secondly, affordable and low-power mobile Internet devices and mobile PCs are needed. This is also happeningwith the computer industry making huge strides in making these devices more affordable. The low-cost netbook category with examples such as the ASUS Eee PC and variety of small mobile PCs or Mobile Internet Devices (MIDs) are now available and will undoubtedly become even more affordable in the near future.
0 114浏览
免费 - Cisco Press:Cisco NAC Appliance Enforcing Host Security with Clean AccesspdfCisco - Cisco NAC Appliance Enforcing Host Security with Clean Access.pdf
3 40浏览
免费 - ( [Practical.Arduino(第1版)].(Practical.Arduino( [Practical.Arduino(第1版)].(Practical.Arduino:
5 147浏览
免费 - 指纹识别 英文 Fingerprint Classification and MatchingThe problem of resolving the identity of a person can be categorized into two fundamentally dis- tinct types of problemswith different inherent complexities [1]: (i) verification and (ii) recognition. Verification (authentication) refers to the problem of confirming or denying a person’s claimed identity (Am I who I claim I am?). Recognition (Who am I?) refers to the problem of establish- ing a subject’s identity1 . A reliable personal identification is critical in many daily transactions. For example, access control to physical facilities and computer privileges are becoming increas- ingly important to prevent their abuse. There is an increasing interest in inexpensive and reliable personal identification in many emerging civilian, commercial, and financial applications.
0 167浏览
免费 - argomanual-0.26Software design is a cognitively challenging task. Designers must manually enter designs, but the primary difficulty is decision-making rather than data-entry. If designers improved their decision-mak- ing capabilities, it would result in better designs. Current CASE tools provide automation and graphical user interfaces that reduce the manual work of entering a design and transforming a design into code. They aid designers in decision-making mainly by providing visualization of design diagrams and simple syntactic checks. Also many CASE tools provide substantial benefits in the area of version control and concurrent design mechanisms. One area of design support that has been not been well supported is analysis of design decisions. Current CASE tools are usable in that they provide a GUI that allows designers to access all the features provided by the tool. And they support the design process in that they allow the designer to enter dia- grams in the style of popular design methodologies. But they typically do not provide process support to guide the designer through the design task. Instead, designers typically start with a blank page and must remember to cover every aspect of the design. ArgoUML is a domain-oriented design environment that provides cognitive support of object-oriented design. ArgoUML provides some of the same automation features of a commercial CASE tool, but it fo- cuses on features that support the cognitive needs of designers. These cognitive needs are described by three cognitive theories:
0 106浏览
免费 - Access.pdf教你如何学好Access The *.mdw file format associated with the Workgroup Information Files used to secure Access databases as described in Chapter 6 has not changed. This file format is identical to the format used by previous version of Access, but is only supported for databases saved in the older *.mdb format
0 55浏览
免费 - LDAPAccessUsingJNDI.pdf简单的介绍了如何用JDNI去做LDAP操作,很好的入门教程。
0 74浏览
免费 - vb数据库教程很好的一个vb连接access数据库的例子,对初学者很有帮助,
4 48浏览
免费 - 图书管理系统Access这是数据可的管理系统,这纯属于个人的制作,这也更适合大家的Access
0 35浏览
免费 - NWG_OTA_Provisioning_Specification_OMA-DM_Rel_1.5_v1.0.0Many different device types will be enabled by Worldwide Interoperability for Microwave Access (WiMAX) 3 technologies, such as notebooks, ultra mobile devices (UMD), handsets, and consumer electronics. A WiMAX 4 service provider would require a dynamic over the air provisioning solution to configure activate, enable 5 subscription for, and manage these device types. 6 This document specifies Stage 2 and Stage 3 specifications for Over-The-Air (OTA) Provisioning and Activation 7 based on OMA DM protocol for Model B WiMAX enabled devices (WiMAX MS). 8 The WiMAX Over-The-Air General Provisioning System Specification describes end to end over the air 9 provisioning and activation [OTAGEN].
3 76浏览
免费 - COGNITIVE RADIOS FOR DYNAMIC SPECTRUM ACCESS - The Throughput Potential of Cognitive Radio -- A Theoretical PerspectiveCOGNITIVE RADIOS FOR DYNAMIC SPECTRUM ACCESS - The Throughput Potential of Cognitive Radio -- A Theoretical Perspective
4 80浏览
免费 - Cambridge.How.to.Think.About.Algorithms.2008There are many algorithm texts that provide lots of well-polished code and proofs of correctness. Instead, this one presents insights, notations, and analogies to help the novice describe and think about algorithms like an expert. It is a bit like a carpenter studying hammers instead of houses. Jeff Edmonds provides both the big picture and easy step-by-step methods for developing algorithms, while avoiding the comon pitfalls. Paradigms such as loop invariants and recursion help to unify a huge range of algorithms into a few meta-algorithms. Part of the goal is to teach students to think abstractly. Without getting bogged down in formal proofs, the book fosters deeper understanding so that how and why each algorithm works is transparent. These insights are presented in a slow and clear manner accessible to second- or third-year students of computer science, preparing them to find on their own innovative ways to solve problems.
0 98浏览
免费 - 信息安全标准术语.pdf信息安全标准术语 1 序号 术语 缩略语 术语 定义 1. availability 可用性 被授权实体一旦需要就可访问和使用的特性. 2. Abstract Syntax Notation 1 ASN.1 抽象语法记法1 用来组织复杂数据对象的表示法.(用于规约复杂数据对象的语法) 3. access category 访问类别 根据实体被授权使用的资源,对实体分配的类别. 4. access control 访问控制 一种保证手段,即数据处理系统的资源只能由被授权实体按授权方式进 行访问. 5. access control list ACL 访问控制(列) 表 对资源拥有访问权的实体组成的列表 ……
0 117浏览
免费 - CCNP Quick ReferencePaperback: 384 pages Data: June 27, 2008 Format: PDF Description: As a final exam preparation tool, the CCNP Quick Reference provides a concise review of all objectives on the four CCNP exams, including BSCI (642-901), BCMSN (642-812), ISCW (642-825) and ONT (642-845). This book provides you with detailed, graphical-based information, highlighting only the key topics in cram-style format. The easy-to-reference format and succinct presentation help you drill on key exam topics. With this document as your guide, you will review topics on routing, switching, secure remote access networks, network security, and quality of service (QoS). This fact-filled Quick Reference allows you to get all-important information at a glance, helping you to focus your study on areas of weakness and to enhance memory retention of essential exam concepts. CCNP Quick Reference is part of a recommended learning path from Cisco® that includes simulation and hands-on training from authorized Cisco Learning Partners and self-study products from Cisco Press. To find out more about instructor-led training, e-learning, and hands-on instruction offered by authorized Cisco Learning Partners worldwide, please visit www.cisco.com/go/ authorizedtraining. Denise Donohue, CCIE® No. 9566, is manager of Solutions Engineering for ePlus Technology in Maryland. Denise was a Cisco instructor and course director for Global Knowledge and did network consulting for many years. Brent Stewart, CCNP®, CCDP®, CCSI, MCSE, is a network administrator for CommScope. He is responsible for designing and managing a large-scale worldwide IP network. He participated in the development of BSCI with Cisco and has written and taught extensively on CCNA® and CCNP. Jerold Swan, CCIE No. 17783, CCNP, CCSP®, is a senior network engineer for the Southern Ute Indian Tribe Growth Fund in Ignacio, CO. Prior to that he was a Cisco instructor and course director for Global Knowledge.
0 87浏览
免费 - A DWT-Based Video Watermarking AlgorithmIn this paper, we propose a DWT-based video watermarking algorithm applying DS-CDMA (Direct Sequence Code Division Multiple Access). We use improved Gold sequences to encode the watermark. The CDMA encoded watermark is embedded into the lowest frequency coefficients of DWT transformed video frames. Blind recovery of the embeddedwatermark is achieved by analyzingthe DWT coefficients of the watermarked video frames and the auto-correlation of orthogonal codes. The experimental results demonstrate that the proposed algorithm can produce watermarked contents in good visual quality and is robust to typical video operations such as MPEG-2 compression, Gaussian noise, cropping and frame dropping.
0 76浏览
免费 - Auerbach.Publications.Software.Requirements.eBook-LinGContents Preface ................................................................................................. xi Acknowledgments .............................................................................. xv 1 Overview .......................................................................................... 1 1.1 Why Freedom?........................................................................................... 1 1.2 Freedom Methodology Overview............................................................. 3 1.3 Methodology Benefits of Freedom............................................................ 4 1.4 Economic Benefits of Freedom................................................................. 4 1.4.1 Development Benefits ................................................................... 5 1.4.2 Maintenance Benefits .................................................................... 6 1.4.3 Total Economic Benefits................................................................ 7 References.......................................................................................................... 7 2 Infor mation-Hiding Secr ets ........................................................... 9 2.1 Chapter Overview..................................................................................... 9 2.2 Information-Hiding Concepts.................................................................... 9 2.2.1 Encapsulation................................................................................. 9 2.2.2 Information-Hiding ...................................................................... 10 2.3 Contrast with Traditional Design ............................................................ 12 2.4 Contrast with Current OO Practice........................................................ 13 References........................................................................................................ 17 3 What Ar e Requir ements? ............................................................. 19 3.1 Chapter Overview................................................................................... 19 3.2 Definition of Requirements..................................................................... 20 3.3 Definition of Design................................................................................ 22 3.4 Definition of Implementation ................................................................. 23 3.5 Design and Implementation Constraints ................................................ 24 References........................................................................................................ 25 vi Contents 4 Freedom Requir ements Pr ocess ................................................. 27 4.1 Chapter Overview................................................................................... 27 4.2 Enterprise Process Models ...................................................................... 28 4.3 Bounding the Black Box ......................................................................... 28 4.4 Context Diagrams.................................................................................... 29 4.5 Requirements Process ............................................................................. 31 4.6 Example Problem Enterprise Process Model.......................................... 34 4.7 Example Problem Black Box Bounding.................................................. 37 4.8 Example Problem Context Diagram ....................................................... 40 References........................................................................................................ 42 5 Quality Requir ements .................................................................. 43 5.1 Chapter Overview................................................................................... 43 5.2 Types of Requirements ........................................................................... 43 5.3 Measuring Software Quality .................................................................... 45 5.4 Where’s the Developer? .......................................................................... 47 5.5 ‘ility Mapping .......................................................................................... 48 5.6 Example Problem Quality Requirements................................................ 48 5.6.1 Functionality ................................................................................ 48 5.6.2 Reliability ..................................................................................... 50 5.6.3 Usability ....................................................................................... 51 5.6.4 Administerability.......................................................................... 51 5.6.5 Maintainability ............................................................................. 51 5.6.6 Execution Speed.......................................................................... 52 5.6.7 Storage Demand .......................................................................... 52 References........................................................................................................ 53 6 Stimulus Identifi cation and Cohesion ........................................ 55 6.1 Chapter Overview................................................................................... 55 6.2 What Is a Stimulus? ................................................................................. 56 6.2.1 Types of Stimuli........................................................................... 56 6.2.2 Sources of Stimuli........................................................................ 57 6.3 Stimulus Sets............................................................................................ 59 6.3.1 Example Human User Stimulus Set............................................. 60 6.3.2 Example External-System Stimulus Set ....................................... 62 6.3.3 Source-Neutral Stimulus Set Recording....................................... 62 6.4 Functionality Screens .............................................................................. 63 6.5 Programmatic Protocols .......................................................................... 65 6.5.1 Command-Data Streams............................................................... 65 Step 1: Group Command Stimuli by Level................................. 67 Step 2: Group Data Stimuli by Command.................................. 67 6.5.2 XML Streams................................................................................ 68 Step 1: Group Command Stimuli by Level................................. 69 Step 2: Group Data Stimuli by Command.................................. 70 Contents vii 6.6 Example Problem Functionality Screen.................................................. 70 6.7 Example Problem Programmatic Protocol.............................................. 72 References........................................................................................................ 75 7 Stimulus Or ganization and Ar chitectur e.................................... 77 7.1 Chapter Overview................................................................................... 77 7.2 Stimulus Set Architecture ........................................................................ 77 7.3 New Stimulus Response.......................................................................... 78 7.4 Functionality Trees .................................................................................. 79 7.5 Sample Functionality Tree ....................................................................... 79 7.6 Example Problem: Programmatic Interface Functionality Tree .............. 82 Step 1 ...................................................................................................... 83 Step 2 ...................................................................................................... 83 Step 3 ...................................................................................................... 83 7.7 Example Problem: Reverse Engineering the External Interface Architecture.............................................................................. 84 7.8 Example Problem Functionality Tree...................................................... 85 7.9 Alternate Kickoff Approaches ................................................................. 91 7.10 Functionality Tree Neutrality................................................................... 92 References........................................................................................................ 93 8 Reusable Requir ements ................................................................ 95 8.1 Chapter Overview................................................................................... 95 8.2 Repetitive and Reusable Stimulus Sets ................................................... 95 8.3 Reusable Requirements Components ..................................................... 98 8.4 Example Reusable Requirements Component ....................................... 99 8.5 Example Problem Reusable Requirements........................................... 101 References...................................................................................................... 103 9 Incr emental Development ......................................................... 105 9.1 Chapter Overview................................................................................. 105 9.2 Requirements Prioritization .................................................................. 106 Step 1. Prioritize Lowest-Level Stimuli................................................. 106 Step 2. Prioritize Upper-Level Stimuli.................................................. 107 9.3 Example Problem Requirements Priorities........................................... 108 10 Responses and Behavior T ables ................................................ 111 10.1 Chapter Overview................................................................................. 111 10.2 Types of Responses............................................................................... 111 10.2.1 Response Visibility ..................................................................... 112 10.2.2 Response Desirability ................................................................ 113 10.2.3 Response Prescriptiveness ........................................................ 114 10.2.4 Response Classification ............................................................. 114 viii Contents 10.3 Behavior Tables...................................................................................... 115 10.3.1 Behavior Table Rule and Format ............................................... 116 10.3.2 Behavior Table Columns............................................................ 117 10.3.3 Behavior Table Rows ................................................................. 118 10.3.4 Behavior Table Generic Example .............................................. 118 10.3.5 Behavior Table Benefits and Costs ............................................ 118 10.4 Response Recording Languages............................................................ 121 10.5 Response Recording Syntax.................................................................. 122 10.5.1 Declaration Statements.............................................................. 123 10.5.2 Sequence Statement .................................................................. 125 10.5.3 Selection Statement ................................................................... 126 10.5.4 Repetition Statement ................................................................. 127 10.6 Example Problem Behavior Tables........................................................ 127 10.6.1 Example Problem Human Interface Behavior Tables................ 128 10.6.2 Behavior Specification in Reality............................................... 139 References...................................................................................................... 143 11 Requir ements Encapsulation Design ........................................ 145 11.1 Chapter Overview................................................................................. 145 11.2 Requirements Encapsulation Design Rule ............................................ 146 11.3 Canonical Design Architecture.............................................................. 148 11.4 Example Problem Functionality Module Architecture.......................... 151 12 Requir ements Encapsulation ..................................................... 155 12.1 Chapter Overview................................................................................. 155 12.2 Functionality Modules........................................................................... 156 12.3 Common Service Modules .................................................................... 157 12.4 Functionality Module Structure ............................................................ 158 12.4.1 Functionality Module Declaration ........................................... 159 12.4.2 Functionality Module Stimulus Methods................................. 159 12.4.3 Functionality Module Response Methods ............................... 162 12.4.4 Functionality Module Access Methods.................................... 162 12.4.5 Functionality Module Hidden Information ............................. 163 12.4.6 Functionality Module External Interface................................. 163 12.5 Example Problem Functionality Module .............................................. 164 13 Inter face Pr ototyping ................................................................. 169 13.1 Chapter Overview................................................................................. 169 13.2 Purpose of Prototypes........................................................................... 169 13.2.1 Clarify Requirements ............................................................... 169 13.2.2 Obtain User Commitment ....................................................... 170 13.2.3 Training.................................................................................... 170 13.2.4 Demonstration ......................................................................... 171 13.2.5 Evaluate Solutions.................................................................... 171 Contents ix 13.3 Types of Prototypes .............................................................................. 171 13.3.1 Partial Functional Simulation................................................... 172 13.3.2 Vertical Functional Simulation ................................................ 173 13.3.3 Robust Vertical Functional Simulation .................................... 174 13.3.4 External Interface Simulation.................................................. 174 13.3.5 Full Functional Simulation....................................................... 174 13.3.6 Robust Functional Simulation ................................................. 175 13.3.7 External Interface Mockup...................................................... 175 13.3.8 Full Functional Mockup .......................................................... 175 13.3.9 Release ..................................................................................... 176 13.3.10 Which To Use? ......................................................................... 176 13.4 Example Problem Interface Mockup .................................................... 177 References...................................................................................................... 197 14 Requir ements Evolution ............................................................ 199 14.1 Chapter Overview................................................................................. 199 14.2 Handling the Ripple Effect of Change.................................................. 199 14.2.1 Ripple Effect of Stimulus Change ............................................. 200 14.2.2 Ripple Effect of External Response Change ............................. 203 14.2.3 Ripple Effect of Protocol Change ............................................. 205 14.3 Requirements Change Example ............................................................ 207 Appendices A Softwar e Requir ements Specifi cation ....................................... 223 B Cost Savings Estimate Details .................................................... 227 C Glossary ....................................................................................... 235 Index .................................................................................................. 243
5 104浏览
免费 - HDAISHistorical Data Access from Industrial Systems Specification
0 105浏览
免费 - Securing Exchange Server 2003 and Outlook Web AccessSecuring Exchange Server 2003 and Outlook Web Access
0 93浏览
免费 - probabilty essensial统计数学概率基础与应用初专业经典学 重要
0 88浏览
免费 - optical access networks and advanced photonics technologies and deployment strategies光网络书籍 optical access networks and advanced photonics technologies and deployment strategies
0 69浏览
免费 - Access 2000开发使用手册003Access 2000 开发使用手册 003
0 70浏览
免费 - Access.2007宝典-附录Access.2007宝典,学习access的不错教材
0 57浏览
免费 - access2007实用教程详细描述access2007操作 从access基本概念到access的编程及应用
0 71浏览
免费 - Next-Generation FTTH Passive Optical Networks_Research towards unlimited bandwidth access:)The first part of this book is devoted to network architectures, the second to electro-optical devices and techniques, the third to the higher layer issues and the fourth part to techno-economic analysis.
4 76浏览
免费 - Networkers2009:BRKUCT-2001 - SIP Trunking for SP AccessNetworkers2009:BRKUCT-2001 - SIP Trunking for SP Access
0 68浏览
免费 - Cognitive Networks and Dynamic Spectrum AccessLuiz DaSilva Virginia Tech (Collaborators: A. MacKenzie, R. Thomas, J. Suris, Z. Han, V. Srivastava
0 62浏览
免费 - cisco ccie 资料cisco ccie 资料 CCIE_Troubleshooting_Remote_Access_Networks.pdf
0 58浏览
免费 - ITIL Version 3 at a Glance Information Quick ReferenceITIL Version 3 at a Glance Information Quick Reference Table of Contents Introduction ........................................................................1 Purpose.............................................................................................. 1 Audience............................................................................................ 1 Organization of the Book ................................................................. 1 Service Strategy .................................................................3 Practices ............................................................................................ 3 Overview Diagram............................................................................. 5 Service Strategy Key Concepts....................................................... 6 Service Design .................................................................11 Service Design Key Concepts ....................................................... 13 Service Catalog Management........................................................ 16 Service Level Management............................................................ 18 Capacity Management.................................................................... 20 Availability Management................................................................ 22 IT Service Continuity Management............................................... 24 Information Security Management................................................ 26 Supplier Management..................................................................... 28 Other Practices ............................................................................... 30 Additional Service Design Roles................................................... 30 Service Transition ............................................................31 Service Transition Key Concepts.................................................. 33 Service Asset and Configuration Management........................... 38 Change Management...................................................................... 42 Release and Deployment Management ........................................ 44 Service Validation and Testing...................................................... 46 Transition Planning and Support .................................................. 48 Knowledge Management................................................................ 50 Evaluation.........................................................................................52 Other Practices ................................................................................54 Additional Service Transition Roles..............................................54 Service Operation.............................................................55 Service Operation Key Concepts...................................................57 Event Management..........................................................................60 Incident Management......................................................................62 Request Fulfillment .........................................................................64 Problem Management .....................................................................66 Access Management.......................................................................68 Other Practices ................................................................................70 Service Operation Functions .........................................................72 Additional Service Operation Roles ..............................................74 Continual Service Improvement......................................75 viii Table of Contents Index..................................................................................79
0 45浏览
免费 - VMvarer升级指南中文版ESX Server 3.5、ESX Server 3i 版本 3.5 和 VirtualCenter 2.5 的 Update 2 版本 索引 数字 530 Please Login with USER and PASS 47 B 备份策略15 C CD 测试64 测试, 介质64 磁盘 本地19, 23, 37 持久模式20, 61 分区65 GSX Server 78 共享的 VMFS 23 裸62 RAID 59 SATA 59 SCSI 59 VirtualCenter 77 VMDK 80 Workstation 78 虚拟19, 24, 36, 40, 61 D DRAC 59 端口 80 46 E ESX Server 升级支持55 esxupdate 69 EULA 67, 69 F 方案28, 31, 39 G grub, 引导加载程序65 GSX Server 虚拟磁盘, 与 ESX Server 配 合使用78 I IDE 磁盘59 ILO 59 iSCSI 磁盘59 J 键盘64, 67 脚本68 介质测试64 K 块大小, VMFS3 的限制18, 70 M Microsoft Access 数据库 迁移51 模板, 升级77 N NFS 装载, 升级后还原61 内部升级19, 22 升级指南 86 VMware, Inc. P PCI 设备, 分配60 Q 迁移升级20, 22 R RSA II 59 S SAN 59 SAS 磁盘60 SATA 磁盘59 SCSI 磁盘59 SDK 13 升级 ESX Server 25, 62, 81 阶段 1 22, 80 阶段 2 23, 81, 82 阶段 3 26 阶段 4 27 具有裸磁盘的虚拟机62 模板77 使用 SAN 的 ESX Server 主机23 使用本地磁盘的 ESX Server 主 机23 VI Client 80 VirtualCenter 80 VirtualCenter Server 48 VirtualCenter 数据库47, 49 VMFS2 到 VMFS3 25, 70, 82 VMware Tools 74, 84 虚拟硬件73, 83 支持45, 55 升级 VMotion 20 升级方案28, 31, 39 升级要求, ESX Server 58 鼠标65 数据库47 数据库升级向导52 T tarball 68 TCP/IP 46 调试模式61 U upgrade.pl 68 V VM2 虚拟机格式19, 73 VM3 虚拟机格式19, 73 VMFS2 18 VMFS3 18 块大小18, 70 VMware 架构, 发生的变化17 VMware Tools, 升级74 W Windows 2000 Server SP4 50 Workstation 虚拟磁盘, 与 ESX Server 配 合使用78 X 虚拟机 升级过程中的停机时间17 Y 引导加载程序 grub 65 记录67 位置67 用例28, 31, 39 预升级脚本17, 63 Z 支持的升级 ESX Server 55 VirtualCenter 45 VMware, Inc. 87 索引 主引导记录67 最终用户许可协议67, 69
0 105浏览
免费 - cooperative communications合作通信This article reviews progress in cooperative communication networks. Our survey is by no means exhaustive. Instead, we assemble a representative sample of recent results to serve as a roadmap for the area. Our emphasis is on wireless networks, but many of the results apply to cooperation in wireline networks and mixed wireless/wireline networks. We intend our presentation to be a tutorial for the reader who is familiar with information theory concepts but has not actively followed the field. For the active researcher, this contribution should serve as a useful digest of significant results. This article is meant to encourage readers to find new ways to apply the ideas of network cooperation and should make the area sufficiently accessible to network designers to contribute to the advancement of networking practice.
0 60浏览
免费 - Access 2000开发使用手册030Access 2000开发使用手册030
0 54浏览
免费 - Advances in Optical Access Networks -- tek_kddi_OFC_v04_slides2005 OFC 講義資 Advances in Optical Access Networks
0 63浏览
免费 - multiple access protocols performance and analysis 英文版,超清晰,非扫描multiple access protocols performance and analysis 英文版,超清晰,非扫描
0 86浏览
免费 - Multidimensional Access Methods (1997).pdfMultidimensional Access Methods (1997).pdf 文件,欢迎大家下载
0 58浏览
免费 - cognos8.1 权限安装配置1.Sun One Directory Server 5.2 2.Cognos PowerPlay Server 7.3 MR2 Server Windows
0 167浏览
免费 - IEEE1609.1IEEE Trial-Use Standard for Wireless Access in Vehicular Environments (WAVE)— Resource Manager
0 49浏览
免费 - Access 2000开发使用手册001Access 2000 开发使用手册 001
0 66浏览
免费 - sas_sata_accessories.pdfsas_sata_accessories.pdf
0 107浏览
免费 - Access 入门(英文)Access的概念和操作的基础入门介绍,一节Access/VBA的简单介绍
0 44浏览
免费 - This document describes the GAMS interface to OSL. osl.pdfThis document describes the GAMS interface to OSL. OSL is the IBM Optimization Subroutine Library, containing high performance solvers for LP (linear programming), MIP (mixed integer programming) and QP (quadratic programming) problems. GAMS does not support the QP capabilities of OSL, you have to use a general non-linear solver like MINOS or CONOPT for that. OSL offers quite a few algorithms and tuning parameters. Most of these are accessible by the GAMS user through an option file. In most cases GAMS/OSL should perform satisfactory without using any options.
0 111浏览
免费 - 在Mapinfo系统中嵌套Access7_0的方法在Mapinfo系统中嵌套Access7_0的方法
0 45浏览
免费 - Access 2000开发使用手册012Access 2000开发使用手册012
0 50浏览
免费 - Networkers2009:BRKCAM-3014 - Advanced Impact of Emerging Technologies on Campus Design - Intelligent AccessNetworkers2009:BRKCAM-3014 - Advanced Impact of Emerging Technologies on Campus Design - Intelligent Access
0 106浏览
免费 - Access 2000开发使用手册021Access 2000开发使用手册021
0 56浏览
免费 - Introduction-to-Algorithms-SecondThis book provides a comprehensive introduction to the modern study of computer algorithms. It presents many algorithms and covers them in considerable depth, yet makes their design and analysis accessible to all levels of readers. We have tried to keep explanations elementary without sacrificing depth of coverage or mathematical rigor. Each chapter presents an algorithm, a design technique, an application area, or a related topic. Algorithms are described in English and in a "pseudocode" designed to be readable by anyone who has done a little programming. The book contains over 230 figures illustrating how the algorithms work. Since we emphasize efficiency as a design criterion, we include careful analyses of the running times of all our algorithms. The text is intended primarily for use in undergraduate or graduate courses in algorithms or data structures. Because it discusses engineering issues in algorithm design, as well as mathematical aspects, it is equally well suited for self-study by technical professionals. In this, the second edition, we have updated the entire book. The changes range from the addition of new chapters to the rewriting of individual sentences.
0 57浏览
免费