The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper describes the positioning and advantages of the American community colleges, analyzes the characteristics of the community colleges and revelation to Higher Vocational Education in China, compares the higher education system in China and the United States, summarizes the practice experience for the demonstration construction of Shanghai Medical Instrumentation College(SMIC), learning from...
Australian Vocational Education and Training (VET) boasts a perfect system and distinctive features. The Vocational Education Leadership Training Program in Australia has furthered one's understanding of the main characteristics of Australian VET and its relationship with higher education. Technical And Further Education (TAFE) provides a valuable reference to the reform and development of Shanghai...
Graphical user interfaces (GUIs) are critical components of software environment for pervasive computing and applications. A systemic solution called GUI testing architecture (GUITA) for automated testing oriented GUIs is proposed in this paper, which is built on the platform that integrating ATS and WinRunner?? by a socket interface. By parsing configure file and loading GUI map successfully, it...
Applying cased-based reasoning (CBR) method in program understanding provides a practical route towards more powerful software engineering technology. A CBR approach to the recognition of model component is presented, and the whole reasoning process of the recognition is presented, including a case representation method and a matching algorithm. A prototype system named process model component recognition...
Traitor tracing is one kind of piracy deterrent schemes that helps trace the source of leaks when sensitive or proprietary data is made available to a large set of parties. For their natural properties, error correcting codes can be applied as traceability codes in such schemes. In this paper, we present Reed-Solomon codes as a kind of traceability codes and use list decoding algorithm to efficiently...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.