基于java技术的web应用设计模型的比较研究 外文文献翻译
基于java的校园论坛网站的开发与设计外文翻译

附录1The application of AjaxSpend a few minutes using your application you selected(browser except),write it down to what user interaction,and then immediately back.For the sake of brevity,I give an example of electronic form,however,points involved here is general enough for various cases,the text editor.Well,we started.First in the spreadsheet to input some equalities,pay attention to,can interact in several ways:edit data,browsing the data using the keyboard and mouse,also can use the mouse to drag to re organize the data.I do these operations,the program gave me feedback.When moving the mouse,the cursor changes shape;when the mouse stops above,button bright;selected text can change color.When a window or dialog box is selected,and usually isnot the same,etc..These are the so-called"rich"interaction.Of course,there are still some room for improvement,but this is a good start.OK,a spreadsheet is a rich client program?Absolutely not.In a spreadsheet or similar desktop applications,business logic and data model is run in a closed environment.In this environment,they clearly understand each other,and can visit each other,and the environment outside of things,is unknown to them.What is the client?It is a separate process of mutual communication program,which is usually run on the server.In general,the server is always bigger than the client,ability,disposition is better,because the server is usually stored multitudeinformation.The client program enables the end users can view and modify the information,when multiple clients connected to the same server,can shareinformation between them.Shows a simple client/server architecture.In the n layer architecture in the modern,the server often and further the back-end server(such as a database)communication,so called"middleware"layeralso plays a role of client and server.End of our Ajax application in the chain,it is only as the client,therefore,for the convenience of discussion,we can put the whole n system as a labeled as"black box server".Spreadsheet applications I only need to manage its own saved a small amount of data in memory or in the local file system.If the design of well structure,couplingform data and it can be very loose,but I can't pass a network to split or sharethem through network.In this sense,the application of electronic form is not a client.The corresponding Web browser is a typical client,which communicate with the Web server,the request page.The browser has abundant functions,used tomanage user browsing behavior,the common function of the back button,the history list and tabbed browsing multiple documents etc..But when we put the site specific Web pages as an application,these general browsing function actuallyand application is,at best,such as spreadsheets and Windows began the relationship between button or the window list.We consider the application of modern Web.For the sake of simplicity,we chose" earth people know"online bookstore.Open the Amazon site in the browser,because before I visited,it will show me a friendlygreeting,somerecommended bibliography,and my purchase history information.Click on any one of the recommended bibliography,will go to another page(at this time,the page to refresh,within a few seconds I what also don't see).The new page is the information relevant to the book review:other books,second-hand books,offer the same author,and other books I read.In short,appears to be very rich,high degree of associated information in front of me.But for me,interactive way is to click on the hyperlink,and then fill in some forms.Suppose I at the keyboard accidentally fell asleep,wake up second days,if not refresh the page,I don't know"Harry Porter"series of books have been published,nor will my list from one page to another page,if I want to see morethings too,because I cannot change the local content area page size.I seem to be in the criticism of the Amazon interface,but it is not the case,I justtook it as an example.In fact,in the traditional Web development of the shackles,they have done very well.But compared to the spreadsheet,and the interaction model is undoubtedly too limited.Why Web is the application of modern still have so many limitations?The currentsituation has some reasonable technical reasons,we have to consider now.The blueprint for the Internet is all the computer in the world are connected,forming a huge computing resources.If the local data and remote invocationequated,then both the analysis of protein components or crack signals from outer space,users need not consider the physical location of the machines,the rest of the computation only pleasure.But unfortunately,the local call and remote invocation is something totally different.Under the current level of technology,the network communication is still a costly things(that is to say,is usually very slow,but unreliable).In the absence of a network called the situation,method and function of different data and theiroperations are located in the same local memory,to transfer data and return the results obtained are very direct.In a remote call,communication in the network at both ends of the two sides to send and receive data requires a lot of computation at the pared with the data back and forth on the line,these calculations require more time consuming.The transmission of a binary data,to go through many steps of coding and decoding,error checking,failure,packet retransmission split andreorganization,data into 0 and 1 binary signal,through the line(or wireless connection to the other party).In the local,call the function call request is encoded as an object,then the object is serialized as a series of bytes,the application layer protocol(usually HTTP)via the physical transmission medium(such as copper cable,optical fiber or radio)send out.On the remote machine,the application layer protocol decoding,the bytedeserialize the data obtained,to create a copy of the requested object.Then the data model is applied to the object and generates a response object.In order to make the response object is passed to the callback function local,all serialization deserialization operation,and the transport layer will be back again.Finally,the response object is passed to the function call local.This interactive process is very complex,but fortunately,it can be done.Modernprogramming environments such Java and Microsoft framework are built with this ability.However,the execution of remote calls,all these operations will still be in the internal execution.If we were using there mote invocation,performance will be affected.That is to say,a remote call is unlikely to have efficiency and local call.What is worse,the instability of network makes the efficiency loss is unpredictable,it is difficult to.In contrast,a local call to run on the local memory,will undoubtedly have an advantage more at this point.And so on,said remote call half a day,between this and the availability of software?The answer is,a relationship.A successful computer user interface must be able to at least level simulation weexperience in the real world.One of the basic rules of interaction is,when wepush,prick or poke about something,it will immediately response.Response timeas long as a little bit out a little,will make people confused,distracted,to shift thefocus from the task at hand to the user interface.Remote calls across the network,need to perform additional operations in great quantities,they tend to put the system to slow down,the user perceived delay.In desktop applications,only when the usability design is very bad,will appear this kind of makes users feel full of bug,unresponsive to the user interface,but in the application of network,what do not get a large number of such interface.Because the network delay is unpredictable,this kind of interface problems oftencome and go like a shadow,it is difficult to carry out the application responsetest.In other words,the network delay is the result of a common cause of the practical application of the interaction.User interface developers for network delay can only assume the worst.Say simply,is to try to make the user interface and network activities unrelated to.Programmers have already created a truly effective and proven solutions,tosolve this problem.To sell a Guan,let us into the real world.In the morning I will do,a very important is to wake my kids go to school.I can stand on the edge of the bed they toss up,chase them up and dressed,but thismethod is very time consuming,it takes me a lot of precious morning timeI want to wake up the children,have a look out the window,often neglected to feed the cat.After the children would ask me to breakfast.As the server process,the children always get up slowly.If I follow the synchronous interaction pattern,will they all day.However,as long as they mumble"I woke up",I can go to do other things,need to come back when they have a look.In computer terms,I need to do is for every child to establish an asynchronous process in a separate thread.After the start,the children will wake up in their ownthreads,the parent thread unnecessary synchronization wait,they afterwards will inform me(which is often asked me to eat).In the process they wake up,I don't need interaction and they,when they had been up and dressed myself,because I have reason to believe that they will do so soon.For any user interface,which is a long established practice,namely to createasynchronous thread,let it in the background who need to calculate a longtimetask,so that the user can continue to do other things.When starting this thread,it is necessary to block the user operation,but after a short period of time can beaccepted,will relieve congestion.Because of the existence of network delay,using asynchronous mode is a good practice to handle any time-consumingremote call.In fact,the network latency problems and solutions related to long-standing.In the old client/server mode,when the poor design of the client program met thehigh load of the server,the user interface will appear delay intolerable.Even in today's Internet era,when to switch the page,if the browser half the things not to,so this situation might be due to network delay caused by.The existing technical conditions,we have no way to remove the network delay,but at least onestrategy,that is the use of asynchronous processing remote calls,isn't it?Worse,for Web developers to do so there is a problem:HTTP protocol is a"request response"mode of the protocol.That is to say,the client requests a document,the server or a return to this document,or tell the client can not findthe document or allows a client to another place to find,also can tell which the client can use the local cache,and so on.To make a long story short,"request response"mode of the protocol is a one-way communication protocol.The clientinitiates a connection to the server,b ut the server can not initiates a connection to the client.Even when the next client,initiate the communication request,forgetful of the server can't remember this client is who(HTTP is a connectionless).Most Web developers to use modern programming language,for example,Java,PHP ,they are familiar with the user session(user session)concept,this is in fact the application server for a remedy can't maintain a connection state of the HTTP protocol.HTTP for the initial design goal well,using some clever processing,it can adapt to the beginning of the design did not consider theoccasion.But the key features of the asynchronous callback scheme of our clientis,will receive two notice,is a time in the thread creation,the other is a time in the end of the thread.The standard HTTP and the traditional Web application model can not provide these.The traditional Web application like Amazon,is built on the concept of the page.Show the user a document,which includes various links and form,the user canaccess further more documentation.This interaction model can support complex data sets on a large scale(like Amazon and other sites have demonstrated),which provides the user experience is enough to meet the needs of business.In ten years,this interaction model laid a deep imprint in our view of theapplication of Internet business.WYSIWYG interface(WYSIWYG)Web authoring tools,making the site more easily to be understood as a stack of pages.The framework of Web server using the state diagram conversion on the pagemodeling.no introduction,the traditional Web application that has been firmlybound in a page refresh operation,as if the refresh is behoove and inevitable,tried processing scheme for any asynchronous never.Of course,no doubt,the traditional Web application must not nothing is right..After all,Amazon in this interaction model to create a successful commercial applications.But this applies to the way Amazon does not necessarily apply to allpeople.Why do you say that?To understand this,we need to study the usermodel(usage pattern).A general discussion of the bicycle and SUV(SUV)merits meaningless.Because they have their own advantages and disadvantages--comfort,speed,fuel consumption or personal identity.Only discussed in particular use mode,this comparison is only meaningful.For example,is to in the rush hour through the center of the city,or to take the whole family,old and young to go on vacation,or just to find a shelter from the rain.In a similar situation like this,can we have a definite object in view to compare.For the user interface,it is the same with.Software usability expert Alan Cooper has written a lot of good articles aboutusage patterns,he defines two main uses:transient(transient)and exclusive(sovereign).Transient applications may use occasionally every day,butalways as a secondary activity,with a sudden.The contrast is sovereign applications,exclusive continued use of application to deal with the user for several hours a day.Many applications have a natural monopoly or transient properties.For example,a word processing software writing is a sovereign application,possible applications also use several transient,such as file management(file open andembed this function will often close the window),dictionary or spell checking tools(many word processing program is also embedded in these functions),andcolleagues contact email and chat tool.For software developers,text editor,debugger or IDE(integrated development environment)is the exclusive.Sovereign applications often use more frequently.Y ou know,a good userinterface is not visible.The measure of a good scale used frequently,is when theuser interface has obvious pause,it affects the user process.For example,from a directory to another directory file to 2 second pause,I can accept with pleasure;but if the two seconds is the place in my is full of passion for paintingsoftware to create an image,or I'm trying to debug a very difficult to deal with thegeneration of code certainly,this makes me feel very uncomfortable.Amazon is a transient application,eBay,Google and most large public Web applications are transient applications.Since the date of birth,the experts had predicted that the traditional desktop applications under Web impact.Over the past ten years,these have not occurred,why?Based on the Web page programfor transient applications is enough,but it is far from enough for a sovereign application.The starting of modern Web browsers and it's original point(a document from a remote server)has not matter,between them like a Swiss Army knife and neolithic hunting tools,it is a world of difference.A variety of interactive components,scripts and plug-ins,these years could not suppress the crazydevelopment,almost forced once again to create a new browsing experience.toprehistoric times visitbrowser.In 1993,netscape founded before the Marc Andreessen(founder of netscape)are lobbying Tim Berners-Lee(founder of Web,the W3C leader)et al.,cited good into a picture label is HTML.A few years ago,a few pioneers began to treat JavaScript as a serious programming language.But on the whole,more people still use it and those whomockwarning box"monkey tricks and click to win awards"advertising a classtogether.The browser wars brought JavaScript a misunderstood,sick children,Ajax can be viewed as his rehabilitation center.As long as the proper guidance,and thento frame it with appropriate,JavaScript will likely become the Internet model citizen.It can really enhance the practicability of Web application,and without forcing users to install additional software,or forcing users to abandon his beloved browser.To obtain mature tools are widely understood can help usachieve this goal.The back of the book design pattern is one such toolmentioned.The promotion and popularization of a new technology,is not only the technical matters,but also social behavior.Once the technology is mature,the people also need to understand how to use it.This step is often by using it to do our very familiar things start.For example,early bicycle called"Trojan wheel"or"pedalinghorse",on his feet tread the reaction force to move forward.As this technology is gradually accepted by the public,then inventors would invent a new way to use,add the pedal,brake,a chain wheel and tire.Each time the invention creation,made the bike in the shadow of more pale horse,that completely disappeared.The same process also occurs in the field of Web development.The technology behind the Ajax have the ability to Web pages into something new somethingcompletely different.Early uses of Ajax try to make Web pages is beginning to look like a"Trojan wheel"neither fish nor fowl.To comprehend the essence of Ajax,we have to forget about the Web page concept,that is to say,we have tobreak these years of experience.In the months after the Ajax officially named,such things have happened a lot.Ajax的应用花几分钟使用一下你选中的应用(浏览器除外),记下它用到了哪些用户交互,然后马上回来。
MVC框架中英文对照外文翻译文献

MVC框架中英⽂对照外⽂翻译⽂献中英⽂对照外⽂翻译⽂献(⽂档含英⽂原⽂和中⽂翻译)译⽂:Web 2.0下的Spring MVC框架摘要 - 当要建⽴丰富⽤户体验的WEB应⽤时,有⼤量的WED应⽤框架可以使⽤,却很少有该选择哪⼀种的指导。
WEB 2.0应⽤允许个体管理他们⾃⼰的在线⽹页,并能与其他在线⽤户和服务器共享。
这样分享需要访问控制器来实现。
然⽽,现有的访问控制器解决⽅案不是令⼈很满意。
因为在开放且由⽤户主导的WEB环境下,它满⾜不了⽤户的功能需求。
MVC框架是在所有的WEB开发框架中最受欢迎的。
模型-视图-控制器(MVC)是⼀种软件架构,如今被认为是⼀种体系结构在软件⼯程模式中使⽤。
该模式从⽤户界⾯(输⼊和演⽰)分离出了“领域逻辑”(基于⽤户的应⽤逻辑),它允许独⽴地开发,测试和维护每个分离的部分。
模型-视图-控制器(MVC)模型创建的应⽤分离为不同的层次应⽤,同时在每两者之间建⽴松散的耦合。
关键字 - Spring MVC, 结构, XStudio, SOA, 控制器I.绪论如何确切地定义⼀个⽹站为“WEB 2.0”的呢?关于这有着许多不同见解,使它很难精确地下⼀个确切的定论。
但当我们将所有的WEB开发框架过⼀遍之后它就会变得清晰了。
各种基于WEB开发的架构如下:●Ntier架构(Ntier Architecture)在软件⼯程中,多层架构(常被称为n-tier架构)是⼀种表⽰层,应⽤处理层和数据管理层在逻辑上分开处理的客户端-服务器架构。
例如,⼀个应⽤在⽤户与数据库之间使⽤中间件提供数据请求服务就⽤到了多层体系结构。
最为⼴泛应⽤的多层体系结构是三层架构。
N-tier 应⽤架构为开发者提供了⽤来创建了⼀个灵活且可复⽤的模型。
通过打破应⽤层次,开发者只需修改或添加⼀个特定的层,⽽不是要去重写⼀遍整个应⽤。
它需要有⼀个表⽰层,⼀个业务层或者数据访问层和⼀个数据层。
层(layer)和层(tier)之间的概念常常是可以互换的。
java英文参考文献.docx

java英文参考文献Java是一种可以撰写跨平台应用软件的面向对象的程序设计语言。
Java 技术具有卓越的通用性、高效性、平台移植性和安全性,广泛应用于PC、数据中心、游戏控制台、科学超级计算机、移动电话和互联网,同时拥有全球最大的开发者专业社群。
java英文参考文献范本一:[1] 冯燕奎, 赵德奎. JSP实用案例教程[M] 清华大学出版社, 2004, 5: 70-100[2] 王家华软件工程[M] 东北大学出版社2001年3月303页[3] 王宜贵软件工程[M] 北京:机械工业出版社,2002:20-79[4] 孙卫琴精通struts[M]电子工业出版社 2004年8月 50-70[5] 孙卫琴精通hibernate[M]电子工业出版社 2005年4月 100-120[6] 张洪斌 java2高级程序设计[M]中科多媒体出版社 2001年11月 85-90[7] Jim Arlow UML2.and the Unified Process[M]机械工业出版社 2006年6月 30-40[8] 林信良 spring2.0技术手册[M]电子工业出版社 2006年6月 50-100[9] 熊节、林仪明、张凯峰、陈玉泉等主编[《CSDN社区电子杂志 Java杂志》创刊号][10]《程序员》杂志 2007 年第4期[11] 耿祥义编著.JSP基础编程[M].清华大学出版社,2004.55-162[12]徐建波,周新莲.Web设计原理于编程技术[M].中南大学出版社,2005.185-193[13] 孙鑫编著.Java Web开发详解[M].电子工业出版社,2006.189-274[14] 林上杰,林康司编著.JSP2.0技术手册[M].电子工业出版社,2004.3-6[15] 萨师煊,王珊.数据库系统概论(第三版)[M].北京:高等教育出版社,1998.[16] 蔡剑,景楠.Java Web应用开发:J2EE和Tomcat[M].北京:清华大学出版社,2004.java英文参考文献范本二:[1]王海涛,-贾宗璞.基于Struts和Hibernate的Web应用开发[J].计算机工程,2011,37(9):[2]傅鹏,殷旻昊.基于Structs+Spring+Hibernate+Ajax技术的科研管理系统设计[J].软件导刊,2009, 8(1):135-136.[3]龚瑜江,红黄永.基于Struts的Web开发[J].计算机与数字工程,2009,37(232):58-62.[4]李峰,刘彦隆. 基于SSH框架与jquery技术的Java Web开发应用[J].科技情报开发与经济,2010,20(6):106-109.[5]赵洋,张丽,王恩东,张素宁.基于Structs+Spring+Hibernate的J2EE的架构研究[J].现代电子技术,2009,2(289):107-110.[6]许川佩,张民,张婧.基于Ajax的J2EE安全应用框架[J].计算机工程,2010,36(4):110-111.[7]陈正举.基于HIRBERNATE的数据库访问优化[J].计算机应用与软件,2012,29(7):145-149.[8]李宁,李战怀.基于黑盒测试的软件测试策略研究与实现[J].计算机应用研究2009,26(3):924-926.[9] Zoya Ali. Designing Object Oriented Software Applications within the Context of Software Frameworks[D]. Ohio State University,2011.[10] Rachit Mohan Garg, YaminiSood, Balaji Kottana, Pallavi Totlani. A Framework Based Approach for the Development of Web Based Applications Waknaghat[J].Jaypee University of Information Technology,2011,1(1):1-4.[11]飞思科技产品研发中心,《JSP应用开发详解(第二版)》,北京:电子工业出版社,2004。
JAVA外文文献+翻译

Java and the InternetIf Java is, in fact, yet another computer programming language, you may question why it is so important and why it is being promoted as a revolutionary step in computer programming. The answer isn’t immediately obvious if you’re coming from a traditional programming perspective. Although Java is very useful for solving traditional stand-alone programming problems, it is also important because it will solve programming problems on the World Wide Web.1.Client-side programmingThe Web’s initial server-browser design provided for interactive content, but the interactivity was completely provided by the server. The server produced static pages for the client browser, which would simply interpret and display them. Basic HTML contains simple mechanisms for data gathering: text-entry boxes, check boxes, radio boxes, lists and drop-down lists, as well as a button that can only be programmed to reset the data on the form or “submit” the data on the form back to the server. This submission passes through the Common Gateway Interface (CGI) provided on all Web servers. The text within the submission tells CGI what to do with it. The most common action is to run a program located on the server in a directory that’s typically called “cgi-bin.” (If you watch the address window at the top of your browser when you push a button on a Web page, you can sometimes see “cgi-bin” within all the gobbledygook there.) These programs can be written in most languages. Perl is acommon choice because it is designed for text manipulation and is interpreted, so it can be installed on any server regardless of processor or operating system. Many powerful Web sites today are built strictly on CGI, and you can in fact do nearly anything with it. However, Web sites built on CGI programs can rapidly become overly complicated to maintain, and there is also the problem of response time. The response of a CGI program depends on how much data must be sent, as well as the load on both the server and the Internet. (On top of this, starting a CGI program tends to be slow.) The initial designers of the Web did not foresee how rapidly this bandwidth would be exhausted for the kinds of applications people developed. For example, any sort of dynamic graphing is nearly impossible to perform with consistency because a GIF file must be created and moved from the server to the client for each version of the graph. And you’ve no doubt had direct experience with something as simple as validating the data on an input form. You press the submit button on a page; the data is shipped back to the server; the server starts a CGI program that discovers an error, formats an HTML page informing you of the error, and then sends the page back to you; you must then back up a page and try again. Not only is this slow, it’s inelegant.The solution is client-side programming. Most machines that run Web browsers are powerful engines capable of doing vast work, and with the original static HTML approach they are sitting there, just idly waiting for the server to dish up the next page. Client-side programming means that the Web browser is harnessed to do whatever work it can, and the result for the user is a much speedier and more interactive experience at your Web site.The problem with discussions of client-side programming is that they aren’t very different from discussions of programming in general. The parameters are almost the same, but the platform is different: a Web browser is like a limited operating system. In the end, you must still program, and this accounts for the dizzying array of problems and solutions produced by client-side programming. The rest of this section provides an overview of the issues and approaches in client-side programming.2.Plug-insOne of the most significant steps forward in client-side programming is the development of the plug-in. This is a way for a programmer to add new functionality to the browser by downloading a piece of code that plugs itself into the appropriate spot in the browser. It tells the browser “from now on you can perform this new activity.” (You ne ed to download the plug-in only once.) Some fast and powerful behavior is added to browsers via plug-ins, but writing a plug-in is not a trivial task, and isn’t something you’d want to do as part of the process of building a particular site. The value of the plug-in for client-side programming is that it allows an expert programmer to develop a new language and add that language to a browser without the permission of the browser manufacturer. Thus, plug-ins provide a “back door” that allows the creation of new client-side programming languages (although not all languages are implemented as plug-ins).3.Scripting languagesPlug-ins resulted in an explosion of scripting languages. With a scripting language you embed the source code for your client-side program directly into the HTML page, and the plug-in that interprets that language is automatically activated while the HTML page is being displayed. Scripting languages tend to be reasonably easy to understand and, because they are simply text that is part of an HTML page, they load very quickly as part of the single server hit required to procure that page. The trade-off is that your code is exposed for everyone to see (and steal). Generally, however, you aren’t doing amazingly sophisticated things with scripting languages so this is not too much of a hardship.This points out that the scripting languages used inside Web browsers are really intended to solve specific types of problems, primarily the creation of richer and more interactive graphical user interfaces (GUIs). However, a scripting language might solve 80 percent of the problems encountered in client-side programming. Your problems might very well fit completely withinthat 80 percent, and since scripting languages can allow easier and faster development, you should probably consider a scripting language before looking at a more involved solution such as Java or ActiveX programming.The most commonly discussed browser scripting languages are JavaScript (which has nothing to do with Java; it’s named that way just to grab some of Java’s marketing momentum), VBScript (which looks like Visual Basic), and Tcl/Tk, which comes from the popular cross-platform GUI-building language. There are others out there, and no doubt more in development.JavaScript is probably the most commonly supported. It comes built into both Netscape Navigator and the Microsoft Internet Explorer (IE). In addition, there are probably more JavaScript books available than there are for the other browser languages, and some tools automatically create pages using JavaScript. However, if you’re already fluent in Visual Basic or Tcl/Tk, you’ll be more productive using those scripting languages rather than learning a new one. (You’ll have your hands full dealing with the Web issues already.)4.JavaIf a scripting language can solve 80 percent of the client-side programming problems, what about the other 20 percent—the “really hard stuff?” The most popular solution today is Java. Not only is it a powerful programming language built to be secure, cross-platform, and international, but Java is being continually extended to provide language features and libraries that elegantly handle problems that are difficult in traditional programming languages, such as multithreading, database access, network programming, and distributed computing. Java allows client-side programming via the applet.An applet is a mini-program that will run only under a Web browser. The applet is downloaded automatically as part of a Web page (just as, for example, a graphic is automatically downloaded). When the applet is activated it executes a program. This is part of its beauty—it provides you with a way to automatically distribute the client software from the server at the time the user needs the client software, and no sooner. The user gets the latest version of the client software without fail and without difficult reinstallation. Because of theway Java is designed, the programmer needs to create only a single program, and that program automatically works with all computers that have browsers with built-in Java interpreters. (This safely includes the vast majority of machines.) Since Java is a full-fledged programming language, you can do as much work as possible on the client before and after making requests of the server. F or example, you won’t need to send a request form across the Internet to discover that you’ve gotten a date or some other parameter wrong, and your client computer can quickly do the work of plotting data instead of waiting for the server to make a plot and ship a graphic image back to you. Not only do you get the immediate win of speed and responsiveness, but the general network traffic and load on servers can be reduced, preventing the entire Internet from slowing down.One advantage a Java applet has ove r a scripted program is that it’s in compiled form, so the source code isn’t available to the client. On the other hand, a Java applet can be decompiled without too much trouble, but hiding your code is often not an important issue. Two other factors can be important. As you will see later in this book, a compiled Java applet can comprise many modules and take multiple server “hits” (accesses) to download. (In Java 1.1 and higher this is minimized by Java archives, called JAR files, that allow all the required modules to be packaged together and compressed for a single download.) A scripted program will just be integrated into the Web page as part of its text (and will generally be smaller and reduce server hits). This could be important to the responsiveness of your Web site. Another factor is the all-important learning curve. Regardless of what you’ve heard, Java is not a trivial language to learn. If you’re a Visual Basic programmer, moving to VBScript will be your fastest solution, and since it will probably solve most typical client/server problems you might be hard pressed to justify learning Java. If you’re experienced with a scripting language you will certainly benefit from looking at JavaScript or VBScript before committing to Java, since they might fit your needs handily and you’ll be more productive sooner.to run its applets withi5.ActiveXTo some degree, the competitor to Java is Microsoft’s ActiveX, although it takes a completely different approach. ActiveX was originally a Windows-only solution, although it is now being developed via an independent consortium to become cross-platform. Effectively, ActiveX says “if your program connects to its environment just so, it can be dropped into a Web page and run under a browser that supports ActiveX.” (I E directly supports ActiveX and Netscape does so using a plug-in.) Thus, ActiveX does not constrain you to a particular language. If, for example, you’re already an experienced Windows programmer using a language such as C++, Visual Basic, or Borland’s Del phi, you can create ActiveX components with almost no changes to your programming knowledge. ActiveX also provides a path for the use of legacy code in your Web pages.6.SecurityAutomatically downloading and running programs across the Internet can sound like a virus-builder’s dream. ActiveX especially brings up the thorny issue of security in client-side programming. If you click on a Web site, you might automatically download any number of things along with the HTML page: GIF files, script code, compiled Java code, and ActiveX components. Some of these are benign; GIF files can’t do any harm, and scripting languages are generally limited in what they can do. Java was also designed to run its applets within a “sandbox” of safety, which prevents it from wri ting to disk or accessing memory outside the sandbox.ActiveX is at the opposite end of the spectrum. Programming with ActiveX is like programming Windows—you can do anything you want. So if you click on a page that downloads an ActiveX component, that component might cause damage to the files on your disk. Of course, programs that you load onto your computer that are not restricted to running inside a Web browser can do the same thing. Viruses downloaded from Bulletin-Board Systems (BBSs) have long been a problem, but the speed of the Internet amplifies the difficulty.The solution seems to be “digital signatures,” whereby code is verified to show who the author is. This is based on the idea that a virus works because its creator can be anonymous, so if you remove the anonymity individuals will be forced to be responsible for their actions. This seems like a good plan because it allows programs to be much more functional, and I suspect it will eliminate malicious mischief. If, however, a program has an unintentional destructive bug it will still cause problems.The Java approach is to prevent these problems from occurring, via the sandbox. The Java interpreter that lives on your local Web browser examines the applet for any untoward instructions as the applet is being loaded. In particular, the applet cannot write files to disk or erase files (one of the mainstays of viruses). Applets are generally considered to be safe, and since this is essential for reliable client/server systems, any bugs in the Java language that allow viruses are rapidly repaired. (It’s worth noting that the browser software actually enforces these security restrictions, and some browsers allow you to select different security levels to provide varying degrees of access to your system.) You might be skeptical of this rather draconian restriction against writing files to your local disk. For example, you may want to build a local database or save data for later use offline. The initial vision seemed to be that eventually everyone would get online to do anything important, but that was soon seen to be impractical (although low-cost “Internet appliances” might someday satisfy the needs of a significant segment of users). The solution is the “signed applet” that uses public-key encryption to verify that an applet does indeed come from where it claims it does. A signed applet can still trash your disk, but the theory is that since you can now hold the applet creator accountable they won’t do vicious things. Java provides a framework for digital signatures so that you will eventually be able to allow an applet to step outside the sandbox if necessary. Digital signatures have missed an important issue, which is the speed that people move around on the Internet. If you download a buggy program and it does something untoward, how long will it be before you discover the damage? It could be days or even weeks. By then, how will you track down the program that’s done it? And what good will it do you at that point?7.Internet vs. intranetThe Web is the most general solution to the client/server problem, so it makes sense that you can use the same technology to solve a subset of the problem, in particular the classic client/server problem within a company. With traditional client/server approaches you have the problem of multiple types of client computers, as well as the difficulty of installing new client software, both of which are handily solved with Web browsers and client-side programming. When Web technology is used for an information network that is restricted to a particular company, it is referred to as an intranet. Intranets provide much greater security than the Internet, since you can physically control access to the servers within your company. In terms of training, it seems that once people und erstand the general concept of a browser it’s much easier for them to deal with differences in the way pages and applets look, so the learning curve for new kinds of systems seems to be reduced.The security problem brings us to one of the divisions that seems to be automatically forming in the world of client-side programming. If your program is running on the Internet, you don’t know what platform it will be working under, and you want to be extra careful that you don’t disseminate buggy code. You need something cross-platform and secure, like a scripting language or Java.If you’re running on an intranet, you might have a different set of constraints. It’s not uncommon that your machines could all be Intel/Windows platforms. On an intranet, you’re respon sible for the quality of your own code and can repair bugs when they’re discovered. In addition, you might already have a body of legacy code that you’ve been using in a more traditional client/server approach, whereby you must physically install client programs every time you do an upgrade. The time wasted in installing upgrades is the most compelling reason to move to browsers, because upgrades are invisible and automatic. If you are involved in such an intranet, the most sensible approach to take is the shortest path that allows you to use your existing code base, rather than trying to recode your programs in a new language.When faced with this bewildering array of solutions to the client-side programming problem, the best plan of attack is a cost-benefit analysis. Consider the constraints of your problem and what would be the shortest path to your solution. Since client-side programming is still programming, it’s always a good idea to take the fastest development approach for your particular situation. This is an aggressive stance to prepare for inevitable encounters with the problems of program development.8.Server-side programmingThis whole discussion has ignored the issue of server-side programming. What happens when you make a request of a server? Most of the time the request is simply “send me this file.” Your browser then interprets the file in some appropriate fashion: as an HTML page, a graphic image, a Java applet, a script program, etc. A more complicated request to a server generally involves a database transaction. A common scenario involves a request for a complex database search, which the server then formats into an HTML page and sends to you as the result. (Of course, if the client has more intelligence via Java or a scripting language, the raw data can be sent and formatted at the client end, which will be faster and less load on the server.) Or you might want to register your name in a database when you join a group or place an order, which will involve changes to that database. These database requests must be processed via some code on the server side, which is generally referred to as server-side programming. Traditionally, server-side programming has been performed using Perl and CGI scripts, but more sophisticated systems have been appearing. These include Java-based Web servers that allow you to perform all your server-side programming in Java by writing what are called servlets. Servlets and their offspring, JSPs, are two of the most compelling reasons that companies who develop Web sites are moving to Java, especially because they eliminate the problems of dealing with differently abled browsers.9. separate arena: applicationsMuch of the brouhaha over Java has been over applets. Java is actually a general-purpose programming language that can solve any type of problem—at least in theory. And as pointed out previously, there might be more effective ways to solve most client/server problems. When you move out of the applet arena (and simultaneously release the restrictions, such as the one against writing to disk) you enter the world of general-purpose applications that run standalone, without a Web browser, just like any ordinary program does. Here, Java’s strength is not only in its portability, but also its programmability. As you’l l see throughout this book, Java has many features that allow you to create robust programs in a shorter period than with previous programming languages. Be aware that this is a mixed blessing. You pay for the improvements through slower execution speed (although there is significant work going on in this area—JDK 1.3, in particular, introduces the so-called “hotspot” performance improvements). Like any language, Java has built-in limitations that might make it inappropriate to solve certain types of programming problems. Java is a rapidly evolving language, however, and as each new release comes out it becomes more and more attractive for solving larger sets of problems.Java和因特网既然Java不过另一种类型的程序设计语言,大家可能会奇怪它为什么值得如此重视,为什么还有这么多的人认为它是计算机程序设计的一个里程碑呢?如果您来自一个传统的程序设计背景,那么答案在刚开始的时候并不是很明显。
计算机毕业设计外文翻译

Hibernate. 其中,服务器端表示层由 Struts 框架来描
述 MVC 框架,业务逻辑层由 Spring 框架的 IoC 容器
来协助完成,持久层由 Hibernate 框架的对象关系映
射 (O/R Mapping) 来完成与数据库的交互,服务器端
表示层和业务逻辑层通过域模型层的 VO (Value
在多层结构设计中,提倡的是对接口进行编程的设计方式,在编程中只引用接口而不用具体的实现类,
在装载时才配置具体的实现类实例. 如接口类 TestDao(TestBean 是我们要处理的持久化类)定义如下:
public interface TestDao// 接口类 void createBean( TestBean Testbean) throws DataAccessException// 持久化 void updateBean(TestBean Testbean) throws DataAccessExcept void deleteBean(int Te stldω) throws DataAccessException; 臼 矿扩删 除垛 Bean l
采用新的高效的开发模式,并且随着 ]ava 组件的迅速开发,许多技术包括 AOP 和 IoC 为 JavaBeans 提供了
很多像 E]B 才拥有的强大功能,为 ]avaBeans 提供了类似 E]B 的声明式编程模型,但并没有带来任何像 E]B
那样的复杂问题 [I J • ]2EE 复杂的多层结构、庞大的体系决定了 ]2EE 项目需要运用框架和设计模式来控制
以定义所要配置的属性以及要注入的值.可以注入任何东西,从基本类型到集合类,甚至是应用系统中的其 他 Bean ,也可以通过 <ref> 标签注入.
javaweb论文参考文献

javaweb论文参考文献javaweb论文参考文献javaweb论文参考文献怎么写?有范文可以参考吗?下面是应届毕业生小编为大家收集的关于javaweb论文参考文献范文,希望能够帮到大家!javaweb论文参考文献范文【1】[1]张梁,张业成,罗元华等.地质灾害灾情评估理论与实践[M].北京:地质出版社,1998.[2]黄润秋.论中国西南地区水电开发工程地质问题及其研究对策[J].地质灾害与环境保护,2002,13(1):01-05.[3]刘传正.论地质环境变化与地质灾害减轻战略[J].地质通报,2005,24(7):597-602.[4]刘传正.中国地质灾害监测预警站网建设构想[J].地质通报,2002,21(12):869-875.[5]殷坤龙.滑坡灾害预测预报分类[J].中国地质灾害与防治学报,2003,14(4):15-21.[6]黄润秋.中国西部地区典型岩质滑坡机理研究[J].第四纪研究,2003,23(6):640-647.[7]黄润秋.论中国西南地区水电开发工程地质问题及其研究对策[J].地质灾害与环境保护,2002,13(1):1-5.[8]杨德龙,王洪辉,黄凡等.山区高速公路开挖边坡失稳监测预警系统研制[J].电子设计工程,2011,19(25):54-56.[9]刘传正,张明霞,孟晖.论地质灾害群测群防体系[J].防灾减灾工程学报,2006,2(26):175-179.[10]杨梅忠.煤矿区地质灾害链分析及防治对策见:全国煤炭青年学术会议论文集[C].北京:煤炭工业出版社,1993:108-111.[11]钟佳迅,庹先国,张兆义等.路堑边坡施工期多参数远程监测预警系统应用[J].传感器与微系统,2012,12(11):149-152. javaweb论文参考文献范文【2】[1]陈龙,张春红等.电信运营支撑系统[M].人民邮电出版.2005年3月第一版.[2]王先勇;移动IP技术及其安全性的研究[D];哈尔滨工程大学;2003年[3]张晓亚,马慧麟,宋庆峰,弗达.电信运营支撑系统[M].北京邮电大学出版社,2003[4]江东,钱永庆等.计费系统现状和下一代计费系统[J].2003年第10期[5]李连样,刘晓亮.电信计费的内涵与外延[J].中国计费网.2003年9月10日[6]魏园园,余颖,杨放春.计费帐务系统发展趋势分析[J].世界电信.2004.12:41-43[7]陈新.GSM数字蜂窝移动通信.北京:人民邮电出版社,1995.17?146[8]范淑敏,陆宝华;谈建运营性的'专业移动通信网[A];大连海事大学校庆暨中国高等航海教育90周年论文集(船舶通信与导航分册)[C];1999年[9]徐伟强;移动通信网话务量需求的混沌特性及预测方法研究[D];西南交通大学;2002年[10杨(日韦);福建联通CDMA网络竞争策略分析[D];厦门大学;2002年[11蒋同泽.现代移动通信系统.北京:电子工业出版社,1994.4-3 [12尤肖虎.我国未来移动通信研究发展展望[863特稿].通讯世界.2003.12javaweb论文参考文献范文【3】[1] 刘凤玲.WEB 应用技术[T].北京:清华大学出版社,2011:25-28.[2] 石志国.JSP 应用教程.北京:清华大学出版社,2004:12-20.[3]谢希仁.计算机网络(第四版).大连:大连理工大学出版社,2008[4] 陈雪莲.网络与Web 技术导论[T].北京:清华大学出版社,2009:10-20.[5] 闻力欧.网页制作实用教程[T].北京:清华大学出版设,2009:10-24.[6]相万让主编.网页设计与制作.人民邮电出版社,2009 年.[7] 张桂珠.Java 面向对象程序设计[T].第三版.北京.清华大学出版社,2010.[8]刘健. 浅谈企业客户及合同管理系统的应用[J]. 科技信息. 2009(13)[9]王爱平.软件测试[M]. 清华大学出版社,2008:14-39.[10] 曹渠江,陈真.Struts2 框架整合 Spring 框架在文件上传下载中的应用[T].上海理工大学学报,2009,31(2):2-15.[11] 杜飞凝.JavaEE 架构下敏捷开发方法的研究与应用[T].计算机光盘软件与应用个,2011(22):1-20.[12] 刘春菊,朱欣焰.基于 JSP/JavaBean 的 Web GIS 实现技术[T].武汉大学学报(信息科学版),2003.,28(5):5-25.[13]刘德山,杨彬彬.基于Hibernate 框架的数据持久层架构设计及应用[T].微型机与应用,2011,30(15):14-29.javaweb论文参考文献范文【4】[1] 汪雪. 基于 Web 服务的社区卫生服务管理系统[D]. 天津大学硕士论文, 2008: 8-11.[2] 周忠冉,合肥地区社区高血压防治调查研究[D]. 安徽医科大学硕士论文, 2012: 3-5[3] 钟淑玲,陈敏莉. 健康教育在社区的开展方法方式[J]. 中华现代护理学杂志, 2012, 9(8): 89.[4] 张旭,社区终端战略[J]. 中国医药指南, 2008, (1): 16-17.[5] 卢春华,刘士英. 社区健康教育的意义和内容[J]. 社区学杂志,2009, 7(11): 80-81.[6] 陆江,林琳. 社区健康教育[M]. 北京大学医学出版社, 2010: 1-3.[7] 王春才,社区卫生服务管理与决策支持系统的设计与实现[D].长春理工大学硕士论文, 2009:26-28.[8] 赵秋芬,面向社区的健康服务网络平台的研究与设计[D]. 华南理工大学硕士论文, 2013:36-37.[9] 于淑云,马继军, Oracle 数据库安全问题探析与应对策略[J]. 软件导刊, 2010,(12): 147-149.[10 孔银昌,夏跃伟,刘兰兰, ORACLE 数据库安全策略和方法[J]. 煤炭技术, 2012, 31(3):190-192.[11 王国辉,王易编着. JSP 数据库系统开发案例精选[M]. 北京:人民邮电出版社, 2006.5: 72-75[12 赛奎春. JSP 信息系统开发案例精选[M]. 北京:机械工业出版社, 2006.1: 93-102[13 胡皖玲,郑文学. 开展社区医疗服务的思考与建议[J]. 社区医学杂志, 2007, 5(10x): 4-6.[14 成湘均. 用 Sping, Hibernate, Struts2 组建轻量级架构[J]. 框架发展, 2006, 29(6): 43~47.[15 刘壮. 基于 Spring+Hibernate 的开发方法研究及实例[D]. 吉林大学,硕士学位论文, 2005:40-42.[16 陈俊国,王燕,郭华等. 建立综合型医院辐射社区医疗服务网络模式的几点思考[C]. 重庆医学, 2008, (1): 41-42.[17 王伟,牟冬梅,曹丹. 基于 Internet 的社区卫生信息系统标准化建设研究[J]. 医学与社会,2005(4): 56-58.[18 陈刚. 新形式下城市社区医疗卫生服务管理与规章制度建设实用手册[M]. 北京:人民卫生科学出版社, 2007, 3: 254-260.。
计算机java外文翻译外文文献英文文献
英文原文:Title: Business Applications of Java. Author: Erbschloe, Michael, Business Applications of Java -- Research Starters Business, 2008DataBase: Research Starters - BusinessBusiness Applications of JavaThis article examines the growing use of Java technology in business applications. The history of Java is briefly reviewed along with the impact of open standards on the growth of the World Wide Web. Key components and concepts of the Java programming language are explained including the Java Virtual Machine. Examples of how Java is being used bye-commerce leaders is provided along with an explanation of how Java is used to develop data warehousing, data mining, and industrial automation applications. The concept of metadata modeling and the use of Extendable Markup Language (XML) are also explained.Keywords Application Programming Interfaces (API's); Enterprise JavaBeans (EJB); Extendable Markup Language (XML); HyperText Markup Language (HTML); HyperText Transfer Protocol (HTTP); Java Authentication and Authorization Service (JAAS); Java Cryptography Architecture (JCA); Java Cryptography Extension (JCE); Java Programming Language; Java Virtual Machine (JVM); Java2 Platform, Enterprise Edition (J2EE); Metadata Business Information Systems > Business Applications of JavaOverviewOpen standards have driven the e-business revolution. Networking protocol standards, such as Transmission Control Protocol/Internet Protocol (TCP/IP), HyperText Transfer Protocol (HTTP), and the HyperText Markup Language (HTML) Web standards have enabled universal communication via the Internet and the World Wide Web. As e-business continues to develop, various computing technologies help to drive its evolution.The Java programming language and platform have emerged as major technologies for performing e-business functions. Java programming standards have enabled portability of applications and the reuse of application components across computing platforms. Sun Microsystems' Java Community Process continues to be a strong base for the growth of the Java infrastructure and language standards. This growth of open standards creates new opportunities for designers and developers of applications and services (Smith, 2001).Creation of Java TechnologyJava technology was created as a computer programming tool in a small, secret effort called "the Green Project" at Sun Microsystems in 1991. The Green Team, fully staffed at 13 people and led by James Gosling, locked themselves away in an anonymous office on Sand Hill Road in Menlo Park, cut off from all regular communications with Sun, and worked around the clock for18 months. Their initial conclusion was that at least one significant trend would be the convergence of digitally controlled consumer devices and computers. A device-independent programming language code-named "Oak" was the result.To demonstrate how this new language could power the future of digital devices, the Green Team developed an interactive, handheld home-entertainment device controller targeted at the digital cable television industry. But the idea was too far ahead of its time, and the digital cable television industry wasn't ready for the leap forward that Java technology offered them. As it turns out, the Internet was ready for Java technology, and just in time for its initial public introduction in 1995, the team was able to announce that the Netscape Navigator Internet browser would incorporate Java technology ("Learn about Java," 2007).Applications of JavaJava uses many familiar programming concepts and constructs and allows portability by providing a common interface through an external Java Virtual Machine (JVM). A virtual machine is a self-contained operating environment, created by a software layer that behaves as if it were a separate computer. Benefits of creating virtual machines include better exploitation of powerful computing resources and isolation of applications to prevent cross-corruption and improve security (Matlis, 2006).The JVM allows computing devices with limited processors or memory to handle more advanced applications by calling up software instructions inside the JVM to perform most of the work. This also reduces the size and complexity of Java applications because many of the core functions and processing instructions were built into the JVM. As a result, software developersno longer need to re-create the same application for every operating system. Java also provides security by instructing the application to interact with the virtual machine, which served as a barrier between applications and the core system, effectively protecting systems from malicious code.Among other things, Java is tailor-made for the growing Internet because it makes it easy to develop new, dynamic applications that could make the most of the Internet's power and capabilities. Java is now an open standard, meaning that no single entity controls its development and the tools for writing programs in the language are available to everyone. The power of open standards like Java is the ability to break down barriers and speed up progress.Today, you can find Java technology in networks and devices that range from the Internet and scientific supercomputers to laptops and cell phones, from Wall Street market simulators to home game players and credit cards. There are over 3 million Java developers and now there are several versions of the code. Most large corporations have in-house Java developers. In addition, the majority of key software vendors use Java in their commercial applications (Lazaridis, 2003).ApplicationsJava on the World Wide WebJava has found a place on some of the most popular websites in the world and the uses of Java continues to grow. Java applications not only provide unique user interfaces, they also help to power the backend of websites. Two e-commerce giants that everybody is probably familiar with (eBay and Amazon) have been Java pioneers on the World Wide Web.eBayFounded in 1995, eBay enables e-commerce on a local, national and international basis with an array of Web sites-including the eBay marketplaces, PayPal, Skype, and -that bring together millions of buyers and sellers every day. You can find it on eBay, even if you didn't know it existed. On a typical day, more than 100 million items are listed on eBay in tens of thousands of categories. Recent listings have included a tunnel boring machine from the Chunnel project, a cup of water that once belonged to Elvis, and the Volkswagen that Pope Benedict XVI owned before he moved up to the Popemobile. More than one hundred million items are available at any given time, from the massive to the miniature, the magical to the mundane, on eBay; the world's largest online marketplace.eBay uses Java almost everywhere. To address some security issues, eBay chose Sun Microsystems' Java System Identity Manager as the platform for revamping its identity management system. The task at hand was to provide identity management for more than 12,000 eBay employees and contractors.Now more than a thousand eBay software developers work daily with Java applications. Java's inherent portability allows eBay to move to new hardware to take advantage of new technology, packaging, or pricing, without having to rewrite Java code ("eBay drives explosive growth," 2007).Amazon (a large seller of books, CDs, and other products) has created a Web Service application that enables users to browse their product catalog and place orders. uses a Java application that searches the Amazon catalog for books whose subject matches a user-selected topic. The application displays ten books that match the chosen topic, and shows the author name, book title, list price, Amazon discount price, and the cover icon. The user may optionally view one review per displayed title and make a buying decision (Stearns & Garishakurthi, 2003).Java in Data Warehousing & MiningAlthough many companies currently benefit from data warehousing to support corporate decision making, new business intelligence approaches continue to emerge that can be powered by Java technology. Applications such as data warehousing, data mining, Enterprise Information Portals (EIP's), and Knowledge Management Systems (which can all comprise a businessintelligence application) are able to provide insight into customer retention, purchasing patterns, and even future buying behavior.These applications can not only tell what has happened but why and what may happen given certain business conditions; allowing for "what if" scenarios to be explored. As a result of this information growth, people at all levels inside the enterprise, as well as suppliers, customers, and others in the value chain, are clamoring for subsets of the vast stores of information such as billing, shipping, and inventory information, to help them make business decisions. While collecting and storing vast amounts of data is one thing, utilizing and deploying that data throughout the organization is another.The technical challenges inherent in integrating disparate data formats, platforms, and applications are significant. However, emerging standards such as the Application Programming Interfaces (API's) that comprise the Java platform, as well as Extendable Markup Language (XML) technologies can facilitate the interchange of data and the development of next generation data warehousing and business intelligence applications. While Java technology has been used extensively for client side access and to presentation layer challenges, it is rapidly emerging as a significant tool for developing scaleable server side programs. The Java2 Platform, Enterprise Edition (J2EE) provides the object, transaction, and security support for building such systems.Metadata IssuesOne of the key issues that business intelligence developers must solve is that of incompatible metadata formats. Metadata can be defined as information about data or simply "data about data." In practice, metadata is what most tools, databases, applications, and other information processes use to define, relate, and manipulate data objects within their own environments. It defines the structure and meaning of data objects managed by an application so that the application knows how to process requests or jobs involving those data objects. Developers can use this schema to create views for users. Also, users can browse the schema to better understand the structure and function of the database tables before launching a query.To address the metadata issue, a group of companies (including Unisys, Oracle, IBM, SAS Institute, Hyperion, Inline Software and Sun) have joined to develop the Java Metadata Interface (JMI) API. The JMI API permits the access and manipulation of metadata in Java with standard metadata services. JMI is based on the Meta Object Facility (MOF) specification from the Object Management Group (OMG). The MOF provides a model and a set of interfaces for the creation, storage, access, and interchange of metadata and metamodels (higher-level abstractions of metadata). Metamodel and metadata interchange is done via XML and uses the XML Metadata Interchange (XMI) specification, also from the OMG. JMI leverages Java technology to create an end-to-end data warehousing and business intelligence solutions framework.Enterprise JavaBeansA key tool provided by J2EE is Enterprise JavaBeans (EJB), an architecture for the development of component-based distributed business applications. Applications written using the EJB architecture are scalable, transactional, secure, and multi-user aware. These applications may be written once and then deployed on any server platform that supports J2EE. The EJB architecture makes it easy for developers to write components, since they do not need to understand or deal with complex, system-level details such as thread management, resource pooling, and transaction and security management. This allows for role-based development where component assemblers, platform providers and application assemblers can focus on their area of responsibility further simplifying application development.EJB's in the Travel IndustryA case study from the travel industry helps to illustrate how such applications could function. A travel company amasses a great deal of information about its operations in various applications distributed throughout multiple departments. Flight, hotel, and automobile reservation information is located in a database being accessed by travel agents worldwide. Another application contains information that must be updated with credit and billing historyfrom a financial services company. Data is periodically extracted from the travel reservation system databases to spreadsheets for use in future sales and marketing analysis.Utilizing J2EE, the company could consolidate application development within an EJB container, which can run on a variety of hardware and software platforms allowing existing databases and applications to coexist with newly developed ones. EJBs can be developed to model various data sets important to the travel reservation business including information about customer, hotel, car rental agency, and other attributes.Data Storage & AccessData stored in existing applications can be accessed with specialized connectors. Integration and interoperability of these data sources is further enabled by the metadata repository that contains metamodels of the data contained in the sources, which then can be accessed and interchanged uniformly via the JMI API. These metamodels capture the essential structure and semantics of business components, allowing them to be accessed and queried via the JMI API or to be interchanged via XML. Through all of these processes, the J2EE infrastructure ensures the security and integrity of the data through transaction management and propagation and the underlying security architecture.To consolidate historical information for analysis of sales and marketing trends, a data warehouse is often the best solution. In this example, data can be extracted from the operational systems with a variety of Extract, Transform and Load tools (ETL). The metamodels allow EJBsdesigned for filtering, transformation, and consolidation of data to operate uniformly on datafrom diverse data sources as the bean is able to query the metamodel to identify and extract the pertinent fields. Queries and reports can be run against the data warehouse that contains information from numerous sources in a consistent, enterprise-wide fashion through the use of the JMI API (Mosher & Oh, 2007).Java in Industrial SettingsMany people know Java only as a tool on the World Wide Web that enables sites to perform some of their fancier functions such as interactivity and animation. However, the actual uses for Java are much more widespread. Since Java is an object-oriented language like C++, the time needed for application development is minimal. Java also encourages good software engineering practices with clear separation of interfaces and implementations as well as easy exception handling.In addition, Java's automatic memory management and lack of pointers remove some leading causes of programming errors. Most importantly, application developers do not need to create different versions of the software for different platforms. The advantages available through Java have even found their way into hardware. The emerging new Java devices are streamlined systems that exploit network servers for much of their processing power, storage, content, and administration.Benefits of JavaThe benefits of Java translate across many industries, and some are specific to the control and automation environment. For example, many plant-floor applications use relatively simple equipment; upgrading to PCs would be expensive and undesirable. Java's ability to run on any platform enables the organization to make use of the existing equipment while enhancing the application.IntegrationWith few exceptions, applications running on the factory floor were never intended to exchange information with systems in the executive office, but managers have recently discovered the need for that type of information. Before Java, that often meant bringing together data from systems written on different platforms in different languages at different times. Integration was usually done on a piecemeal basis, resulting in a system that, once it worked, was unique to the two applications it was tying together. Additional integration required developing a brand new system from scratch, raising the cost of integration.Java makes system integration relatively easy. Foxboro Controls Inc., for example, used Java to make its dynamic-performance-monitor software package Internet-ready. This software provides senior executives with strategic information about a plant's operation. The dynamic performance monitor takes data from instruments throughout the plant and performs variousmathematical and statistical calculations on them, resulting in information (usually financial) that a manager can more readily absorb and use.ScalabilityAnother benefit of Java in the industrial environment is its scalability. In a plant, embedded applications such as automated data collection and machine diagnostics provide critical data regarding production-line readiness or operation efficiency. These data form a critical ingredient for applications that examine the health of a production line or run. Users of these devices can take advantage of the benefits of Java without changing or upgrading hardware. For example, operations and maintenance personnel could carry a handheld, wireless, embedded-Java device anywhere in the plant to monitor production status or problems.Even when internal compatibility is not an issue, companies often face difficulties when suppliers with whom they share information have incompatible systems. This becomes more of a problem as supply-chain management takes on a more critical role which requires manufacturers to interact more with offshore suppliers and clients. The greatest efficiency comes when all systems can communicate with each other and share information seamlessly. Since Java is so ubiquitous, it often solves these problems (Paula, 1997).Dynamic Web Page DevelopmentJava has been used by both large and small organizations for a wide variety of applications beyond consumer oriented websites. Sandia, a multiprogram laboratory of the U.S. Department of Energy's National Nuclear Security Administration, has developed a unique Java application. The lab was tasked with developing an enterprise-wide inventory tracking and equipment maintenance system that provides dynamic Web pages. The developers selected Java Studio Enterprise 7 for the project because of its Application Framework technology and Web Graphical User Interface (GUI) components, which allow the system to be indexed by an expandable catalog. The flexibility, scalability, and portability of Java helped to reduce development timeand costs (Garcia, 2004)IssueJava Security for E-Business ApplicationsTo support the expansion of their computing boundaries, businesses have deployed Web application servers (WAS). A WAS differs from a traditional Web server because it provides a more flexible foundation for dynamic transactions and objects, partly through the exploitation of Java technology. Traditional Web servers remain constrained to servicing standard HTTP requests, returning the contents of static HTML pages and images or the output from executed Common Gateway Interface (CGI ) scripts.An administrator can configure a WAS with policies based on security specifications for Java servlets and manage authentication and authorization with Java Authentication andAuthorization Service (JAAS) modules. An authentication and authorization service can bewritten in Java code or interface to an existing authentication or authorization infrastructure. Fora cryptography-based security infrastructure, the security server may exploit the Java Cryptography Architecture (JCA) and Java Cryptography Extension (JCE). To present the user with a usable interaction with the WAS environment, the Web server can readily employ a formof "single sign-on" to avoid redundant authentication requests. A single sign-on preserves user authentication across multiple HTTP requests so that the user is not prompted many times for authentication data (i.e., user ID and password).Based on the security policies, JAAS can be employed to handle the authentication process with the identity of the Java client. After successful authentication, the WAS securitycollaborator consults with the security server. The WAS environment authentication requirements can be fairly complex. In a given deployment environment, all applications or solutions may not originate from the same vendor. In addition, these applications may be running on different operating systems. Although Java is often the language of choice for portability between platforms, it needs to marry its security features with those of the containing environment.Authentication & AuthorizationAuthentication and authorization are key elements in any secure information handling system. Since the inception of Java technology, much of the authentication and authorization issues have been with respect to downloadable code running in Web browsers. In many ways, this had been the correct set of issues to address, since the client's system needs to be protected from mobile code obtained from arbitrary sites on the Internet. As Java technology moved from a client-centric Web technology to a server-side scripting and integration technology, it required additional authentication and authorization technologies.The kind of proof required for authentication may depend on the security requirements of a particular computing resource or specific enterprise security policies. To provide such flexibility, the JAAS authentication framework is based on the concept of configurable authenticators. This architecture allows system administrators to configure, or plug in, the appropriate authenticatorsto meet the security requirements of the deployed application. The JAAS architecture also allows applications to remain independent from underlying authentication mechanisms. So, as new authenticators become available or as current authentication services are updated, system administrators can easily replace authenticators without having to modify or recompile existing applications.At the end of a successful authentication, a request is associated with a user in the WAS user registry. After a successful authentication, the WAS consults security policies to determine if the user has the required permissions to complete the requested action on the servlet. This policy canbe enforced using the WAS configuration (declarative security) or by the servlet itself (programmatic security), or a combination of both.The WAS environment pulls together many different technologies to service the enterprise. Because of the heterogeneous nature of the client and server entities, Java technology is a good choice for both administrators and developers. However, to service the diverse security needs of these entities and their tasks, many Java security technologies must be used, not only at a primary level between client and server entities, but also at a secondary level, from served objects. By using a synergistic mix of the various Java security technologies, administrators and developers can make not only their Web application servers secure, but their WAS environments secure as well (Koved, 2001).ConclusionOpen standards have driven the e-business revolution. As e-business continues to develop, various computing technologies help to drive its evolution. The Java programming language and platform have emerged as major technologies for performing e-business functions. Java programming standards have enabled portability of applications and the reuse of application components. Java uses many familiar concepts and constructs and allows portability by providing a common interface through an external Java Virtual Machine (JVM). Today, you can find Java technology in networks and devices that range from the Internet and scientific supercomputers to laptops and cell phones, from Wall Street market simulators to home game players and credit cards.Java has found a place on some of the most popular websites in the world. Java applications not only provide unique user interfaces, they also help to power the backend of websites. While Java technology has been used extensively for client side access and in the presentation layer, it is also emerging as a significant tool for developing scaleable server side programs.Since Java is an object-oriented language like C++, the time needed for application development is minimal. Java also encourages good software engineering practices with clear separation of interfaces and implementations as well as easy exception handling. Java's automatic memory management and lack of pointers remove some leading causes of programming errors. The advantages available through Java have also found their way into hardware. The emerging new Java devices are streamlined systems that exploit network servers for much of their processing power, storage, content, and administration.中文翻译:标题:Java的商业应用。
java英文参考文献
篇二:Java项目ssh2相关参考文献
Java开发相关参考中英文文献期刊
[1]Bruce Eckel. Thinking in Java[M]. Upper Saddle River, New Jersey, USA:Prentice Hall, 2006
[2]陈道鑫,宋绍云,袁中旺,等. ExtJS框架在Web软件开发中的应用[J].电脑知识与技术2011, 07(9): 2044-2047
1.1.4 Features of the .NET Platform ......................................................... 16
1.1.5 Multilanguage Development .................................................................. 17
1.1.6 endence ........................................... 18
1.1.7 Automatic Memory Management ............................................................. 19
专业___计算机科学与技术___
年级班别____2009级(1)班__
学号
学生姓名_______ ________
指导教师______ ________
2013年5月
目录
译文:
前言......................................................................................................................................... 1
基于javaweb的参考文献
基于javaweb的参考文献以下是一些基于 JavaWeb 的参考文献:1. Journal of Web Programming:这是一本专注于 Web 编程的期刊,它涵盖了各种 Web 开发技术,包括 JavaWeb 开发。
该期刊的论文通常涉及 Web 应用程序的设计、架构和实现方面。
2. Java Technology Journal:这是一本专注于 Java 技术的期刊,它涵盖了各种 Java 开发技术,包括 JavaWeb 开发。
该期刊的论文通常涉及 Java 应用程序的设计、架构和实现方面。
3. Oracle Certified Professional Java Web Technology:这是一本证书考试指南,它覆盖了 JavaWeb 开发的各个方面,包括Java Servlets、JSP、Struts、Spring 和 Web 框架等。
该指南可以帮助开发人员掌握 JavaWeb 开发的基本知识。
4. Programming Java:这是一本广泛使用的 Java 编程教科书,它涵盖了 Java 语言的各个方面,包括数据类型、控制结构、类和对象、继承、多态和抽象类、接口和面向对象编程等。
该书籍可以帮助开发人员掌握 Java 编程的基础知识。
5. Spring Framework:这是一本广泛使用的 Java Web 框架,它提供了一种快速开发和部署 Web 应用程序的方法。
该框架涵盖了许多方面,包括依赖注入、AOP、事务管理、Web 框架和应用程序配置等。
该书籍可以帮助开发人员掌握 Spring 框架的基本知识。
以上是一些基于 JavaWeb 的参考文献,它们可以帮助开发人员提高 JavaWeb 开发技能,掌握 JavaWeb 开发的基本原理和方法。
计算机专业毕业设计论文外文文献中英文翻译——java对象
1 . Introduction To Objects1.1The progress of abstractionAll programming languages provide abstractions. It can be argued that the complexity of the problems you’re able to solve is directly related to the kind and quality of abstraction。
By “kind” I mean,“What is it that you are abstracting?” Assembly language is a small abstraction of the underlying machine. Many so—called “imperative” languages that followed (such as FORTRAN,BASIC, and C) were abstractions of assembly language。
These languages are big improvements over assembly language,but their primary abstraction still requires you to think in terms of the structure of the computer rather than the structure of the problem you are trying to solve。
The programmer must establish the association between the machine model (in the “solution space,” which is the place where you’re modeling that problem, such as a computer) and the model of the problem that is actually being solved (in the “problem space,” which is the place where the problem exists). The effort required to perform this mapping, and the fact that it is extrinsic to the programming language,produces programs that are difficult to write and expensive to maintain,and as a side effect created the entire “programming methods” industry.The alter native to modeling the machine is to model the problem you’re trying to solve。
- 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
- 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
- 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。
中文翻译基于Java技术的Web应用设计模型的比较研究来源:School of Computer Science and Engineering University of New South Wales Sydney, NSW 2052, Australia作者:Budi Kurniawan and Jingling Xue摘要Servlet技术是在建立可扩展性Web应用中被应用最广泛的技术。
在运用JAVA 技术开发Web应用中有四种模型,分别是:Model 1、Model 2、Struts和JavaServer Faces JSF。
Model 1使用一连串的JSP页面,Model 2采用了模型,视图,控制器MVC模式。
Struts是一个采用了Model 2设计模型的框架,JSF是一种支持ready-to-use组件来进行快速Web应用开发的新技术。
Model 1对于中等和大型的应用来说很难维护,所以不推荐使用。
本文通过利用Model 2、Struts和JSF这三种模型分别构建三个不同版本的在线商店应用程序来比较和评价这三种模型在应用程序开发和性能上的差异。
1.绪论当今Web应用是一种展现动态内容的最普遍的方式。
构建Web应用有许多种方法,其中最流行的是Servlet技术。
这种技术的流行是因为它比CGI、PHP等其他技术更具优越性。
然而Servlet对于开发来说还是麻烦的,因为它在传送HTML标签时需要程序员将他们组合成为一个字符串对象,再将这个对象传给浏览器。
同样的,对于输出的一个很小的改动也要求Servlet被重新编译。
基于这个原因SUN公司发明了JavaServer Pages JSP技术。
JSP允许HTML标签和Java代码混合在一起,每个页面将被转化为一个Servlet,一个JSP就是一个Servlet,而且编译将在JSP页面第一次被请求时自动进行改变输出也不需要重新编译。
另外通过使用JavaBean和定制标签库,JSP能够将表示与业务逻辑相分离。
现今基于JAVA的Web 应用开发标准是将servlets与JSP结合在一起。
随后出现了许多种设计模型用来构建servlet/JSP应用。
Model 1、Model 2、Struts]和JavaServer Faces JSF。
Model 1和Model 2最早是在JSP规范中被提及的。
Model 1只使用JSP而不使用servlet,Model 2则结合了JSP与servlet。
Model 1和Model 2的使用是有条件的。
Model 1适合与开发原型和非常小的应用,Model 2则是开发中型和大型应用推荐的设计模型。
由于Model 2越来越被行业所接受,一个建立Struts框架的开源项目也因此被启动了。
Struts通过为Model 2提供了模型、视图、控制器中的控制器来完善Model 2。
另外Struts提供了更好的页面导航管理机制和一些定制标签库,能够进行更快速的开发。
尽管它学习难度大,并且实际上它没有在任何的规范中被定义,但是它还是作为Model 2的一种替代获得了流行。
JavaServer Faces是在JCP的JSR-127规范下被建立。
Sun公司力推这项技术,希望它能够成为构建Java Web应用的最终模型。
JSF最重要的特性是对ready-to-use组件的支持,比如,可扩展用户接口组件、简易的页面导航、输入验证、数据转换和JavaBean管理机制。
servlet/JSP 程序员面临的问题是选择最合适的设计模型。
明显的JSF在开发时间上提供了更好的解决方案。
然而,有些人担心实施JSF的开销所带来的性能下降而不愿采用这种技术。
我们使用Model 2、 Struts和JSF分别构建三个不同版本的在线商店应用比较的参数是代码的行数、类的数目和性能测试结果。
我们研究哪种设计模型能够进行最快速的开发。
我们评估基于这些模型的应用的性能。
我们提供一些建议来完善现有的设计模型使得开发速度更快。
文章的余下部分组织如下第二部分讨论了Web开发中的问题,第三部分解释了三个设计模型如何来解决这些开发问题,第四部分详细介绍了试验所需要的硬件和软件,第五部分给出试验的结果并进行分析,第六部分回顾相关工作,第七部分得出结论并提出了一些改进现有设计模型的建议。
2.Web开发中的问题所有的Java开发都使用Servlet技术作为基础技术。
同样的所有的Java Web 应用都有一些问题需要解决:1.用户接口是在客户浏览器上呈现出的HTML标签。
任何在应用中使用的服务器端组件都必须被编码成为正确的HTML标签。
除了显示内容和数据外,用户接口还负责接收用户的输入。
2.用户的输入必须要验证。
输入的验证有两种类型:服务器端和客户端。
顾名思义,服务器端的输入验证是在输入的数据到达服务器后在服务器上进行的。
客户端的输入验证是在浏览器上完成的,一般使用JavaScript或其他脚本语言。
利用客户端进行输入验证的好处是反应迅速,而且能够减轻服务器的负载。
无论是否存在客户端输入验证,服务器端的输入验证是一定要执行的。
因为无法保证用户的浏览器的脚本特性被打开,而且恶意用户能够很轻松的绕过客户端的验证。
3.在基于Java的Web应用中模型对象是以JavaBean的形式出项的。
模型对象组成了基于MVC设计模型的模型部分。
一个模型对象能够用来绑定一个组件的值以备下阶段使用。
此外它能够封装需要执行的业务逻辑。
4.大多数的Web应用都包含多个页面,能够使用户从一个页面跳转到另一个页面。
所有的基于MVC的设计模式都使用Servlet作为控制部分。
这个Servlet也作为进入应用的唯一入口。
当前的请求之后哪个页面会被显示取决于请求参数的具体值。
管理页面导航是至关重要的。
3.Web应用设计模型Model 2设计模型是基于模型、视图、控制器、MVC设计模式的。
正如Burbeck 所解释的,在MVC中有三个主要模块:控制器、视图和模型。
控制器作为应用的中心,所有的用户交互都要通过它。
视图包含了应用的显示,而模型用来存储数据和封装应用的业务逻辑。
随后,Struts框架提供了一个通用框架能够容易的构建Model 2应用。
最主动的是同样使用MVC设计模式的JSF。
在之后的章节,我们将来讨论这三种设计模型,并且说明每一种设计模型是怎样来解决之前提到的开发问题。
3.1 Model 2一个基于Model 2设计模型的Java Web应用有一个作为控制部分的servlet 称为控制器servlet。
所有的请求首先被这个servlet处理,它通过RequestDispatcher对象将请求迅速的分派到合适的视图。
在Model 2中视图是通过JSP页面来表现的。
JavaBean作为Model 2 的模型部分,用来在应用中存储数据。
除了存储数据JavaBean还用来封装业务逻辑。
每个HTTP请求都带有一个行为参数,用来指出哪个视图指派给这个请求。
程序员必须在所有的JSP页面中为用户接口编写HTML标签代码,并且编写输入验证代码。
此外,模型对象被单独的JSP 页面所管理。
3.2 Struts Struts框架是Model 2设计模型的一个改进。
它提供了一个默认的控制器servlet使得程序员不用非得去编写一个。
Struts允许在应用配置文件一个XML文件中编写导航规则来减轻页面导航的任务,改变导航规则不需要重新编译。
除了更简单的页面导航,Struts还提供了定制标签库来定义标签代表HTML元素。
这些标签中的一些用来处理异常,而且Struts支持国际化,能够显示本地化的错误消息。
就像Model 2一样,Struts使用JavaBean作为模型。
此外Struts程序员必须编写输入验证代码。
3.3 JSFJSF同样使用了一个控制器servlet称为FacesServlet。
这个Servlet是整个JSF应用的唯一入口。
JSF同样使用JSP页面作为它的视图,使用JavaBean作为模型对象。
与Model 2和Struts不同,JSF提供了能够写入JSP页面的ready-to-use 的用户接口组件。
在JSF应用中的页面的调用,FacesServlet建立了一个组件树来显示JSP页面的请求。
大部分的组件还能够触发事件来构成JSF的事件驱动。
对于页面导航,JSF使用了和Struts类似的方法,即允许在一个应用控制文件,XML文件中定义导航规则。
JSF应用与非JSF的servlet/JSP应用的不同在于JSF是事件驱动的。
JSF的用户接口是一个或多个JSP页面,用来服务诸如表单和输入框等Web组件。
这些组件以JSF定制标签的形式出现而且能够保存数据。
一个组件能够嵌套在另一个组件中,有可能形成一个组件的树状结构。
在普通的servlet/JSP应用中,使用JavaBean 来存储用户输入的数据。
4.运行环境以下是我们实验的软硬件详细描述。
4.1 Servlet容器Java Web应用是在servlet容器中运行的,在应用中它一个引擎用来处理接踵而来的请求资源的HTTP请求。
在这个试验项目中,我们使用Tomcat——一个来自Apache软件基金会的开源的servlet容器,版本号是6.0。
基本上一个servlet容器通过执行下面的任务来处理一个servlet:创建一个HttpRequest对象创建一个HttpResponse对象传递HttpRequest、HttpResponse对象来调用Servlet接口的service方法4.2 测试用客户端为了进行性能测试,我们使用同样来自Apache软件基金会的JMeter1.9来模拟多用户。
JMeter允许用户选择一定数量的线程来执行测试。
每个线程模拟了一个不同的用户。
JMeter来能允许我们选择完成一次测试的测试次数。
使用JMeter 来测试一个Web应用。
你只要直接向某个IP地址、上下文路径和端口号发出请求。
你也可以将请求参数包含在HTTP请求中。
对于一个测试,JMeter将服务器的响应时间以毫秒的形式输出。
从响应时间,我们能够得到服务器执行服务的每秒命中次数。
4.3 硬件为了得到最大的性能度量精度,我们使用不同的计算机来进行应用的测试。
运行应用的是一台XP计算机,它的配置如下:Intel Core 1GHz CPU 、1G RAM。
测试用客户端是运行JMeter的Windows2000计算机,具体配置如下:Intel Core 1GHz CPU、 1G RAM。
5.结论我们得到两类实验结果:开发的难易程度和性能。
开发的难易程度比较了类的数目和代码的行数。
这些数目显示了遵从某个设计模型来开发一个应用的难易程度。
一个应用包含较少的类和较少的代码行数说明应用相对而言更容易构建。