An annotated bibliography of computer supported cooperative work
- 格式:pdf
- 大小:159.54 KB
- 文档页数:40
人工智能是一门新兴的具有挑战力的学科。
自人工智能诞生以来,发展迅速,产生了许多分支。
诸如强化学习、模拟环境、智能硬件、机器学习等。
但是,在当前人工智能技术迅猛发展,为人们的生活带来许多便利。
下面是搜索整理的人工智能英文参考文献的分享,供大家借鉴参考。
人工智能英文参考文献一:[1]Lars Egevad,Peter Str?m,Kimmo Kartasalo,Henrik Olsson,Hemamali Samaratunga,Brett Delahunt,Martin Eklund. The utility of artificial intelligence in the assessment of prostate pathology[J]. Histopathology,2020,76(6).[2]Rudy van Belkom. The Impact of Artificial Intelligence on the Activities ofa Futurist[J]. World Futures Review,2020,12(2).[3]Reza Hafezi. How Artificial Intelligence Can Improve Understanding in Challenging Chaotic Environments[J]. World Futures Review,2020,12(2).[4]Alejandro Díaz-Domínguez. How Futures Studies and Foresight Could Address Ethical Dilemmas of Machine Learning and Artificial Intelligence[J]. World Futures Review,2020,12(2).[5]Russell T. Warne,Jared Z. Burton. Beliefs About Human Intelligence in a Sample of Teachers and Nonteachers[J]. Journal for the Education of the Gifted,2020,43(2).[6]Russell Belk,Mariam Humayun,Ahir Gopaldas. Artificial Life[J]. Journal of Macromarketing,2020,40(2).[7]Walter Kehl,Mike Jackson,Alessandro Fergnani. Natural Language Processing and Futures Studies[J]. World Futures Review,2020,12(2).[8]Anne Boysen. Mine the Gap: Augmenting Foresight Methodologies with Data Analytics[J]. World Futures Review,2020,12(2).[9]Marco Bevolo,Filiberto Amati. The Potential Role of AI in Anticipating Futures from a Design Process Perspective: From the Reflexive Description of “Design” to a Discussion of Influences by the Inclusion of AI in the Futures Research Process[J]. World Futures Review,2020,12(2).[10]Lan Xu,Paul Tu,Qian Tang,Dan Seli?teanu. Contract Design for Cloud Logistics (CL) Based on Blockchain Technology (BT)[J]. Complexity,2020,2020.[11]L. Grant,X. Xue,Z. Vajihi,A. Azuelos,S. Rosenthal,D. Hopkins,R. Aroutiunian,B. Unger,A. Guttman,M. Afilalo. LO32: Artificial intelligence to predict disposition to improve flow in the emergency department[J]. CJEM,2020,22(S1).[12]A. Kirubarajan,A. Taher,S. Khan,S. Masood. P071: Artificial intelligence in emergency medicine: A scoping review[J]. CJEM,2020,22(S1).[13]L. Grant,P. Joo,B. Eng,A. Carrington,M. Nemnom,V. Thiruganasambandamoorthy. LO22: Risk-stratification of emergency department syncope by artificial intelligence using machine learning: human, statistics or machine[J]. CJEM,2020,22(S1).[14]Riva Giuseppe,Riva Eleonora. OS for Ind Robots: Manufacturing Robots Get Smarter Thanks to Artificial Intelligence.[J]. Cyberpsychology, behavior and social networking,2020,23(5).[15]Markus M. Obmann,Aurelio Cosentino,Joshy Cyriac,Verena Hofmann,Bram Stieltjes,Daniel T. Boll,Benjamin M. Yeh,Matthias R. Benz. Quantitative enhancement thresholds and machine learning algorithms for the evaluation of renal lesions using single-phase split-filter dual-energy CT[J]. Abdominal Radiology,2020,45(1).[16]Haytham H. Elmousalami,Mahmoud Elaskary. Drilling stuck pipe classification and mitigation in the Gulf of Suez oil fields using artificial intelligence[J]. Journal of Petroleum Exploration and Production Technology,2020,10(10).[17]Rüdiger Schulz-Wendtland,Karin Bock. Bildgebung in der Mammadiagnostik –Ein Ausblick <trans-title xml:lang="en">Imaging in breast diagnostics—an outlook [J]. Der Gyn?kologe,2020,53(6).</trans-title>[18]Nowakowski Piotr,Szwarc Krzysztof,Boryczka Urszula. Combining an artificial intelligence algorithm and a novel vehicle for sustainable e-waste collection[J]. Science of the Total Environment,2020,730.[19]Wang Huaizhi,Liu Yangyang,Zhou Bin,Li Canbing,Cao Guangzhong,Voropai Nikolai,Barakhtenko Evgeny. Taxonomy research of artificial intelligence for deterministic solar power forecasting[J]. Energy Conversion and Management,2020,214.[20]Kagemoto Hiroshi. Forecasting a water-surface wave train with artificial intelligence- A case study[J]. Ocean Engineering,2020,207.[21]Tomonori Aoki,Atsuo Yamada,Kazuharu Aoyama,Hiroaki Saito,Gota Fujisawa,Nariaki Odawara,Ryo Kondo,Akiyoshi Tsuboi,Rei Ishibashi,Ayako Nakada,Ryota Niikura,Mitsuhiro Fujishiro,Shiro Oka,Soichiro Ishihara,Tomoki Matsuda,Masato Nakahori,Shinji Tanaka,Kazuhiko Koike,Tomohiro Tada. Clinical usefulness of a deep learning‐based system as the first screening on small‐bowel capsule endoscopy reading[J]. Digestive Endoscopy,2020,32(4).[22]Masashi Fujii,Hajime Isomoto. Next generation of endoscopy: Harmony with artificial intelligence and robotic‐assisted devices[J]. Digestive Endoscopy,2020,32(4).[23]Roberto Verganti,Luca Vendraminelli,Marco Iansiti. Innovation and Design in the Age of Artificial Intelligence[J]. Journal of Product Innovation Management,2020,37(3).[24]Yuval Elbaz,David Furman,Maytal Caspary Toroker. Modeling Diffusion in Functional Materials: From Density Functional Theory to Artificial Intelligence[J]. Advanced Functional Materials,2020,30(18).[25]Dinesh Visva Gunasekeran,Tien Yin Wong. Artificial Intelligence in Ophthalmology in 2020: A Technology on the Cusp for Translation and Implementation[J]. Asia-Pacific Journal of Ophthalmology,2020,9(2).[26]Fu-Neng Jiang,Li-Jun Dai,Yong-Ding Wu,Sheng-Bang Yang,Yu-Xiang Liang,Xin Zhang,Cui-Yun Zou,Ren-Qiang He,Xiao-Ming Xu,Wei-De Zhong. The study of multiple diagnosis models of human prostate cancer based on Taylor database by artificial neural networks[J]. Journal of the Chinese Medical Association,2020,83(5).[27]Matheus Calil Faleiros,Marcello Henrique Nogueira-Barbosa,Vitor Faeda Dalto,JoséRaniery Ferreira Júnior,Ariane Priscilla Magalh?es Tenório,Rodrigo Luppino-Assad,Paulo Louzada-Junior,Rangaraj Mandayam Rangayyan,Paulo Mazzoncini de Azevedo-Marques. Machine learning techniques for computer-aided classification of active inflammatory sacroiliitis in magnetic resonance imaging[J]. Advances in Rheumatology,2020,60(1078).[28]Balamurugan Balakreshnan,Grant Richards,Gaurav Nanda,Huachao Mao,Ragu Athinarayanan,Joseph Zaccaria. PPE Compliance Detection using Artificial Intelligence in Learning Factories[J]. Procedia Manufacturing,2020,45.[29]M. Stévenin,V. Avisse,N. Ducarme,A. de Broca. Qui est responsable si un robot autonome vient à entra?ner un dommage ?[J]. Ethique et Santé,2020.[30]Fatemeh Barzegari Banadkooki,Mohammad Ehteram,Fatemeh Panahi,Saad Sh. Sammen,Faridah Binti Othman,Ahmed EL-Shafie. Estimation of Total Dissolved Solids (TDS) using New Hybrid Machine Learning Models[J]. Journal of Hydrology,2020.[31]Adam J. Schwartz,Henry D. Clarke,Mark J. Spangehl,Joshua S. Bingham,DavidA. Etzioni,Matthew R. Neville. Can a Convolutional Neural Network Classify Knee Osteoarthritis on Plain Radiographs as Accurately as Fellowship-Trained Knee Arthroplasty Surgeons?[J]. The Journal of Arthroplasty,2020.[32]Ivana Nizetic Kosovic,Toni Mastelic,Damir Ivankovic. Using Artificial Intelligence on environmental data from Internet of Things for estimating solar radiation: Comprehensive analysis[J]. Journal of Cleaner Production,2020.[33]Lauren Fried,Andrea Tan,Shirin Bajaj,Tracey N. Liebman,David Polsky,Jennifer A. Stein. Technological advances for the detection of melanoma: Part I. Advances in diagnostic techniques[J]. Journal of the American Academy of Dermatology,2020.[34]Mohammed Amoon,Torki Altameem,Ayman Altameem. Internet of things Sensor Assisted Security and Quality Analysis for Health Care Data Sets Using Artificial Intelligent Based Heuristic Health Management System[J]. Measurement,2020.[35]E. Lotan,C. Tschider,D.K. Sodickson,A. Caplan,M. Bruno,B. Zhang,Yvonne W. Lui. Medical Imaging and Privacy in the Era of Artificial Intelligence: Myth, Fallacy, and the Future[J]. Journal of the American College of Radiology,2020.[36]Fabien Lareyre,Cédric Adam,Marion Carrier,Juliette Raffort. Artificial Intelligence in Vascular Surgery: moving from Big Data to Smart Data[J]. Annals of Vascular Surgery,2020.[37]Ilesanmi Daniyan,Khumbulani Mpofu,Moses Oyesola,Boitumelo Ramatsetse,Adefemi Adeodu. Artificial intelligence for predictive maintenance in the railcar learning factories[J]. Procedia Manufacturing,2020,45.[38]Janet L. McCauley,Anthony E. Swartz. Reframing Telehealth[J]. Obstetrics and Gynecology Clinics of North America,2020.[39]Jean-Emmanuel Bibault,Lei Xing. Screening for chronic obstructive pulmonary disease with artificial intelligence[J]. The Lancet Digital Health,2020,2(5).[40]Andrea Laghi. Cautions about radiologic diagnosis of COVID-19 infection driven by artificial intelligence[J]. The Lancet Digital Health,2020,2(5).人工智能英文参考文献二:[41]K. Orhan,I. S. Bayrakdar,M. Ezhov,A. Kravtsov,T. ?zyürek. Evaluation of artificial intelligence for detecting periapical pathosis on cone‐beam computed tomography scans[J]. International Endodontic Journal,2020,53(5).[42]Avila A M,Mezi? I. Data-driven analysis and forecasting of highway traffic dynamics.[J]. Nature communications,2020,11(1).[43]Neri Emanuele,Miele Vittorio,Coppola Francesca,Grassi Roberto. Use of CT andartificial intelligence in suspected or COVID-19 positive patients: statement of the Italian Society of Medical and Interventional Radiology.[J]. La Radiologia medica,2020.[44]Tau Noam,Stundzia Audrius,Yasufuku Kazuhiro,Hussey Douglas,Metser Ur. Convolutional Neural Networks in Predicting Nodal and Distant Metastatic Potential of Newly Diagnosed Non-Small Cell Lung Cancer on FDG PET Images.[J]. AJR. American journal of roentgenology,2020.[45]Coppola Francesca,Faggioni Lorenzo,Regge Daniele,Giovagnoni Andrea,Golfieri Rita,Bibbolino Corrado,Miele Vittorio,Neri Emanuele,Grassi Roberto. Artificial intelligence: radiologists' expectations and opinions gleaned from a nationwide online survey.[J]. La Radiologia medica,2020.[46]?. ? ? ? ? [J]. ,2020,25(4).[47]Savage Rock H,van Assen Marly,Martin Simon S,Sahbaee Pooyan,Griffith Lewis P,Giovagnoli Dante,Sperl Jonathan I,Hopfgartner Christian,K?rgel Rainer,Schoepf U Joseph. Utilizing Artificial Intelligence to Determine Bone Mineral Density Via Chest Computed Tomography.[J]. Journal of thoracic imaging,2020,35 Suppl 1.[48]Brzezicki Maksymilian A,Bridger Nicholas E,Kobeti? Matthew D,Ostrowski Maciej,Grabowski Waldemar,Gill Simran S,Neumann Sandra. Artificial intelligence outperforms human students in conducting neurosurgical audits.[J]. Clinical neurology and neurosurgery,2020,192.[49]Lockhart Mark E,Smith Andrew D. Fatty Liver Disease: Artificial Intelligence Takes on the Challenge.[J]. Radiology,2020,295(2).[50]Wood Edward H,Korot Edward,Storey Philip P,Muscat Stephanie,Williams George A,Drenser Kimberly A. The retina revolution: signaling pathway therapies, genetic therapies, mitochondrial therapies, artificial intelligence.[J]. Current opinion in ophthalmology,2020,31(3).[51]Ho Dean,Quake Stephen R,McCabe Edward R B,Chng Wee Joo,Chow Edward K,Ding Xianting,Gelb Bruce D,Ginsburg Geoffrey S,Hassenstab Jason,Ho Chih-Ming,Mobley William C,Nolan Garry P,Rosen Steven T,Tan Patrick,Yen Yun,Zarrinpar Ali. Enabling Technologies for Personalized and Precision Medicine.[J]. Trends in biotechnology,2020,38(5).[52]Fischer Andreas M,Varga-Szemes Akos,van Assen Marly,Griffith L Parkwood,Sahbaee Pooyan,Sperl Jonathan I,Nance John W,Schoepf U Joseph. Comparison of Artificial Intelligence-Based Fully Automatic Chest CT Emphysema Quantification to Pulmonary Function Testing.[J]. AJR. American journal ofroentgenology,2020,214(5).[53]Moore William,Ko Jane,Gozansky Elliott. Artificial Intelligence Pertaining to Cardiothoracic Imaging and Patient Care: Beyond Image Interpretation.[J]. Journal of thoracic imaging,2020,35(3).[54]Hwang Eui Jin,Park Chang Min. Clinical Implementation of Deep Learning in Thoracic Radiology: Potential Applications and Challenges.[J]. Korean journal of radiology,2020,21(5).[55]Mateen Bilal A,David Anna L,Denaxas Spiros. Electronic Health Records to Predict Gestational Diabetes Risk.[J]. Trends in pharmacological sciences,2020,41(5).[56]Yao Xiang,Mao Ling,Lv Shunli,Ren Zhenghong,Li Wentao,Ren Ke. CT radiomics features as a diagnostic tool for classifying basal ganglia infarction onset time.[J]. Journal of the neurological sciences,2020,412.[57]van Assen Marly,Banerjee Imon,De Cecco Carlo N. Beyond the Artificial Intelligence Hype: What Lies Behind the Algorithms and What We Can Achieve.[J]. Journal of thoracic imaging,2020,35 Suppl 1.[58]Guzik Tomasz J,Fuster Valentin. Leaders in Cardiovascular Research: Valentin Fuster.[J]. Cardiovascular research,2020,116(6).[59]Fischer Andreas M,Eid Marwen,De Cecco Carlo N,Gulsun Mehmet A,van Assen Marly,Nance John W,Sahbaee Pooyan,De Santis Domenico,Bauer Maximilian J,Jacobs Brian E,Varga-Szemes Akos,Kabakus Ismail M,Sharma Puneet,Jackson Logan J,Schoepf U Joseph. Accuracy of an Artificial Intelligence Deep Learning Algorithm Implementing a Recurrent Neural Network With Long Short-term Memory for the Automated Detection of Calcified Plaques From Coronary Computed Tomography Angiography.[J]. Journal of thoracic imaging,2020,35 Suppl 1.[60]Ghosh Adarsh,Kandasamy Devasenathipathy. Interpretable Artificial Intelligence: Why and When.[J]. AJR. American journal of roentgenology,2020,214(5).[61]M.Rosario González-Rodríguez,M.Carmen Díaz-Fernández,Carmen Pacheco Gómez. Facial-expression recognition: An emergent approach to the measurement of tourist satisfaction through emotions[J]. Telematics and Informatics,2020,51.[62]Ru-Xi Ding,Iván Palomares,Xueqing Wang,Guo-Rui Yang,Bingsheng Liu,Yucheng Dong,Enrique Herrera-Viedma,Francisco Herrera. Large-Scale decision-making: Characterization, taxonomy, challenges and future directions from an Artificial Intelligence and applications perspective[J]. Information Fusion,2020,59.[63]Abdulrhman H. Al-Jebrni,Brendan Chwyl,Xiao Yu Wang,Alexander Wong,Bechara J. Saab. AI-enabled remote and objective quantification of stress at scale[J]. Biomedical Signal Processing and Control,2020,59.[64]Gillian Thomas,Elizabeth Eisenhauer,Robert G. Bristow,Cai Grau,Coen Hurkmans,Piet Ost,Matthias Guckenberger,Eric Deutsch,Denis Lacombe,Damien C. Weber. The European Organisation for Research and Treatment of Cancer, State of Science in radiation oncology and priorities for clinical trials meeting report[J]. European Journal of Cancer,2020,131.[65]Muhammad Asif. Are QM models aligned with Industry 4.0? A perspective on current practices[J]. Journal of Cleaner Production,2020,258.[66]Siva Teja Kakileti,Himanshu J. Madhu,Geetha Manjunath,Leonard Wee,Andre Dekker,Sudhakar Sampangi. Personalized risk prediction for breast cancer pre-screening using artificial intelligence and thermal radiomics[J]. Artificial Intelligence In Medicine,2020,105.[67]. Evaluation of Payer Budget Impact Associated with the Use of Artificial Intelligence in Vitro Diagnostic, Kidneyintelx, to Modify DKD Progression:[J]. American Journal of Kidney Diseases,2020,75(5).[68]Rohit Nishant,Mike Kennedy,Jacqueline Corbett. Artificial intelligence for sustainability: Challenges, opportunities, and a research agenda[J]. International Journal of Information Management,2020,53.[69]Hoang Nguyen,Xuan-Nam Bui. Soft computing models for predicting blast-induced air over-pressure: A novel artificial intelligence approach[J]. Applied Soft Computing Journal,2020,92.[70]Benjamin S. Hopkins,Aditya Mazmudar,Conor Driscoll,Mark Svet,Jack Goergen,Max Kelsten,Nathan A. Shlobin,Kartik Kesavabhotla,Zachary A Smith,Nader S Dahdaleh. Using artificial intelligence (AI) to predict postoperative surgical site infection: A retrospective cohort of 4046 posterior spinal fusions[J]. Clinical Neurology and Neurosurgery,2020,192.[71]Mei Yang,Runze Zhou,Xiangjun Qiu,Xiangfei Feng,Jian Sun,Qunshan Wang,Qiufen Lu,Pengpai Zhang,Bo Liu,Wei Li,Mu Chen,Yan Zhao,Binfeng Mo,Xin Zhou,Xi Zhang,Yingxue Hua,Jin Guo,Fangfang Bi,Yajun Cao,Feng Ling,Shengming Shi,Yi-Gang Li. Artificial intelligence-assisted analysis on the association between exposure to ambient fine particulate matter and incidence of arrhythmias in outpatients of Shanghai community hospitals[J]. Environment International,2020,139.[72]Fatemehalsadat Madaeni,Rachid Lhissou,Karem Chokmani,Sebastien Raymond,Yves Gauthier. Ice jam formation, breakup and prediction methods based on hydroclimatic data using artificial intelligence: A review[J]. Cold Regions Science and Technology,2020,174.[73]Steve Chukwuebuka Arum,David Grace,Paul Daniel Mitchell. A review of wireless communication using high-altitude platforms for extended coverage and capacity[J]. Computer Communications,2020,157.[74]Yong-Hong Kuo,Nicholas B. Chan,Janny M.Y. Leung,Helen Meng,Anthony Man-Cho So,Kelvin K.F. Tsoi,Colin A. Graham. An Integrated Approach of Machine Learning and Systems Thinking for Waiting Time Prediction in an Emergency Department[J]. International Journal of Medical Informatics,2020,139.[75]Matteo Terzi,Gian Antonio Susto,Pratik Chaudhari. Directional adversarial training for cost sensitive deep learning classification applications[J]. Engineering Applications of Artificial Intelligence,2020,91.[76]Arman Kilic. Artificial Intelligence and Machine Learning in Cardiovascular Health Care[J]. The Annals of Thoracic Surgery,2020,109(5).[77]Hossein Azarmdel,Ahmad Jahanbakhshi,Seyed Saeid Mohtasebi,Alfredo Rosado Mu?oz. Evaluation of image processing technique as an expert system in mulberry fruit grading based on ripeness level using artificial neural networks (ANNs) and support vector machine (SVM)[J]. Postharvest Biology and Technology,2020,166.[78]Wafaa Wardah,Abdollah Dehzangi,Ghazaleh Taherzadeh,Mahmood A. Rashid,M.G.M. Khan,Tatsuhiko Tsunoda,Alok Sharma. Predicting protein-peptide binding sites with a deep convolutional neural network[J]. Journal of Theoretical Biology,2020,496.[79]Francisco F.X. Vasconcelos,Róger M. Sarmento,Pedro P. Rebou?as Filho,Victor Hugo C. de Albuquerque. Artificial intelligence techniques empowered edge-cloud architecture for brain CT image analysis[J]. Engineering Applications of Artificial Intelligence,2020,91.[80]Masaaki Konishi. Bioethanol production estimated from volatile compositions in hydrolysates of lignocellulosic biomass by deep learning[J]. Journal of Bioscience and Bioengineering,2020,129(6).人工智能英文参考文献三:[81]J. Kwon,K. Kim. Artificial Intelligence for Early Prediction of Pulmonary Hypertension Using Electrocardiography[J]. Journal of Heart and Lung Transplantation,2020,39(4).[82]C. Maathuis,W. Pieters,J. van den Berg. Decision support model for effects estimation and proportionality assessment for targeting in cyber operations[J]. Defence Technology,2020.[83]Samer Ellahham. Artificial Intelligence in Diabetes Care[J]. The American Journal of Medicine,2020.[84]Yi-Ting Hsieh,Lee-Ming Chuang,Yi-Der Jiang,Tien-Jyun Chang,Chung-May Yang,Chang-Hao Yang,Li-Wei Chan,Tzu-Yun Kao,Ta-Ching Chen,Hsuan-Chieh Lin,Chin-Han Tsai,Mingke Chen. Application of deep learning image assessment software VeriSee? for diabetic retinopathy screening[J]. Journal of the Formosan Medical Association,2020.[85]Emre ARTUN,Burak KULGA. Selection of candidate wells for re-fracturing in tight gas sand reservoirs using fuzzy inference[J]. Petroleum Exploration and Development Online,2020,47(2).[86]Alberto Arenal,Cristina Armu?a,Claudio Feijoo,Sergio Ramos,Zimu Xu,Ana Moreno. Innovation ecosystems theory revisited: The case of artificial intelligence in China[J]. Telecommunications Policy,2020.[87]T. Som,M. Dwivedi,C. Dubey,A. Sharma. Parametric Studies on Artificial Intelligence Techniques for Battery SOC Management and Optimization of Renewable Power[J]. Procedia Computer Science,2020,167.[88]Bushra Kidwai,Nadesh RK. Design and Development of Diagnostic Chabot for supporting Primary Health Care Systems[J]. Procedia Computer Science,2020,167.[89]Asl? Bozda?,Ye?im Dokuz,?znur Begüm G?k?ek. Spatial prediction of PM 10 concentration using machine learning algorithms in Ankara, Turkey[J]. Environmental Pollution,2020.[90]K.P. Smith,J.E. Kirby. Image analysis and artificial intelligence in infectious disease diagnostics[J]. Clinical Microbiology and Infection,2020.[91]Alklih Mohamad YOUSEF,Ghahfarokhi Payam KAVOUSI,Marwan ALNUAIMI,Yara ALATRACH. Predictive data analytics application for enhanced oil recovery in a mature field in the Middle East[J]. Petroleum Exploration and Development Online,2020,47(2).[92]Omer F. Ahmad,Danail Stoyanov,Laurence B. Lovat. Barriers and pitfalls for artificial intelligence in gastroenterology: Ethical and regulatory issues[J]. Techniques and Innovations in Gastrointestinal Endoscopy,2020,22(2).[93]Sanne A. Hoogenboom,Ulas Bagci,Michael B. Wallace. Artificial intelligence in gastroenterology. The current state of play and the potential. How will it affect our practice and when?[J]. Techniques and Innovations in Gastrointestinal Endoscopy,2020,22(2).[94]Douglas K. Rex. Can we do resect and discard with artificial intelligence-assisted colon polyp “optical biopsy?”[J]. Techniques and Innovations in Gastrointestinal Endoscopy,2020,22(2).[95]Neal Shahidi,Michael J. Bourke. Can artificial intelligence accurately diagnose endoscopically curable gastrointestinal cancers?[J]. Techniques and Innovations in Gastrointestinal Endoscopy,2020,22(2).[96]Michael Byrne. Artificial intelligence in gastroenterology[J]. Techniques and Innovations in Gastrointestinal Endoscopy,2020,22(2).[97]Piet C. de Groen. Using artificial intelligence to improve adequacy of inspection in gastrointestinal endoscopy[J]. Techniques and Innovations in Gastrointestinal Endoscopy,2020,22(2).[98]Robin Zachariah,Andrew Ninh,William Karnes. Artificial intelligence for colon polyp detection: Why should we embrace this?[J]. Techniques and Innovations in Gastrointestinal Endoscopy,2020,22(2).[99]Alexandra T. Greenhill,Bethany R. Edmunds. A primer of artificial intelligence in medicine[J]. Techniques and Innovations in Gastrointestinal Endoscopy,2020,22(2).[100]Tomohiro Tada,Toshiaki Hirasawa,Toshiyuki Yoshio. The role for artificial intelligence in evaluation of upper GI cancer[J]. Techniques and Innovations in Gastrointestinal Endoscopy,2020,22(2).[101]Yahui Jiang,Meng Yang,Shuhao Wang,Xiangchun Li,Yan Sun. Emerging role of deep learning‐based artificial intelligence in tumor pathology[J]. Cancer Communications,2020,40(4).[102]Kristopher D. Knott,Andreas Seraphim,Joao B. Augusto,Hui Xue,Liza Chacko,Nay Aung,Steffen E. Petersen,Jackie A. Cooper,Charlotte Manisty,Anish N. Bhuva,Tushar Kotecha,Christos V. Bourantas,Rhodri H. Davies,Louise A.E. Brown,Sven Plein,Marianna Fontana,Peter Kellman,James C. Moon. The Prognostic Significance of Quantitative Myocardial Perfusion: An Artificial Intelligence–Based Approach Using Perfusion Mapping[J]. Circulation,2020,141(16).[103]Muhammad Asad,Ahmed Moustafa,Takayuki Ito. FedOpt: Towards Communication Efficiency and Privacy Preservation in Federated Learning[J]. Applied Sciences,2020,10(8).[104]Wu Wenzhi,Zhang Yan,Wang Pu,Zhang Li,Wang Guixiang,Lei Guanghui,Xiao Qiang,Cao Xiaochen,Bian Yueran,Xie Simiao,Huang Fei,Luo Na,Zhang Jingyuan,Luo Mingyan. Psychological stress of medical staffs during outbreak of COVID-19 and adjustment strategy.[J]. Journal of medical virology,2020.[105]. Eyenuk Fulfills Contract for Artificial Intelligence Grading of Retinal Images[J]. Telecomworldwire,2020.[106]Kim Tae Woo,Duhachek Adam. Artificial Intelligence and Persuasion: A Construal-Level Account.[J]. Psychological science,2020,31(4).[107]McCall Becky. COVID-19 and artificial intelligence: protecting health-care workers and curbing the spread.[J]. The Lancet. Digital health,2020,2(4).[108]Alca?iz Mariano,Chicchi Giglioli Irene A,Sirera Marian,Minissi Eleonora,Abad Luis. [Autism spectrum disorder biomarkers based on biosignals, virtual reality and artificial intelligence].[J]. Medicina,2020,80 Suppl 2.[109]Cong Lei,Feng Wanbing,Yao Zhigang,Zhou Xiaoming,Xiao Wei. Deep Learning Model as a New Trend in Computer-aided Diagnosis of Tumor Pathology for Lung Cancer.[J]. Journal of Cancer,2020,11(12).[110]Wang Fengdan,Gu Xiao,Chen Shi,Liu Yongliang,Shen Qing,Pan Hui,Shi Lei,Jin Zhengyu. Artificial intelligence system can achieve comparable results to experts for bone age assessment of Chinese children with abnormal growth and development.[J]. PeerJ,2020,8.[111]Hu Wenmo,Yang Huayu,Xu Haifeng,Mao Yilei. Radiomics based on artificial intelligence in liver diseases: where we are?[J]. Gastroenterology report,2020,8(2).[112]Batayneh Wafa,Abdulhay Enas,Alothman Mohammad. Prediction of the performance of artificial neural networks in mapping sEMG to finger joint angles via signal pre-investigation techniques.[J]. Heliyon,2020,6(4).[113]Aydin Emrah,Türkmen ?nan Utku,Namli G?zde,?ztürk ?i?dem,Esen Ay?e B,Eray Y Nur,Ero?lu Egemen,Akova Fatih. A novel and simple machine learning algorithm for preoperative diagnosis of acute appendicitis in children.[J]. Pediatric surgery international,2020.[114]Ellahham Samer. Artificial Intelligence in Diabetes Care.[J]. The Americanjournal of medicine,2020.[115]David J. Winkel,Thomas J. Weikert,Hanns-Christian Breit,Guillaume Chabin,Eli Gibson,Tobias J. Heye,Dorin Comaniciu,Daniel T. Boll. Validation of a fully automated liver segmentation algorithm using multi-scale deep reinforcement learning and comparison versus manual segmentation[J]. European Journal of Radiology,2020,126.[116]Binjie Fu,Guoshu Wang,Mingyue Wu,Wangjia Li,Yineng Zheng,Zhigang Chu,Fajin Lv. Influence of CT effective dose and convolution kernel on the detection of pulmonary nodules in different artificial intelligence software systems: A phantom study[J]. European Journal of Radiology,2020,126.[117]Georgios N. Kouziokas. A new W-SVM kernel combining PSO-neural network transformed vector and Bayesian optimized SVM in GDP forecasting[J]. Engineering Applications of Artificial Intelligence,2020,92.[118]Qingsong Ruan,Zilin Wang,Yaping Zhou,Dayong Lv. A new investor sentiment indicator ( ISI ) based on artificial intelligence: A powerful return predictor in China[J]. Economic Modelling,2020,88.[119]Mohamed Abdel-Basset,Weiping Ding,Laila Abdel-Fatah. The fusion of Internet of Intelligent Things (IoIT) in remote diagnosis of obstructive Sleep Apnea: A survey and a new model[J]. Information Fusion,2020,61.[120]Federico Caobelli. Artificial intelligence in medical imaging: Game over for radiologists?[J]. European Journal of Radiology,2020,126.以上就是关于人工智能参考文献的分享,希望对你有所帮助。
英文原文:Title: Business Applications of Java. Author: Erbschloe, Michael, Business Applications of Java -- Research Starters Business, 2008DataBase: Research Starters - BusinessBusiness Applications of JavaThis article examines the growing use of Java technology in business applications. The history of Java is briefly reviewed along with the impact of open standards on the growth of the World Wide Web. Key components and concepts of the Java programming language are explained including the Java Virtual Machine. Examples of how Java is being used bye-commerce leaders is provided along with an explanation of how Java is used to develop data warehousing, data mining, and industrial automation applications. The concept of metadata modeling and the use of Extendable Markup Language (XML) are also explained.Keywords Application Programming Interfaces (API's); Enterprise JavaBeans (EJB); Extendable Markup Language (XML); HyperText Markup Language (HTML); HyperText Transfer Protocol (HTTP); Java Authentication and Authorization Service (JAAS); Java Cryptography Architecture (JCA); Java Cryptography Extension (JCE); Java Programming Language; Java Virtual Machine (JVM); Java2 Platform, Enterprise Edition (J2EE); Metadata Business Information Systems > Business Applications of JavaOverviewOpen standards have driven the e-business revolution. Networking protocol standards, such as Transmission Control Protocol/Internet Protocol (TCP/IP), HyperText Transfer Protocol (HTTP), and the HyperText Markup Language (HTML) Web standards have enabled universal communication via the Internet and the World Wide Web. As e-business continues to develop, various computing technologies help to drive its evolution.The Java programming language and platform have emerged as major technologies for performing e-business functions. Java programming standards have enabled portability of applications and the reuse of application components across computing platforms. Sun Microsystems' Java Community Process continues to be a strong base for the growth of the Java infrastructure and language standards. This growth of open standards creates new opportunities for designers and developers of applications and services (Smith, 2001).Creation of Java TechnologyJava technology was created as a computer programming tool in a small, secret effort called "the Green Project" at Sun Microsystems in 1991. The Green Team, fully staffed at 13 people and led by James Gosling, locked themselves away in an anonymous office on Sand Hill Road in Menlo Park, cut off from all regular communications with Sun, and worked around the clock for18 months. Their initial conclusion was that at least one significant trend would be the convergence of digitally controlled consumer devices and computers. A device-independent programming language code-named "Oak" was the result.To demonstrate how this new language could power the future of digital devices, the Green Team developed an interactive, handheld home-entertainment device controller targeted at the digital cable television industry. But the idea was too far ahead of its time, and the digital cable television industry wasn't ready for the leap forward that Java technology offered them. As it turns out, the Internet was ready for Java technology, and just in time for its initial public introduction in 1995, the team was able to announce that the Netscape Navigator Internet browser would incorporate Java technology ("Learn about Java," 2007).Applications of JavaJava uses many familiar programming concepts and constructs and allows portability by providing a common interface through an external Java Virtual Machine (JVM). A virtual machine is a self-contained operating environment, created by a software layer that behaves as if it were a separate computer. Benefits of creating virtual machines include better exploitation of powerful computing resources and isolation of applications to prevent cross-corruption and improve security (Matlis, 2006).The JVM allows computing devices with limited processors or memory to handle more advanced applications by calling up software instructions inside the JVM to perform most of the work. This also reduces the size and complexity of Java applications because many of the core functions and processing instructions were built into the JVM. As a result, software developersno longer need to re-create the same application for every operating system. Java also provides security by instructing the application to interact with the virtual machine, which served as a barrier between applications and the core system, effectively protecting systems from malicious code.Among other things, Java is tailor-made for the growing Internet because it makes it easy to develop new, dynamic applications that could make the most of the Internet's power and capabilities. Java is now an open standard, meaning that no single entity controls its development and the tools for writing programs in the language are available to everyone. The power of open standards like Java is the ability to break down barriers and speed up progress.Today, you can find Java technology in networks and devices that range from the Internet and scientific supercomputers to laptops and cell phones, from Wall Street market simulators to home game players and credit cards. There are over 3 million Java developers and now there are several versions of the code. Most large corporations have in-house Java developers. In addition, the majority of key software vendors use Java in their commercial applications (Lazaridis, 2003).ApplicationsJava on the World Wide WebJava has found a place on some of the most popular websites in the world and the uses of Java continues to grow. Java applications not only provide unique user interfaces, they also help to power the backend of websites. Two e-commerce giants that everybody is probably familiar with (eBay and Amazon) have been Java pioneers on the World Wide Web.eBayFounded in 1995, eBay enables e-commerce on a local, national and international basis with an array of Web sites-including the eBay marketplaces, PayPal, Skype, and -that bring together millions of buyers and sellers every day. You can find it on eBay, even if you didn't know it existed. On a typical day, more than 100 million items are listed on eBay in tens of thousands of categories. Recent listings have included a tunnel boring machine from the Chunnel project, a cup of water that once belonged to Elvis, and the Volkswagen that Pope Benedict XVI owned before he moved up to the Popemobile. More than one hundred million items are available at any given time, from the massive to the miniature, the magical to the mundane, on eBay; the world's largest online marketplace.eBay uses Java almost everywhere. To address some security issues, eBay chose Sun Microsystems' Java System Identity Manager as the platform for revamping its identity management system. The task at hand was to provide identity management for more than 12,000 eBay employees and contractors.Now more than a thousand eBay software developers work daily with Java applications. Java's inherent portability allows eBay to move to new hardware to take advantage of new technology, packaging, or pricing, without having to rewrite Java code ("eBay drives explosive growth," 2007).Amazon (a large seller of books, CDs, and other products) has created a Web Service application that enables users to browse their product catalog and place orders. uses a Java application that searches the Amazon catalog for books whose subject matches a user-selected topic. The application displays ten books that match the chosen topic, and shows the author name, book title, list price, Amazon discount price, and the cover icon. The user may optionally view one review per displayed title and make a buying decision (Stearns & Garishakurthi, 2003).Java in Data Warehousing & MiningAlthough many companies currently benefit from data warehousing to support corporate decision making, new business intelligence approaches continue to emerge that can be powered by Java technology. Applications such as data warehousing, data mining, Enterprise Information Portals (EIP's), and Knowledge Management Systems (which can all comprise a businessintelligence application) are able to provide insight into customer retention, purchasing patterns, and even future buying behavior.These applications can not only tell what has happened but why and what may happen given certain business conditions; allowing for "what if" scenarios to be explored. As a result of this information growth, people at all levels inside the enterprise, as well as suppliers, customers, and others in the value chain, are clamoring for subsets of the vast stores of information such as billing, shipping, and inventory information, to help them make business decisions. While collecting and storing vast amounts of data is one thing, utilizing and deploying that data throughout the organization is another.The technical challenges inherent in integrating disparate data formats, platforms, and applications are significant. However, emerging standards such as the Application Programming Interfaces (API's) that comprise the Java platform, as well as Extendable Markup Language (XML) technologies can facilitate the interchange of data and the development of next generation data warehousing and business intelligence applications. While Java technology has been used extensively for client side access and to presentation layer challenges, it is rapidly emerging as a significant tool for developing scaleable server side programs. The Java2 Platform, Enterprise Edition (J2EE) provides the object, transaction, and security support for building such systems.Metadata IssuesOne of the key issues that business intelligence developers must solve is that of incompatible metadata formats. Metadata can be defined as information about data or simply "data about data." In practice, metadata is what most tools, databases, applications, and other information processes use to define, relate, and manipulate data objects within their own environments. It defines the structure and meaning of data objects managed by an application so that the application knows how to process requests or jobs involving those data objects. Developers can use this schema to create views for users. Also, users can browse the schema to better understand the structure and function of the database tables before launching a query.To address the metadata issue, a group of companies (including Unisys, Oracle, IBM, SAS Institute, Hyperion, Inline Software and Sun) have joined to develop the Java Metadata Interface (JMI) API. The JMI API permits the access and manipulation of metadata in Java with standard metadata services. JMI is based on the Meta Object Facility (MOF) specification from the Object Management Group (OMG). The MOF provides a model and a set of interfaces for the creation, storage, access, and interchange of metadata and metamodels (higher-level abstractions of metadata). Metamodel and metadata interchange is done via XML and uses the XML Metadata Interchange (XMI) specification, also from the OMG. JMI leverages Java technology to create an end-to-end data warehousing and business intelligence solutions framework.Enterprise JavaBeansA key tool provided by J2EE is Enterprise JavaBeans (EJB), an architecture for the development of component-based distributed business applications. Applications written using the EJB architecture are scalable, transactional, secure, and multi-user aware. These applications may be written once and then deployed on any server platform that supports J2EE. The EJB architecture makes it easy for developers to write components, since they do not need to understand or deal with complex, system-level details such as thread management, resource pooling, and transaction and security management. This allows for role-based development where component assemblers, platform providers and application assemblers can focus on their area of responsibility further simplifying application development.EJB's in the Travel IndustryA case study from the travel industry helps to illustrate how such applications could function. A travel company amasses a great deal of information about its operations in various applications distributed throughout multiple departments. Flight, hotel, and automobile reservation information is located in a database being accessed by travel agents worldwide. Another application contains information that must be updated with credit and billing historyfrom a financial services company. Data is periodically extracted from the travel reservation system databases to spreadsheets for use in future sales and marketing analysis.Utilizing J2EE, the company could consolidate application development within an EJB container, which can run on a variety of hardware and software platforms allowing existing databases and applications to coexist with newly developed ones. EJBs can be developed to model various data sets important to the travel reservation business including information about customer, hotel, car rental agency, and other attributes.Data Storage & AccessData stored in existing applications can be accessed with specialized connectors. Integration and interoperability of these data sources is further enabled by the metadata repository that contains metamodels of the data contained in the sources, which then can be accessed and interchanged uniformly via the JMI API. These metamodels capture the essential structure and semantics of business components, allowing them to be accessed and queried via the JMI API or to be interchanged via XML. Through all of these processes, the J2EE infrastructure ensures the security and integrity of the data through transaction management and propagation and the underlying security architecture.To consolidate historical information for analysis of sales and marketing trends, a data warehouse is often the best solution. In this example, data can be extracted from the operational systems with a variety of Extract, Transform and Load tools (ETL). The metamodels allow EJBsdesigned for filtering, transformation, and consolidation of data to operate uniformly on datafrom diverse data sources as the bean is able to query the metamodel to identify and extract the pertinent fields. Queries and reports can be run against the data warehouse that contains information from numerous sources in a consistent, enterprise-wide fashion through the use of the JMI API (Mosher & Oh, 2007).Java in Industrial SettingsMany people know Java only as a tool on the World Wide Web that enables sites to perform some of their fancier functions such as interactivity and animation. However, the actual uses for Java are much more widespread. Since Java is an object-oriented language like C++, the time needed for application development is minimal. Java also encourages good software engineering practices with clear separation of interfaces and implementations as well as easy exception handling.In addition, Java's automatic memory management and lack of pointers remove some leading causes of programming errors. Most importantly, application developers do not need to create different versions of the software for different platforms. The advantages available through Java have even found their way into hardware. The emerging new Java devices are streamlined systems that exploit network servers for much of their processing power, storage, content, and administration.Benefits of JavaThe benefits of Java translate across many industries, and some are specific to the control and automation environment. For example, many plant-floor applications use relatively simple equipment; upgrading to PCs would be expensive and undesirable. Java's ability to run on any platform enables the organization to make use of the existing equipment while enhancing the application.IntegrationWith few exceptions, applications running on the factory floor were never intended to exchange information with systems in the executive office, but managers have recently discovered the need for that type of information. Before Java, that often meant bringing together data from systems written on different platforms in different languages at different times. Integration was usually done on a piecemeal basis, resulting in a system that, once it worked, was unique to the two applications it was tying together. Additional integration required developing a brand new system from scratch, raising the cost of integration.Java makes system integration relatively easy. Foxboro Controls Inc., for example, used Java to make its dynamic-performance-monitor software package Internet-ready. This software provides senior executives with strategic information about a plant's operation. The dynamic performance monitor takes data from instruments throughout the plant and performs variousmathematical and statistical calculations on them, resulting in information (usually financial) that a manager can more readily absorb and use.ScalabilityAnother benefit of Java in the industrial environment is its scalability. In a plant, embedded applications such as automated data collection and machine diagnostics provide critical data regarding production-line readiness or operation efficiency. These data form a critical ingredient for applications that examine the health of a production line or run. Users of these devices can take advantage of the benefits of Java without changing or upgrading hardware. For example, operations and maintenance personnel could carry a handheld, wireless, embedded-Java device anywhere in the plant to monitor production status or problems.Even when internal compatibility is not an issue, companies often face difficulties when suppliers with whom they share information have incompatible systems. This becomes more of a problem as supply-chain management takes on a more critical role which requires manufacturers to interact more with offshore suppliers and clients. The greatest efficiency comes when all systems can communicate with each other and share information seamlessly. Since Java is so ubiquitous, it often solves these problems (Paula, 1997).Dynamic Web Page DevelopmentJava has been used by both large and small organizations for a wide variety of applications beyond consumer oriented websites. Sandia, a multiprogram laboratory of the U.S. Department of Energy's National Nuclear Security Administration, has developed a unique Java application. The lab was tasked with developing an enterprise-wide inventory tracking and equipment maintenance system that provides dynamic Web pages. The developers selected Java Studio Enterprise 7 for the project because of its Application Framework technology and Web Graphical User Interface (GUI) components, which allow the system to be indexed by an expandable catalog. The flexibility, scalability, and portability of Java helped to reduce development timeand costs (Garcia, 2004)IssueJava Security for E-Business ApplicationsTo support the expansion of their computing boundaries, businesses have deployed Web application servers (WAS). A WAS differs from a traditional Web server because it provides a more flexible foundation for dynamic transactions and objects, partly through the exploitation of Java technology. Traditional Web servers remain constrained to servicing standard HTTP requests, returning the contents of static HTML pages and images or the output from executed Common Gateway Interface (CGI ) scripts.An administrator can configure a WAS with policies based on security specifications for Java servlets and manage authentication and authorization with Java Authentication andAuthorization Service (JAAS) modules. An authentication and authorization service can bewritten in Java code or interface to an existing authentication or authorization infrastructure. Fora cryptography-based security infrastructure, the security server may exploit the Java Cryptography Architecture (JCA) and Java Cryptography Extension (JCE). To present the user with a usable interaction with the WAS environment, the Web server can readily employ a formof "single sign-on" to avoid redundant authentication requests. A single sign-on preserves user authentication across multiple HTTP requests so that the user is not prompted many times for authentication data (i.e., user ID and password).Based on the security policies, JAAS can be employed to handle the authentication process with the identity of the Java client. After successful authentication, the WAS securitycollaborator consults with the security server. The WAS environment authentication requirements can be fairly complex. In a given deployment environment, all applications or solutions may not originate from the same vendor. In addition, these applications may be running on different operating systems. Although Java is often the language of choice for portability between platforms, it needs to marry its security features with those of the containing environment.Authentication & AuthorizationAuthentication and authorization are key elements in any secure information handling system. Since the inception of Java technology, much of the authentication and authorization issues have been with respect to downloadable code running in Web browsers. In many ways, this had been the correct set of issues to address, since the client's system needs to be protected from mobile code obtained from arbitrary sites on the Internet. As Java technology moved from a client-centric Web technology to a server-side scripting and integration technology, it required additional authentication and authorization technologies.The kind of proof required for authentication may depend on the security requirements of a particular computing resource or specific enterprise security policies. To provide such flexibility, the JAAS authentication framework is based on the concept of configurable authenticators. This architecture allows system administrators to configure, or plug in, the appropriate authenticatorsto meet the security requirements of the deployed application. The JAAS architecture also allows applications to remain independent from underlying authentication mechanisms. So, as new authenticators become available or as current authentication services are updated, system administrators can easily replace authenticators without having to modify or recompile existing applications.At the end of a successful authentication, a request is associated with a user in the WAS user registry. After a successful authentication, the WAS consults security policies to determine if the user has the required permissions to complete the requested action on the servlet. This policy canbe enforced using the WAS configuration (declarative security) or by the servlet itself (programmatic security), or a combination of both.The WAS environment pulls together many different technologies to service the enterprise. Because of the heterogeneous nature of the client and server entities, Java technology is a good choice for both administrators and developers. However, to service the diverse security needs of these entities and their tasks, many Java security technologies must be used, not only at a primary level between client and server entities, but also at a secondary level, from served objects. By using a synergistic mix of the various Java security technologies, administrators and developers can make not only their Web application servers secure, but their WAS environments secure as well (Koved, 2001).ConclusionOpen standards have driven the e-business revolution. As e-business continues to develop, various computing technologies help to drive its evolution. The Java programming language and platform have emerged as major technologies for performing e-business functions. Java programming standards have enabled portability of applications and the reuse of application components. Java uses many familiar concepts and constructs and allows portability by providing a common interface through an external Java Virtual Machine (JVM). Today, you can find Java technology in networks and devices that range from the Internet and scientific supercomputers to laptops and cell phones, from Wall Street market simulators to home game players and credit cards.Java has found a place on some of the most popular websites in the world. Java applications not only provide unique user interfaces, they also help to power the backend of websites. While Java technology has been used extensively for client side access and in the presentation layer, it is also emerging as a significant tool for developing scaleable server side programs.Since Java is an object-oriented language like C++, the time needed for application development is minimal. Java also encourages good software engineering practices with clear separation of interfaces and implementations as well as easy exception handling. Java's automatic memory management and lack of pointers remove some leading causes of programming errors. The advantages available through Java have also found their way into hardware. The emerging new Java devices are streamlined systems that exploit network servers for much of their processing power, storage, content, and administration.中文翻译:标题:Java的商业应用。
CHAPTER11.Explain the five parts of an information system .What part do people play inthis system?An information system has five parts: people, procedures, software, hardware and data.People: Are end users who use computer to make themselves more productive.Procedures: Specify rules or guidelines for computer operations.Software: Provides step-by-step instructions for computer hardware.Hardware: Processes the data to create information.Data: Consist of unprocessed facts including text, numbers, image and sounds.People are the most important part of any information system.2.What is system software? What kinds of programs are included in systemsoftware?System software helps the computer manage its own internal resources. It includes three kinds of programs: operating systems, utilities and device drivers programs.3.Define and compare basic and specialized application software. Describe somedifferent types of basic application software. Describe some types of specialized applications.Basic applications are the kinds of programs to be considered computer competent.Specialized applications are more narrowly focused on specific disciplines and occupations.Basic applications have some types, such as browser, word processor, spreadsheet ,and so on.Also specialized applications have many types, some of the best known are graphics, audio and video, multimedia, Web authoring ,and artificial intelligence programs.4.Describe the different types of computer. What is the most common type? Whatare the types of microcomputers?There are four types of computers: supercomputers, mainframe computers, minicomputers, and microcomputers.Supercomputers are the most powerful type of computer.Mainframe computers occupy specially wired, air-conditioned rooms, they are capable of great processing speeds and data storage.Minicomputers are refrigerator sized machines.Microcomputers are the least powerful, yet the most widely used and fastest-growing, type of computer.Microcomputers are the most common type of computers.There are four types of microcomputers: Desktop computers, Notebook computers, Handheld computers and PDA.5.What is connectivity? How are the wireless revolution and connectivityrelated? What is a computer network? What is the Internet? What is the Web?Connectivity is the capability of you microcomputer to share the information with other computers.Wireless revolution dramatically affect connectivity.A computer network is a communications system connecting two or more computers.Internet is the largest network in the world.The Web provides a multimedia interface to the numerous resources available on the Internet.CHAPTER21.Discuss the uses of the Internet. Which activities have you participated in?Which one do you think is the most popular?The most common uses of the Internet are the following: communicating, shopping, searching, entertainment, education, and so on. I have participated in almost all of them. I think communicating is the most popular.2.Explain the differences between the two most common types of providers.The two most common types of providers are National and wireless.National service providers provide access through standard telephone connections.Wireless service providers provide Internet connections for computers with wireless modems and a wide array of wireless devices.3.What are the basic elements of an message?A typical message has three basic elements: header, message and signature.4.What is social networking ? Describe the three types if social networkingsites.Social networking is the grouping of individuals into specific groups. Thereare three basic categories of social networking sites: reuniting, friend-of-a-friend and common interestReuniting sites are designed to connect people who have known one another but have lost touch.Friend-of-a-friend sites are designed to bring together two people who do not know one another but share a common friend.Common interest sites bring together individuals that share common interests or hobbies.5.Describe the different types of search engines. Given an example of the typeof search each engine is best for.There are three types of search engines: crawler-based search engines, metasearch engines and specialized search enginesCrawler-based search engines, such as Google, create their listings automatically.Metasearch engines are programs that automatically submit your search request to several engines simultaneously. The metasearch engines receives the results, eliminates duplicates, orders the hits, and then provides the edited list to you .one of the best known is Dogpile.Specialized search engines focus on subject-specific Web sites. such as Environment.CHAPTER31.Explain the difference between general-purpose and special-purposeapplications.General-purpose application are widely used in nearly every discipline and occupation. They include word processors, spreadsheets, database management systems and presentation graphics.Specialized application includes thousands of other programs that are more narrowly focused on specific disciplines and occupations.2.Discuss the common features of most software programs. Describe the newinterface to what-if analysis?Most applications use a GUI, use windows to display information, and have menus to present commands.3.What is the difference between a function and a formula? How is a formularelated to what-if analysis?A formula is an instruction to calculate or process. Functions are prewrittenformulas. A formula related to what-if analysis is called recalculation.4.What are presentation graphics programs? How are they used?Presentation graphics are programs that combine a variety of visual objects to create attractive, visually interesting presentation. People in a variety of setting and situations use presentation graphics programs to make their presentations more interesting and professional.5.What is the difference between an integrated package and a software suite?What are the advantages and disadvantages od each?An integrated package is a single program that provides the functionality ofa word processor, spreadsheet, database manager, and more. The primarydisadvantage of an integrated package is that the capabilities of each function are not as extensive as in the individual programs. The primary advantages are cost and simplicity.A software suite is a collection of separate application programs bundledtogether and sold as a group. It is significantly less expensive to buy a suite of applications than to buy each application separatelyCHAPTER41.Describe graphics , including desktop publishers, image editors, illustrationprograms, image galleries, and graphics suites.Graphics are widely used to analyze data and to create professional-looking presentations; Desktop publishers focus on page design and layout and provide greater flexibility; Image editors are programs for creating and editing bitmap images; Illustration programs are used to create and to edit vector images; Image galleries are libraries of electronic images. These images are used for a wide variety of applications from illustrating textbooks to providing visual interest to presentations;Graphics suites are some companies combining their separate graphics programs in groups.2.Discuss audio and video editing software.Audio editing software allows you to create and edit audio clips, most software allow you to add audio effects to your tracks. Video editingsoftware allows you to reorganize, add effects, and more to your digital video footage.3.What is multimedia? How are multimedia presentations developed?Multimedia is the integration of all sorts of media into one presentation.The creation of interactive multimedia presentations follows several steps: Plan, Design, Create and Support.4.Describe Web authoring , including Web site design and Web authoring programs.Creating a site is called Web authoring. A web site design is an interactive multimedia form of communication, designing a web site begins with determining the site’s overall content, the overall site design is commonly represented in a graphical map. More specialized and powerful programs, called Web authoring programs, are typically used to create sophisticated commercial sites.5.Discuss three areas of artificial intelligence.The three areas of artificial intelligence are virtual reality, knowledge-based systems and robotics. Virtual reality is an artificial, or simulated, reality generated in 3-D by a computer. Knowledge-based systems are a type of artificial intelligence that uses a database to provide assistance to users. Robotics is the field of study concerned with developing and using robots.CHAPTER51.Describe system software. What are the four types of system programs?System software works with end users, application software, and computer hardware to handle the majority of technical details. It consists of four types of programs: operating systems, utilities, device drivers and language translators.2.What are the basic functions of every operating system? What are the threebasic operating system categories?The basic functions of every operating system are : managing computer resources, providing a user interface, and running applications. The three basic operating system categories are: embedded, network and stand-alone.3.Explain the differences and similarities between Windows, Mac OS, and Linux.Windows is by far the most popular microcomputer operating system today. It comes in a variety of different versions and is designed to run with Intel and Intel-compatible microprocessors. Mac OS is not nearly as widely used as the Windows operating system. It is a powerful, easy-to-use operating system that is popular with professional graphic designs, desktop publishers, and many home users. While Windows, the Mac OS are proprietary operating systems, Linux is not. It is open source software free and available from many sources, including the Web.4.Discuss utilities. What are the five most essential utilities? What is autilities suite?Utilities are specialized programs designed to make computing easier. The five most essential utilities are: troubleshooting or diagnostic programs, antivirus programs, uninstall programs, backup programs and file compression programs. Utility suites combine several programs into one package.5.Explain the role of device drivers. Discuss the Add Printer Wizard andWindows Update.A device driver works with the operating system to allow communication betweenthe device and the rest of the computer system. Each time the computer system is started, the operating system loads all of the device drivers into memory.Whenever a new device is added to a computer system, a new device driver must be installed before the device can be used.Add Printer Wizard provides step-by-step guidance to select the appropriate printer driver and to install that driver. Windows uses Windows Update to make reinstalling or updating device drivers easily.CHAPTER61.Describe the four basic types of system units.There are four basic types of system units: Desktop system units, Notebook system units, Tablet PC system units, and Handheld computer system units.Desktop system units typically contain the system’s electronic components and selected secondary storage devices.Notebook system units are portable and much smaller. They contain the electronic components, selected secondary storage devices, and input device.Tablet PC system units are highly portable devices that support the use of a stylus or pen to input commands and data.Handheld computer system units are the smallest and are designed to fit into the palm of one hand.2.Describe the two basic components of the CPU.The two basic components are: the control unit and the arithmetic-logic unit.Control unit tells the rest of the computer system how to carry out a program’s instructions.Arithmetic-logic unit performs two types of operations---arithmetic and logical.3.What are the differences and similarities between the three types of memory?There are three types of memory chips: RAM, ROM, and CMOS.RAM chips hold the program and data that the CPU is presently processing, everything in most types of RAM is lost as soon as the microcomputer is turned off or a power failure.ROM chips have programs built into them at the factory. ROM chips are not volatile and cannot be changed by the user.CMOS chip provides flexibility and expandability for a computer system. It contains essential information that is required every time the computer system is turned on. It is powered by a battery and does not lose its contents when the power is turned. Its contents can be changed to reflect changes in the computer system.4.Identify five expansion cards and describe the function of each.Five expansion cards are: graphics cards, sound cards, modem cards, NIC and TV tuner cards.Graphics cards connect the system board to the computer’s monitor, they convert the internal electronic signals to video signals so they can be displayed on the monitor.Sound cards accept audio input from a microphone and convert it into a form that can be processed by the computer. They also convert internal electronic signals to audio signals.Modem cards allow distant computers to communicate with one another by converting electronic signals from within the system unit into electronic signals that can travel over telephone lines and other types of connections.NIC are used to connect a computer to one or more other computers.TV tuner cards can changes the TV signal into one that can be displayed on you monitor.5.Identify and describe four standard ports and two specialized ports.Four standard ports are: serial ports, parallel ports, universal serial bus ports and FireWire ports.Serial ports are often used to connect a mouse, keyboard, modem, and many other devices to the system unit.Parallel ports are used to connect external devices that need to send or receive a lot of data over a short distance.USB ports are gradually replacing serial and parallel ports.FireWire ports provide connections to specialized FireWire devices.CHAPTER71.Define input and output devices.Input is any data or instructions that are used by a computer. Input devices are hardware used to translate what people understand into a form that computers can process.2.Describe the three categories of output devices.①There are a widely of different pointing devices including the mouse,joystick, touch screen, light pen, and stylus.A mouse controls a pointer that is displayed on the monitor.A joystick is the most popular input device for computer games. You controlgame actions by varying the pressure, speed, and direction of the joystick.A touch screen is a particular kind of monitor with a clear plastic outerlayer.A light pen is a light-sensitive pen-like device.A stylus acts with the computer through handwriting recognition software.②There are three types of scanning devices: optical scanners, card readers,bar code readers, and character and mark recognition devices.An optical scanner accepts documents consisting of text and/or images and converts them to machine readable form.Card readers interpret encoded information.Bar code readers are either handheld wand readers or platform scanners.Character and mark recognition devices are scanners that are able to recognize special characters and marks.③Image capturing devices include digital cameras and digital video cameras.Digital cameras capture still images. Digital video cameras capture motion.④Audio input can take many forms including the human voice and music.Voice recognition systems accept voice commands to control computer operations and to create document.MIDI is a standard for connecting musical instruments to the system unit.3.Describe the three categories if output devices.The most widely used output devices are monitors, printers and audio output.Monitors present visual images of text and graphics.Printers translate information that has been processed by the system unit and present the information on paper.Audio output devices translate audio information from the computer into sounds that people can understand.4. Define output an output devices.Output is processed data or information. Output devices are hardware used to translate information that has been processed by the system unit into a form that humans can understands.5. What are combination input and output devices? Describe four such devices.Devices combine features of input devices such as scanners with features of output devices like printers are called combination input and output devices.Combination devices include fax machines, multifunction devices, Internet telephones, and terminals.A fax machine is a standard tool in nearly every office.Multifunction devices combine the capabilities of a scanner, printer, fax, and copying machine.Internet telephones are specialized input and output devices for receiving and sending voice communication.Terminals are input and output device that connect you to a mainframe or other type of computer.CHAPTER81.Discuss the traditional and high-capacity floppy disksThe traditional floppy disk is the 1.44MB 3-inch disk. They have a thin exterior jacket made of hard plastic to protect the flexible disk inside.The high capacity floppy disks are 3 inches in diameter. They are able to store more information, are thicker, and require special disk drives.2.What are the three types of hard disks? Describe three ways to improve harddisk performance.There are three types of hard disks: Internal hard disk, hard-disk cartridge, and hard-disk pack.Three ways to improve the performance of hard disks are disk caching, redundant arrays of inexpensive disks, and file compression/decompression.Disk caching improves hard-disk performance by anticipating data needs.Redundant arrays of inexpensive disks improve performance by expending external storage, improving access speed, and providing reliable storage.File compression and file decompression increase storage capacity by reducing the amount of space required to store data and programs.3.What are the two most common optical disc formats? What is hi def ? Describethe basic types for each format.The two most common optical disc formats are CD and DVD. Hi def is the next generation of optical discs.①There are four basic types of CDs: read only, write once, rewritable, andPicture and Photo CDs.Read only CDs cannot be written on or erased by the users, they are used to distribute large databases, references, and large software application packages.Write once CDs can be written to once, they are used to archive data and to record music download from the Internet.Rewritable CDs are similar to write once CDs except that the disks surface is not permanently altered when data is recorded.Picture and Photo CDs use a special format developed by Eastman Kodak to store digital images.②There are three types of DVDs: read only, write once, and rewriteable.Read only DVDs can provide over two hours of very high-quality video and sound comparable to that found in motion picture theatres.Write once DVDs are typically used to create permanent archives for large amounts of data and to record videos.Rewriteable DVDs are competing rewriteable formats.4.Discuss solid-state storage, Internet hard drives, and magnetic tape. Whatare the advantages and disadvantages of each?Solid-state storage does not have moving parts. Internet drives use the Internet to store data and information. Magnetic tape provides sequential access for backup.Solid-state storage is more expensive than the others, it is more reliable and requires less power.Internet drives are low cost and the flexibility to access information from any location using the Internet. Access speed is slower.Magnetic tapes provide slower sequential access. It is an effective and commonly used tool for backing up data.5. Discuss mass storage, enterprise storage system, and mass storage devices.Mass storage refers to the storage of large amounts of data in a persisting and machine-readable fashion. Enterprise storage systems are the computer storage systems designed for large-scale, high-technology environments of the modern enterprises.Mass storage Devices have been described as mass storage include tape libraries, RAID systems, hard disk drives, magnetic tape drives, optical disc drives, magneto-optical disc drives, drum memory, floppy disk drives, punched tape and holographic memory.CHAPTER91.Define and discuss connectivity, the wireless revolution, and communications.①Connectivity is a concept related to using computer networks to link peopleand resources.②The single most dramatic change in connectivity and communications in thepast five years has been the widespread use of mobile or wireless telephones.This wireless technology allows individuals to stay connected with one another from almost anywhere at any time, the revolution is just beginning.③Communication systems transmit data from one location to another. Everycommunication system has four basic elements: sending and receiving devices, communication channel, connection devices, and data transmission specifications.2.Identify and describe the various physical and wireless communications.①Physical connections use a solid medium to connect sending and receivingdevices.These connections include telephone lines, coaxial cable, and fiber-optic cables.Telephone lines consist of twisted pair cable, they have been the standard transmission medium for years for both voice and data.Coaxial cable replaces the multiple wires of telephone lines with a single solid-copper core.Fiber-optic cable transmits data as pulses of light through tiny tubes of glass.②Wireless connections use the air to connect sending and receiving devices.Primary technologies used for wireless connections are infrared, broadcast radio, microwave, and satellite.Infrared uses infrared light waves to communicate over short distances.Broadcast radio communication uses special sending and receiving towers called transceivers.Microwave communication uses high-frequency radio waves.Satellite communication uses satellites orbiting about 22000 miles above the earth as microwave relay stations.3.Identify the standard Internet protocol and discuss its essential features.The standard protocol for the Internet is TCP/IP. The essential features of this protocol involve: identifying sending and receiving devices and reformatting information for transmission across the Internet.Identification: Every computer on the Internet has a unique number address called an IP address, the Internet uses IP addresses to deliver and to locate Web sites.Reformatting: Information sent or transmitted across the Internet usually travels through numerous interconnected networks. Before the massage is sent, it is reformatted or broken down into small parts called packets, at the receiving end, the packets are reassembled into the correct order.4.Define and discuss the four principal network topologies.The four principal network topologies are star, bus, ring, and hierarchical.In a star network, a number of small computers or peripheral devices are linked to a central unit, all communications pass through this central unit.In a bus network, each device in the network handles its own communication control.In a ring network, each device is connected to two other devices, forming a ring.The hierarchical network consists of several computers linked to a central host computer, other computers are also hosts to other, smaller computers or to peripheral devices.5.Define and discuss the three most common network strategies.The most common network strategies are terminal, client/server, and peer-to-peer systems.①In a terminal network system, processing power is centralized in one largecomputer. For the end user it is lack of control and flexibility.②Client/server network system use one computer to coordinate and supplyservices to other nodes on the network. One advantage of the client/sever network strategy is the ability to handle very large networks efficiently.Another advantage is the ability of powerful network management software to monitor and control network activities. The major disadvantages are the cost of installation and maintenance.③In a peer-to-peer network system, nodes have equal authority and can actas both clients and servers. The networks are inexpensive and easy to install, and they usually work well for smaller systems with fewer than 10 nodes.CHAPTER101.Discuss the impact of large database , private networks, the Internet, andthe Web on privacy.Large databases raise some serious concerns on privacy: identity theft and mistaken identity.The impact of private networks on privacy has the two parts: The first instance, of firms eavesdropping on employees, has inspired attempts at federal legislation. The second instance, in which online information services screen and reject messages, is a common activity with most commercial services.The internet brings illusion of anonymity, the web creates a history file, your web activity is monitored is by cookies. To respond to these privacy concerns, a code of fair information practice has been established.2.Discuss the carious kinds of computer criminals.Computer criminals are of five types:Employees: The largest category of computer criminals consists of those with the easiest access to computers-namely, employees.Outside users: Some suppliers or clients may have access to a company’s computer system.Hackers and crackers: Hackers are people who gain unauthorized access to a computer system for the fun and challenge of it. Crackers do the same thing but for malicious purposes.Organized crime: Members of organized crime groups have discovered that they can use computers just as people in legitimate businesses do, but for illegal purpose.Terrorists: Knowledgeable terrorist groups and hostile governments could potentially crash satellites and wage economic warfare by disrupting navigation and communication systems.3. What are the principal measures used to protect computer security? What isencryption? How is it used by corporations and individuals?Some of the principal measures to protect computer security are encryption, restricting access, anticipating disasters, and backing up data.Encryption is the conversion of data into a form, called a ciphertext that cannot be easily understood by unauthorized people.Corporations have use it for years that some law enforcement agencies are unable to wiretap messages from suspected criminals. Individuals are alsousing encryption programs to safeguard their private communications.4.What is ergonomics? How does computer use impact mental health? Physicalhealth?Ergonomics is defined as the study of human factors related to things people use.The physical health matters related to computers that have received the most attention recently are the following: eyestrain and headache, back and neck pain, and repetitive strain injury. Computer technology creates some irritants that may be counter productive: noise, and electronic monitoring.5.Describe the basic elements of the Green PC and what you can do to protectthe environment.The basic elements of the Green PC are: System unit, display, and manufacturing.As a computer user, you can do to help protect the environment are the following:conserve, recycle, and educate.。
附件1:外文资料翻译译文大容量存储器由于计算机主存储器的易失性和容量的限制, 大多数的计算机都有附加的称为大容量存储系统的存储设备, 包括有磁盘、CD 和磁带。
相对于主存储器,大的容量储存系统的优点是易失性小,容量大,低成本, 并且在许多情况下, 为了归档的需要可以把储存介质从计算机上移开。
术语联机和脱机通常分别用于描述连接于和没有连接于计算机的设备。
联机意味着,设备或信息已经与计算机连接,计算机不需要人的干预,脱机意味着设备或信息与机器相连前需要人的干预,或许需要将这个设备接通电源,或许包含有该信息的介质需要插到某机械装置里。
大量储存器系统的主要缺点是他们典型地需要机械的运动因此需要较多的时间,因为主存储器的所有工作都由电子器件实现。
1. 磁盘今天,我们使用得最多的一种大量存储器是磁盘,在那里有薄的可以旋转的盘片,盘片上有磁介质以储存数据。
盘片的上面和(或)下面安装有读/写磁头,当盘片旋转时,每个磁头都遍历一圈,它被叫作磁道,围绕着磁盘的上下两个表面。
通过重新定位的读/写磁头,不同的同心圆磁道可以被访问。
通常,一个磁盘存储系统由若干个安装在同一根轴上的盘片组成,盘片之间有足够的距离,使得磁头可以在盘片之间滑动。
在一个磁盘中,所有的磁头是一起移动的。
因此,当磁头移动到新的位置时,新的一组磁道可以存取了。
每一组磁道称为一个柱面。
因为一个磁道能包含的信息可能比我们一次操作所需要得多,所以每个磁道划分成若干个弧区,称为扇区,记录在每个扇区上的信息是连续的二进制位串。
传统的磁盘上每个磁道分为同样数目的扇区,而每个扇区也包含同样数目的二进制位。
(所以,盘片中心的储存的二进制位的密度要比靠近盘片边缘的大)。
因此,一个磁盘存储器系统有许多个别的磁区, 每个扇区都可以作为独立的二进制位串存取,盘片表面上的磁道数目和每个磁道上的扇区数目对于不同的磁盘系统可能都不相同。
磁区大小一般是不超过几个KB; 512 个字节或1024 个字节。
计算机专业英语全部答案(第三版)Unit1EX11 F2 T3 T4 F5 T6 F7 T 8 T 9 T 10FEX2Input hardware, storage hardware, processing hardware, output hardware power, speed, memorycentral processing unitinternal, primary, memorykeyboard, central processing unit, main memory, monitorEX3 PARTA1 F2 D3 G4 C5 B6 A7 E 8 HEX3 PART B1 F2 E3 G4 B5 A6 C7D 8 HEX41 input device2 screen3 manipulates4 instructions5 retrieve6 codes7 hardcopy8 functionEX51 T2 T3 F4 F5 T6 F7 T 8 TUNIT2EX11 T2 F3 T4 F5 T6 F7 T 8 FEX21 sizes, shapes, processing capabilities2 supercomputers, mainframe computers, minicomputers, microcomputers3 mainframe computer4 microcomputer, storage locations5 portables, laptop computers, desktop workstations6 semiconductor7 CPU, memory, storage, devices, processing, users8 microprocessor chipEX3 PARTA1 C2 A3 H4 I5 E6 F7 G 8 JEX3 PARTB1 capacity2 device3 laptop computer4 Portable computers5 Silicon6 semiconductor7 workstation8 Voltage, voltage9 RAM10ROMEX41 portable2 access3 main memory4 sophisticated programs5 processing capabilities6 instructions7 computation8 computer professionalEX51 T2 T3 F4 F5 F6 T7 F 8 T 9 T 10T11F 12T 13 T 14 TUNIT3EX11 T2 F3 T4 T5 T6 T7 F 8 F 9 T 10 F11T 12F 13F 14TEX21 microprocessor2 bus3 register 4control unit5 processor6 binary7 arithmetic, logic 8 milliseconds, microseconds9 instruction 10execution 11megahertz 12wordsize EX3 PARTA1 F2 A3 J4 C5 D6 E7 H 8 I 9 B 10GEX3 PARTB1 Storage 2chip3 buses4 ALU5 register 6control unit7 machine language 8 binary system 9 bits 10computer programEX41 configuration2 decodes3 data bus4 characters5 converts6 synchronize7 circuitry8 internal clockEX51 T2 F3 F4 T5 F6 F7 T 8 T 9 F 10 FUNIT4EX11 F2 T3 T4 F5 F6 T7 F 8 T 9 T 10 F11T 12T 13F 14F 15T 16F17T 18F 19T 20F21T 22FEX2memoryRAMdiskettes, diskschipsparityexpanded, extendedmonochromecacheROMupdatedEX3 PART A1 B2 E3 C4 J5 I6 H 7A 8 F 9 G 10DEX3 PART Bsecondary storagebufferaccesscodedisketteslotterminalsmotherboardbytescreenEX4desktopsoftwareanimationtransferredsophisticatedcompatiblecacheupgradeEX51 T2 F3 F4 T5 T6 T7 T8 F9 T 10 F11T 12F 13F 14T 15T 16F17F 18F 19F 20T21T 22TUnit 5Ex1:1 T2 T3 F4 T5 F6 F7 F 8 T 9 T 10 T11F 12T 13F 14F 15T 16T17F 18T 19F 20F21T 22T 23TEX2mail, courierhub, starlocal area networkpacketsEthernetkilobits per second, megabits per second, gigabits per second circuit switchingreassembledinternet protocol, transmission control protocol datagramsframesbinary, decimalEX3 part A1 C2 E3 B4 F5 A6 D7 H 8 GEX3 part Bhubzippeddecimalframebinary numberinternetpacketbandwidthEX4forwardedreassembledare encapsulatedcableburstysubmitare retransmittedprotocolEX5IP addressnotationdotted-decimalcomputer networkbackgroundsharedgeographicprivacyExercise to the Passage for ReadingEX6有意为维修技师使用所留被弃的、丢失的或损坏了的数据都进了数据桶。
计算机科学与技术英文文献Organized at 3pm on January 25, 2023Only by working hard can we be better专业英语期末考试课程论文微软设计应用班级: 13级信息管理与信息系统1班学号:姓名:朱敦达分数:2015年12月25日微软设计应用CGI具有扩充性能和克服的问题的能力,是微软公司开发的一种新的方式开发建设规模的应用;这就是所谓的替代high performance互联网服务器应用程式接口ISAPI;代替了housing功能编程档案,利用DLLs代替了复杂的编写程序的过程,同其它软件比较DLLs 具有很大的优势,在性能上也有所扩充;Introduction to DevelopmentTo overcome the performance and scalability problems that CGI brings, Microsoft developed a new way for developers to build scalable applications. This high performance alternative is called the Internet Server Application Programming InterfaceISAPI. Instead of housing functionality in executable files, ISAPI uses DLLs. Using DLLs instead of executable programs has some definite performance and scalability advantagesISAPI在功能上有所扩展,它可以向用户提出要求,使单一ISAPI扩展执行多种任务;就像CGI的例子一样, ISAPI再使用时必须使用目录执行许可认证, 或利用DLL下载客户端,而不是直接在服务器上使用,ISAPI扩展通常用来处理用户的要求做出回应,这和使用CGI的方式非常类似;The ISAPI extension could also be called with arguments that will allow a single ISAPI extension to perform multiple tasks. Just as in the CGI example, the directory must have execute permissions enabled, or the DLL will be downloaded to the client rather than run on the server. ISAPI extensions are typically used to process client requests and output a response as HTML, which is very similar to the way CGI programs are used.凡是直接与CGI重复的申请必须经过ISAPI的过滤器;但是,ISAPI过滤器没有明确的要求,相反,它们被称为to certain针对IIS的生活事件要求,发展商在任何一种称为ISAPI过滤器的事件发生后,才能提出要求,具体发生事件如下:1.当服务器发生客户邀请事件时;2.当客户使用真实服务器时;3.当服务器从逻辑URL绘制物理URL图形时;4.在原始数据由客户发送给服务器时;5.在原始数据由客户发送到服务器,但在服务器程序运行之前时;6.当信息服务器原数据时;7.在协议结束时;ISAPI filters perform a function that can’t be directly duplicated with CGI applications. ISAPI filters are never explicitly called; instead, they are called by IIS in response to certain events in the life of a request. The developer can request that an ISAPI filter be called whenever any of the following events occur:1.When the server has preprocessed the client headers2.When the server authenticates the client3.When the server is mapping a logical URL to a physical URL4.Before raw data is sent from the client to the server5.After raw data is sent from the client to the server but before the server processes it 6.When the server logs information7.When the session is ending作为过滤器,ISAPI过滤器只通知要求,然后服务器就会尽快处理要求;其中较常见的是给用户提供认证功能;另一个是使用HTML修改文本,然后服务器会自动将其送交给客户端;举个例子,可以用ISAPI过滤器的背景颜色来改变每一个页面的颜色,这是由于ISAPI过滤器几乎是共同的ISAPI扩展,但是由于本文的篇幅有限,所以,我们不能在这本书中进一步介绍它,如果你想了解更多的关于ISAPI扩展方面的知识,你可以看看我的书的服务器应用这一章节的内容,ISAPI几个具体的起点职务,必须由DLL输出,同时利用这些切入点, IIS可以负荷的DLL,功能要求它执行, 在经过必要的参数,接收数据和写回浏览器;ISAPI只需两起实施这些功能点切入点;As with any filter, ISAPI filters should request only the notifications it requires and process them as quickly as possible. One of the more common uses of ISAPI filters is to provide custom authentication. Another use is to modify the HTML that will be sent to the client. For example, an ISAPI filter could be used to change the background color of each page. Because ISAPI filters aren’t nearly as common as ISAPI extensions, I won’t cover them any further in this book. If you want to learn more about ISAPI extensions, you can check out my book Inside Server-Based Applications Microsoft Press, 1999.ISAPI specifies several entry-point functions that must be exported from the DLL. Using these entry points, IIS can load the DLL; call the functions that it implements, passing in parameters as required; and receive the data to write back to the browser. ISAPI requires only two entry-point functions to be implemented these entry points, IIS can load the DLL; call the functions that it implements, passing in parameters as required; and receive the data to write back to the browser. ISAPI requires only twoentry-point functions to be implemented一个更好的方法:动态页面;如果你想知道我们为什么要编注一本关于在程序应用的书,那么我们就会告诉你,其实它的答案在于执行的具体细节及其前身, 动态页面ASP;在这之前,我们需要了解ISAP与Iadeeper的联系,只有这样才能了解;A Better Solution: Active Server PagesIf you’re wondering why we’ve dwelt on th e alternatives to in a book about programming , the answer lies in the details of the implementation of and its predecessor, Active Server Pages ASP. Understanding ISAPI is required for adept understanding of ASP and thus .是的一部分,微软推出新技术的最初代号为" Denali " 这是在微软的"主动"期间, 现在,这项技术终于正式命名为动态页面技术,或者叫做ASP;它的前几个版本已出版,其中最重要的版本,包括选择包和协议、Windows2000和协议;对于这次讨论的目的,首先,我们要把ASP作为一个整体来看待,而不要想它的不同版本;During the beta of IIS , which became part of Windows NT , Microsoft introduced a new technology initially codenamed “Denali.” This was during Microsoft’s “Active” period and so the technology was eventually named Active Server Pages, or ASP. Several versions of have been released, most notably the versions included with Windows NT Option Pack ASP and IIS and Windows 2000 ASP and IIS . For the purposes of this discussion, I’ll consider ASP as a whole, without referring to version differences ASP在很短的时间内成为了一个协议,这在很大程度上是因为它把一些非常困难的问题动态网页内容创造变得比较容易;创造CGI应用和ISAPI应用是一件非常困难的事情,但是程序员利用ASP进行编程却变得非常容易,ASP利用VB. NET开发. 几百万个程序开发人员多多少少有点熟悉Visual Basic、Visual Basic应用VBA或VBScript;正是有了这些发展, ASP成为进入网络时代的一个基本标志;当然程序开发人员本可以学习新的编程语言,他们都没有出色. 部分原因是它源于VBScript,用ASP去建立网络应用成为可行的方法;became an instant hit, in large part because it made something that was difficultcreate dynamic Web content relatively easy. Creating CGI applications and ISAPI applications wasn’t terribly difficult, but using ASP was much simpler By default, ASP uses VBScript. Literally millions of developers are at least somewhat familiar with Visual Basic, Visual Basic for Applications VBA, or VBScript. For these developers, ASP was the way to enter the Internet age. Certainly the developers could have learned a new programming language, but they didn’t have to with ASP. Partly because of its use of VBScript, ASP became a viable way to build Web applications.同样重要的是通过微软启动ObjectsADO 可以比较容易获得数据库资料;当程序开发人员需要产生动态内容,动态内容显然是需要来自某处,而使用ADO可以使访问数据库变得容易;Just as important was the relatively easy access to databases allowed through Microsoft ActiveX Data Objects ADO. When you need to generate dynamic content, that dynamic content obviously needs to come from somewhere, and ADO made it easy to get at that data.最后,也许最重要的是, 的发展模式允许程序开发人员只简单的写代码并能运行. 无需进行详细设置步骤,或编译;的程序开发人员需要认真掌握这一发展模式, 即使情形有点不同;Finally, and perhaps most important, the development model allowed developers to essentially write code and run it. There was no need to perform compilation or elaborate installation steps. the architects were careful to capture this same development model, even though what’s going on under the covers is quite a bit different.的最新使用办法;版本和Windows2000几乎是在同一时间发布的,它的发布使人们清楚地看到了与开发未来网站密切相关的软件;微软推出新版本保留协议和发展模式深受广大用户的喜爱;同时程序开发人员可以把创造的用户和密码正确的添加得到许可目录, 而且还引进创新思想,使程序开发人员更容易分离其内容和应用;A New Solution:When version of was released along with Windows 2000, it became clearer that the future of software development was closely tied to the future of the Web. As part of its initiative, Microsoft has introduced , a new version of ASP that retains the model of development ASP developers have come to know and love: you can create the code and place it in the correct directory with the proper permissions, and it will just work. also introduces innovations that allow easier separation of the development of the core of an application and its presentation.添加了很多很多的特点,并且提高了很多能力; 它实在是一个全新的产品, 虽然新产品的设计与开发经验,使这一协议得到了发展. 有一些明显的特点:网架构:网是一个框架结构,便于网络设计和传统应用;Framework: The Framework is an architecture that makes it easier to design Web and traditional applications.通用语言runtime: Runtime提供一套服务给所有的;如果你是一个想把ASP scripting和COM objects相结合的程序设计员, 你会体会到穿梭多种编程语言的乐趣;Common language runtime: The common language runtime provides a set of services for all languages. If you’re an ASP developer who has had to combine ASP scripting withCOM objects, you’ll appreciate the beauty of a com mon set of types across many languages.汇编语言: 提供了更高性能的汇编语言;汇编语言允许开发者验证至少语法是正确的代码,ASP不提供任何这类帮助, 所以语法错误可能不是那么简单被察觉,直到第一次执行代码;Compiled languages: provides enhanced performance through the use of compiled languages. Compiled languages allow the developer to verify that code is at least syntactically correct. ASP doesn’t provide any such facility, so simple syntax errors might not be caught until the first time the code is executed.最新潮的语言Visual Basic:Visual Basic的最新版提供了一个新的, 简洁语法;C是仿照C++设计出来的新语言,但一些不安全的特点使c++难以被用来建立可靠应用;这两种语言都能直接使用,但其他语言都要借助第三方;到写本文为止, Cobol语言和Eiffel语言应该都能通过VisualStudio实现了;Cool new languages Visual Basic: is a completely new version of Visual Basic that provides a new, cleaner syntax. C is a new language designed to look and feel a lot like C++, but without some of the unsafe features that make C++ difficult to use to create reliable applications. These two languages are available out of the box, but other languages will be available from third parties as well. As of this writing, COBOL and Eiffel implementations should be available for Visual Studio as well.VisualStudio:VisualStudio是一个新的开发环境,带来了快速应用开发RAD服务器;Visual Studio : Visual Studio is a cool new development environment that brings rapid application development RAD to the server.提高部分:网框架使用新型支持组件,可以方便地在运行中的应用中替换;Improved components: The Framework supports the use of new types of components that can be conveniently replaced in a running application.网站形式:允许仿照者通过常见HTML部件的事件处理程序一起发展;Web Forms: Web Forms allow Visual Basic–like development, with event handlers for common HTML widgets.XML网络服务:XML网络服务同意开发者提供服务,以使他们能够获得行业标准协议;XML Web services: XML Web services enable developers to create services and then make them available using industry standard protocols.:是一项新技术,它可以使应用更快捷的获得数据库中的数据和其它形式的数据,如:可扩展标记语言XML;: ADO for the Framework is a new version of the technology that allows applications to more conveniently get at data residing in relational databases and in other formats, such as Extensible Markup Language XML.结论这个短暂的web发展历史应该向你提供了学习的基础;学习一种编程语言与开发环境很像学习一种人类的语言;虽然书上的语法和词汇有一些帮助,但是,它们仅仅只是对人们了解语言的历史有用;ConclusionThis brief history of Web development should provide you with a foundation as you continue reading about . Learning a programming language or development environment is much like learning a human language. Although books that cover the syntax and vocabulary are helpful, it’s often just as useful to understand the history of the people who use the language.如果,你是一个的程序开发员,关于的很多书籍将会开阔你的视野,但我希望你能从中学到写什么,如果你个是初学者,了解的历史,也会对你如何使用技术进行编程有很大帮助;If you’re an developer, much of this chapter might be a review for you, but I hope that you’ve added something to your understanding of the history of . If you’re new to ASP and , understanding the history of ASP and what came before it will be useful as you begin to explore the exciting new technologies that make up .关于;不仅仅是Active Server Page ASP的下一个版本;它还提供了一个统一的Web开发模型,其中包括开发人员生成企业级 Web 应用程序所需的各种服务;的语法在很大程度上与ASP兼容,同时它还提供一种新的编程模型和结构,可生成伸缩性和稳定性更好的应用程序,并提供更好的安全保护;对现有ASP应用程序,可以通过添加一些功能,增强应用程序的能力;AboutActive Server Aside from the burden is not only ASP version of the next; It also provides a unified Web development models, including the development of enterprise-class Web applications generated personnel for the various services. grammar largely compatible with ASP, it also provides a new programming model and structure, flexibility and stability can produce better applications, and to provide better security protection. Through the existing ASP applications, gradually add functions to enhance ASP applications functions.当创建应用程序时,开发人员可以使用Web窗体或XML Web services,或以他们认为合适的任何方式进行组合;每个功能都能得到同一结构的支持,使您能够使用身份验证方案,缓存经常使用的数据,或者对应用程序的配置进行自定义,这里只是列出几种可能性而已;When building applications, developers can use Web or XML Web services, or in any manner they deemed appropriate portfolio. Each functional access to the same supportstructure, so that you can use as a certification program, buffer frequently used data, or configuration of applications for self definition, only listed a few possibilities here.使用Web窗体可以生成功能强大的基于窗体的Web页;生成这些页时,可以使用服务器控件来创建公共UI元素,以及对它们进行编程以用于执行常见的任务;这些控件使您能够用可重复使用的内置或自定义组件生成Web窗体,从而简化页面的代码;有关更多信息,请参见Web窗体页;You can use Web-based generation of powerful the Web page. These generated pages, can be used to build public complaints server UI elements, and programming for the implementation of their common task. You can use these complaints to the building or from reusable components generated Web definition, thus simplifying the code page. For more information, please see Web pages.XML Web services 提供了远程访问服务器功能的途径;使用 XML Web services,企业可以公开数据或业务逻辑的编程接口,而客户端和服务器应用程序则可以获取和操作这些编程接口;通过使用诸如 HTTP 和XML消息传递之类的标准跨越防火墙移动数据,XML Web services 可在客户端-服务器或服务器-服务器方案下实现数据的交换;XML Web services 不用依靠特定的组件技术或对象调用约定;因此,用任何语言编写、使用任何组件模型并在任何操作系统上运行的程序,都可以访问 XML Web services;XML Web services provide a means of remote access server functions. Use XML Web services, enterprises can open data or business logic programming interface, and client-server applications and can acquire and operate these programming interfaces. Through the use of information such as web and XML standards such as the transmission of data across mobile firewall, XML Web services to customers - in-server or server-server programmed for data exchange. XML Web services without relying on specific components or technology transfer targets agreed. Therefore, the use of any language, using any component model, operating system and in any operating procedures can visit XML Web services.的安装与运行与 Framework 版一起安装,作为每个 Windows Server 2003 系列产品的一部分;您只需通过控制面板将它添加为新的程序,或者使用“配置您的服务器向导”启用它;此外,可以按照本主题后面介绍的“在装有 Windows XP Professional 或 Windows 2000 Server 的计算机上安装”过程,从网上下载版;安装 Visual Studio 时会同时安装版;and. Net Framework version installed, as each part of the Windows Server 2003 series products. You can add it through the control panels for the new procedures, or use "of your server guide" opening it. In addition, according to this theme later introduced "with Windows XP Professional or Windows 2000 Server computer installed " process downloading . Installed Visual Studio. Net will also install .。
计算机领域的引用格式计算机领域的引用格式1. 引用格式的重要性在计算机领域中,引用格式是非常重要的。
这是因为计算机领域的研究日新月异,新的技术和方法不断涌现。
为了更好地了解这些技术和方法,我们需要查看已有的相关研究成果。
而通过引用,我们可以了解更多的相关研究,更加全面和深入地理解当前研究的背景和状况。
因此,在写作和研究中,正确使用引用格式是非常重要的一步。
2. 引用格式的种类在计算机领域中,常见的引用格式有几种不同的种类。
下面分别进行介绍。
2.1 IEEE 格式IEEE 引用格式最初是面向电子工程技术的,但现在已经成为计算机领域中广泛使用的一种标准引用格式。
该格式要求提供以下信息:作者、文献标题、期刊名称、卷数、期数、页码和出版年份。
例如:[1] D. Rincon, “A novel algorithm for real-time tracking,” IEEE Transactions on Robotics, vol. 28, no. 5, pp. 945-953, 2012.2.2 APA 格式APA 引用格式被广泛用于社会科学和人文学科中,但在计算机科学领域中也有一定的使用。
该格式要求提供以下信息:作者、文献标题、期刊名称、卷数、期数、页码和出版年份。
例如:Rincon, D. (2012). A novel algorithm for real-time tracking. IEEE Transactions on Robotics, 28(5), 945-953.2.3 ACM 格式ACM 引用格式是计算机领域中的一种常见的引用格式。
该格式要求提供以下信息:作者、文献标题、会议名称、页码和出版年份。
例如:Rincon, D. 2012. A novel algorithm for real-time tracking. In Proceedings of the ACM International Conference onRobotics and Automation (ICRA '12), 945-953.3. 常见的引用错误正确使用引用格式对于保证文章的质量非常重要。
英文文献及翻译(计算机专业)The increasing complexity of design resources in a net-based collaborative XXX common systems。
design resources can be organized in n with design activities。
A task is formed by a set of activities and resources linked by logical ns。
XXX managementof all design resources and activities via a Task Management System (TMS)。
which is designed to break down tasks and assign resources to task nodes。
This XXX。
2 Task Management System (TMS)TMS is a system designed to manage the tasks and resources involved in a design project。
It poses tasks into smaller subtasks。
XXX management of all design resources and activities。
TMS assigns resources to task nodes。
XXX。
3 Collaborative DesignCollaborative design is a process that XXX a common goal。
In a net-based collaborative design environment。
n XXX n for all design resources and activities。
An Annotated Bibliography ofComputer Supported CooperativeWorkSaul Greenberg1991Cite as:Greenberg, S. (1991) “An annotated bibliography of computer supported cooperative work.”ACM SIGCHI Bulletin, 23(3), pp. 29-62. July. Reprinted in Greenberg, S. ed. (1991) "Computer Supported Cooperative Work and Groupware, pp. 359-413, Academic Press.An Annotated Bibliography of Computer Supported CooperativeWorkSaul GreenbergDepartment of Computer Science, University of CalgaryCalgary, Alberta, Canada T2N 1N4phone: (403) 220-6087email: saul@cpsc.ucalgary.caAbstract—Computer-supported cooperative work (CSCW) is a new multi-disciplinary field with roots in many disciplines. Due to the area’s youth and diversity, few specialized books or journals are available, and articles are scattered amongst diverse journals, proceedings and technical reports.Building a CSCW reference library is particularly demanding, for it is difficult for the new researcher to discover relevant documents. To aid this task, this article compiles, lists and annotates some of the current research in computer supported cooperative work into a bibliography. Over 300 references are included.1 IntroductionAn important part of any new research venture is building and maintaining a reference collection of relevant publications. This article provides a bibliography of computer supported cooperative work (CSCW). Many entries are annotated with a brief description derived from snippets from the original abstract, my personal notes, and from commentaries written by other people. Annotations also include a keyword list for topic disambiguation, where each keyword is selected from the limited set shown in Table 1. The article also includes and overview of the general sources that publish CSCW works (Section 2), and a list of groupware systems and concepts indexed to the bibliography (Section 3).The bibliography is available in both an EndNote1 database and a Refer database. Those wishing an electronic version of this bibliography can obtain it in two ways. The EndNote database and a Microsoft word copy of this document are available by writing the author at the above address (please enclose a 3.5 inch Macintosh disc and a self-addressed stamped envelope). The Refer database and other related files are available via anonymous ftp from cpsc.ucalgary.ca in the directory pub/CSCWbibliography.2 General CSCW Sources1 EndNote is a Macintosh-based bibliographic package available through Niles & Associates Inc.Due to the youth and diversity of CSCW, there are only a handful of specialized books available. Most of the literature is scattered amongst many journals, proceedings of conferences and workshops, and technical reports. This section is a resource guide for readers interested in tracking the relevant published literature in CSCW and groupware2.Books. Perhaps the best selection of CSCW articles is provided by Irene Greif’s “Computer Supported Cooperative Work” (Greif, 1988)3. Her collected readings span from the earliest visions of CSCW to present day theory and practice. On the groupware front, Johansen’s “Groupware: Computer support for business teams” is a very readable layman’s book detailing current approaches and applications of groupware to business environments (Johansen, 1988). Two recent CSCW collections cover social and technological support for work group collaborations: “Intellectual teamwork” by Galegher, Kraut and Egido (1990); and “Technological support for work group collaboration” by Olson (1989).“Computer supported cooperative work and Groupware” (Greenberg, 1991c) collects 16 CSCW articles previously published in a 2-part special2With special thanks to Jonathan Grudin, who provided a contents list of several books and proceedings, and where selected articles had been republished.3The annotated references to books and proceedings include a list of section or conference session names and, in some cases, ordering information.edition of the International Journal of Man Machine Studies, as well as this bibliography. Conferences. The major conference for CSCW is the bi-annual ACM-sponsored “Conference on Computer-Supported Cooperative Work”. The first conference was held in 1986 in Austin, Texas (ACM Press, 1986). Although its proceedings are no longer in publication, many of the articles have been reprinted in revised form in the books and journals mentioned in this section. Proceedings of the 1988 Portland Oregon conference and the 1990 Los Angeles California conference (ACM Press, 1988 & 1990)are available from the ACM Order Department, PO Box 64145, Baltimore, MD, USA 21264. These proceedings are of excellent quality, with collected papers covering most contemporary work.The “European Community Conference on Computer Supported Cooperative Work” is the European counterpart to the ACM conference. The first was held on September 13–15 in Gatwick, London, UK (EC-CSCW, 1989), with a second scheduled for fall of 1991 in Amsterdam, The Netherlands. Proceedings are available from the Computer Sciences Company, Computer Sciences House, Brunel Way, Slough, United Kingdom SL1 1XL.Several other important conferences deserve mention. The “IFIP WG8.4 Conference on Multi-User Interfaces and Applications” was recently held in Crete (Gibbs and Verrijn-Stuart, 1990). The “Symposium on Computer Conferencing”, once centered around distance education and asynchronous conferencing, now has broader coverage more in line with CSCW (University Of Guelph, 1987 and 1990). ACM’s “SIGCHI Conference on Human Factors in Computing Systems” and the “SIGOIS Conference on Office Information Systems” normally have special sessions, panels or papers on CSCW. Journals. There are no dedicated journals for CSCW. Still, the ones listed below do publish occasional papers of interest.ACM Transactions on Information Systems has had several special editions on CSCW. These tend to re-publish selected and revised papers previously presented at the ACM-sponsored CSCW conferences. In particular, see Volumes 5(2) 1987, and 6(3&4) 1988. A forthcoming edition will feature several articles from the CSCW’90 conference.The International Journal of Man Machine Studies has formalized its interest in CSCW in its re-organization of the editorial board into topic areas,one being CSCW. A two-volume special edition on CSCW and Groupware containing sixteen new articles on a variety of topics was published in February/March of 1991. Academic Press has republished this collection as a book (Greenberg, 1991c).The December 1988 issue of Byte had a special section devoted to CSCW papers, and the odd high-quality article has appeared in Communications of the ACM and IEEE Computer. ACM’s SIGCHI Bulletin and SIGOIS Bulletin occasionally contain relevant articles and summaries of conferences and workshops. Other mainstream human-computer interface and management-oriented journals also have the odd article on CSCW. These include Behaviour and Information Technology; Decision Support Systems; Human Computer Interaction; Interacting with Computers; Management Science; and Office: Technology and People.Major collections included in the bibliography.The bibliography contains a large mix of references. While some come from from the “gray literature” of unusual journals, research reports, and unpublished papers, most come from the sources listed above. The following list shows which major collections of CSCW papers are completely included in this bibliography.• Proceedings of the 1986, 1988, and 1990 ACM Conference on Computer Supported Cooperative Work (ACM Press: 1986, 1988 & 1990)• Proceedings of the 1989 European Community Conference on Computer Supported Cooperative Work (EC-CSCW, 1989)• Proceedings of the 1990 IFIP WG8.4 Conference on Multi-User Interfaces and Applications (Gibbs and Verrijn-Stuart, 1990)•Computer supported cooperative work and groupware (Greenberg, 1991c)• Intellectual teamwork: Social and technical foundations of cooperative work (Galegher, Kraut and Egido, 1990)• Computer Supported Cooperative Work: A book of readings (Greif, 1988)• Technological Support for Work Group Collaboration (Olson, 1989)• International Journal of Man Machine Studies Special Editions on CSCW and Groupware (February and March 1991), republished in Greenberg (1991c)• ACM Transactions on Information Systems Special Editions on CSCW vol 5(2) 1987; 6(3) and 6(4) 19883 Index to Groupware Systems and CSCW conceptsName CitationDykstra 1991ACE (Amsterdam ConversationEnvironment)AMIGO model Danielsen 1986Andrew Messaging System Borenstein 1988a, 1988b & 1991Animating Interfaces Wulff 1990Aplex project Bodker 1988ArgNoter Stefik 1987a & 1987bAudio windows Cohen 1991Augment/NLS Engelbart 1963, 1968, 1982, 1984, 1988 & 1990Banyan Jackson 1989BITNET Jarrell 1986; Pliskin 1989BoardNoter Stefik 1987a & 1987bCallisto Sathi 1986CAVECAT Mantei 1991Cantata Chang 1986, 1987a & 1989Capture Lab EDS 1988; Halonen 1989; Losada 1990; Mantei 1988 & 1989 CATeam Room Ferwanger 1989; Lewe 1990CHAOS De Cindio 1986ClearFace Ishii 1991CoAuthor Hahn 1989Cognoter Foster 1986; Stefik 1987a & 1987b; Tatar 1991CoLab Foster 1986; Stefik 1987a & 1987b; Tatar 1991 Collaboratory Lederberg 1989Commune Bly 1990; Minneman 1990 & 1991; Tang 1990Confer Fanning 1986Contexts Delisle 1987Cookbook Ishii 1990bCoordination theory Malone 1988 & 1990Coordinator Bair 1988; Erickson 1989; Winograd 1986, 1988a & 1988b Cosmos Bowres 1988Cruiser Fish 1989; Root 1988DHSS Large DemonstratorStorrs 1989ProjectDialogo Lantz 1986 & 1989; Lauwers 1990a & 1990bDiamond see MMCONFDistEdit Knister 1990Earth Lab Newman 1988Electronic Brainstorming System Applegate 1986Envisioning Machine Singer 1988Moran 1990; Buxton 1990EuroPARC Multi-mediaEnvironmentgIBIS(see also rIBIS) Conklin 1988; Lee 1990a; Yakemovic 1990 GroupSketch Greenberg 1990Grove Ellis 1988a & 1988bHypermate Ellis 1988bICICLE Brothers 1990Intermedia Garrett 1986; Landow 1990InVision Kass 1989KMS Yoder 1989Liveware Witten 1991Liza Ellis 1988b; Gibbs 1989MAFIA Lutz 1990MBlink Sarin 1985Mermaid Watabe 1990Name CitationMIAC conferencing system Clark 1989MMCONF Crowley 1987, 1989 & 1990; Lison 1989; Thomas 1985Mosaic Garcia-Luna-Aceves 1988NETLIB Dongarra 1987Notecards Halasz 1988; Trigg 1986 & 1988NSF EXPRES Olson 1990Object Lens, Information Lens Crowston 1988b; Lia 1988; Mackay 1989 & 1990; Malone 1986, 1987,1987a & 1989; Tarazi 1989Office design project (Xerox)Harrison 1989; Stults 1988Open Hyperdocument System Engelbart 1990PAGES Mantyla 1990Portland Experiment Abel 1990a; Goodman 1987b; Olson 1991PREP editor Neuwirth 1990Project Nick Begeman 1986; Cook 1987; Ellis 1988b; Rein 1989Quilt Leland 1988RandMail Eveland 1987Rapport Ahuja 1990; Ensor 1988 & 1989Rendezvous Patterson 1990rIBIS Rein 1991RTCal Sarin 1985SharedARK Smith 1988 & 1989SharedX Garfinkel 1989; Gust 1988 & 1989Share Greenberg 1990b & 1990cSIBYL Lee 1990aSimple Simon’s GesturePad Gerrissen 1990bSlate (BBN)See MMConfSpeech filing system Gould 1983 & 1984STRUDEL Shepherd 1990SYNVIEW Lowe 1986Talking Heads MIT 1983aTeamWorkstation Ishii 1990a, 1990c, 1991, 1991 (submitted)Timbuktu Farallon 1988; Guttman 1989Together Quinn 1990Trillium Blomberg 1986University of Arizona GDSS Valacich 1991; Vogel 1990Unix customization files Mackay 1990US West Tele-collaborationAbel 1990b; Bulick 1989; Corey 1989ProjectVideoDraw Tang 1989 & 1990VideoWhiteboard Tang 1991VideoWindow Fish 1990Video wall (Xerox)See Portland ExperimentVirtual Environments Cohen 1991Visual Schedular Beard 1990Vmacs Lakin 1990XSketch Lee 1990bKeyword Meaningasynchronous conferencing Different time, different place meetings. Also known as computer-mediated communication, computer conferencing, and bulletin boardscollection A collection of papers, readings, essays, etcconceptual High-level discussion of CSCWcritique General analysis and assessment of CSCWdata sharing Sharing of common data (files, etc)decision support Group decision support systems (GDSS)education CSCW applied to educationemail Electronic mailevaluation A formal study by controlled experiment, questionairre, field study,observations, etcface-to-face meetings Meetings in the same place and at the same timehypertext Hypertext and Hypermediaidea processors Idea processors, outliners, brainstorming toolsimplementation A description of an implemented system or a commercially available product informal meetings Explicit recognition of informal encounters and meetings, and technicalsupport of themmultimedia Multiple types of media (graphics, voice, video, text, rasters, etc) organizational concerns Organizational issues in the use/acceptance of groupwareoverview An overview/survey of an area within CSCWparticipatory design Users are involved as part of the design team. Article describes how to do it, ordescribes tools supporting it, or discusses implications to CSCW.protocols Person to person communication protocols such as speech actsremote meetings Meetings held at the same time, different locationreport Report on a workshop or conferencesemi-structured messages Template-based textual communication with some free textshared views Shared views and serial interaction with single-user systemsshared workspace Shared workspaces, usually supporting simultaneous participant activitysocial impact Social science theory and social issues in the use of CSCW systemssoftware design Design and development of groupware including both design process andtoolkitsvideo Video is used as a component of the CSCW system or for data analysisvirtual environments Shared virtual environments or ideas related to itvirtual hallways Social real-time interaction in a virtual worldTable 1: Keywords used to annotate the bibliography entries and their meanings4. BibliographyAbel, M. (1990a) “Experiences in an exploratory distributed organization.” In IntellectualTeamwork: Social Foundations of CooperativeWork, p489-510, J. Galegher, R. E. Kraut and C.Egido ed., Hillsdale, New Jersey, LawrenceErlbaum Associates.(virtual hallways, video, informal meetings,evaluation) Abel describes a case study of a video wall used to create permanent links between twogeographically-distributed research labs to supportinformal interaction. The system is described asadequate (but just barely so) for creating a joint sense of place and culture.Abel, M., Corey, D., Bulick, S., Schmidt, J. and Coffin, S. (1990b) “The US West AdvancedTechnologies TeleCollaboration research project.”In Computer Augmented Teamwork, G. Wagnered.Van Nostrand Reinhold.(virtual hallways, video, informal meetings) Thischapter provides an overview of the US WestTeleCollaboration project. The emphasis is onsupporting day-to-day interaction among individuals, especially informal, spontaneous interaction.Motivation, technical infrastructure, and lessonslearnt are provided. A good sequel to Xerox's Portland experiment.Abel, M. J. and Rein, G. L. (1989) “Report on the collaborative technology developers' workshop.”SIGCHI Bulletin, 20(3), p86-89, January. Alsopublished in ACM SIGOIS 1989 10(1).(report, software design) This brief report summarizes the 1988 CSCW workshop held for developersbuilding collaborative technologies. Several issues were raised: 1) personalized views versus what yousee is what I see (WYSIWIS); 2) synchronous versus asynchronous interaction; 3) navigation and visualmetaphors; 4) single vs multi-user applications; 5)social protocols and the niche for sociologists. The workshop was part of the CSCW '88 conference. ACM Press (ed.) (1986) “Proceedings of the 1986 Conference on Computer Supported CooperativeWork.” ACM Press. December 3-5, Austin,Texas.(collection) Session titles were: 1 Supporting face-to-face groups; 2 Empirical studies; 3 Supportingdistributed groups; 4 Hypertext systems; 5Underlying technology for collaborative groups; 6Collaboration research; 7 Interfaces: Multimedia and multi-user; 8 Industrial experience with computer-supported groups; 9 Coordination and decision-making. Although proceedings are no longeravailable, many of the articles have beenreprinted/revised in: Trans Office InformationSystems 1987 5(2) and 1988 6(3); Human-Computer Interaction 3(1); Office: Technology and People1987 3; Computing Surveys 1988 20(2); and Greif(1988).ACM Press (ed.) (1988) “Proceedings of the 1988 Conference on Computer Supported CooperativeWork.” ACM Press. September 26-28, Portland, Oregon.(collection) Session titles were: 1 Remotecommunication; 2 Work settings and applications; 3 Perspectives on evaluation; 4 Structuredcommunication technologies; 5 Practical experiences in system development; 6 Enabling technologies and environments; 7 Synchronous communication; 8Collaborative learning; 9 Electronic mail; 10Perspectives. A few articles have beenrevised/reprinted in: Trans Office InformationSystems 1988 6(4); Office: Techonology and People 1989 4(2) and 4(3). Proceedings available from ACM Order Department, PO Box 64145, Baltimore, MD21264, or phone 1-800-342-6626.ACM Press (ed.) (1990) “Proceedings of the 1990 Conference on Computer Supported CooperativeWork.” ACM Press. October 7-10, Los Angeles, California.(collection) Session titles were: 1 Shared videospaces; 2 Experimental studies in CSCW; 3Supporting structured communication; 4 CSCWwithin and across organizations; 5 Cooperativesupport and customization; 6 User interfaces in theCSCW context; 7 (CS)CW in the field; 8 Systemsinfrastructure for CSCW; 9 Issues and perspectives on CSCW. Proceedings available from ACM OrderDepartment, PO Box 64145, Baltimore, MD 21264, or phone 1-800-342-6626.Adrianson, L. and Hjelmquist, E. (1988) “Group processes in face-to-face and computer-mediatedcommunication.” Department of Psychology,University of Gotenborg.(evaluation, decision support, face-to-face meetings, remote meetings, protocols) This study reportsresults from an experiment investigating differentaspects of communication pattern and communicative outcome. The experiment was a 2x2x2 ANOVA.Factors were mode of communication (face-to-face vs computer mediated), problem type (human relation vs technical ranking problem) and experience(experienced vs inexperienced). Results show nodifferences in decision quality depending uponmedium, but more consensus decisions in face-to-face. No equalization of participants was seen incomputer-mediated communication, contrary toprevious research.Ahuja, S. R., Ensor, J. R. and Lucco, S. E. (1990)“A comparison of applications sharingmechanisms in real-time desktop conferencingsystems.” In Proceedings of the Conference onOffice Information Systems, p238-248, Boston,April 25-27.(shared views, software design, implementation) This paper contrasts three architecturally differentversions of a shared window system (Rapport): asingle-site centralized approach, a multi-sitedistributed approach, and a combination of the two.Performance issues were discussed, and the single-site approach was recommended.Allen, R. B. (1990) “User models: Theory, method, practice.” Int J Man Machine Studies, 32(5),p511-544, May.(asynchronous conferencing) This paper describesthe use of user models to select and filter information sources for readers of information services. Resultssuggest that prediction of preferences arestraightforward for general categories of newsarticles, but difficult when specific news reports aredesired.Ancona, D. G. and Caldwell, D. F. (1990)“Information technology and work groups: Thecase of new product teams.” In IntellectualTeamwork: Social Foundations of CooperativeWork, p173-190, J. Galegher, R. E. Kraut and C.Egido ed., Hillsdale, New Jersey, LawrenceErlbaum Associates.(organizational concerns, social impact) The focus is on groups which face the highly interactive andcomplex task of developing new products. Adescription is presented of the activities in whichthese teams engage, and moves from that data tosuggest how information technology might better be used to support the work of those teams. The work is premised on the belief that an in-depth understanding of the group's complex tasks is necessary to realizethe full capabilities of technology.Applegate, L. M., Konsynski, B. R. and Nunamaker, J. F. (1986) “A group decision support system for idea generation and issue analysis in organizational planning.” In Proceedings of the Conference onComputer Supported Cooperative Work, p16-34, Austin, Texas, December 3-5, ACM Press.(decision support, idea processors, face to face,evaluation) The idea generation and managementprocess has been chosen as the domain for the study of the design and implementation of a GDSS tosupport complex, unstructured group decisionprocesses within organizations. Results of research conducted in the MIS Planning and DecisionLaboratory on the use of the ElectronicBrainstorming System with over 100 planners arepresented. Planners reported high levels ofsatisfaction with the process and rated the computer brainstorming tool as much better than manualbrainstorming.Attewell, P. and Rule, J. (1984) “Computing and organizations: What we know and what we don'tknow.” Comm ACM, 27(12), p1184-1192.Reprinted in Greif, 1988.(organizational concerns) This paper analyses theearlier literature on the effects of computing inorganizations. The literature is found to beinconsistent and inconclusive.Austin, L. C., Liker, J. K. and McLeod, P. L. (1990)“Determinants and patterns of control overtechnology in a computerized meeting room.” InProceedings of the Conference on ComputerSupported Cooperative Work (CSCW '90), p39-52, Los Angeles, California, October 7-10, ACM Press.(face-to-face meetings, evaluation) Groups completeda priorization task in a "low structure" computerizedmeeting room. All group members had equal access toa public screen used to complete the task. The authorsstudied how groups distributed control of thetechnology, the determinants of which groupmembers took control, and the consequences ofcontrol. They noticed that proficiency with thecomputer interface and the social influence are factors which predicted who will take control. Dedicatedversus non-dedicated scribes are also discussed. Bair, J. H. (1987) “CSCW '86.” ACM SIGOIS Bulletin, 8(3), p3-13.(report) A review of the CSCW '86 conference. Bair, J. H. (1989) “Supporting cooperative work with computers: Addressing meeting mania.” InProceedings of the 34th IEEE Computer SocietyInternational Conference–CompCon Spring, p208-217, San Francisco, CA, February 27-March 3.(overview, face-to-face meetings, critique) This paper argues that CSCW is a renewed recognition of userneeds for extensions to current communicationmedia. A taxonomy of communication media isprovided; four levels of user needs---informing,coordinating, collaborating and cooperating---arepresented; limits of current media are raised; andextensions of electronic media are proposed. A good overview of the area, its problems, and directions to follow.Bair, J. H. and Gale, S. (1988) “An investigation of the Coordinator as an example of computersupported cooperative work.” Hewlett PackardLaboratories, California. Unpublished.(semi-structured messages, protocols, critique,evaluation) This paper describes an extensiveinvestigation of the Coordinator and the suitability of speech-act systems in organizations. Conclusions and recommendations are included.Bannon, L., Bjorn-Andersen, N. and Due-Thomsen,B. (1988) “Computer support for cooperativework: An appraisal and critique.” In Eurinfo '88.Information Systems for OrganizationalEffectiveness, H. J. Bullinger ed., Amsterdam,North-Holland.(critique)Bannon, L. J. and Schmidt, K. (1989) “CSCW: Four characters in search of a context.” In Proceedingsof the 1st European Conference on ComputerSupported Cooperative Work (EC-CSCW '89),p358-372, Gatwick, U.K., September 13-15,Computer Sciences House, Sloug, UK.(conceptual, critique) This paper highlights theinadequacies of the CSCW acronym. A framework for approaching the issue of cooperative work andcomputer support is provided; core issues areidentified; and the fields prospects are outlined. Beard, D., Palanappian, M., Humm, A., Banks, D.and Nair, A. (1990) “A visual calendar forscheduling group meetings.” In Proceedings of the Conference on Computer Supported CooperativeWork (CSCW '90), Los Angeles, California,October 7-10, ACM Press.(face-to-face meetings, evaluation, organizationalconcerns) This paper discusses a comprehensivegroup meeting scheduling system called "VisualSchedular" that summarizes available information for quick, flexible, and reliable scheduling. A controlled experiment shows the automated system to be faster and less error-prone than manual scheduling, and afield study shows the Visual Schedular to be generally useful. An interesting paper, as it contradictsprevious studies that suggested that automatedscheduling systems do not work in practice. Beaudouin-Lafon, M. (1990) “Collaborative development of software.” In Proceedings of IFIP WG8.4 Conference on Multi-User Interfaces andApplications, Crete, S. Gibbs and A. A. Verrighn-Stuart (ed), North Holland.Begeman, M., Cook, P., Ellis, C., Graf, M., Rein,G. and Smith, T. (1986) “Project NICK: Meetingsaugmentation and analysis.” In Proceedings of the Conference on Computer-Supported CooperativeWork (CSCW '86), p1-6, Austin, Texas,December 3-5, ACM Press.(face-to-face meetings) See Cook (1987) for anexpanded version of this paper.Benford, S. (1989) “Requirements of activity management.” In Proceedings of the 1st European Conference on Computer Supported CooperativeWork (EC-CSCW '89), Gatwick, U.K.,September 13-15, Computer Sciences House,Sloug, UK.Benson, I., Ciborra, C. and Proffitt, S. (1990) “Some social and economic consequences of groupwarefor flight crew.” In Proceedings of the Conference on Computer Supported Cooperative Work(CSCW '90), Los Angeles, California, October 7-10, ACM Press.(organizational concerns, evaluation) Groupware can never substitute for the social and organisationalintegration of team members, but it can fill many of the inevitable logistical, knowledge andcommunication gaps that always arise, especially in large and/or dispersed teams performing complextasks. Within this context, a case study of 3000flight crew from a major European airline isdescribed.Berlin, L. M. and O’Day, V. L. (1990) “Platform and application issues in multi-user hypertext.” InProceedings of IFIP WG8.4 Conference on Multi-User Interfaces and Applications, Crete, S. Gibbs and A. A. Verrighn-Stuart (ed), North Holland. Bermann, T. and Thorenson, K. (1988) “Can networks make an organization?” In Proceedingsof the Conference on Computer-SupportedCooperative Work (CSCW '88), p153-166,Portland, Oregon, September 26-28, ACM Press.(participatory design, evaluation, organizationalconcerns, social impact) The authors share theirexperience of a cooperative systems developmentproject involving centralization of severalpreviously independent surgical departments in ahospital. A few simple cases illustrate that theconventional development process is wrought withconflicts, contradictions and challenges. Inparticular, the design of a cooperative system canneither be pushed by technology, nor by the workers view of what they require. Rather, the process iscollaborative, where both designer and end userforward and evaluate ideas during systemdevelopment. The work is an example of the"Scandinavian approach" to design.Bhandaru, N. and Croft, B. (1990) “Architecture for supporting goal-based cooperative work.” InProceedings of IFIP WG8.4 Conference on Multi-User Interfaces and Applications, Crete, S. Gibbs and A. A. Verrighn-Stuart (ed), North Holland. Bignoli, C. and Simone, C. (1989) “AI techniques for supporting human to human communication inCHAOS.” In Proceedings of the 1st EuropeanConference on Computer Supported CooperativeWork (EC-CSCW '89), Gatwick, U.K.,September 13-15, Computer Sciences House,Sloug, UK.Bikson, T. K. and Eveland, J. D. (1990) “The interplay of work group structures.” In Intellectual Teamwork: Social Foundations of CooperativeWork, p245-290, J. Galegher, R. E. Kraut and C.Egido ed., Hillsdale, New Jersey, LawrenceErlbaum Associates.(email, asynchronous conferencing, evaluation) The paper reports a field experiment using email andcomputer conferencing to support a task force writingretirement policy. The study shows that computer-based communication can empower otherwiseisolated people by providing them with the resources need to accomplish their tasks, including access toinformation and other people. Barriers to socialinteraction are reduced, and leadership rolesbroadened.Bjerknes, G. and Bratteteig, T. (1988) “The memoirs of two survivors: Or the evaluation of a computer system for cooperative work.” In Proceedings ofthe Conference on Computer-SupportedCooperative Work (CSCW '88), p167-177,Portland, Oregon, September 26-28, ACM Press.(participatory design, evaluation, organizationalconcerns) The authors describe their experiences with the "ultimate test" of a CSCW system built according to the Scandinavian approach by evaluating its useseveral months after installation. Through a series of flashbacks of diary clips and analysis, they bring us through the design process, giving the reader insight as to what happened and why things were designed a certain way. The result of their ultimate test did more than show a system in active use, for it describedseveral surprising work habits that had developed. Blomberg, J. (1986) “The variable impact of computer technologies on the organization ofwork activities.” In Proceedings of the Conference on Computer-Supported Cooperative Work(CSCW '86), p35-42, Austin, Texas, December 3-5, ACM Press. Republished in revised form inGreif, 1988.(organizational concerns, software design,participatory design) New computer tools areaffecting the ways in which work is accomplishedand, in turn, existing patterns of social interactionare shaping the evolution of these highly malleable tools. This paper explores the interplay between acomputer-based design environment employed in the creation of machine interfaces and the "users" of this tool, including the user interface designers and thesoftware engineers supporting the technology. The use of this has resulted in the restructuring of thesocial organization of the design tasks. Anethnographic study of a computer-based designenvironment called Trillium is used as an example. Bly, S. (1988) “A use of drawing surfaces in different collaborative settings.” In Proceedings of theConference on Computer-Supported Cooperative Work (CSCW '88), p250-256, Portland, Oregon, September 26-28, ACM Press.(shared workspace, evaluation, video) Bly observed designers communicating through three differentmedia: face to face; over a video link that included a view of the other person and their drawing surface;and over the telephone. From her observations, she hypothesizes that the actions, uses, and interactions on a drawing artifact are as important to theeffectiveness of many design collaborations asviewing the final artifact. Also, allowing designers to share drawing space activities increases theirattention and involvement in the design task. When interaction over the drawing surface is reduced, thequality of the collaboration decreases.。