نتایج جستجو برای: computer systems software
تعداد نتایج: 1886967 فیلتر نتایج به سال:
Modern computing technology is creating a growing infrastructure for high performance, nearly ubiquitous computing and communication. This infrastructure extends the reach of computation and information beyond the traditional framework of a computer application running on a fixed set of machines. The architectures that suffice for such traditional software do not address the challenges of highl...
Computer software similarities play important roles in users’ skills transfer from one application to another. Despite common software attributes recognized in extant literature, a systematic understanding of the components and structure of software similarities has not been fully developed. To address the issue, a Delphi study was conducted to explore the underlying dimensions of software simi...
In recent years, advances in computer architecture have slowed dramatically with most simulation results demonstrating only incremental architectural innovation. This is further exacerbated by increased processor and system complexity spurred by a seemingly unlimited number of transistors at computer architect’s disposal. Computer architects produce a myopic view of their systems through the le...
There is no doubt that malicious programs are one of the permanent threats to computer systems. Malicious programs distract the normal process of computer systems to apply their roguish purposes. Meanwhile, there is also a type of malware known as the ransomware that limits victims to access their computer system either by encrypting the victimchr('39')s files or by locking the system. Despite ...
Computer-Aided Software Engineering (CASE) tools are popular software programs to support the members of development team (including analysts, designers, coders, database administrators, and project managers) in building new systems. Up-to-date consistent knowledge representation documentation is crucial for companies developing Product Configuration Systems (PCSs). The literature reports vario...
Software piracy, the unauthorized copying of computer software, poses a significant threat to the computer industry. In recent years, progress has been made to reduce software piracy. However, computer software is greatly susceptible to theft and software vendors worldwide lost a staggering $50 billion due to piracy this past year [4]. This paper outlines research in progress that will provide ...
A key issue in integrating process planning systems with design systems and production planning systems is how to overcome barriers in data exchange and sharing amongst software systems. Each software system has its own proprietary data format and definition, which is often not available to users. This paper presents the activity model and a machining process plan data model developed as an int...
Recent developments in the design and manufacture of microcomputers together with improved simulation techniques make it possible to achieve the speed and accuracy required for the dynamic simulation of power systems in real time. This paper presents some experimental results and outlines new ideas on hardware architecture, mathematical algorithms and software development for this purpose. The ...
Production planning is performed through diverse methods according to the type of the system it is structured upon. One of the most important steps before production planning is to determine which system best fits the firm, and how the facilities should be designed. Both job-shop and group-technology systems have their own pros and cons, each of which is suitable to a specific kind of factory. ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید