计算机英语论文
计算机英语论文英文版

E-commerce in China Co mputer Engli sh09计科1班201190504张小倩Electronic CommerceElectronic Commerce, referres to as the EC. E-commerce is a wide range of commercial trade activities in the the Internet around the world,based on browser / server application mode, both buyers and sellers are not met to develop various business activities, consumers online shopping, business to business model for online transactions between households and online electronic payments, as well as a variety of business activities, trading activities, financial activities and related service activities.Some people find it useful to Categorize electronic commerce by the types of entities particpating in the transactions or business processes. The e-commerce model refers to using the Internet to carry out operations achieved operating income; The traditional view is that enterprise e-business models, summarized as: B2C (Business to Consumer), B2B (Business to Business), C2B (Consumer to Business), C2C (Consumer to Consumer), B2G (Business to Government), BMC (Business Medium Consumer), ABC (Agents Business Consumer) seven kind of business model.The three categories that are most connonly used are: Consumer shopping on the Web,often called business-to-consumer(or B2C)Transactions conducted between businesses on the Web,often called business-to- business(or B2B)Transactions and business processes that companies,governments,and other organizations undertake on the Internet to support selling and purchasing activities With the rapid development of the domestic Internet, the numbers of users increase, the use of the Internet for online shopping and consumer bank card payment gradually come to our life, the market share is also growing rapidly, e-commerce sites are endless.From the classification of a new point of view to analyze. From the traditional differences in point of view of the type of the body of the e-commerce activities of the e-commerce activities classify, To develop enterprises e-commerce activities to a certain extent lacks of significance, because enterprises can be easier to know are the four e-commerce model, but can not own the revelation of how to conduct business activities derive. And the "B" side here on behalf of the enterprise may be wondering whatever type people. What will be different, so the problem complicated by the People will not only ask four types of e-commerce model differences between different types of "B", also ask the four modes of e-commerce activities.In fact, the e-commerce model that businesses or individuals make money through the network mode. When research it to make money, the behavior by whom is not important, the important thing is whether it is who will carry out e-commerce to make money from the network, he will take the inevitable pattern of behavior. These patterns of behavior is our the real goal of studying.Profitting model of e-commerce project can be attributed to the following three points: The first is the use of existing resources. For example: a garment enterprise sells their products through the network, a marketing consultancy firm provides consultancy services through the network , portal uses the huge traffic to sell advertising space.For this mode of e-commerce enterprise, provides customers with good products, find the right sales channels and the necessary promotion on the line.Second, the use of accumulated some resources. For example, the massive music, music website known online, on the site of the Listening massive English audio lectures onlinemassive video lectures.For this mode of e-commerce enterprise, as long as the accumulated wealth of resources need to build a good platform and you can increase the intensity of promotional success, paid membership.Third, taking advantages of the convergence of two visitors resources. For example, Taobao and Alibaba brings together buyers and sellers of commodities resources, the task of Chinese website brings together buyers and sellers of labor resources, Regarding as soft paper advertising alliance brings together buyers and sellers of advertising spaces soft paper resources, Zhaopin network brings together job seekersand recruiters information resources, online games, where are many games.For this mode of e-commerce enterprise, the need to build a good platform, and two kinds of visitors are attracted by a strong promotional platform-oriented, usually the starting stage are at the same time to take the free strategy with two visitors.To date, the most charm of the e-commerce, is to be freed from the rent costs of the traditional market, warehousing costs, staff time, distance, and other hardware conditions. That will be able to share the business opportunities around the world for a second time, the supply-side and demand-side information docke. And saving time costs and communication costs to find each other in order to complete the transaction within the shortest possible time. Improving the efficiency, profitability is to increase the speed and profitability. But the most critical mention to operate the e-commerce, we can not see the immediate benefits, while ignore the long-term gains. So we want to be innovatived, mobile e-commerce, not only to provide electronic shopping environment, but also provide a new sales and distributionchannels.Therefore, the development of e-commerce marketing of Chinese enterprises own industry characteristics, the behavioral characteristics of the target market of consumers, the economic strength of the enterprise, marketing the state of the environment, and other factors to the development of the corporate marketing objectives, select the products for Internet transactions, use network toolsmarketing to plan, select the appropriate marketing of financial intermediaries to conduct online transactions and online tools for data statistics and evaluation, timely adjustment of the strategy to win market dominance. At this stage, the combination of conditions, tracke technology, promoting development, while protecting market resources and national culture, the path of sustainable development, which is fundamental to development.References:[1]The Present Situation of Chellona's E-commerce and Its Future Development).Journal of Yantai University( Phellolosophy and Social Science Edition)][2]The Actuality and Expectation of Electronic Business Payment in Chellona .Journal of Chongqing RTV University][3]Present Situation and Development of Electronic Commerce .Lin Jianxia[4]"Chinese enterprise e-commerce development strategy”, Peking University Press, 2001[5] Vision of affairs on the growth in China's e-commerce.。
计算机英语论文(中英双语)[精华]
![计算机英语论文(中英双语)[精华]](https://img.taocdn.com/s3/m/93e7e1e19f3143323968011ca300a6c30c22f1ff.png)
稀疏表示计算机视觉和模式识别从抽象技术的现象已经可以开始看到稀疏信号在电脑视觉产生重大影响,通常在非传统的应用场合的目标不仅是要获得一个紧凑的高保真度表示的观察信号,而且要提取语义信息。
非常规词典在字典的选择中扮演了重要的角色,衔接的差距或学习、训练样本同来获得自己提供钥匙,解出结果和附加语义意义信号稀疏表示。
理解这种非传统的良好性能要求词典把新的算法和分析技术。
本文强调了一些典型例子:稀疏信号的表现如何互动的和扩展计算机视觉领域,并提出了许多未解的问题为了进一步研究。
稀疏表现已经被证明具有非常强大的工具,获取、表示、压缩高维信号的功能。
它的成功主要是基于这个事实,即重要类型的信号(如声音和图像,稀疏表示很自然地就固定基地或串连这样的基地。
此外,高效、大概有效算法说明基于凸优化一书提供了计算这样的陈述。
虽然这些应用在经典信号处理的铺垫下,已经可以在电脑视觉上形成一个我们经常更感兴趣的内容或语义,而不是一种紧凑、高保真的表示。
一个人可能会理所当然地知道是否可以有用稀疏表示为视觉任务。
答案很大程度上是积极的:在过去的几年里,变化和延伸的最小化已应用于许多视觉任务。
稀疏表示的能力是揭示出语义信息,大部分来自于一个简单但重要的性质数据:虽然照片所展示的图像是在非常高自然的空间,在许多同类应用中图像属于次级结构。
也就是说他们在接近低维子空间或层次。
如果发现一个收集的样本分布,我们理应期望一个典型的样品有一个稀疏表示理论的基础。
然而,想要成功地把稀疏表示应用于电脑视觉,我们通常是必须面对的一个额外的问题,如何正确选择依据。
这里的数据选择不同于在信号处理的传统设置,基于指定的环境具有良好的性能可以被假定。
在电脑视觉方面,我们经常要学习样本图像的任务词典,我们不得不用一个连贯的思想来贯穿工作。
因此,我们需要扩展现有的理论和稀疏表示算法新情况。
自动人像识别仍然是最具有挑战性的应用领域和计算机视觉的难题。
在理论基础实验上,稀疏表示在近期获得了显著的进展。
有关计算机的英语文章

有关计算机的英语文章众所周知,计算机辅助教学在外语教学中起着越来越重要的作用。
随着学校的软硬件配备的不断完善,越来越多的外语教师开始从事计算机辅助教学的实践和研究。
下面是店铺带来的有关计算机的英语文章,欢迎阅读!有关计算机的英语文章篇一第三次计算机革命浪潮悄然来袭We have entered a new age of embedded, intuitive computing in which our homes, cars, stores, farms, and factories have the ability to think, sense, understand, and respond to our needs. It's not science fiction, but the dawn of a new era.我们正在迈入可穿戴、直觉式计算的新时代。
房屋、汽车、商店、农场、工厂,这些东西都将具备思考、感知和行动的能力。
这不是科幻小说中的场景,而是我们即将进入的新时代。
Most people might not realize it yet, but we are already feeling the impact of what's known as the third wave of computing. In small but significant ways it is helping us live safer, healthier, and more secure lives. If you drive a 2014 Mercedes Benz, for example, an "intelligent" system endeavors to keep you from hitting a pedestrian. A farmer in Nigeria relies on weather sensors that communicate with his mobile device. Forgot your medication? A new pill bottle from AdhereTech reminds you via text or automated phone messages that it's time to take a pill.大多数人可能还没有意识到,我们已经感受到第三次计算机革命的影响。
浅议计算机英语论文范文

浅议计算机英语论文范文计算机英语是计算机专业学生的必修的一门专业基础课。
下面是店铺为大家整理的计算机英语论文,供大家参考。
计算机英语论文范文一:职校计算机英语教育状况与途径摘要:总之,随着计算机科学技术的飞速发展,计算机英语也越来越显现出它的重要性,作为教师我们只有不断探索和改进英语教学方法,不断学习,增强自身的业务素质,才能把计算机英语这门课教好,才能使计算机英语在学生学习计算机专业课的过程中真正起到工具和助手的作用。
从而达到相关专业的培养目标,增强中职院校毕业生在就业之后的就业竞争力。
关键词:计算机;英语教育计算机英语课这门课是中职院校计算机专业所开设的主要文化课之一,学好这门课程对于他们学好其他的计算机专业课有很大的帮助。
尤其是在当前我国各地技术工人用工紧缺的大背景下,作为一名中等职业学校的毕业生如果具有较好的英语应用能力将能够帮助他们毕业后在今后工作的道路上发展的更加顺利。
但是,当前中职院校的英语教学现状不容乐观,存在一些无法回避的问题。
1中职院校的英语教学现状分析1.1生源问题招生生源普遍不好,如今的中职院校的招生由于各院校之间的竞争等因素使得学生生源质量急剧下降,就文化课而言,有部分中职学生甚至连最基本的文化基础课都没有学好,更谈不上养成了良好的学习和行为习惯,在这方面最突出的表现就是英语基础普遍较差。
对英语学习没有兴趣。
更有甚者连二十六个英文字母都写不全,再加上从心理上厌恶甚至抵触英语的学习。
学习稍好些的同学也只是认识一些简单的日常常用单词,掌握的词汇量普遍较少,更没有养成良好的学习习惯。
1.2教材问题在教材的选取方面,如今的计算机专业英语教材往往较为陈旧,与现在飞速发展的计算机科学技术严重脱节,缺乏最新的科技动态和流行术语等,这就使得很大一部分学生失去了继续学习英语的兴趣,让他们误以为即使是学了,将来对他们的专业学习也没有多大帮助。
导致一些学生干脆放弃了对计算机英语这门课的学习。
关于计算机的英语文章

关于计算机的英语文章随着现代信息技术的迅猛发展,计算机已经广泛地应用到社会的各行各业,人们渴望学习这种“人类通用智力工具”。
下面是店铺带来的关于计算机的英语文章,欢迎大家阅读!关于计算机的英语文章篇一系统软件Software refers to computer programs. Programs are the instructions that tell the computer how to process data into the form you want. There are two kinds of software: system software and application software.软件指的是计算机程序。
程序是告诉计算机如何将数据处理成你想要的形式的指令。
有两种软件:系统软件和应用软件。
System software is a collection of programs that enables application software to run on a computer system's hardware devices, it is background software and includes programs that help the computer manage its own internal resources.系统软件是指能让应用软件在计算机系统硬件设备上运行的程序的集合,它是后台软件并且包括帮助计算机管理自己内部资源的程序。
Application software is a specialized programs that enables the user toaccomplish specific tasks.应用软件是让用户能够完成特定任务的专门程序。
In this text, we mainly discuss system software.System software consists of four kinds of programs: bootstrap loader, diagnostic routines, basic input-output system, and operating system. Among these four parts, the operating system is we most concerned with, whith helps manage computer resources. Most important operating systems are: Windows, Windows NT, OS/2, Macintosh, and Unix.在这一节中,我们主要讨论系统软件。
计算机专业英语论文

小论文(中英文对照,注明参考文献,至少一篇英文参考文献):(1)试论计算机硬件前沿技术可以通过查阅资料了解目前计算机硬件的前沿技术,做一些综述性介绍,也可以针对某一个前沿技术进行详细介绍,如3D打印机、Kinect等的构造、工作原理及应用。
还有像存储设备,DNA存储设备,可手撕的U盘等等。
关键词:Computer hardware;3D printer;Kinect;DNA storage device(2)论计算机网络技术以网络的新应用,新的网站制作工具,物联网技术以及网络安全等为方向,选择其一,查阅资料,进行说明论述。
关键词:Network;Website establishment;Internet of things;Network security (3)Android应用程序设计介绍结合网络上的一些介绍资料,了解一些Android开发的小游戏或小应用,可以从Android 平台介绍,到以简单的应用程序为例的设计过程介绍,以及Android程序的市场前景等方面进行论述。
关键词:Android application development;Android platform;Small games(4)数据可视化研究方向初探我们前面课上也看过几个这方面的公开课视频,也可以再到网络上查找相关资料,找到一两个点写一写,以信息图形、信息可视化、科学可视化、统计图形等为关键词,也可以结合实例论述其应用意义。
关键词:Information graphics;Information visualization;Scientific visualization;Statistical graphics(5)游戏程序设计语言介绍结合你们平时玩的一些游戏,了解其开发语言,并作一些初步介绍,C语言、C++、Java、Matlab等等,可能还涉及到一些调用的图形库openGL、程序接口Direct X等,比较其异同。
计算机英语毕业论文

计算机英语毕业论文计算机英语用语增进了用户亲切感的原因之一是隐喻的使用。
把新技术比喻成人人熟知的旧东西对承受计算机压力(technostress)的人有很大帮助。
下面是店铺给大家推荐的计算机英语毕业论文,希望大家喜欢!计算机英语毕业论文篇一《计算机英语新用语》摘要:随着计算机科学技术的发明和普及,出现了大量的新英语词汇,还使许多原有的英语词被赋予新意。
计算机英语新词汇有其特点、结构和变化,也有一些认识、学习和运用的规律。
本文就计算机英语新用语进行了阐述。
关键词:计算机英语新词汇隐喻结构变化计算机的发展日新月异,人们不可避免地要与计算机打交道。
现在如果你想真正地掌握英语这门语言,就必须熟悉那些随处可见的新计算机英语词汇。
例如,你若是天天坐在电脑桌前,在英语中被称为mouse potato;或者你对计算机新技术感到紧张不安则被称为technophobe。
值得庆幸的是,大多数计算机英语用语并不难学,一方面是因为其中的许多词已经出现在人们的语言中了,像汉语中mouse译为鼠标;德语与computer相对应的词是Computer;西班牙语则是computador。
另一方面,计算机英语新词汇的丰富多彩也是人们容易学习的原因。
比如一些词语snail mail(传统书信而不是电子邮件),或wysiwyg(what-you-see-is-what-you-get你看到的就是你得到的),会让第一次听说的人发笑。
计算机英语用语增进了用户亲切感的原因之一是隐喻的使用。
把新技术比喻成人人熟知的旧东西对承受计算机压力(technostress)的人有很大帮助。
因为许多人害怕使用电脑,隐喻对帮助用户适应计算机技术起着重要作用,例如,cut和paste(剪贴)计算机数据时,人们会想到纸张的使用;看到desktop,file,folder,recycle bin,wallpaper等词时,人们会想到自己熟悉的办公室。
计算机隐喻很有趣,因为许多与主题相关,像办公室主题。
计算机英语论文3000字(2)

计算机英语论文3000字(2)计算机英语论文3000字篇三浅谈计算机英语的词汇变化词是一个语言表达单位,离开了词汇,语言就空洞无物。
由此看来,词的重要性也是不言而喻了。
语言是随着社会的发展而发展变化的。
随着社会的发展,人的观念日渐改变,词的运用变化也随之而产生。
近几年,信息技术日新月异地发展,新术语层出不穷。
本文以计算机英语新词为实例来探讨计算机英语词汇与日常词汇的区别,以及在计算机英语词汇中所呈现出的词汇变化规则。
一、计算机英语词汇与日常词汇的比较计算机英语是专门用途英语(English for Special Purposes)大家族里的一名重要成员。
它以计算机和英语的基本知识为基础,一般用于介绍最新计算机的基础知识、硬件知识、软件系统、网络知识与应用、网络安全、程序设计、计算机病毒、和多媒体等,以及一些最新的研究成果和动态。
计算机英语与一般英语既相互联系, 又相互区别。
那么,这些运用在计算机专业中与运用在日常用语中的同一个英语单词在含义上是不是相同呢?首先,让我们来看看以下几个例子:1.bus在日常用语中,bus 的意思是“公共汽车”。
例如:I usually go to school by bus.我通常乘公共汽车去上学。
而在计算机英语中,bus 的意思是“总线”。
例如:System bus is a set of lines that facilitates all communication between the individual major components of a computer.系统总线是用于在计算机各个主件之间进行通讯的一组线。
2.memory在日常用语中,memory的意思是“记忆,记忆力”。
例如:His short-term memory was damaged in the accident.他的短时记忆在事故中受到了损害。
而在计算机英语中,memory的意思是“存储器,内存”。
- 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
- 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
- 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。
学号09710128计算机英语论文书名:计算机网络(第四版)作者:AndrewS.T anenbaum出版社:清华大学出版社出版时间:2004年8月学生姓名袁璇班级计算机1班成绩指导教师(签字)电子与信息工程系2011年10月8日Uses of Computer NetworksBefore we start to examine the technical issues in detail, it is worth devoting some time to pointing out why people are interested in computer networks and what they can be used for. After all, if nobody were interested in computer networks, few of them would be built. We will start with traditional uses at companies and for individuals and then move on to recent developments regarding mobile users and home networking.1.Business ApplicationsMany companies have a substantial number of computers. For a example,a company may have separate computers to monitor production, keep track of inventories, and do the payroll. Initially, each of these computers may have worked in isolation from the others, but at some point, management may have decided to connect them to be able to extract and correlate information about the entire company.Put in slightly more general form, the issue here is resource sharing, and the goal is to make all programs, equipment, and especially data available to anyone on the network without regard to the physical location of the resource and the user. An obvious and widespread example is having a group of office workers share a common printer. None of the individuals really needs a private printer, and a high-volume networked printer is often cheaper, faster, and easier to maintain than a large collection of individual printers.However, probably even more important than sharing physical resources such as printers, scanners, and CD burners, is sharing information. Every large and medium-sized company and many small companies are vitally dependent on computerized information. Most companies have customer records, inventories, accounts receivable, financial statements, tax information, and much more online. If all of its computers went down, a bank could not last more than five minutes.A modern manufacturing plant, with a computer-controlled assembly line, would not last even that long. Even a small travel agency or three-person law firm is now highly dependent on computer networks for allowing employees to access relevant information and documents instantly.For smaller companies, all the computers are likely to be in a single office or perhaps a single building, but for larger ones, the computers and employees may be scattered over dozens of offices and plants in many countries. Nevertheless, a sales person in New Y ork might sometimes need access to a product inventory database in Singapore. In other words, the mere fact that a user happens to be 15,000 km away from his data should not prevent him from using the data as though they were local. This goal may be summarized by saying that it is an attempt to end the ''tyranny of geography.''In the simplest of terms, one can imagine a company's information system as consisting of one or more databases and some number of employees who need to access them remotely. In this model, the data are stored on powerful computers called servers. Often these are centrally housed and maintained by a system administrator. In contrast, the employees have simpler machines, called clients, on their desks, with which they access remote data, for example, to include in spreadsheets they are constructing. (Sometimes we will refer to the human user of the client machine as the ''client,'' but it should be clear from the context whether we mean the computer or its user.) The client and server machines are connected by a network, as illustrated in Fig. 1-1. Note that we have shown the network as a simple oval, without any detail. We will use this form when we mean a network in the abstract sense. When more detail is required, it will be provided.This whole arrangement is called the client-server model. It is widely used and forms the basis of much network usage. It is applicable when the client and server are both in the same building (e.g., belong to the same company), but also when they are far apart. For example, when a person at home accesses a page on the World Wide Web, the same model is employed, with the remote Web server being the server and the user's personal computer being the client. Under most conditions, one server can handle a large number of clients.If we look at the client-server model in detail, we see that two processes are involved, one on the client machine and one on the server machine. Communication takes the form of the client process sending a message over the network to the server process. The client process then waits for a reply message. When the server process gets the request, it performs the requested work or looks up the requested data and sends back a reply. The client-server model involves requests and replies.A second goal of setting up a computer network has to do with people rather than information or even computers. A computer network can provide a powerful communication medium among employees. Virtually every company that has two or more computers now has e-mail (electronic mail), which employees generally use for a great deal of daily communication. In fact, a common gripe around the water cooler is how much e-mail everyone has to deal with, much of it meaningless because bosses have discovered that they can send the same message to all their subordinates at the push of a button.But e-mail is not the only form of improved communication made possible by computer networks. With a network, it is easy for two or more people who work far apart to write a report together. When one worker makes a change to an online document, the others can see the change immediately, instead of waiting several days for a letter. Such a speedup makes cooperation among far-flung groups of people easy where it previously had been impossible.Y et another form of computer-assisted communication is videoconferencing. Using this technology, employees at distant locations can hold a meeting, seeing and hearing each other and even writing on a shared virtual blackboard. V ideoconferencing is a powerful tool for eliminating the cost and time previously devoted to travel. It is sometimes said that communication and transportation are having a race, and whichever wins will make the other obsolete.A third goal for increasingly many companies is doing business electronically with other companies, especially suppliers and customers. For example, manufacturers of automobiles, aircraft, and computers, among others, buy subsystems from a variety of suppliers and then assemble the parts. Using computer networks, manufacturers can place orders electronically as needed. Being able to place orders in real time reduces the need for large inventories and enhances efficiency.A fourth goal that is starting to become more important is doing business with consumers over the Internet. Airlines, bookstores, and music vendors have discovered that many customers like the convenience of shopping from home. Consequently, many companies provide catalogs of their goods and services online and take orders on-line. This sector is expected to grow quickly in the future. It is called e-commerce (electronic commerce).2.Home ApplicationsIn 1977, Ken Olsen was president of the Digital Equipment Corporation, then the number two computer vendor in the world (after IBM). When asked why Digital was not going after the personal computer market in a big way, he said: ''There is no reason for any individual to have acomputer in his home.'' History showed otherwise and Digital no longer exists. Why do people buy computers for home use? Initially, for word processing and games, but in recent years that picture has changed radically. Probably the biggest reason now is for Internet access. Some of the more popular uses of the Internet for home users are as follows:Access to remote information.Person-to-person communication.Interactive entertainment.Electronic commerce.Access to remote information comes in many forms. It can be surfing the World Wide Web for information or just for fun. Information available includes the arts, business, cooking, government, health, history, hobbies, recreation, science, sports, travel, and many others. Fun comes in too many ways to mention, plus some ways that are better left unmentioned.Many newspapers have gone on-line and can be personalized. For example, it is sometimes possible to tell a newspaper that you want everything about corrupt politicians, big fires, scandals involving celebrities, and epidemics, but no football, thank you. Sometimes it is even possible to have the selected articles downloaded to your hard disk while you sleep or printed on your printer just before breakfast. As this trend continues, it will cause massive unemployment among 12-year-old paperboys, but newspapers like it because distribution has always been the weakest link in the whole production chain.The next step beyond newspapers (plus magazines and scientific journals) is the on-line digital library. Many professional organizations, such as the ACM () and the IEEE Computer Society (), already have many journals and conference proceedings on-line. Other groups are following rapidly. Depending on the cost, size, and weight of book-sized notebook computers, printed books may become obsolete. Skeptics should take note of the effect the printing press had on the medieval illuminated manuscript.All of the above applications involve interactions between a person and a remote database full of information. The second broad category of network use is person-to-person communication, basically the 21st century's answer to the 19th century's telephone. E-mail is already used on a daily basis by millions of people all over the world and its use is growing rapidly. It already routinely contains audio and video as well as text and pictures. Smell may take a while.Any teenager worth his or her salt is addicted to instant messaging. This facility, derived from the UNIX talk program in use since around 1970, allows two people to type messages at each other in real time. A multiperson version of this idea is the chat room, in which a group of people can type messages for all to see.Worldwide newsgroups, with discussions on every conceivable topic, are already commonplace among a select group of people, and this phenomenon will grow to include the population at large. These discussions, in which one person posts a message and all the other subscribers to the newsgroup can read it, run the gamut from humorous to impassioned. Unlike chat rooms, newsgroups are not real time and messages are saved so that when someone comes back from vacation, all messages that have been posted in the meanwhile are patiently waiting for reading. Another type of person-to-person communication often goes by the name of peer-to-peer communication, to distinguish it from the client-server model (Parameswaran et al., 2001). In this form, individuals who form a loose group can communicate with others in the group. Every person can, in principle, communicate with one or more other people; there is no fixed divisioninto clients and servers.In a peer-to-peer system there are no fixed clients and servers. Peer-to-peer communication really hit the big time around 2000 with a service called Napster, which at its peak had over 50 million music fans swapping music, in what was probably the biggest copyright infringement in all of recorded history (Lam and Tan, 2001; and Macedonia, 2000). The idea was fairly simple. Members registered the music they had on their hard disks in a central database maintained on the Napster server. If a member wanted a song, he checked the database to see who had it and went directly there to get it. By not actually keeping any music on its machines, Napster argued that it was not infringing anyone's copyright. The courts did not agree and shut it down.However, the next generation of peer-to-peer systems eliminates the central database by having each user maintain his own database locally, as well as providing a list of other nearby people who are members of the system. A new user can then go to any existing member to see what he has and get a list of other members to inspect for more music and more names. This lookup process can be repeated indefinitely to build up a large local database of what is out there. It is an activity that would get tedious for people but is one at which computers excel.Legal applications for peer-to-peer communication also exist. For example, fans sharing public domain music or sample tracks that new bands have released for publicity purposes, families sharing photos, movies, and genealogical information, and teenagers playing multiperson on-line games. In fact, one of the most popular Internet applications of all, e-mail, is inherently peer-to-peer. This form of communication is expected to grow considerably in the future. Electronic crime is not restricted to copyright law. Another hot area is electronic gambling. Computers have been simulating things for decades. Why not simulate slot machines, roulette wheels, blackjack dealers, and more gambling equipment? Well, because it is illegal in a lot of places. The trouble is, gambling is legal in a lot of other places and casino owners there have grasped the potential for Internet gambling. What happens if the gambler and the casino are in different countries, with conflicting laws? Good question.Other communication-oriented applications include using the Internet to carry telephone calls, video phone, and Internet radio, three rapidly growing areas. Another application is telelearning, meaning attending 8 A.M. classes without the inconvenience of having to get out of bed first. In the long run, the use of networks to enhance human-to-human communication may prove more important than any of the others.Our third category is entertainment, which is a huge and growing industry. The killer application here is video on demand. A decade or so hence, it may be possible to select any movie or television program ever made, in any country, and have it displayed on your screen instantly. New films may become interactive, where the user is occasionally prompted for the story direction with alternative scenarios provided for all cases. Live television may also become interactive, with the audience participating in quiz shows, choosing among contestants, and so on.On the other hand, maybe the killer application will not be video on demand. Maybe it will be game playing. Already we have multiperson real-time simulation games, like hide-and-seek in a virtual dungeon, and flight simulators with the players on one team trying to shoot down the players on the opposing team. If games are played with goggles and three-dimensional real-time, photographic-quality moving images, we have a kind of worldwide shared virtual reality.Our fourth category is electronic commerce in the broadest sense of the term. Home shopping is already popular and enables users to inspect the on-line catalogs of thousands of companies.Some of these catalogs will soon provide the ability to get an instant video on any product by just clicking on the product's name. After the customer buys a product electronically but cannot figure out how to use it, on-line technical support may be consulted. Another area in which e-commerce is already happening is access to financial institutions. Many people already pay their bills, manage their bank accounts, and handle their investments electronically. This will surely grow as networks become more secure.One area that virtually nobody foresaw is electronic flea markets (e-flea?). On-line auctions of second-hand goods have become a massive industry. Unlike traditional e-commerce, which follows the client-server model, on-line auctions are more of a peer-to-peer system, sort of consumer-to-consumer. Some of these forms of e-commerce have acquired cute little tags based on the fact that ''to'' and ''2'' are pronounced the same. The most popular ones are listed in Fig. 1-4. Some forms of e-commerce.No doubt the range of uses of computer networks will grow rapidly in the future, and probably in ways no one can now foresee. After all, how many people in 1990 predicted that teenagers tediously typing short text messages on mobile phones while riding buses would be an immense money maker for telephone companies in 10 years? But short message service is very profitable.Computer networks may become hugely important to people who are geographically challenged, giving them the same access to services as people living in the middle of a big city. Telelearning may radically affect education; universities may go national or international. Telemedicine is only now starting to catch on, but may become much more important. But the killer application may be something mundane, like using the webcam in your refrigerator to see if you have to buy milk on the way home from work.3.Mobile UsersMobile computers, such as notebook computers and personal digital assistants (PDAs), are one of the fastest-growing segments of the computer industry. Many owners of these computers have desktop machines back at the office and want to be connected to their home base even when away from home or en route. Since having a wired connection is impossible in cars and airplanes, there is a lot of interest in wireless networks. In this section we will briefly look at some of the uses of wireless networks.Why would anyone want one? A common reason is the portable office. People on the road often want to use their portable electronic equipment to send and receive telephone calls, faxes, and electronic mail, surf the Web, access remote files, and log on to remote machines. And they want to do this from anywhere on land, sea, or air. For example, at computer conferences these days, the organizers often set up a wireless network in the conference area. Anyone with a notebook computer and a wireless modem can just turn the computer on and be connected to the Internet, as though the computer were plugged into a wired network. Similarly, some universities have installed wireless networks on campus so students can sit under the trees and consult the library's card catalog or read their e-mail.Wireless networks are of great value to fleets of trucks, taxis, delivery vehicles, and repairpersons for keeping in contact with home. For example, in many cities, taxi drivers are independent businessmen, rather than being employees of a taxi company. In some of these cities, the taxis have a display the driver can see. When a customer calls up, a central dispatcher types in the pickup and destination points. This information is displayed on the drivers' displays and a beepsounds. The first driver to hit a button on the display gets the call.Wireless networks are also important to the military. If you have to be able to fight a war anywhere on earth on short notice, counting on using the local networking infrastructure is probably not a good idea. It is better to bring your own.Although wireless networking and mobile computing are often related, they are not identical, as Fig. 1-5 shows. Here we see a distinction between fixed wireless and mobile wireless. Even notebook computers are sometimes wired. For example, if a traveler plugs a notebook computer into the telephone jack in a hotel room, he has mobility without a wireless network. Combinations of wireless networks and mobile computing.On the other hand, some wireless computers are not mobile. An important example is a company that owns an older building lacking network cabling, and which wants to connect its computers. Installing a wireless network may require little more than buying a small box with some electronics, unpacking it, and plugging it in. This solution may be far cheaper than having workmen put in cable ducts to wire the building.But of course, there are also the true mobile, wireless applications, ranging from the portable office to people walking around a store with a PDA doing inventory. At many busy airports, car rental return clerks work in the parking lot with wireless portable computers. They type in the license plate number of returning cars, and their portable, which has a built-in printer, calls the main computer, gets the rental information, and prints out the bill on the spot.As wireless technology becomes more widespread, numerous other applications are likely to emerge. Let us take a quick look at some of the possibilities. Wireless parking meters have advantages for both users and city governments. The meters could accept credit or debit cards with instant verification over the wireless link. When a meter expires, it could check for the presence of a car (by bouncing a signal off it) and report the expiration to the police. It has been estimated that city governments in the U.S. alone could collect an additional $10 billion this way (Harte et al., 2000). Furthermore, better parking enforcement would help the environment, as drivers who knew their illegal parking was sure to be caught might use public transport instead.Food, drink, and other vending machines are found everywhere. However, the food does not get into the machines by magic. Periodically, someone comes by with a truck to fill them. If the vending machines issued a wireless report once a day announcing their current inventories, the truck driver would know which machines needed servicing and how much of which product to bring. This information could lead to more efficient route planning.Of course, this information could be sent over a standard telephone line as well, but giving every vending machine a fixed telephone connection for one call a day is expensive on account of the fixed monthly charge.Another area in which wireless could save money is utility meter reading. If electricity, gas, water, and other meters in people's homes were to report usage over a wireless network, there would be no need to send out meter readers. Similarly, wireless smoke detectors could call the fire department instead of making a big noise. As the cost of both the radio devices and the air time drops, more and more measurement and reporting will be done with wireless networks.A whole different application area for wireless networks is the expected merger of cell phones and PDAs into tiny wireless computers. A first attempt was tiny wireless PDAs that could display stripped-down Web pages on their even tinier screens. This system, called WAP 1.0 (Wireless Application Protocol) failed, mostly due to the microscopic screens, low bandwidth, andpoor service. But newer devices and services will be better with W AP 2.0.One area in which these devices may excel is called m-commerce (mobile-commerce) (Senn, 2000). The driving force behind this phenomenon consists of an amalgam of wireless PDA manufacturers and network operators who are trying hard to figure out how to get a piece of the e-commerce pie. One of their hopes is to use wireless PDAs for banking and shopping. One idea is to use the wireless PDAs as a kind of electronic wallet, authorizing payments in stores, as a replacement for cash and credit cards. The charge then appears on the mobile phone bill. From the store's point of view, this scheme may save them most of the credit card company's fee, which can be several percent. Of course, this plan may backfire, since customers in a store might use their PDAs to check out competitors' prices before buying. Worse yet, telephone companies might offer PDAs with bar code readers that allow a customer to scan a product in a store and then instantaneously get a detailed report on where else it can be purchased and at what price.Since the network operator knows where the user is, some services are intentionally location dependent. For example, it may be possible to ask for a nearby bookstore or Chinese restaurant. Mobile maps are another candidate. So are very local weather forecasts (''When is it going to stop raining in my backyard?''). No doubt many other applications appear as these devices become more widespread.One huge thing that m-commerce has going for it is that mobile phone users are accustomed to paying for everything (in contrast to Internet users, who expect everything to be free). If an Internet Web site charged a fee to allow its customers to pay by credit card, there would be an immense howling noise from the users. If a mobile phone operator allowed people to pay for items in a store by using the phone and then tacked on a fee for this convenience, it would probably be accepted as normal. Time will tell.A little further out in time are personal area networks and wearable computers. IBM has developed a watch that runs Linux (including the X11 windowing system) and has wireless connectivity to the Internet for sending and receiving e-mail (Narayanaswami et al., 2002). In the future, people may exchange business cards just by exposing their watches to each other. Wearable wireless computers may give people access to secure rooms the same way magnetic stripe cards do now (possibly in combination with a PIN code or biometric measurement). These watches may also be able to retrieve information relevant to the user's current location (e.g., local restaurants). The possibilities are endless.Smart watches with radios have been part of our mental space since their appearance in the Dick Tracy comic strip in 1946. But smart dust? Researchers at Berkeley have packed a wireless computer into a cube 1 mm on edge (Warneke et al., 2001). Potential applications include tracking inventory, packages, and even small birds, rodents, and insects.网址:/view/104bf188d0d233d4b14e69da.html。