An Overview of Work by Pachet and Aucouturier on Timbre Similarity

合集下载

计算机网络体系结构论文外文翻译

计算机网络体系结构论文外文翻译

附录AWith the new network technology and application of the continuous rapid development of the computer network should. Use of becoming increasingly widespread, the role played by the increasingly important computer networks and human. More inseparable from the lives of the community's reliance on them will keep growing.In order for computers to communicate, they must speak the same language or protocol. In the early days of networking, networks were disorganized in many ways. Companies developed proprietary network technologies that had great difficulties in exchanging information with other or existing technologies; so network interconnections were very hard to build. To solve this problem, the International Organization for Standardization(ISO)created a network model that helps vendors to create networks compatible with each other.Finding the best software is not easy. A better understanding of what you need and asking the right questions makes it easier. The software should be capable of handling challenges specific to your company. If you operate multiple distribution centers, it may be beneficial to create routes with product originating from more than one depot. Few software providers though, are capable of optimizing routes using multiple depots. The provider should be able to support installation of its product. Make sure to clearly understand what training and software maintenance is offered.Obviously, selecting the right routing/scheduling software is critically important. Unfortunately, some companies are using software that may not be best suited to their operation. Logistics actives with responsibility for approving the software ought to be comfortable they've made the right decision. It is important to realize that not all routing/scheduling software is alike!There questions to ask are: Which operating system is used? How easy is the software to use? Here is a good way to tell. Ask if its graphical user interface(GUI)is flexible. Find out about installation speed - how long does it take? Is the software able to route third party customers with your core business?When was the software originally released and when was it last upgraded?In 1984, ISO released the Open Systems Interconnection(OSI)reference model, which is a well-defined set of specifications that ensures greater compatibility among various technologies. In fact, OSI is a description of network communication that everyone refers to. It is not the only network model, but it has become the primary model for network communication. You will see further in this chapter, that the TCP/IP model is only a reduced version of the OSI model. The OSI model consists of seven layers, each illustrating a particular network function.meanwhile, ASP continues to evolve. With the arrival of the millennium came the arrival of ASP version 3. 0. Version 3. 0 was released along with Internet Information Server(IIS)version 5. 0 as part of the highly anticipated Microsoft Windows 2000. By far, the most important new feature of version 3.0 is the addition of a seventh, intrinsic object called ASP Error which should greatly simplify error handling. Other new features include the addition of three new methods to the Server object, and two new methods to both the Application object and the Session object.When programmers design an image editor for example, they don't have to think about adding OSI Layer 7 capabilities to that software, because it has no need for communication with other computers. On the other hand, when creating an FTP client, they must add communication capabilities to that software. At Layer 7 we usually find Telnet, FTP, HTTP, SMTP, SNMP, or SSH. When we say, For Example, Layer 7 filtering, we refer to filtering application data, regardless of what port or computer it may come from.OSI will be a computer network architecture(architecture)is divided into the following seven:The first layer:physical layer(Physical Layer), provides communications equipment for the mechanical, electrical and functional characteristics and process for the establishment, maintenance and removal of the physical link connection. Specifically, the provisions of the mechanical properties required for network connectivity connector dimensions, pin number and order situation, etc. ;the provisions of the electrical characteristics of the physical connection in the bit stream transmission line signal level of the size, impedance matching , transfer rate from the constraints; features refers to the distribution of the various signals to the exact meaning of the signal, that is the definition of the DTE and DCE function between the various lines; order characteristics of the definition of the use of bit stream signal transmission lines for a group of rules refers to the physical connection of the establishment, maintenance, exchange of information, DTE and DCE on the circuit on double-action series. In this layer, data units known as bits (bit). Belong to the typical definition of the physical layer specification included: EIA / TIA RS-232, EIA / TIA RS-449, V. 35, RJ-45 and so on.The second layer: data link layer(Data Link Layer): in the physical layer bit stream to provide services based on adjacent node between the data link, through the provision of error control data frame(Frame)in the channel error-free transmission, and the action of the series circuit. Data link layer in the physical media is not reliable to provide reliable transmission. The role of this layer include: addressing the physical address, data framing, flow control, data error, such as re-issued. In this layer, data units known as the frame(frame). Data link layer protocol, including representatives of: SDLC, HDLC, PPP, STP, such as frame relay.The third layer is the network layerIn the computer network to communicate between two computers may be a lot of data link may also go through a lot of communication subnet. Network layer of the task is to choose a suitable inter-network routing and switching nodes, to ensure timely delivery of data. Network layer will provide the data link layer packet frame components, including network layer in the package header, which contains the logical address information - - the source site and destination site address of the network address. If you're talking about an IP address, then you are in dealing with the problem of Layer 3, which is “data packets”, rather than layer 2 of the “frame. ” IP is layer 3 part of the problem, in addition to a number of routing protocols and ARP(ARP). All things related to routing in Layer 3 processing. Address resolution and routing is an important objective of Level 3. Network layer can also achieve congestion control features such as Internet interconnection. In this layer, data packets as the unit(packet). Representatives of the network layer protocol, including: IP, IPX, RIP, OSPF, etc…The fourth tier is the transport layer process information. At fourth floor unit, also known as data packets(packets). However, when you talk about TCP protocol, such as concrete and specific when the name, TCP data unit known as paragraph(segments)and the UDP protocol data unit referred to as “datagram (data grams)”. This layer is responsible for obtaining all the information, therefore, it must be tracking data cell debris, out-of-order packets arrive in the transfer process and other possible risk. No. 4 for the upper layer to provide end-to-end(the end-user to end-users)of a transparent and reliable data transmission services. Transparent by means of transmission is transmitted in the communication process of the upper layer shielding the communication transmission system details. Representatives of the Transport Protocol: TCP, UDP, SPX, etc…The fifth layer is the session layerThis layer can also be known as the dialogue meeting between layers or layer, in the session layer and above the high-level, the data transmission is no longer the other named units, known collectively as the message. Session layer does not participate in specific transmission, It provides, including access to authentication and session management, including the establishment and maintenance of mechanisms for communication between applications. If the server to verify user login is completed by the session layer.The sixth layer is Presentation LayerThe main solution to support this level of information that the problem of syntax. For the exchange of data will be suitable for a user from the abstract syntax, into a system suitable for the use of OSI transfer syntax. To provide formatting and conversion of that data services. Data compression and decompression, encryption and decryption so that the layers are responsible for.The seventh layer application layer, application layer for the operating system, applications or network services access the network interface. Agreement on behalf of the application layer, including: Telnet, FTP, HTTP, SNMP, etc. .Through the OSI layers, information from a computer software application for transfer to another application. For example, computer A on the application to send information to the computer application B, then A computer application in information need to be sent to the Application Layer(seventh layer), and then this layer will be sent to that level of information(sixth floor), indicating that the data layer will be transferred to the session layer(fifth layer), and so continue until the physical layer(first layer). In the physical layer, data is placed in the physical network media and sent to computer B. The physical layer of computer B to receive data from the physical media, and then send information up to data link layer(second layer), data link layer and then to the network layer, until the information in order to arrive at the application layer of computer B. Finally, the application layer of computer B and then the application information to the receiving end, thus completing the communication process. The following describes the icons in the process.OSI's seven control the use of a wide range of information and other computer systems to communicate the corresponding layer. Control information contained in these special requests, and show that they correspond to the OSI layer exchange. Data at every level of the head and tail to bring the two basic forms of control information.For one to send down from the previous data, additional control information in the front as the head, attached to the back of the end of the control information is called. However, data from one level to increase the agreement and the agreement the end of the first of a OSI layer is not necessary.When the data transmission between each floor, each level in the data can be added to the head and tail, and these data have been included to increase the level of the head and tail. Agreement includes the first layer and the communication of information between layers. Head and tail as well as the data is associated with the concept, they depend on the analysis of the protocol layer module. For example, the transport layer header includes only the transport layer can be seen the information, the transport layer of the other layers below this only the first part of a data transmission. For the network layer, an information unit from the third layer composed of the first and data. The data link layer, network layer by passing down all the information that is the first and third data layer is seen as data. In other words, a given OSI layer, the information unit that contains the data from all parts of the upper head and tail, as well as data, referred to as packaging. For example, if computer A to a certain application data sent to computer B, the first data sent to the application layer. A computer in the application layer protocol data to add up and the application layer of computer B communications. Formed by the first information unit includes an agreement, data, and possibly the end of the agreement was sent to that layer, that layer of computer B and then add that layer of the control information to understand the agreement first. Information on the size of units in each level in agreement with the agreement the end of the first and add the increase in the first of these agreements and agreements contained in the computer B the end of the corresponding layers of control information to be used. In the physical layer, the entire information unit through the network transmission medium.Computer B in the physical layer unit of information received and sent to the data link layer; and B data link layer in computer A to read the data link layer protocol header added to the control of information;and then remove the agreement and the end of the first agreement, sent to the remainder of the network layer. Perform the same at every level of action: from the corresponding first layer to read the agreement and protocol tail, and remove, and then send the remaining first floor. End of application-layer implementation of these actions, the data sent to computer B on the application, the data and computer applications A is exactly the same as sent.An OSI layer and another layer of communication between the second layer is the use of the services completed. Services provided by adjacent layers help a OSI layer with another layer corresponds to the computer system to communicate. A particular layer of the OSI model is often associated with three other OSI layers contact: with the layer directly adjacent to and under the floor, as well as the objectives of the corresponding computer systems networking layer. For example, computer A's data link layer should be with the network layer, physical layer of computer B, as well as the data link layer communication.附录B为了让电脑来沟通,就必须讲同样的语言或议定书。

软件工程(外文翻译文献)

软件工程(外文翻译文献)

外文文献资料1、Software EngineeringSoftware is the sequences of instructions in one or more programming languages that comprise a computer application to automate some business function. Engineering is the use of tools and techniques in problem solving. Putting the two words together, software engineering is the systemtic application of tools and techniques in the development of computer-based applications.The software engineering process describes the steps it takes to deelop the system. We begin a development project with the notion that there is a problem to be solved via automation. The process is how you get from problem recognition to a working solution. A quality process is desirable because it is more likely to lead to a quality product. The process followed by a project team during the development life cycle of an application should be orderly, goal-oriented, enjoyable, and a learning experience.Object-oriented methodology is an approach to system lifecycle development that takes a top-down view of data objects, their allowable actions, and the underlying communication requirement to define a system architecture. The data and action components are encapsulated, that is , they are combined together, to form abstract data types Encapsulation means that if I know what data I want ,I also know the allowable processes against that data. Data are designed as lattice hierarchies of relationships to ensure that top-down, hierarchic inheritance and side ways relationships are accommodated. Encapsulated objects are constrained only to communicate via messages. At a minimum, messages indicate the receiver and action requested. Messages may be more elaborate, including the sender and data to be acted upon.That we try to apply engineering discipline to software development does not mean that we have all the answers about how to build applications. On the contrary, we still build systems that are not useful and thus are not used. Part of the reason for continuing problems in application development, is that we are constantly trying to hita moving target. Both the technology and the type of applications needed by businesses are constantly changing and becoming more complex. Our ability to develop and disseminate knowledge about how to successfully build systems for new technologies and new application types seriously lags behind technological and business changes.Another reason for continuing problems in application development is that we aren’t always free to do what we like and it is hard to change habits and cultures from the old way of doing things, as well as get users to agree with a new sequence of events or an unfamiliar format for documentation.You might ask then, if many organizations don’t use good software engineering practices, why should I bother learning them? There are two good answers to this question. First, if you never know the right thing to do, you have no chance of ever using it. Second, organizations will frequently accept evolutionary, small steps of change instead of revolutionary, massive change. You can learn individual techniques that can be applied without complete devotion to one way of developing systems. In this way, software engineering can speed changee in their organizations by demonstrating how the tools and techniques enhance th quality of both the product and the process of building a system.2、Data Base System1、IntroductionThe development of corporate databases will be one of the most important data-processing activities for the rest of the 1970s. Date will be increasingly regarded as a vital corporate resource, which must be organized so as to maximize their value. In addition to the databases within an organization, a vast new demand is growing for database services, which will collect, organize, and sell data.The files of data which computers can use are growing at a staggering rate. The growth rate in the size of computer storage is greater than the growth in the size or power of any other component in the exploding data processing industry. The more data the computers have access to, the greater is their potential power. In all walks of life and in all areas of industry, data banks will change the areas of what it is possiblefor man to do. In the end of this century, historians will look back to the coming of computer data banks and their associated facilities as a step which changed the nature of the evolution of society, perhaps eventually having a greater effect on the human condition than even the invention of the printing press.Some most impressive corporate growth stories of the generation are largely attributable to the explosive growth in the need of information.The vast majority of this information is not yet computerized. However, the cost of data storage hardware is dropping more rapidly than other costs in data processing. It will become cheaper to store data on computer files than to store them on paper. Not only printed information will be stored. The computer industry is improving its capability to store line drawing, data in facsimile form, photo-graphs, human speech, etc. In fact, any form of information other than the most intimate communications between humans can be transmitted and stored digitally.There are two main technology developments likely to become available in the near future. First, there are electromagnetic devices that will hold much more data than disks but have much longer access time. Second, there are solid-state technologies that will give microsecond access time but capacities are smaller than disks.Disks themselves may be increased in capacity somewhat. For the longer term future there are a number of new technologies which are currently working in research labs which may replace disks and may provide very large microsecond-access-time devices. A steady stream of new storage devices is thus likely to reach the marketplace over the next 5 years, rapidly lowering the cost of storing data.Given the available technologies, it is likely that on-line data bases will use two or three levels of storage. One solid-state with microsecond access time, one electromagnetic with access time of a fraction of a second. If two ,three ,or four levels of storage are used, physical storage organization will become more complex ,probably with paging mechanisms to move data between the levels; solid-state storage offers the possibility of parallel search operation and associativememory.Both the quantity of data stored and the complexity of their organization are going up by leaps and bounds. The first trillion bit on-line stores are now in use . in a few year’s time ,stores of this size may be common.A particularly important consideration in data base design is to store the data so that the can be used for a wide variety of applications and so that the way they can be changed quickly and easily. On computer installation prior to the data base era it has been remarkably difficult to change the way data are used. Different programmers view the data in different ways and constantly want to modify them as new needs arise modification , however ,can set off a chain reaction of changes to existing programs and hence can be exceedingly expensive to accomplish .Consequently , data processing has tended to become frozen into its old data structures .To achieve flexibility of data usage that is essential in most commercial situations . Two aspects of data base design are important. First, it should be possible to interrogate and search the data base without the lengthy operation of writing programs in conventional programming languages. Second ,the data should be independent of the programs which use them so that they can be added to or restructured without the programs being changed .The work of designing a data base is becoming increasing difficult , especially if it is to perform in an optimal fashion . There are many different ways in which data can be structured ,and they have different types of data need to be organized in different ways. Different data have different characteristics , which ought to effect the data organization ,and different users have fundamentally different requirements. So we need a kind of data base management system(DBMS)to manage data.Data base design using the entity-relationship model begins with a list of the entity types involved and the relationships among them. The philosophy of assuming that the designer knows what the entity types are at the outset is significantly different from the philosophy behind the normalization-based approach.The entity-relationship(E-R)approach uses entity-relationship diagrams. The E-Rapproach requires several steps to produre a structure that is acceptable by the particular DBMS. These steps are:(1) Data analysis(2) Producing and optimizing the entity model.(3) Logical schema development(4) Physical data base design process.Developing a data base structure from user requirements is called data bases design. Most practitioners agree that there are two separate phases to the data base design process. The design of a logical database structure that is processable by the data base management system(DBMS)d escribes the user’s view of data, and is the selection of a physical structure such as the indexed sequential or direct access method of the intended DBMS.Current data base design technology shows many residual effects of its outgrowth from single-record file design methods. File design is primarily application program dependent since the data has been defined and structured in terms of individual applications to use them. The advent of DBMS revised the emphasis in data and program design approaches.There are many interlocking questions in the design of data-base systems and many types of technique that one can use is answer to the question so many; in fact, that one often sees valuable approaches being overlooked in the design and vital questions not being asked.There will soon be new storage devices, new software techniques, and new types of data bases. The details will change, but most of the principles will remain. Therefore, the reader should concentrate on the principles.2、Data base systemThe conception used for describing files and data bases has varied substantially in the same organization.A data base may be defined as a collection of interrelated data stored together with as little redundancy as possible to serve on or more applications in an optimal fashion; the data are stored so that they are independent of programs which use thedata; a common and controlled approach is used in adding new data and in modifying and retrieving existing data within the data base. One system is said to contain a collection of data bases if they are entirely separate in structure.A data base may be designed for batch processing, real-time processing, or in-line processing. A data base system involve application program, DBMS, and data base.One of the most important characteristics of most data bases is that they will constantly need to change and grow. Easy restructuring of the data base must be possible as new data types and new applications are added. The restructuring should be possible without having to rewrite the application program and in general should cause as little upheaval as possible. The ease with which a data base can be changed will have a major effect on the rate at which data-processing application can be developed in a corporation.The term data independence is often quoted as being one of the main attributes of a data base. It implies that the data and the application programs which use them are independent so that either may be changed without changing the other. When a single set of data items serves a variety of applications, different application programs perceive different relationships between the data items. To a large extent, data-base organization is concerned with the representation of relationship between data items and records as well as how and where the data are stored. A data base used for many applications can have multiple interconnections between the data item about which we may wish to record. It can describes the real world. The data item represents an attribute, and the attribute must be associated with the relevant entity. We design values to the attributes, one attribute has a special significance in that it identifies the entity.An attribute or set of attribute which the computer uses to identify a record or tuple is referred to as a key. The primary key is defined as that key used to uniquely identify one record or tuple. The primary key is of great importance because it is used by the computer in locating the record or tuple by means of an index or addressing algorithm.If the function of a data base were merely to store data, its organization would be simple. Most of the complexities arise from the fact that is must also show the relationships between the various items of data that are stored. It is different to describe the data in logical or physical.The logical data base description is referred to as a schema .A schema is a chart of the types of data that one used. It gives the names of the entities and attributes, and specifics the relations between them. It is a framework into which the values of the data-items can be fitted.We must distinguish between a record type and a instance of the record. When we talk about a “personnel record”,this is really a record type.There are no data values associated with it.The term schema is used to mean an overall chart of all of the dataitem types and record types stored in a data he uses. Many different subschema can be derived from one schema.The schema and the subschema are both used by the data-base management system, the primary function of which is to serve the application programs by executing their data operations.A DBMS will usually be handing multiple data calls concurrently. It must organize its system buffers so that different data operations can be in process together. It provides a data definition language to specify the conceptual schema and most likely, some of the details regarding the implementation of the conceptual schema by the physical schema. The data definition language is a high-level language, enabling one to describe the conceptual schema in terms of a “data model” .The choice of a data model is a difficult one, since it must be rich enough in structure to describe significant aspects of the real world, yet it must be possible to determine fairly automatically an efficient implementation of the conceptual schema by a physical schema. It should be emphasized that while a DBMS might be used to build small data bases, many data bases involve millions of bytes, and an inefficient implementation can be disastrous.We will discuss the data model in the following.3、Three Data ModelsLogical schemas are defined as data models with the underlying structure of particular database management systems superimposed on them. At the present time, there are three main underlying structures for database management systems. These are :RelationalHierarchicalNetworkThe hierarchical and network structures have been used for DBMS since the 1960s. The relational structure was introduced in the early 1970s.In the relational model, the entities and their relationships are represented by two-dimensional tables. Every table represents an entity and is made up of rows and columns. Relationships between entities are represented by common columns containing identical values from a domain or range of possible values.The last user is presented with a simple data model. His and her request are formulated in terms of the information content and do not reflect any complexities due to system-oriented aspects. A relational data model is what the user sees, but it is not necessarily what will be implemented physically.The relational data model removes the details of storage structure and access strategy from the user interface. The model provides a relatively higher degree of data. To be able to make use of this property of the relational data model however, the design of the relations must be complete and accurate.Although some DBMS based on the relational data model are commercially available today, it is difficult to provide a complete set of operational capabilities with required efficiency on a large scale. It appears today that technological improvements in providing faster and more reliable hardware may answer the question positively.The hierarchical data model is based on a tree-like structure made up of nodes and branches. A node is a collection of data attributes describing the entity at that point.The highest node of the hierarchical tree structure is called a root. The nodes at succeeding lower levels are called children .A hierarchical data model always starts with a root node. Every node consists of one or more attributes describing the entity at that node. Dependent nodes can follow the succeeding levels. The node in the preceding level becomes the parent node of the new dependent nodes. A parent node can have one child node as a dependent or many children nodes. The major advantage of the hierarchical data model is the existence of proven database management systems that use the hierarchical data model as the basic structure. There is a reduction of data dependency but any child node is accessible only through its parent node, the many-to –many relationship can be implemented only in a clumsy way. This often results in a redundancy in stored data.The network data model interconnects the entities of an enterprise into a network. In the network data model a data base consists of a number of areas. An area contains records. In turn, a record may consist of fields. A set which is a grouping of records, may reside in an area or span a number of areas. A set type is based on the owner record type and the member record type. The many-to many relation-ship, which occurs quite frequently in real life can be implemented easily. The network data model is very complex, the application programmer must be familiar with the logical structure of the data base.4、Logical Design and Physical DesignLogical design of databases is mainly concerned with superimposing the constructs of the data base management system on the logical data model. There are three mainly models: hierarchical, relational, network we have mentioned above.The physical model is a framework of the database to be stored on physical devices. The model must be constructed with every regard given to the performance of the resulting database. One should carry out an analysis of the physical model with average frequencies of occurrences of the grou pings of the data elements, with expected space estimates, and with respect to time estimates for retrieving and maintaining the data.The database designer may find it necessary to have multiple entry points into a database, or to access a particular segment type with more than one key. To provide this type of access; it may be necessary to invert the segment on the keys. Thephysical designer must have expertise in knowledge of the DBMS functions and understanding of the characteristics of direct access devices and knowledge of the applications.Many data bases have links between one record and another, called pointers. A pointer is a field in one record which indicates where a second record is located on the storage devices.Records that exist on storage devices is a given physical sequence. This sequencing may be employed for some purpose. The most common pupose is that records are needed in a given sequence by certain data-processing operations and so they are stored in that sequences.Different applications may need records in different sequences.The most common method of ordering records is to have them in sequence by a key —that key which is most commonly used for addressing them. An index is required to find any record without a lengthy search of the file.If the data records are laid out sequentially by key, the index for that key can be much smaller than they are nonsequential.Hashing has been used for addressing random-access storages since they first came into existence in the mid-1950s. But nobody had the temerity to use the word hashing until 1968.Many systems analysis has avoided the use of hashing in the suspicion that it is complicated. In fact, it is simple to use and has two important advantages over indexing. First, it finds most records with only one seek and second, insertion and deletions can be handled without added complexity. Indexing, however, can be used with a file which is sequential by prime key and this is an overriding advantage, for some batch-pro-cessing applications.Many data-base systems use chains to interconnect records also. A chain refers to a group of records scatters within the files and interconnected by a sequence of pointers. The software that is used to retrive the chained records will make them appear to the application programmer as a contiguous logical file.The primary disadvantage of chained records is that many read operations areneeded in order to follow lengthy chains. Sometimes this does not matter because the records have to be read anyway. In most search operations, however, the chains have to be followed through records which would not otherwise to read. In some file organizations the chains can be contained within blocked physical records so that excessive reads do not occur.Rings have been used in many file organizations. They are used to eliminate redundancy. When a ring or a chain is entered at a point some distance from its head, it may be desirable to obtain the information at the head quickly without stepping through all the intervening links.5、Data Description LanguagesIt is necessary for both the programmers and the data administrator to be able to describe their data precisely; they do so by means of data description languages. A data description language is the means of declaring to data-base management system what data structures will be used.A data description languages giving a logical data description should perform the folloeing functions:It should give a unique name to each data-item type, file type, data base and other data subdivision.It should identify the types of data subdivision such as data item segment , record and base file.It may define the type of encoding the program uses in the data items (binary , character ,bit string , etc.)It may define the length of the data items and the range of the values that a data item can assume .It may specify the sequence of records in a file or the sequence of groups of record in the data base .It may specify means of checking for errors in the data .It may specify privacy locks for preventing unauthorized reading or modification of the data .These may operate at the data-item ,segment ,record, file or data-base level and if necessary may be extended to the contents(value) of individual data items .The authorization may , on the other hand, be separate defined .It is more subject to change than the data structures, and changes in authorization proceduresshould not force changes in application programs.A logical data description should not specify addressing ,indexing ,or searching techniques or specify the placement of data on the storage units ,because these topics are in the domain of physical ,not logical organization .It may give an indication of how the data will be used or of searching requirement .So that the physical technique can be selected optimally but such indications should not be logically limiting.Most DBMS have their own languages for defining the schemas that are used . In most cases these data description languages are different to other programmer language, because other programmer do not have the capability to define to variety of relationship that may exit in the schemas.附录 B 外文译文1、软件工程软件是指令的序列,该指令序列由一种或者多种程序语言编写,它能使计算机应用于某些事物的运用自动化。

tosca job finished with an error

tosca job finished with an error

TOSCA Job Finished with an ErrorIntroductionIn the world of cloud computing and automation, TOSCA (Topology and Orchestration Specification for Cloud Applications) is an important standard that allows developers to describe and deploy complex cloud applications. However, sometimes TOSCA jobs can finish with an error, indicating a problem in the deployment process. In this article, we will explore the reasons behind TOSCA job errors and discuss potential solutions to resolve them.Understanding TOSCA Job ErrorsWhat is a TOSCA Job?Before we delve into the specifics of TOSCA job errors, it is essential to understand what a TOSCA job is. In the context of TOSCA, a job refers to a deployment or orchestration task that is executed to manage a cloud application’s lifecycle. This can include tasks like crea ting, updating, or deleting cloud resources, as well as other management operations.Common TOSCA Job Errors1.Syntax Errors: One of the most common types of errors in TOSCAjobs is syntax errors. These errors occur when the TOSCAdefinition contains incorrect or invalid syntax, preventing thejob from being executed successfully. Examples of syntax errorsinclude missing or misplaced keywords, incorrect indentations, ormismatched data types.2.Resource Conflicts: TOSCA jobs may also encounter errors due toresource conflicts. This can happen when multiple jobs are tryingto modify the same cloud resource simultaneously, leading toconflicts and failures. Resource conflicts can be caused by manual changes made to resources outside of the TOSCA framework or evenconcurrent execution of multiple TOSCA jobs.3.Dependency Issues: TOSCA deployments often involve a complexnetwork of interdependent resources. If there are dependencyissues between different resources or components specified in the TOSCA template, it can result in job errors. For example, if aTOSCA job tries to create a virtual machine before creating anetwork subnet, it will fail due to the missing dependency. Resolving TOSCA Job ErrorsTroubleshooting Syntax Errors1.Verify Syntax: The first step to resolving syntax errors is tovalidate the TOSCA template’s syntax. There are various toolsavailable that can help in validating TOSCA templates andidentifying syntax errors. It is crucial to carefully review the error messages and fix any syntax issues accordingly.2.Check Data Types: Another common cause of syntax errors isincorrect data types. Ensure that the data types specified in the TOSCA template match the expected types for each field. Forexample, if a field expects an integer but receives a string, it will cause a syntax error.Managing Resource Conflicts1.Locking Mechanisms: To avoid resource conflicts, it is essentialto implement locking mechanisms that prevent concurrentmodification of resources. This can be achieved by usingdistributed lock managers or other concurrency control techniques.2.Audit Trails: Implementing audit trails can provide visibilityinto resource changes made outside of the TOSCA framework. Bymonitoring the changes and notifying stakeholders, potentialconflicts can be detected early and resolved before they impactTOSCA jobs.Addressing Dependency Issues1.Analyze Dependencies: Thoroughly analyze the dependencies betweenresources and components defined in the TOSCA template. Identify any missing or incorrect dependencies that may be causing joberrors. Tools like TOSCA dependency graph generators can assist in visualizing and analyzing dependencies.2.Parallel Execution: If possible, modify the TOSCA template toallow parallel execution of independent resources. This can helpimprove deployment speed and reduce the chances of dependency-related errors.ConclusionTOSCA job errors can often hinder the smooth deployment andorchestration of complex cloud applications. By understanding the common types of errors and implementing appropriate troubleshooting techniques, these errors can be resolved efficiently. Through thorough validation of syntax, careful management of resource conflicts, and effective handling of dependencies, TOSCA job errors can be minimized, resulting in successful and error-free deployments.。

职责范围,工作任务,工作产出

职责范围,工作任务,工作产出

职责范围,工作任务,工作产出英文回答:Responsibility Scope, Job Tasks, and Job Outputs.Responsibility Scope:As an employee, my responsibility scope refers to the range of duties and tasks that I am accountable for in my role. It outlines the areas and aspects of the job that I am expected to handle and be responsible for. This includes the specific tasks, projects, and responsibilities that are assigned to me.For example, as a marketing manager, my responsibility scope may include overseeing marketing campaigns, conducting market research, managing social media accounts, and developing marketing strategies. These tasks fallwithin my responsibility scope and are part of my job description.Job Tasks:Job tasks refer to the specific activities and actions that I need to perform as part of my role. These tasks are directly related to the responsibilities outlined in my job description and contribute to the overall goals and objectives of the organization.For instance, as a marketing manager, my job tasks may include creating marketing materials, analyzing market trends, coordinating with the creative team for campaign designs, conducting competitor analysis, and monitoring the performance of marketing campaigns. These tasks are essential for the successful execution of marketing initiatives.Job Outputs:Job outputs are the tangible or intangible results and deliverables that are produced as a result of performing the assigned tasks. These outputs can be measured andevaluated to assess the effectiveness and efficiency of my work.Continuing with the marketing manager example, some of the job outputs may include the successful launch of a marketing campaign, an increase in brand awareness, growth in social media engagement, higher website traffic, and improved lead generation. These outputs demonstrate the impact and value of my work and contribute to the overall success of the marketing department.中文回答:职责范围、工作任务和工作产出。

AvailabilityCascadesandRiskRegulation

AvailabilityCascadesandRiskRegulation
314. Adam B. Cox and Eric A. Posner, The Second-Order Structure of Immigration Law (November 2006)
315. Lior J. Strahilevitz, Wealth without Markets? (November 2006)
Timur Kuran
Follow this and additional works at:/
public_law_and_legal_theory
Part of the Law Commons
This Working Paper is brought to you for free and open access by the Working Papers at Chicago Unbound. It has been accepted for inclusion in Public Law and Legal Theory Working Papers by an authorized administrator of Chicago Unbound. For more information, please contact
312. Dennis W. Carlton and Randal C. Picker, Antitrust and Regulation (October 2006)
313. Robert Cooter and Ariel Porat, Liability Externalities and Mandatory Choices: Should Doctors Pay Less? (November 2006)
University of Chicago Law School

(完整版)川大软院计网选择题答案Chapter1(含答案)

(完整版)川大软院计网选择题答案Chapter1(含答案)

(完整版)川大软院计网选择题答案Chapter1(含答案)1.1 In the following options, which does not define in protocol? ( D )A the format of messages exchanged between two or more communicatingentitiesB the order of messages exchanged between two or more communicating entitiesC the actions taken on the transmission of a message or other eventD the transmission signals are digital signals or analog signals1.2 In the following options, which is defined in protocol? ( A )A the actions taken on the transmission and/or receipt of a message or other eventB the objects exchanged between communicating entitiesC the content in the exchanged messagesD the location of the hosts1.3 An application can rely on the connection to deliver all of its data without error and in the proper order. The sentence describes (C ).A flow controlB congestion-controlC reliable data transferD connection-oriented service1.4 The Internet’s connection-oriented service has a name, it is ( A ).A TCPB UDPC TCP/IPD IP1.5 The Internet’s connectionless service is called ( B ).A TCPB UDPC TCP/IPD IP1.6 Which of the following nodes belongs to the network core?CA. a Web ServerB. a Host with Win2003 ServerC. a Router with NAT serviceD. a Supernode on Skype Network1.7 In the Internet, the equivalent concept to end systems is ( )A.A hostsB serversC clientsD routers1.8 In the Internet, end systems are connected together by ( C ).A copper wireB coaxial cableC communication linksD fiber optics1.9 End systems access to the Internet through its (C ).A modemsB protocolsC ISPD sockets1.10 In the following options, which belongs to the network core? ( B )A end systemsB routersC clientsD servers1.11 End systems, packet switches, and other pieces of the Internet, run ( D ) that control the sending and receiving of information within the Internet.A programsB processesC applicationsD protocols1.12 The internet allows ( D ) running on its end systems to exchange data with each other.A clients applicationsB server applicationsC P2P applicationsD distributed applications1.13 The protocols of various layers are called ( A ).A the protocol stackB TCP/IPC ISPD network protocol1.14 In the OSI reference model, the upper layers of the OSI model are, in correct orderDA Session, application, presentationB Session, presentation, applicationC Session, application, presentation, physicalD Application, presentation, session1.15 The lower layers of the OSI model are, in correct orderDA physical, system, network, logicalB physical, logical, network, systemC physical, transport, network, data linkD physical, data link, network, transport1.16 The Internet Protocol (IP) generally corresponds to which OSI layer?AA Network (layer three)B Transport (layer four)C Data link (layer two)D Session (layer five)1.17 What layer of the OSI model is designed to perform error detection functions?BA PhysicalB Data linkC NetworkD transport1.18 Which of the following protocol layers is not explicitly part of the Internet Protocol Stack? _____B____A. application layerB. session layerC. data link layerD. transport layer1.19 The 5-PDU is called__A_A. messageB. segmentC. datagramD. frame1.20 The Internet’s network l ayer is responsible for moving network-layer packets known as B( ) from one host to another.A frameB datagramC segmentD message1.21 Transport-layer packets are called:BA. messageB. segmentC. datagramD. frame1.22 The units of data exchanged by a link-layer protocol are called ( A).A FramesB SegmentsC DatagramsD bit streams1.23 There are two fundamental approaches to building a network core, ( B ) and packet switching.A electrical current switchingB circuit switchingC data switchingD message switching1.24 Datagram networks and virtual-circuit networks differ in that ( C ).A datagram networks are circuit-switched networks, and virtual-circuit networksare packet-switched networks.B datagram networks are packet-switched networks, and virtual-circuit networksare circuit-switched networks.C datagram networks use destination addresses and virtual-circuit networks useVC. numbers to forward packets toward their destination.D datagram networks use VC. numbers and virtual-circuit networks usedestination addresses to forward packets toward their destination.1.25 (A ) means that the switch must receive the entire packet before it can begin to transmit the first bit of the packet onto the outbound link.A Store-and-forward transmissionB FDMC End-to-end connectionD TDM1.26 In ( C ) networks, the resources needed along a path to provide for communication between the end system are reserved for the duration of the communication session.A packet-switchedB data-switchedC circuit-switchedD message-switched1.27 In ( A ) networks, the resources are not reserved; a session’s messages use the resources on demand, and as a consequence, may have to wait for access to communication link.A packet-switchedB data-switchedC circuit-switchedD message-switched1.28 In a circuit-switched network, if each link has n circuits, for each link used by the end-to-end connection, the connection gets ( A) of the link’s bandwidth for the duration of theconnection.A a fraction 1/nB allC 1/2D n times1.29 For (C ), the transmission rate of a circuit is equal to the frame rate multiplied by the number of bits in a slot.A CDMAB packet-switched networkC TDMD FDM1.30 The network that forwards packets according to host destination addresses is called ( D) network.A circuit-switchedB packet-switchedC virtual-circuitD datagram1.31 The network that forwards packets according to virtual-circuit numbers is called ( C ) network.A circuit-switchedB packet-switchedC virtual-circuitD datagram1.32 The time required to propagate from the beginning of the link to the next router is ( C).A queuing delayB processing delayC propagation delayD transmission delay1.33 Processing delay does not include the time to (B ).A examine the packet’s headerB wait to transmit the packet onto the linkC determine where to direct the packetD check bit-error in the packet1.34 In the following four descriptions, which one is correct? ( C)A The traffic intensity must be greater than 1.B The fraction of lost packets increases as the traffic intensity decreases.C If the traffic intensity is close to zero, the average queuing delay will be closeto zero.D If the traffic intensity is close to one, the average queuing delay will be closeto one.1.35 Suppose, a is the average rate at which packets arrive at the queue, R is the transmission rate, and all packets consist of L bits, then the traffic intensity is ( B ),A LR/aB La/RC Ra/LD LR/a1.36 Suppose there is exactly one packet switch between a sending host and a receiving host. The transmission rates between the sending host and the switch and between the switch and the receiving host are R1 and R2, respectively. Assuming that the switch uses store-and-forward packet switching, what is the total end-to-end delay to send a packet of length L? (Ignore queuing delay, propagation delay, and processing delay.) ( A )A L/R1+L/R2B L/R1C L/R2D none of the above1.37 We are sending a 30 Mbit MP3 file from a source host to a destination host. Suppose there is only one link between source and destination and the link has a transmission rate of 10 Mbps. Assume that the propagation speed is 2 * 108 meters/sec, and the distance between source and destination is 10,000 km. Also suppose that message switching is used, with the message consisting of the entire MP3 file. How many bits will the source have transmitted when the first bit arrives at the destination?CA. 1 bitB. 30,000,000 bitsC. 500,000 bitsD. none of the above1.38 In the following entries, which is not a kind of access network?(D )A residential accessB company accessC wireless accessD local access1.39 The following technologies may be used for residential access, exceptDA. HFCB. DSLC. Dial-up modemD. FDDI1.40 Which kind of media is not a guided media? ( D)A twisted-pair copper wireB a coaxial cableC fiber opticsD digital satellite channel。

软考题目-软件设计师英文题目,卧槽怎么选一个错一个

软考题目-软件设计师英文题目,卧槽怎么选一个错一个

软考题⽬-软件设计师英⽂题⽬,卧槽怎么选⼀个错⼀个2019-08-09英语⾃认为还算可以,不好也不差。

但是做软考英⽂题⽬题,选⼀个错⼀个啊。

备受打击。

题⽬如下:A project is a [temporary] 【temporary:临时的】(Sequence) of unique 【unique:独特的】,complex,and connected activities having one goal or purpose and that must be completed by a specific【specific:具体的】 time,within budget【预算】,and according to (Specifications).【specifications:规范】Project management is the process of scoping【范围】,planning,staffing,organizing,directing,and controlling the development of a(n) ( acceptable)【可接受的】 system at a minimum cost within a specified tiem frame.For any systems development project,effective project management is necessary to ensure that the project meets the (deadline)【⼯期,结束⽇期】,is developed within an acceptable budget,and fullfills customer expectations and specifications .Project management is a process that starts at the beginning of a project,extends through a project and doesn't culminate【最终导致】 until the project is completed. The prerequisite【先决条件】 for good project management is a well-defined system development process.Process management is an ongoing activity that documents ,manages the use of ,and imporves an organization's chosen methodology【⽅法】(the process) for system development.Process management is concerned with the activities,delierables,and quality standards to be applied to ( all )【所有】 project(s).。

计算机与网络英汉对照词典

计算机与网络英汉对照词典

计算机与网络英汉对照词典[A]Alphamosic Graphics字母镶嵌图形Active Directory动态目录ADSI动态目录服务接口Autosizing自动调整大小Anonymous FTP 匿名文件传输Access Control 访问控制ARP 地址解析协议API 应用程序界面ACL 访问控制表Attenuation 衰减ARP 地址解析协议Adapter 适配器Average seek time 平均寻道时间Authorization 授权,认证Adapter 适配器A3D 3D定位音效技术Acrobat Adobe阅读软件AC97 音响数字/模拟转换ACL 访问控制表A3D Aureal声音技术ATAPI AT附件包接口aliasing 混淆utoexec.bat 自动批处理文件API 应用程序设计接口ASP 服务器开发专用脚本ADSL 非对称数字用户线路AVI 影音文件ADSL 非对称数字用户环线Algorithm 算法Alpha DEC公司微处理器Authorwsre Authorware 多媒体创作软件AMI BIOS BIOS基本输入/输出系统AGP 加速图形接口Aactive matrix 动态矩阵Aactive Network 动态网络Authentication and Authorization 鉴别与授权Auditing 审计,计审At Work Architecture,Microsoft Microsoft的At Work体系结构-------------------------------------------------------------------------------- [B]BISDN宽带综合业务数字网BRI基本速率接口BIS商务信息系统Bundled Software捆绑软件Bluetooth蓝牙Back Door 后门Bridge 网桥Bit 比特Backup 备份Beta Test Beta测试Bookmark 书签BASIC 编程语言B2B 商务对商务Bandwidth 带宽BBS 电子布告栏系统Beta 测试第二版bit 位Bug 程序缺陷、臭虫Byte-Oriented Protocol 面向字节规程Bus Topology 总线拓扑Bursts 突发传送Burst Mode,NetWare NetWare的突发方式Bulletin Board System 公告牌系统Brouter(Bridge/router)桥路器(桥接器/路由器)Broadcast Storm 广播风暴Broadcast 广播Broadband Services 宽带(通信)服务Broadband ISDN 宽带综合业务数字网Bridging 桥接Breakout BoX 中断盒Border Gateway Protocol 边界网关协议BNC Connector BNC连接器Block Suballocation 磁盘块再分配Bit-Oriented Protocol 面向位协议BITNET BITNET网Bindery 装订Binary Synchronous Communications 二进制同步通信(规程)Bell Operating Companies 贝尔运营公司Bell modem Standards 贝尔调制解调器标准Bellman-Ford Distance-Vector Routing Algorithm Bellman-Ford距离向量--------------------------------------------------------------------------------[C]CFTV付费电视CDMA码分多址技术CRC循环冗余检查CD-ROM只读光盘机CMIP 通用管理信息协议Cable 电缆Cable Modem 电缆调制解调器Chipset 芯片组CNNIC 中国互联网络信息中心CRT 阴极射线管Cache 高速缓冲存储器Client/Server 客户机/服务器Cookie 网络小甜饼Cache 高速缓冲存储器CMOS 可读写芯片CGI 公共网关接口Cryptography 密码术;密码学Corporation for Open Systems 开放系统公司Copper Distri but ed Data Interface 铜质分布式数据接口Cooperative Accessing 协同处理Controlled Access Unit 受控访问单元Contention 争用Container Objects 所有者对象Connection-Oriented and Connectionless Protocols 面向连接和无连接协议Connectionless Network Protocol 无连接网络协议Connectionless and Connection-Oriented Transactions 无连接和面向连接事务Configuration Management 配置管理Conditioning 调节Concentrator Devices 集中器设备Compression Techniques 压缩技术Compound Documents 复合文档Complex Instruction Set Computer 复杂指令系统计算机Communication Services 通信服务Communication Server 通信服务器Communication Controller 通信控制器Communication 通信Common Programming Interface for Communication IBM IBM的通信公用编程接口Common Open Software Environment 公用开放软件环境Common Object Request Broker Architecture 公用对象请求代管者体系结构Common Object Model 公用对象模型--------------------------------------------------------------------------------[D]Dvorak Keyboard Dvorak键盘DDR双倍速率SDRAMDAO 数据访问对象Daemon 后台程序DTR 数据终端就绪DASD 直接访问存储设备DMI 桌面管理界面DPI 打印分辨率DHCP 动态主机配置协议Driver 驱动程序DDN 数字数据网络DRAM 动态随机存取内存DSL 数字用户环线Desktop 桌面、台式电脑Download 下载Digital camera Digital camera 数码相机Dynamic Routing 动态路由选择Dynamic Data Exchange 动态数据交换Duplex Transmission 双工传输Duplexed Systems 双工系统Downsizing 向下规模化,下移DOS Requester,NetWare NetWare礑OS请求解释器Domains 域Domain Name Service 域名服务Document Management 文档管理Document Interchange Standards 文档交换标准Distri but ed System Object Model 分布式系统对象模型Distri but ed Relational Database Architecture 分布式关系数据库体系结构Distri but ed Queue Dual Bus 分布式队列双总线Distri but ed Processing 分布式处理Distri but ed Objects EveryWhere(DOE),SunSoft SunSoft的全分布式对象Distri but ed Object Management Systems 分布式对象管理系统Distri but ed Object Management Facility(DOMF),Hewlett-Packard HP的分布式对象管理设施Distri but ed Name Service,DEC DEC的分布式命名服务Distri but ed Management Environment 分布式管理环境Distri but ed Management 分布式管理Distri but ed File Systems 分布式文件系统Distri but ed File System,OSF DCE OSF DCE的分布式文件系统Distri but ed Database 分布式数据库Distri but ed Computing Environment(DCE),OSF 开放软件基金会(OSF)的分布式计算环境--------------------------------------------------------------------------------[E]Edge Device 边界设备Email Filter 电子邮件过滤器EPP 增强型并行端口Extranet 外联网EISA总线扩展工业标准结构External Bus 外部总线EDO RAM 动态存储器Ethernet 以太网Email client 电子邮件客户端程序Exterior Gateway Protocols 外部网关协议Extended Industry Standard Architecture Bus 扩展工业标准体系结构(EISA)总线EtherTalk EtherTalk 适配器Ethernet100VG-AnyLAN(Voice Grade)100VG-AnyLAN(语音级)以太网Ethernet 100Base-X 100Base-X以太网Ethernet 10BaSe-T(Twisted-pair)10Base-T(双绞线)以太网Ethernet 10Base-5(Thicknet)10Base-5(粗电缆)以太网Ethernet 10Base-2(Thinnet)10Base-2(细电缆)以太网Ethernet 以太网Error Detection and Correction 检错和纠错Enterprise System Connections(SCON),IBM IBM的企业级系统连接Enterprise System Architecture,IBM IBM的企业级系统体系结构Enterprise Networks 企业网Enterprise Management Architecture,DEC DEC的企业(点)管理体系结构End System-to-Intermediate System(ES-IS)Routing 端系统对中间系统Encryption 加密Encina Encina应用程序Encapsulation 封装E-Mail 电子函件Elevator Seeking 电梯式查找[寻道]算法Electronic Software Distri but ion(ESD)and Licensing 电子软件分发(ESD)和特许(ESL)Electronic Mail Broadcasts to a Roaming Computer 对漫游计算机的电子函件广播Electronic Mail 电子函件Electronic Industries Association 电子工业协会Electronic Data Interchange 电子数据交换Electromagnetic Interference 电磁干扰EISA(Extended Industry Standard Architecture)Bus EISA(扩展工业标准体系结构)总线EIA/TIA 568 Commercial Building Wiring Standard EIA/TIA 568 商用建[F]File Server文件服务器FCC & BCC转发与密送Flash动画制作软件Failback 自动恢复FAT 文件分配表FTP Server 文件传输服务器Fax modem 传真调制解调器FDDI 光纤分布式数据接口FAT 文件分配表FLASH 动感网页制作工具FTP 文件传输协议FAT32 32位文件分配表Firewall 防火墙Flash FlashFull-Duplex Transmissions 全双工传输Front-End System 前端(台)系统Front-End Processor 前端(台)处理机Frequency Division Multiplexing 频分多路复用Frames in Communication 通信帧Frame Relay 帧中继Fractional T1/Fractional T3 部分T1/部分T3Forwarding 转发Flow Control Methods 流控方法FINGER FINGER实用程序Filtering 筛选,过滤File Transfer Protocol 文件传输协议File Transfer Access and Management 文件传输访问和管理File Systems in the Network Environment 网络环境中的文件系统File Systems,Distri but ed 分布式文件系统Filesharing 文件共享File Server 文件服务器Fileand Directory Permissions,Windows NT Windows NT的文件和目录许File and Directory Attri but es,NetWare NetWare的文件和目录属性Fiber Channel 光纤通道Fiber-Optic Cable 光缆Fiber Distri but ed Data Interface 光纤分布式数据接口Federated Naming Services,SunSoft ONC SunSoft ONC的联合命名服务Federated Database 联合数据库Federal Information Processing Standards 联邦信息处理标准FAX Servers 传真服务器--------------------------------------------------------------------------------[G]GPRS通用分组无线业务GPRS通用分组无线业务3G 第三代移动通信GUI 图形用户界面Gateway 网关Groupware 群件Groups 组Grounding Problems 接地问题Government OSI Profile 政府OSI框架文件Glue,Oracle Oracle的Glue解决方法Global Naming Services 全局命名服务Gateway-to-Gateway Protocol 网关对网关协议Gateway 网关,信关--------------------------------------------------------------------------------[H]HDF 层次型数据格式Hardware 硬件HTTP 超文本传输协议Hacker 黑客HTML 超文本标记语言HUB 集线器HTTP 超文本传输协议HTML 超文本链接标示语言Hard Disk 硬盘Hubs Hub,集线器,集中器Hub Management Interface Hub管理接口Hot Fix,Novell NetWare Novell NetWare的热修复Host 主机Horizontal Wiring System 水平布线系统Hop 跳跃(计)数,过路数,中继数Homogeneous Network Environments 同构网络环境Home Directory 私人目录High-Speed Serial Interface 高速串行接口High-Speed Networking 高速联网高速网包括传输速度高于在1990年前占主导地位的传统传输速度的LAN和WHigh Performance Routing(HPR),IBM IBM 的高性能路由选择High Performance Parallel Interface 高性能并行接口High Performance File System 高性能文件系统High-Level Data Link Control 高级数据链路控制(规程)High Capacity Storage System(HCSS),Novell NetWare Novell NetWare的大容量存储系统High-bit-rate Digital Subscriber Line 高位速率数字用户专用线Heterogeneous Network Environments 异构网络环境Hermes,Microsoft Microsoft的企业网管理系统Handshaking 握手,联络,信号交换Half-Duplex Transmission 半双工传输--------------------------------------------------------------------------------[I]IMAP4信息访问协议4Insert Mode插入模式iPAQ Pocket PCIIS Internet信息服务器IB 智能大厦IrDA 红外线传输装置IIS 网络信息服务器IA 信息家电INF File 适配器安装信息文件Instructions Cache 指令缓存INF File 信息文件Internet backbone Internet骨干网Interface 界面Icon 图标Icon 图标Icon 图标Icon 图标Icon 图标IT 信息技术产业Internal Bus 内部总线IIS Internet信息服务器IT 信息技术IDE 集成驱动电子设备IP 网络协议IRC 互联网中转聊天ICP 互联网内容提供商ICP 互联网内容提供商Isohronous Service 等时服务IS-IS Interdomain Routing Protocol IS-IS域间路由选择协议ISDN/B-ISDN 综合业务数字网/宽带综合业务数字网Iridium System 铱系统Interrupts 中断Interprocess Communication 进程间通信Interoperability 互操作性,互用性Internetwork Routing 网间路由选择Internetwork Packet Exchange 网间分组交换Internetworking 网络互联Internet Protocol Internet网络协议,因特网协议Internet Engineering Task Force Internet工程任务组Internet Internet网因特网-------------------------------------------------------------------------------- [J]JPEG 联合图像专家组规范JSP 网页控制技术Java 编程语言Jukebox Optical Storage Device 自动换盘光盘存储设备Jabber 超时传输,Jabber传输[K]Key recovry 密钥恢复Knowbots Knowbots智能程序Key Encryption Technology 密钥加密技术Kernel 操作系统内核Kermit Kermit文件运输协议Kerberos Authentication Kerberos鉴别-------------------------------------------------------------------------------- [L]LCD 液晶显示屏Light Cabel 光缆Leased line 专线LPT 打印终端LPT 打印终端接口LAN 局域网LU 6.2 LU 6.2协议Lotus Notes Lotus的Notes软件Logons and Logon Accounts 用户登录和登录帐号Login Scripts 登录原语Logical Units 逻辑单元Logical Links 逻辑链路LocalTalk LocalTalk网Local Procedure Calls 本地过程调用Local Loops 局部环路Local Groups 本地组Local Exchange Carrier 本地交换电信局Local Area Transport 局域传输协议Local Area NetWorks 局域网Local Access and Transport Area 本地访问和传输区域Load-Balancing Bridges 负载平衡桥接器,负载平衡网桥Link State Routing 链路状态路由选择Link Services Protocol,NetWare NetWare的链路服务协议Link Layer 链路层Link Access Procedure 链路访问规程Line Conditioning 线路调节Licensing Server API 许可证服务器APILegacy Systems 保留系统Leased Line 租用线路Learning Bridges 自学习桥接器Leaf Objects 叶对象Layered Architecture 分层体系结构Large Internetwork Packet Exchange 大型网间分组交换Laptop Connections 膝上机联网LAN Workplace Products,Novell Novell的LAN Workplace产品,Novell的局域网Wo rkplace产品LAN Troubleshooting 局域网故障诊断LANtastic LANtastic局域网操作系统LAN Server 局域网服务器LAN Requester 局域网请求解释器LAN Manager,Microsoft Microsoft的局域网管理器,Microsoft的LAN Manager--------------------------------------------------------------------------------[M]Mosaic 摩塞克浏览器MO 磁性光盘Mac OS Mac操作系统MO 磁光盘MCSE 微软认证系统工程师MUD 分配角色的游戏环境Mainbus 系统总线Mainboard 主板MAN 城域网Memory Stick Memory Stick 存储棒MSI MSI 微星科技Multistation Access Unit 多站访问部件Multipurpose Internet Mail Extension Internet多功能邮件传递扩展标准Multiprotocol Transport Network(MPTN),IBM IBM的多协议传输网络Multiprotocol Router 多协议路由器Multiprotocol Networks 多协议网络Multiprocessor Systems 多处理器系统Multiprocessing 多处理器处理Multiplexing 多路复用技术Multimedia 多媒体Multidrop(Multipoint)Connection 多点连接MOTIS(Message Oriented Text Interchange System)MOTIS(面向消息的文本交换系统)Motif Motif 工具Modems 调制解调器Mobile Computing 移动计算Mirroring 镜像Middleware 中间件Microwave Communication 微波通信Micro-to-Mainframe Connectivity 微型计算机到大型计算机的互联性Microsoft At Work Architecture Microsoft At Work体系结构Microsegmentation 微分段Microkernel 微内核Microcom Networking Protocol(MNP)Microcom的联网协议MicroChannel Architecture(MCA)Bus 微通道体系结构(MCA)总线Metropolitan Area Networks 城域网Messaging Application Programming Interface 消息应用程序编程接口Messaging API,Inter-Application 应用程序间的消息传递APIMessaging API,E-mail E-mail的消息传递APIMessage Transfer Agent 消息传送代理Message Queuing Interface(MAI),IBM IBM的消息排队接口--------------------------------------------------------------------------------[N]NOC网络操作中心NAT网址解析NOC网络操作中心NAT 网址解析NDIS 网络驱动程序接口Network Architecture 网络体系结构NSR 渲染引擎NFS 网络文件系统NAT 网址转换NWLink IPX/SPX协议微软执行部分NetBIOS 网络基本输入/输出系统Network interface card 网卡NTFS(New Technology File System)NTFS(新技术文件系统)Novell Novell公司Node 节点,结点,网点Network Troubleshooting 网络故障诊断与维修Network Service Protocol,DEC DEC网络服务协议Networks 网络NetWork Management 网络管理Network Layer,OSI Model OSI模型的网络层Network Interface Card 网络接口卡Networking Blueprint 联网方案Network File System 网络文件系统Network Dynamic Data Exchange 网络动态数据交换Network Driver Standards 网络驱动程序标准Network Driver Interface Specification 网络驱动程序接口规范NetWork Control Program 网络控制程序Network Architecture 网络体系结构NetWare Volumes NetWare的(文件)卷宗NetWare Shell NetWare工作站外壳程序NetWare SFT Level ⅢNetWare的三级系统容错NetWare Products NetWare软件产品NetWare Loadable Module NetWare的可装入模块NetWare Link Service Protocol NetWare的链路服务协议NetWare Electronic Software Distri but ion NetWare的电子软件分发NetWare Disks,Partitions,and Volumes NetWare的磁盘、分区和卷宗NetWare Core Protocol NetWare的核心协议NetWare NetWare网络操作系统NetView,IBM IBM的NetView网络管理系统NetLS(Network License Server)NetLS(网络许可权服务器)--------------------------------------------------------------------------------[O]OEM原装备生产厂商OH调制解调器连线OSD 屏幕视控系统OAW 光学辅助温式技术OA 办公自动化Open Source 开放源代码OSF/1,Open Software Foundation 开放软件基金会OSF/1操作系统OS/2 OS/2操作系统Organization Containers 机构包容器对象Optical Libraries 光盘库,光盘存储库Optical Fiber 光纤Open View Management System,Hewlett-Packard HP的Open VieW管理系统Open Systems Interconnection(OSI)Model 开放式系统互联(OSI)模型Open Systems 开放式系统Open Software Foundation(OSF)开放软件基金会(OSF)Open Shortest Path First(OSPF)Protocol 优先开放最短路径(OSPF)协议Open Network Computing(ONC),SunSoft SunSoft的开放式网络计算环境Open Messaging Interface(OMI)开放消息传递接口Open Document Architecture 开放文档体系结构OpenDoc Alliance,Apple Apple的OpenDoc联盟OPEN DECconnect Structured Wiring 开放DECconnect结构化布线系统OpenData-link Interface 开放数据链路接口Open Database Connectivity(ODBC),Microsoft Microsoft的开放式数据库互联性Open Collaborative Environment(OCE),Apple Apple的开放协作环境On-line Transaction Processing 联机(在线)事务处理Objects,NetWare Directory Services NetWare目录服务中的对象Objects 对象,目标,实体Object Request Broker 对象请求代管者Object-Oriented echnology 面向对象技术Object-Oriented Interfaces and Operating Systems 面向对象接口和操作系统Object-Oriented Database 面向对象数据库Object Management Group 对象管理组织Object Management Architecture 对象管理体系结构Object Linkingand Embedding 对象链接与嵌入Object Broker,DEC DEC的对象代理者软件,DEC的Object Broker软件--------------------------------------------------------------------------------[P]Packetsniffer包嗅探器PHP4嵌入式脚本描述语言Push Technology推技术PVM并行虚拟机Path 路径、通路PKI 公开密钥基础设施Pull-down Menu 下拉菜单PAP 密码验证协议PnP 即插即用PCL 打印机指令语言PDS 个人数字系统PCI 周边元件扩展接口POP3 高级网络协议PHP 服务器端编程语言Plasma Display Plasma Display 等离子显示器Punchdown Block 穿孔板,分线盒Pulse-Code Modulation 脉码调制,脉冲代码调制Public Switched Data NetWork 公共交换数据网Public Key Cryptographic Systems 公开密钥加密系统Public Data NetWorks(PDNs)公用数据网(PDN)PU2.1 物理单元(PU)2.1Protocol Stack 协议栈Protocols,Communication 通信协议Protocol Data Unit 协议数据单元Protocol Converters 协议转换器Protocol Analyzers 协议分析器(程序)Protected of Data 数据的保护Protected Mode (受)保护模式Properties of Objects 对象的性质,对象的特性Propagation Delay 传播延迟Project DOE(Distri but ed Objects Everywhere)企业(工程)DOE(全分布式对象)Private Network 私用网,专用网Private Key Cryptography 私用密钥密码学Privacy Enhanced Mail 增强安全的私人函件Print Server 打印服务器Printingon NetWare Networks NetWare网上打印(服务)Premises Distri but ion System 规整化布线系统Preemptive Multitasking 抢先多任务处理PowerPC PowerPC微处理里器系列PowerOpen Environment PowerOpen环境[Q]|龙哥救急呀,我的Win2k(professional)中了“红色代码III”病毒,该如何手动清除?Quadrature Amplitude Modulation 正交振幅调制,正交调幅--------------------------------------------------------------------------------[R]RDRAM高频DRAMRAID 冗余独立磁盘阵列Registry 注册表RISC CPU 精简指令集CPURegistry 注册表RDRAM Rambus动态随机存取内存RSA Data Security RSA数据安全性RSA数据安全性Routing Protocols 路由选择协议Routing Information Protocol 路由选择信息协议Routing,OSI OSI的路由选择Routing,NetWare NetWare的路由选择Routing,Internet Internet路由选择Routing,IBM IBM路由选择Routing,AppleTalk AppleTalk路由选择AppleTalk路由选择Routers 路由器RJ-11and RJ-45 Connections RJ-11和RJ-45连接Ring Network Topology 环网拓扑结构环网拓扑结构Rights(Permissions)in Windows NT Windows NT权限(准许权限)Rightsin Windows for Workgroups Windows for Workgroups中的权限Rightsin Novell NetWare Novell NetWare中的权限RG-62 Coaxial Cable RG-62同轴电缆RG-58 Coaxial Cable RG-58同轴电缆Replication 复制Repeater 中继器,重复器Remote Procedure Call 远程过程调用Remote Access Software 远程访问软件Regional Bell Operating Companies(RBOC)地方贝尔运营公司Redundant Arrays of Inexpensive Disks(RAID)廉价磁盘冗余阵列Reduced Instruction Set Computer 精简指令系统(集)计算机Redirector 重定向器(程序)RAM Mobile Data RAM 移动数据公司Radio Networks 无线电网络--------------------------------------------------------------------------------[S]SSL安全套层SAA系统应用架构SMP 对称多处理结构SET 安全电子商务协议SNA 系统网络结构Subnet 子网SSL 安全套接层协议Server 服务器SMP 对称式多处理器Serial Interface 串行接口SOHO 小型办公与家庭办公Scanner 扫描仪Search Engine 搜索引擎Screen Saver 屏幕保护程序Socket 7 接口结构SONET 同步光纤网SMTP 简单邮件传送协议SCSI 小型计算机系统接口SGRAM 同步图形动态随机存取内存SDRAM 同步动态随机存取内存SystemView,IBM IBM的SystemView网络管理系统Systems Network Architecture(SNA),IBM IBM 系统网络体系结构Systems Application Architecture 系统应用体系结构System Object Model(SOM),IBM IBM的系统对象模型(SOM)System Fault Tolerance 系统容错Synchronous Optical Network 同步光纤网Synchronous Data Link Control 同步数据链路控制(规程)Synchronous Communication 同步通信Symmetrical Multiprocessing 对称多处理Switching Hubs 交换式集线器Switched Virtual Circuit 交换式虚电路Switched Services 交换式服务Switched Multimegabit Data Service 交换式多兆位数据服务Switched-56 Services Switched-56服务,交换式56服务Surge Suppressors 浪涌电压抑制器,电涌抑制器Supervisor 超级用户,监管员SunOS,SunSoft SunSoft的SunOS操作系统SunNet Manager,Sun Microsystems,Inc.Sun公司的SunNet Manager Sun Microsystems,Inc.Sun 微系统公司SunLink Network Sunlink网--------------------------------------------------------------------------------[T]TFT 有源矩阵彩色显示器TFTP 小文件传输协议Transport layer 传输层Taskbar 任务条Twisted-Pair Cable 双绞线,双绞线电缆Tuxedo,UNIX System Laboratories UNIX系统实验室的Tuxedo中间件Tunneling 管道传送,隧道,管道传输Trustees 受托者Troubleshooting 故障诊断与维修,排错Trivial File Transfer Protocol 普通文件运输协议Transport Protocol 传输协议Transport Layer Interface 运输层接口Transport Layer,OSI Model OSI模型的运输层Transmission Media,Methods,and Equipment 传输介质、方法和设备Transmission Control Protocol/Internet Protocol 传输控制协议/Internet协议Transfer Rates 传输率Transceiver,Ethernet 以太网收发器,以太网的接收发送器Transaction Processing 事务处理Topology 拓扑结构Token Ring NetWork 令牌环网Token Bus NetWork 令牌总线网Token and Token Passing Access Methods 令牌和令牌传递访问方式Time Synchronization Services 时间同步服务Time Domain Reflectometer 时域反射计(仪,器)Throughput 吞吐率,处理能力Threads 线程Testing Equipment and Techniques 测试设备和技术Terminator 终端器,终结器,终止器Terminal Servers 终端服务器Terminal 终端Telnet Telnet程序Telenet Telenet网Telecommunication 电信,远程通信Technical Office Protocol 技术办公系统协议TeamLinks,DEC DEC的群件TeamLinksTaligent Taligent公司T1/T3 Services T1/T3服务--------------------------------------------------------------------------------[U]UDA统一数据读取UML 统一建模语言UTP 无屏蔽双绞线URL 统一资源定位格式UPS 不间断电源Ultra DMA 33 同步DMA协定UNIX 32位操作系统UNIX 操作系统USB 通用串行总线Users and Groups 用户和(小)组User Datagram Protocol 用户数据报协议User Agent 用户代理USENET USENET网Unshielded Twisted Pair 非屏蔽双绞线UNIX-to-UNIX Copy Program UNIX系统间文件拷贝程序UNIX System Laboratories UNIX系统实验室UNIX International UNIX国际UNIX UNIX操作系统Unit of Work 作业单元,工作单元Uninterruptible Power Supply 不间断电源Unified Network Management Architecture(UNMA),AT&T AT&T的统一网络管理体系结构--------------------------------------------------------------------------------[V]Virtual Desktop虚拟桌面VoxML语音标记语言Video Compression 视频压缩Virtual reality 虚拟现实VOD 视频传播系统VESA 视频电子标准协会VRML 虚拟现实建模语言VESA 视频电子标准Volume Spanning 卷宗的跨越Volumes,NetWare NetWare的卷宗Virtual Terminal(VT)虚拟终端Virtual Telecommunication Access Method 虚拟远程通信访问方法Virtually Integrated Technical Architecture Lifecycle 虚拟集成技术体系结构生命周期Virtual File Systems 虚拟文件系统Virtual Data Networks 虚拟数据网Virtual Circuit 虚电路VINES,Banyan Banyan的VINES操作系统Videoconferencing and Desktop Video 电视会议和台式(桌面)视频系统Very Small Aperture Terminals(VSATs)卫星小站电路设备Vertical Wiring 垂直布线系统Vendor Independent Messaging (VIM),Lotus Lotus 的厂商无关消息传递应用程序编程接口“V dot”Standards,CCITT CCITT(ITU)的“V点”标准VAX,Digital Equipment Corporation(DEC)数字设备公司(DEC)的VAXValue-Added Carrier 增值网[W]WINS IP解析WYSIWYG 所见即所得WEB VOD WEB视频点播Wizard 向导Wavetable 波表合成WindowsCE 操作系统WAP 无线应用协议Workstation 工作站Workplace OS Workplace操作系统Workgroups 工作组,(用户)组Workflow Software 工作流软件Wiring 布线Wireless Mobile Communication 无线移动通信Wireless LAN Communication 无线局域网通信Windows Telephony Application Interface Windows 电话应用程序接口Windows Sockets API Windows套节字(嵌套字)APIWindows Open System Architecture(WOSA)Windows开放式系统体系结构(WOSA)Windows NT Advanced Server,Microsoft Microsoft的Windows NT高级服务器操作系统Windows NT,Microsoft Microsoft的Windows NT操作系统Windows for Workgroups,Microsoft Microsoft的Windows for Workgroups操作系统Wide Area Networks 广域网WHOIS(“Who Is”)WHOIS数据库--------------------------------------------------------------------------------[X]XUL扩展用户接口语言XON/XOFF异步通信协议X2/DSL调制解调器XSLT XSL变换描述XUL 扩展用户接口语言XQL XML查询语言XML 扩展标签语言X Window X窗口,X Windows图形用户接口X/Open X/Open公司,X/Open国际联盟有限公司XMODEM Protocol XMODEM协议Xerox Network System Xerox网络系统X.500 Directory Services X.500目录服务X.400 Message Handling System X.400消息处理系统X.25 X.25 协议--------------------------------------------------------------------------------[Y]Ymodem Ymodem协议--------------------------------------------------------------------------------[Z]Zmodem Zmodem协议Zip Drive Zip驱动器ZIP 压缩文件格式Zone Multicast Address,AppleTalk AppleTalk的区广播地址Zone Information Table(ZIT),AppleTalk AppleTalk 的区信息表Zone Information Protocol(ZIP),AppleTalk AppleTalk的区信息协议Zone,AppleTalk AppleTalk 的区,AppleTalk的域ZMODEM Protocol ZMODEM 协议Aabsolute positioning 絕對定位abstract windows toolkit 抽象窗口工具庫accumulator 累加器active multi-media 動態多媒體address 地址,[台]位址AI-searching 智能搜索引擎alphamosic graphics 字母鑲嵌圖形alphanumeric 字母數字,[台]文數American on Line 美國在線,美國連線,[台]美國線上American Standard Code for Information Interchange 美國信息交換標準代碼analog 模擬,[台]類比AND gate 與門,[台]及閘AOL (American on Line) 美國在線,美國連線,[台]美國線上API (application programming interface) 應用編程接口,應用編程界面,[台]應用程式介面,[港]應用程式編寫介面applet 支程序,小應用程序application-oriented language 面向應用的語言,[台]應用導向語言application programming interface 應用編程接口,應用編程界面,[台]應用程式介面,[港]應用程式編寫介面application service provider 應用服務提供商[港]應用服務供應商ASCII (American Standard Code for Information Interchange) 美國信息交換標準代碼ASP (application service provider) 應用服務提供商[港]應用服務供應商assembler 匯編器,匯編程序,[台]組譯器,組合程式asynchronous transfer mode 異步傳輸模式,[台]非同步傳輸模式ATM (asynchronous transfer mode) 異步傳輸模式,[台]非同步傳輸模式audio card 聲卡AWT (abstract windows toolkit) 抽象窗口工具庫Bbackground 後台,[台]背景,次優bandwidth 帶寬,通訊頻帶,[台/港]頻寬baseband 基帶,[台/港]基頻BBS (bulletin board system) 公告牌系統,電子公告系統,電子公告欄,電子佈告系統,[台]電子佈告欄BFT (binary file transfer) 二進制文件傳輸Big-5 大五碼,[台]五大碼,大五碼binary file transfer 二進制文件傳輸binary runtime environment for wireless 無線二進制碼,[港]無�二位元?#92;行環境軟件bit 位,比特,[台]位元,數元bit-slice 位片,[台]位元切片,位片劃分bluetooth ?#123;牙,[港]?#123;芽boot 引導bootstrap 引導程序,引導指令,輔助程序,[台]啟動程式BREW (binary runtime environment for wireless) 無線二進制碼,[港]無�二位元? #92;行環境軟件broadband 寬帶,[台/港]寬頻broken link 斷鏈browser 瀏覽器buffer 緩存器,[台/港]緩衝器bulletin board system 公告牌系統,電子公告系統,電子公告欄,電子佈告系統,[台]電子佈告欄bus 總線,匯流排bus network 總線網,[港]幹線網絡byte 字節,[台]位元組,數元組byte code 字節碼CC-MARC format (Chinese machine readable cataloging format) [台]中國機讀編目格式cable modem 線纜?#123;制解?#123;器,[港]電纜數據機calendar server 日歷服務器call on motion 動態監測cascading style sheets 層疊樣式表,串接樣式表,級聯風格表單CASE (compter aided software engineering) 計算機輔助軟件工程,[港]電腦軟件輔助工程case sensitive 區分大小寫CCCII (Chinese Character Code for Information Interchange) 漢字信息交換碼,[台]漢字資訊交換碼,中文資訊交換碼CD-E (compact disc-erasable) [台/港]可擦除式光碟CD-I 交互式光盤CD-R (compact disc-recordable) 光盤刻錄機,[港]光碟燒錄機CD-ROM 光盤,唯讀光盤,只讀光盤,[台/港]光碟,唯讀光碟CD-ROM drive 光盤驅動器,[港]光碟機,[台]唯讀光碟機CD-RW (compact disc-rewritable) 可擦寫刻錄機,[港]可重寫光碟燒錄機CDMA (code division multiple access) 碼分多址certificate server 認證服務器CERNET (China Education and Research Network) 中國教育和科研計算機網CGI (common gateway interface) 通用網關接口,公用網關接口,公共網關接口channel definition format 通道定義格式,頻道定義格式character 字符,[台]字元China Education and Research Network 中國教育和科研計算機網China machine readable cataloging format 中國機讀目錄格式China MARC format (China machine readable cataloging format)中國機讀目錄格式Chinanet 中國公用計算機交互網Chinese Character Code for Information Interchange 漢字信息交換碼,[台]漢字資訊交換碼,中文資訊交換碼Chinese machine readable cataloging format [台]中國機讀編目格式Chinese MARC format (Chinese machine readable cataloging format) [台]中國機讀編目格式CIMS (computer integrated manufacturing system) 計算機集成制造系統click 點擊,[港]按掣client 客戶,客戶機,客戶端,[台]客戶端,用戶端,用者端CMOS RAM (complementary metal oxide semiconductor random access memory)互補金屬氧化物半導體隨機存儲器code division multiple access 碼分多址code snippet 代碼片斷cold link 冷鏈接collabra 新聞閱讀器collabra server 新聞組服務器COM (component object model) 組件對象模式,組件對象模型common gateway interface 通用網關接口,公用網關接口,公共網關接口compact disc-erasable [台/港]可擦除式光碟compact disc-recordable 光盤刻錄機,[港]光碟燒錄機compact disc-rewritable 可擦寫刻錄機,[港]可重寫光碟燒錄機compatibility 兼容性,[台]相容性,互換性complementary metal oxide semiconductor random access memory 互補金屬氧化物半導體隨機存儲器component object model 組件對象模式,組件對象模型computer aided software engineering 計算機輔助軟件工程,[港]電腦軟件輔助工程computer integrated manufacturing system 計算機集成制造系統computer supported cooperative work 計算機支持的協同工作,[台]電腦輔助群體合作computer-to-plate 電腦直接製版技術computing 計算corporate user [港]公司用戶cracker 闖入者,[港]破網客cross-platform 跨平臺cross platform extension 跨平臺擴展器CSCW (computer supported cooperative work) 計算機支持的協同工作,[台]電腦輔助群體合作CSS (cascading style sheets) 層疊樣式表,層疊樣式單,串接樣式表,級聯風格表單cyber cash 電子貨幣cyberspace 信息空間,電腦空間,網絡空間DDAB (digital audio broadcasting) 數字音頻廣播,[港]數碼音頻廣播,數字音訊廣播data 數據,[台]資料data exchange interface 數據交換接口data mining 數據開發,數據採集,數據採掘,[台]資料探勘,[港]數據開拓data sharing 數據共享data warehouse 數據?#125;庫,[台]資料?#125;儲data warehousing [港]數據貯存database 數據庫,[台]資料庫,資料基daughter card 子卡deadlock 死鎖,[台]死結,停滯debug 排錯,[台]除錯,[港]偵錯,除蟲demand paging 請求?#123;頁,[台]需量播叫DEN (directory enabled network) 目錄驅動網絡dense wavelength division multiplexing 高密度波分多路?#125;用,密集波分多路?#125;用,[港]密集波分?#125;用技術destination document 目的地文件DHCP (Dynamic Host Configuration Protocol) 動態主機配置協議,[港]動態主機配置協定DHTML (dynamical hypertext markup language) 動態超文本置標語言digerati [港]數位精英digital audio broadcasting 數字音頻廣播,[港]數碼音頻廣播,數字音訊廣播digital library 數字化圖書館,數字圖書館,[台]數位圖書館,電子圖書館,[港]數碼圖書館digital loop carrier [台]數位迴路載波器digital nervous system 數字神經系統,[港]數位神經系統digital right management 數字內容權利保護,數碼權利管理,[港]數碼權益管理digital signal processor 數字信號處理器digital subscriber line 數字用戶線,[港]數碼用戶線路digital video disc 數字視盤,[港]數碼影像光碟,數碼視像光碟,數碼影碟direct memory access 直接內存存取directory 目錄,[台]目錄,指南directory enabled network 目錄驅動網絡directory server 目錄服務器directory service 目錄服務,名錄服務DIS (distri but ed interactive simulation) 分佈式交互仿真disassembler 反匯編,[台]分解器diskette 軟磁盤,[台]軟磁片,[港]軟磁碟distri but ed interactive simulation 分佈式交互仿真。

  1. 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
  2. 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
  3. 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。

Rebecca Fiebrink10 March 2005An Overview of Work by Pachet and Aucouturier on Timbre Similarity IntroductionIn the last few years, there has been much research into developing frameworks for electronic music distribution and browsing systems that can best meet users’ needs. One vein of this research involves computing perceptually-based measures of music similarity. François Pachet and Jean-Julien Aucouturier, two researchers from the Sony Computer Science Laboratory in Paris, have contributed significantly to this body of work. This review outlines their main contributions to research on timbre similarity in particular.MotivationAucouturier and Pachet’s work on timbre similarity is motivated by the growing area of Electronic Music Distribution (EMD). EMD allows large numbers of music selections to be distributed to large user populations, but to be effective, it must be accompanied by means for users to efficiently browse through these electronic music collections. Aucouturier and Pachet argue that incorporating perceptual measures of musical similarity, specifically timbre similarity, can facilitate browsing through EMD systems. Musical taste is often associated with timbre, and timbre similarity is a useful and natural way to build relationships between music selections (Aucouturier and Pachet 2002a).Initial WorkTheir first work toward a timbre similarity system, published in 2002, involved the use of Mel Frequency Cepstral Coefficients (MFCCs) to compute a high-level timbre descriptor for each musical selection. This descriptor was built by finding the first eight MFCCs for every 50 milliseconds of audio and modeling the set of all MFCCs in the song as a 3-state Gaussian Mixture Model (GMM). The similarity between two songs is inversely related to the distance between the GMMs of the two songs, and this distance was computed by sampling using 1000 samples. The compact GMM information could be stored with each song in a database, and a similarity matrix could be computed offline for all pairs of songs for quick lookup by a user (Aucouturier and Pachet 2002a; 2002b).Aucouturier and Pachet evaluated the performance of the 2002 system favorably. The system often judged selections by the same artist or in the same genre to have similar timbre, which is to be expected for any timbre similarity measure. Additionally, the system proposed timbre matches such as a piece by Beethoven with a Beatles song. The authors described such matches as “interesting,” and argued that it was on those matches that would not be proposed based on artist or genre metadata alone that a timbre similarity measure proves most useful. There is difficulty inherent in testing a system such as this where no ground truth exists, but a study comparing this system to human listeners demonstrated agreement on similarity 80% of the time (Aucouturier and Pachet 2002a; 2002b).CUIDADO and the Music BrowserThis system was implemented within the European CUIDADO (Content-based Unified Interfaces and Descriptors for Audio/music Databases Available Online) project framework. This larger project, which lasted from 2001 to 2003, focused on music description structures, the development of extractors for high-level audio information, and the implementation of the Sound Palette and Music Browser applications (Vinet et al. 2002). 17, 075 popular music selections and associated metadata were accessible from the Music Browser, and work on the Browser continued through the duration of the CUIDADO project (Pachet et al. 2004). As part of their initial work, Aucouturier and Pachet (2002a; 2002b) integrated the timbre similarity measure so that users could directly search for songs that matched the timbre of a given song or generate playlists from a set of constraints, including constraints on timbre.Similar Work Through 2003Pampalk, Dixon, and Widmer’s paper discussed five perceptual music similarity measures, one of which was Aucouturier and Pachet’s 2002 system. While not all measures dealt specifically with timbre similarity, several also used MFCCs in similar computations. Aucouturier and Pachet’s system appeared to work relatively slowly but performed better than average (Pampalk, Dixon, and Widmer 2003).Improvements to the 2002 SystemIn 2004, Aucouturier and Pachet conducted a series of tests varying the algorithms and parameters used in their first system and evaluated the results within the Music Browser. They examined the extent of the improvements made possible by increasing the signal sampling rate and the GMM sampling rate, replacing GMM sampling with Earth Mover’s Distance, adjusting the number of MFCCs and GMM components, and changing the analysis window size. Even when they used their discovered optimum parameter values, they found that the system performance improved by only 16%. They also experimented with using a variety of speech processing algorithms, which offered at best a 2% increase, and they tried using hidden Markov models instead of GMMs, which offered no improvement (Aucouturier and Pachet2004a; 2004b).As a result of these tests, they concluded that little improvement was likely past 65% precision using the existing system framework. It is notable that this precision value is somewhat conservative, as they only considered same-genre matches to be correct for the purposes of evaluation. However, false-positives still seemed to be an issue in the 2004 system, and the authors proposed that further improvements might best be made through a greater focus on timbre perception. For instance, some frames of an audio signal might be more important than others in determining a piece’s perceived overall timbre quality, and some timbres may be more salient than others (Aucuturier and Pachet 2004a; 2004b).ConclusionsThe above studies suggest that timbre similarity systems, though in their infancy, can already provide us with effective and efficient supplements to existing music recommendation and browsing systems. However, existing systems based on MFCCdistributions are far from perfect, and their evaluation and improvement are frustrated by the difficulty of objective evaluation and by open questions regarding human timbre perception.ReferencesAucouturier, J., and F. Pachet. 2002a. Finding songs that sound the same. Proceedings of the First IEEE Benelux Workshop on Model Based Processing and Coding ofAudio, 91–98.———. 2002b. Music similarity measures: What’s the use? Proceedings of the International Conference on Music Information Retrieval.———. 2004a. Improving timbre similarity: How high’s the sky? Journal of Negative Results in Speech and Audio Sciences 1 (1).———. 2004b. Tools and architecture for the evaluation of similarity measures: Case study of timbre similarity. Proceedings of the International Conference on Music Information Retrieval.Pachet, F., A. La Burthe, A. Zils, and J. Aucouturier. 2004. Popular music access: The Sony music browser. Journal of the American Society for Information Science 55(12): 1037–44.Pampalk, E., S. Dixon, and G. Widmer. 2003. On the evaluation of perceptual similarity measures for music. Proceedings of the 6th International Conference on DigitalAudio Effects, 6-12.Vinet, H., P. Herrera, and F. Pachet. 2002. The CUIDADO project. Proceedings of the International Conference on Music Information Retrieval.。

相关文档
最新文档