首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   12篇
  完全免费   2篇
  自动化技术   14篇
  2022年   1篇
  2016年   1篇
  2013年   1篇
  2012年   1篇
  2011年   1篇
  2010年   2篇
  2008年   1篇
  2005年   1篇
  1999年   1篇
  1995年   1篇
  1991年   1篇
  1987年   1篇
  1978年   1篇
排序方式: 共有14条查询结果,搜索用时 109 毫秒
1.
网格性能评价问题分析与探讨   总被引:6,自引:3,他引:3  
网格作为一种新兴的计算平台,其复杂程度远远超出了传统的分布式系统。因此,对其进行性能评价也变得更为复杂,面临许多新的困难。为了对网格性能评价有一个全面深刻的认识,通过分析网格与分布式系统的根本区别,并指出影响其性能的关键因素以及对其进行性能评价的特殊要求,从而明确了网格性能评价需要解决的新问题,并初步探讨了可能的解决方向或方案。  相似文献
2.
Data structures and the time complexity of ray tracing   总被引:2,自引:2,他引:0  
The time complexity of ray tracing is a function of the data structures used for space division. Octree and hierarchical extents have been suggested as effective choices. In this paper, complexity parameters are suggested to characterize images and show that both octrees and hierarchies are appropriate choices if given most favorable images. Also, a unified technique is proposed and shown to be better than previous methods for all images. Octrees and hierarchies are particular cases of the new proposed algorithm.  相似文献
3.
本文主要基于现有Android手机系统框架设计了一种基带跟踪数据导出方案。对方案的总体框架、AP侧的软件流程、CP侧跟踪数据发送流程、串口通信机制的设计进行了详细说明,并给出了方案验证。在由三星公司Exynos4412四核AP芯片和重邮信科公司C6310双模CP芯片组成的手机硬件系统上实现和测试了该方案。实验结果表明,该基带数据导出方案在实际产品中具有良好的可靠性和可行性。  相似文献
4.
基于TD-LTE系统中数据跟踪技术的研究与DMA获取系统总线的不同模式,设计并分析比较了在S3C6410上通过DMA实现原语跟踪的两种方案。根据TD-LTE无线综合测试仪中的设计要求,选择了中断标志查询模式获取系统总线的方案,实现了TD-LTE系统原语的实时跟踪,满足了系统对CPU资源利用率以及数据传输速度和准确性的要求。  相似文献
5.
Educational technology innovations enable students to collaborate in online educational tasks, across individual, institutional, and national boundaries. However, online interactions across these boundaries are seldom transparent to each other. As a result, students are not motivated to share their best learning practices. Also, there is no singular basis on which one can compare learning practices of multiple students. In addressing these problems, we offer a solution that encourages students to record and share their learning interactions using our ontology-oriented theory-centric software tool. In doing so, students not only observe the products of their learning but also the process of how they learnt. These unique and computationally formal recordings of learning interactions not only allow educators to observe how learners learn, but also provide opportunities for learners to reflect on their understanding of meta-cognitive processes that they employed or neglected in their learning. Further, these recordings feed our software system to autonomously analyze students’ learning behaviour and to actively promote self- and co-regulation among learners. This article presents the need for such a system, the architecture of the system, and concludes with key experimental observations from software prototypes.  相似文献
6.
对数据包标记的各种技术进行了深入研究,分析它们存在的问题,基于上述的研究,提出一种多Agent的追踪方法,以解决传统方法存在的重构需要大量数据包,追踪鲁棒性和实时性差等问题.该方法采用并行分布式的结构,将整个追踪区域分成若干自治网络,在各自治网络内独立采用动态的标记概率等算法,同时设立追踪Agent进行自治区内的追踪,最终将由追踪管理器收集各追踪Agent的部分攻击路径并重构出整个攻击路径.理论分析表明,该方法降低了计算量和误报率,增强了追踪的实时性和准确性等.  相似文献
7.
唐杉  徐强  丁炜 《计算机工程》2008,34(15):16-18
片上网络(NoC)技术使片上系统(SoC)的通信机制发生了根本改变,直接影响了SoC中处理器内核的实时跟踪技术。该文以ARM Coresight构架的实时跟踪机制为参考,分析了在NoC环境中实现实时跟踪数据传输的难点,提出相应的解决方案。通过对实验系统的仿真,验证了其中的关键技术。  相似文献
8.
Patterns found in digital trace data are increasingly used as evidence of social phenomena. Still, the role of digital services not as mirrors but instead as mediators of social reality has been neglected. We identify characteristics of this mediation process by analyzing Twitter messages referring to politics during the campaign for the German federal election 2013 and comparing the thus emerging image of political reality with established measurements of political reality. We focus on the relationship between temporal dynamics in politically relevant Twitter messages and crucial campaign events, comparing dominant topics in politically relevant tweets with topics prominent in surveys and in television news, and by comparing mention shares of political actors with their election results.  相似文献
9.
The performance of a program often varies significantly over the course of the program's run. Thus, to understand the performance of a program it is valuable to look not just at end‐to‐end metrics (e.g. total number of cache misses) but also the time‐varying performance of the program. Unfortunately, analyzing time‐varying performance is both cumbersome and difficult. This paper makes three contributions, all geared toward helping others in working with traces. First, it describes a system, the TraceAnalyzer, designed specifically for working with performance traces; a performance trace captures the time‐varying performance of a program run. Second, it describes lessons that we have learned from many years of working with these traces. Finally, it uses a case study to demonstrate how we have used the TraceAnalyzer to understand a performance anomaly. Copyright © 2010 John Wiley & Sons, Ltd.  相似文献
10.
云平台数据遭受攻击时,入侵人员可伪造网络地址或通过间接攻击方式隐藏真实地址。此时,管理员不但要修复漏洞,还要获得证据线索和溯源。为此,提出云平台下入侵人员位置实时监测方法。分析云平台入侵监测系统设计需求,建立入侵监测模型;从数据源、安全警报等方面设置入侵人员位置监测系统结构,综合考虑各类干扰因素,设计系统电路与软件程序;利用粒子群多层解析方法,确定入侵特性权值系数矩阵,提取入侵者行为特征,并预先估计可能通过的路径;通过频谱特征采集痕迹数据,利用这些数据计算待监测位置与痕迹信息的特征模糊聚类概率,其中超出设定阈值的数据即为侵人员位置信息,实现实时监测。仿真结果表明,该方法监测到的位置信息与实际位置吻合度高,监测延时低。  相似文献
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号