首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   4篇
  免费   0篇
  国内免费   1篇
能源动力   1篇
冶金工业   1篇
自动化技术   3篇
  2022年   1篇
  2021年   1篇
  2010年   1篇
  2009年   1篇
  2004年   1篇
排序方式: 共有5条查询结果,搜索用时 78 毫秒
1
1.
Knowing which method parameters may be mutated during a method’s execution is useful for many software engineering tasks. A parameter reference is immutable if it cannot be used to modify the state of its referent object during the method’s execution. We formally define this notion, in a core object-oriented language. Having the formal definition enables determining correctness and accuracy of tools approximating this definition and unbiased comparison of analyses and tools that approximate similar definitions. We present Pidasa, a tool for classifying parameter reference immutability. Pidasa combines several lightweight, scalable analyses in stages, with each stage refining the overall result. The resulting analysis is scalable and combines the strengths of its component analyses. As one of the component analyses, we present a novel dynamic mutability analysis and show how its results can be improved by random input generation. Experimental results on programs of up to 185 kLOC show that, compared to previous approaches, Pidasa increases both run-time performance and overall accuracy of immutability inference.  相似文献   
2.
The author examines the ways in which a psychoanalytic perspective may illuminate the underlying developmental dynamics of children of lesbian parents. Families headed by gay and lesbian parents demand reconsideration of a theory of oedipal development based on heterosexual parents. If triangulation, the move from dyadic to triadic object relationships, depends on 2 primary processes--the child's acceptance of the immutability of generations and the child's recognition that children are excluded from the world of adult sexuality--parental gender or sexual orientation assumes less importance. The emergence of conscience from multifaceted processes of identification is consistent with this view of triangulation as a developmental phase. Children of gay and lesbian parents must be offered theories of healthy development that include them. (PsycINFO Database Record (c) 2010 APA, all rights reserved)  相似文献   
3.
The structure of a power energy system is becoming more distributed than before. It becomes challenging to manage such a system in a centralized way, because a central authority may not exist or may not be trusted by all parties. Blockchain is a promising tool to address this challenge, by enabling trusted collaboration in the absence of a trusted central authority. Its use in the energy sector has been pioneered by several pilot projects. However, to date the energy sector has not seen large-scale deployment of blockchain, partly because the founders of those pilot projects, the public, and utilities have not reached consensus on the values and limitations of blockchain in energy. This perspective aims to bridge this gap. First, the philosophy and unique values of blockchain are discussed. Second, some promising blockchain-based applications in energy systems are presented. Third, some common misunderstandings of blockchain in energy are discussed. Last, some frequently-asked questions from utilities are discussed. Hopefully this perspective can help advance large-scale deployment of blockchain in energy systems.  相似文献   
4.
静动态结合的Java程序不变性分析方法   总被引:1,自引:0,他引:1  
程序的不变性(immutability)是指类的实例对象在其生命周期内状态不会发生改变.不变性信息可以用来指导程序的分析、测试和验证等工作.现有分析不变性的技术主要集中于对程序的静态分析,而动态分析方面的工作很少.文中在分析了静、动态分析技术各自的优缺点后,提出了一种静动态结合的混合分析技术.首先通过对程序进行静态分析,即对程序进行分析测试和验证,来获得初步的程序不变性信息,然后对静态分析的结果中不确定的部分再进行动态分析,即通过观察程序运行时各个对象的状态变化进行分析,同时还将动态分析用于对静态分析结果的验证.静动态结合的分析技术比单纯的静态分析提高了分析结果的精度,同时也比单纯的动态分析降低了开销,提高了效率.  相似文献   
5.
田国华  胡云瀚  陈晓峰 《软件学报》2021,32(5):1495-1525
区块链作为一种多技术融合的新兴服务架构,因其去中心化、不可篡改等特点,受到了学术界和工业界的广泛关注.然而,由于区块链技术架构的复杂性,针对区块链的攻击方式层出不穷,逐年增加的安全事件导致了巨大的经济损失,严重影响了区块链技术的发展与应用.本文从层级分类、攻击关联分析两个维度对区块链已有安全问题的系统架构、攻击原理、防御策略展开研究.首先,按照区块链层级架构对现有区块链攻击进行归类,介绍了这些攻击方式的攻击原理,分析了它们的共性与特性.其次,分析总结了已有解决方案的思路,提出一些有效的建议和防御措施.最后,通过攻击关联分析归纳出多个区块链攻击簇,构建了一个相对完整的区块链安全防御体系,展望了区块链技术在未来复杂服务场景下的安全态势.  相似文献   
1
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号