共查询到20条相似文献,搜索用时 0 毫秒
1.
2.
3.
电磁计量是计量技术中极为重要的组成部分.20世纪中电磁计量的量子基准取得了长足的进步,形成了以约瑟夫森量子电压标准、量子化霍尔电阻标准和单电子隧道电流标准为三个顶点的"量子三角形",使电学计量的准确度大幅度提高.在新世纪中,电磁计量的量子基准将进一步发展,服务领域渗透到各个方面. 相似文献
4.
What's the difference between ignorance and indifference? If you are one the rare few who don't know and don't care, then you have the kind of open-mindedness that may allow you to rethink entrepreneurial inventing for the 21st century. 相似文献
5.
Historically, compilers have operated by applying a fixed set of optimizations in a predetermined order. We call such an ordered list of optimizations a compilation sequence. This paper describes a prototype system that uses biased random search to discover a program-specific compilation sequence that minimizes an explicit, external objective function. The result is a compiler framework that adapts its behavior to the application being compiled, to the pool of available transformations, to the objective function, and to the target machine. This paper describes experiments that attempt to characterize the space that the adaptive compiler must search. The preliminary results suggest that optimal solutions are rare and that local minima are frequent. If this holds true, biased random searches, such as a genetic algorithm, should find good solutions more quickly than simpler strategies, such as hill climbing. 相似文献
6.
2020年,新冠肺炎在全球爆发,全球医疗系统受到巨大考验,新冠肺炎患者隐私数据安全是医疗信息系统中极其重要的一环.疫情期间,中国新冠肺炎患者隐私数据泄露的案例层出不穷,给患者带来巨大的困扰.采用委托拜占庭容错机制(dBFT)提出了结合区块链的重大疫情患者隐私数据保护方案.方案以联盟链为基础,将政府机构、医疗机构和民众等... 相似文献
7.
8.
The computer architecture arena faces exciting challenges as it attempts to meet the design goals and constraints that new markets, changing applications and fast-moving semiconductor technology impose 相似文献
9.
Gerald Kovacich 《Computer Fraud & Security》2000,2000(3):10-13
As we enter the 21st Century, we will be faced with many challenges brought on by technology. Let’s look at the possible future and the environment where computer and technology crimes and frauds of the future will breed along the Internet, as well as its challenges to security and law enforcement professionals. 相似文献
10.
The deluge of data that future applications must process—in domains ranging from science to business informatics—creates a compelling argument for substantially increased R&D targeted at discovering scalable hardware and software solutions for data-intensive problems. 相似文献
11.
Anthony Riem 《Computer Fraud & Security》2001,2001(4):12-15
Last month we discussed the scale of the problem of cybercrime and found that it was international in scope and very costly to business. We also looked at the type of criminals that were cyber-perpetrators. From this, it became apparent that by far the greatest threat comes from employees, consultants and contractors working within businesses, rather than from those attempting to obtain access from outside. In this article, we will look at some of the more serious cybercrimes that are being practiced against businesses, starting with perhaps the serious of them all, ‘netspionage’. 相似文献
12.
13.
本文叙述了IFAC'93世界大会的盛况,简要地介绍了本次大会所反映的当今控制与自动化学科的内涵,焦点及应用实况。作者预防控制与自动化将向着智能控制与智能自动化方向发展,所以智能控制必将成为21世纪的控制技术。 相似文献
14.
15.
Neal Lane 《Information Systems Frontiers》1999,1(3):317-320
This article focuses on ways in which the Federal government is addressing long-range implications of the digital economy. First, it attempts to set some context and then briefly describes the Clinton-Gore Administration's Information Technology for the 21st Century Initiative (IT2), which includes research on the social and economic implications of information technology. Finally, it identifies some of the key areas of research within the scope of that initiative. 相似文献
16.
建立21世纪无所不在的网络社会--浅谈日本u-Japan及韩国u-Korea战略 总被引:1,自引:0,他引:1
20世纪末以来,信息技术发展迅速,日益广泛的信息化带来了许多新的生产模式和生活理念。如今人们对于电子邮件(E-mail)、电子商务(E-business)、电子政务(E-government)等“e”化事物早已不再陌生。而科技的进步永远能够不断带来惊喜,随着无所不在的计算技术(ubiquitous computing)及移动通信技术的发展成熟,人们开始考虑用“u”(ubiquitous,意指“无所不在的”)来取代原先的“e”,描述21世纪“无所不在的”信息社会。 相似文献
17.
21世纪中国计算机安全展望 总被引:1,自引:0,他引:1
缪道期 《网络安全技术与应用》2001,(2):10-12
20年前,开创中国计算机安全监察工作的历史重任落到公安部的肩上。20年来,在国家外交部,中国人民解放军总参谋部,中央机要和保密部门的密切协助下。克服了各种困难,不断拓展工作,壮大了队伍,宣传了观念,并且从1994年开始,走上了法制化的道路,确定了公安部在这项工作中的主管职能。规定了各信息化相关部门的职责。如今一个全国计算机安全工作体系正在逐步建立,计算机安全观念正变得家喻户晓。我国党和国家领导人已经以行动表明:中国在加强国际计算机安全方面起着倡导者的角色。我国 相似文献
18.
Elizabeth France 《Computer Fraud & Security》1997,1997(1):12-16
The single most significant event for my office during the last year was a European Initiative, the adoption on 24 October 1995 of the EU General Directive on Data Protection (95/46/EC). As information flows and business patterns make geographical boundaries inappropriate in setting standards applying to automatic processing, so harmonization at international level becomes of increasing significance. This applies to informal arrangements as well as to the law, and initiatives to improve the scope for cooperation between European Data Protection and Privacy Commissioners have also been significant. One of the areas on which cooperative working is beginning to bear fruit, and which is clearly of interest to those involved in IT security, is the work being done to encourage and develop the use of Privacy Enhancing Technologies (PETS). Beyond the limits of the EU, but in a European context, initiatives designed to improve cooperation between Police Forces (Europol) and Customs (CIS) have had an impact on our work. 相似文献
19.
20.