全文获取类型
收费全文 | 46篇 |
免费 | 5篇 |
国内免费 | 6篇 |
专业分类
综合类 | 10篇 |
金属工艺 | 1篇 |
建筑科学 | 6篇 |
无线电 | 7篇 |
一般工业技术 | 2篇 |
冶金工业 | 12篇 |
自动化技术 | 19篇 |
出版年
2022年 | 1篇 |
2021年 | 1篇 |
2018年 | 5篇 |
2017年 | 1篇 |
2016年 | 4篇 |
2015年 | 5篇 |
2014年 | 1篇 |
2013年 | 6篇 |
2012年 | 3篇 |
2011年 | 5篇 |
2010年 | 1篇 |
2009年 | 2篇 |
2008年 | 2篇 |
2007年 | 2篇 |
2006年 | 1篇 |
2005年 | 2篇 |
2004年 | 1篇 |
2003年 | 5篇 |
2002年 | 2篇 |
2001年 | 2篇 |
1998年 | 1篇 |
1993年 | 1篇 |
1987年 | 1篇 |
1986年 | 1篇 |
1955年 | 1篇 |
排序方式: 共有57条查询结果,搜索用时 140 毫秒
21.
22.
This paper describes an approach to providing software fault tolerance for future deep‐space robotic National Aeronautics and Space Administration missions, which will require a high degree of autonomy supported by an enhanced on‐board computational capability. We focus on introspection‐based adaptive fault tolerance guided by the specific requirements of applications. Introspection supports monitoring of the program execution with the goal of identifying, locating, and analyzing errors. Fault tolerance assertions for the introspection system can be provided by the user, domain‐specific knowledge, or via the results of static or dynamic program analysis. This work is part of an on‐going project at the Jet Propulsion Laboratory in Pasadena, California. Copyright © 2011 John Wiley & Sons, Ltd. 相似文献
23.
Network security situation awareness is an important foundation for network security management, which presents the target system security status by analyzing existing or potential cyber threats in the target system. In network offense and defense, the network security state of the target system will be affected by both offensive and defensive strategies. According to this feature, this paper proposes a network security situation awareness method using stochastic game in cloud computing environment, uses the utility of both sides of the game to quantify the network security situation value. This method analyzes the nodes based on the network security state of the target virtual machine and uses the virtual machine introspection mechanism to obtain the impact of network attacks on the target virtual machine, then dynamically evaluates the network security situation of the cloud environment based on the game process of both attack and defense. In attack prediction, cyber threat intelligence is used as an important basis for potential threat analysis. Cyber threat intelligence that is applicable to the current security state is screened through the system hierarchy fuzzy optimization method, and the potential threat of the target system is analyzed using the cyber threat intelligence obtained through screening. If there is no applicable cyber threat intelligence, using the Nash equilibrium to make predictions for the attack behavior. The experimental results show that the network security situation awareness method proposed in this paper can accurately reflect the changes in the network security situation and make predictions on the attack behavior. 相似文献
24.
25.
26.
提出了一种基于内存自省技术的虚拟化安全防护模型,能够在无任何先验知识的前提下,通过实时分析物理主机物理内存重构物理主机状态信息、发现正在运行的虚拟机以及重构虚拟机高级语义信息,及时发现虚拟机中存在的恶意行为,并对恶意行为做出智能响应.实验结果表明,该模型具有透明、抗攻击、通用和高效等特性. 相似文献
27.
通过检测虚拟机内部的隐藏文件,检测工具可以及时判断虚拟机是否受到攻击.传统的文件检测工具驻留在被监视虚拟机中,容易遭到恶意软件的攻击.基于虚拟机自省原理,设计并实现一种模块化的虚拟机文件检测方法FDM. FDM借助操作系统内核知识,解析虚拟机所依存的物理硬件,构建虚拟机文件语义视图,并通过与内部文件列表比较来发现隐藏文件. FDM将硬件状态解析和操作系统语义信息获取以不同模块实现,不仅具备虚拟机自省技术的抗干扰性,还具备模块化架构的可移植性与高效性.实验结果表明, FDM能够准确快速地检测出虚拟机内部的隐藏文件. 相似文献
28.
How is introspection related to accurate self-perception? Self-focused attention is said to facilitate accurate judgments of cognitive aspects (attitudes, standards, and attributions) and somatic aspects (sensations, arousal, physical symptoms, emotions) of self. The present skeptical review concludes that the "perceptual accuracy hypothesis" is unsupported. There is simply little direct evidence, and the indirect evidence is better explained by objective self-awareness theory's core tenet: Self-focus increases consistency motivation. Most studies have also failed to appreciate the complexity of establishing the accuracy of self-judgment. The authors discuss some conceptual issues that future work should recognize, such as the logics of accuracy research, the role of honesty standards in accurate self-reports, differences in self-perception and object perception, and the implications of different self-theories for accuracy. (PsycINFO Database Record (c) 2010 APA, all rights reserved) 相似文献
29.
已有的云安全防护方法如加密、访问控制和虚拟机隔离等不能够提供数据端到端的安全防护。首先,提出了一个面向云环境的双层信息流控制模型,给出了模型的关键要素定义、集中式与分布式信息流控制规则、能力标记调整规则、标记传播规则和降密规则.然后,综合动态污点跟踪和虚拟机自省技术,设计并实现了原型系统IFCloud,可为云租户提供信息流跟踪与控制即服务,为云平台提供常见系统攻击如栈溢出、缓冲区溢出等攻击的防护机制.最后,给出了原型系统IFCloud的功能测试结果.表明IFCloud能够灵活、正确、实时地跟踪和控制云下敏感数据流.可应用于云平台下面向软件即服务的细粒度数据安全保护. 相似文献
30.
作为中国古代的伟大思想家,孔子的思想被后人接受和发展,并成为两千多年封建社会的指导思想。从个人修养的层面看,孔子重视内省和教育;从国家治理的层面看,孔子强调修身和教化。孔子的这种欲望观对当今中国的自由、民主、法治等都产生了深远的影响。 相似文献