全部文献期刊会议图书|学者科研项目
中外文文献  中文文献  外文文献
作者:Moupojou Matango Emmanuel , Moukouop Nguena Ibrahim
来源:[J].Journal of Software Engineering and Applications, 2015, Vol.8 (4), pp.192-200Scientific Research Publishing
摘要:In an information system, applicationsoften make use of services that they access using the parameters described intheir configuration files. Various applications then use different codes todenote the same parameters. When access parameters of a service are modified,it is ne...
作者:R. Vidmar , N. Creati
来源:[J].SoftwareX, 2018, Vol.7, pp.347-351Elsevier
摘要:Abstract(#br)We present a Python package to help scientists and researchers to add physical quantities to the configuration files they use in their computer programs. Parameter values are validated against user defined specifications to ensure they are in the correct range and ev...
作者:Jakub Chęciński , Marek Frankowski
来源:[J].Computer Physics Communications(IF 3.078), 2016, Vol.207, pp.487-498Elsevier
摘要:Abstract(#br)We present a tool for fully-automated generation of both simulations configuration files (Mif) and Matlab scripts for automated data analysis, dedicated for Object Oriented Micromagnetic Framework (OOMMF). We introduce extended graphical user interface (GUI) that...
作者:Indar Sugiarto
来源:[J].TELKOMNIKA, 2009, Vol.7 (2), pp.73DOAJ
摘要:... Using XML file format for configuring the visual stimulator of a BCI system, we can develop BCI applications which can accommodate many experiment strategies in BCI research. The BCI framework and its configuration platform is developed using C++ programming language which ...
作者:Mark Santolucito , Ennan Zhai , Rahul Dhodapkar ...
来源:[J].Proceedings of the ACM on Programming Languages, 2017, Vol.1 (OOPSLA), pp.1-20ACM
摘要:System failures resulting from configuration errors are one of the major reasons for the compromised reliability of today's software systems. Although many techniques have been proposed for configuration error detection, these approaches can generally only be applied after an e...
作者:M.M. Emmanuel , M.N. Ibrahim , A.E. Roger
来源:[J].International Journal of Information Security Science, 2015, Vol.4 (1)IJISS
摘要:One of the major points of interest in software engineering nowadays is how to ensure applic- ations configuration files’ security. In fact, they very often contain confidential information as database connection credentials, thereby providing a vulnerability point to these ...
作者:Ming Cen , Yi Yan , Huasheng Dai
来源:[J].Journal of Computers, 2010, Vol.5 (12), pp.1893-1898Academy
摘要:... In this architecture, based on the concept of configuration technique, UI and other function layer are separated, and a XML file is proposed as interface to describe the configuration of UI totally. Correspondingly, the general calibration system architecture is composed of e...
作者:Cheng Li , Ning Wang , Jie Zhu
来源:[J].Energy Procedia, 2012, Vol.17, pp.1441-1446Elsevier
摘要:Abstract(#br)With the promotion of the standard IEC61850, the configurations of substation automation system and intelligent electronic device (IED) in the substation project play an important role. In practical engineering applications also exist some problems: In Substation Pro...
作者:Yuanbo Ye , Min Xie , Jiaqi Wang ...
来源:[J].The Journal of Engineering, 2019, Vol.2019 (23), pp.9209-9214IET
摘要:... Taking the exported information as the data source, according to the configuration file information, the state-space information that can be monitored by the protection device can be automatically extracted, and then the automatic extraction of the historical state of the pro...
作者:Mohammed I. Younis , Ghassan H. Majeed
来源:[J].Al-Khawarizmi Engineering Journal, 2007, Vol.3 (3)DOAJ
摘要:This paper presents a fully computerized method to backup the router configuration file. The method consists of a friendly graphical interface programmed by Java programming language. The proposed method is compared with the two existing methods, namely: TFTP server method and Co...

我们正在为您处理中,这可能需要一些时间,请稍等。

资源合作:cnki.scholar@cnki.net, +86-10-82896619   意见反馈:scholar@cnki.net

×