共查询到20条相似文献,搜索用时 734 毫秒
1.
This is an exploratory paper about combining logics, combining theories and combining structures. Typically when one applies logic to such areas as computer science, artificial intelligence or linguistics, one encounters hybrid ontologies. The aim of this paper is to identify plausible strategies for coping with ontological richness. 相似文献
2.
3.
<正>"也许我背后生有反骨吧。"周磊调侃般地形容自己为什么走上创业的道路。1998年,大学刚毕业的周磊到外经贸部面试,他被马云一眼看中,成为马云手下第一个和雅虎总部沟通的人。随 相似文献
4.
5.
创业对促进就业的作用
我国是人口大国,自然也是劳动力大国。虽有学者认为我国劳动力供给的“刘易斯拐点”已经来临.但总的来说,劳动力供大干求的格局暂时还不会改变。因此,如何促进就业,改善民生。仍是我国未来若干年所面临的重大战略问题。就业促进包括就业规模的扩大、就业结构的优化和就业质量的提高。国内外的实践表明,创业是就业促进的重要而有效途径。 相似文献
6.
九月 《数码设计:surface》2009,(11):36-37
本文从马斯洛"需要理论"的角度来认清艺术设计和艺术的主要区别,从而明确艺术设计和艺术各自的任务和研究内容,这有助于我们在设计学习和设计实践中更好的把握设计的发展方向,形成完整的设计理念,更好的完成设计任务。 相似文献
7.
《软件工程师》编辑部 《软件工程师》2008,(6):14-23
<正>当就业形势日渐严峻,党的十七大报告提出"以创业带动就业"的新思路,当越来越多的毕业生转变就业观念,把创业当作就业的第二舞台……也许,还有大批毕业生在面对创业、就业的选择时,为"向 相似文献
8.
9.
《Computer Graphics and Applications, IEEE》2007,27(2):6-6
Outgoing Editor-in-Chief John Dill and incoming Editor-in-Chief Maureen Stone discuss the magazine's successes and its future. 相似文献
10.
Leave One Out Error, Stability, and Generalization of Voting Combinations of Classifiers 总被引:4,自引:0,他引:4
We study the leave-one-out and generalization errors of voting combinations of learning machines. A special case considered is a variant of bagging. We analyze in detail combinations of kernel machines, such as support vector machines, and present theoretical estimates of their leave-one-out error. We also derive novel bounds on the stability of combinations of any classifiers. These bounds can be used to formally show that, for example, bagging increases the stability of unstable learning machines. We report experiments supporting the theoretical findings. 相似文献
11.
《网络安全技术与应用》2002,(9)
近日,国内著名网络安全厂商东方龙马系统集成公司在其防火墙脱颖而出之后不久,又隆重推出了具有高技术水准的东方龙马入侵检测系统。 东方龙马IDS由以下两部分组成:1.探测引擎,负责按照指定的安全规则监视网络数据流,发现网络攻击或网络违规的时候,按照安全策略的定义实施实时响应,如:向安全控制中心发送报警信息,实时阻断非法的网络连接,与防火墙联动阻断连接等。2.安全控制中心,负责管理探测引擎的运行、显示并记录探测引擎发来的报警 相似文献
12.
13.
Many people do great work but still can't satisfy their customers. When this happens to you, either learn to live with the results or take the reins and change them. Whichever path you choose, commit to it. 相似文献
14.
Cormac Smyth Evgeny Kudriashov Breda O'Driscoll Vitaly Buckin 《Journal of The Association for Laboratory Automation》2003,8(4):46-49
High-resolution ultrasonic spectroscopy is a novel technique with enormous potential for analysis of a wide range of samples and processes. This technique is based on precision measurements of velocity and attenuation of acoustical waves at high frequencies propagating through materials. It allows fast at/on line measurements analysis of formulation consistency (composition, structure) of raw materials, ingredients and intermediates, process impurity analysis, particle sizing, batch to batch variation, stability assessment etc in pharmaceutical industry. The technology can be used for static fingerprint measurements or for dynamic analysis of systems. Optical transparency is not required as ultrasonic waves propagate through opaque samples. The analysis is fast and non-destructive. High-resolution ultrasonic spectrometers were developed, patented and brought to the market by Ultrasonic Scientific Ltd. and recognised with various international awards. These instruments require small sample volumes, down to 0.03 ml, and give excellent resolution. They can be used for the analysis of composition, aggregation, particle sizing, gelation, micellisation, crystallisation, sedimentation, enzymatic activity, conformational transitions in polymers, biopolymer-ligand binding and antigen-antibody interactions, etc. This article describes main features of High-Resolution Ultrasonic Spectroscopy and area of applications of new high-resolution HR-US series of ultrasonic spectrometers. Several applications are illustrated including the monitoring of denaturation and aggregation of proteins in antibody solution, the measurements of the particle size in emulsions, precipitation in synthetic blood substitutes and crystallisation 相似文献
15.
It has been shown that secret information can be leaked to external observers through covert timing channels. In this paper we are concerned with a kind of timing attack that wants to differentiate two processes, presented as probabilistic transition systems, by observing their timing behaviour. Our goal is to make the processes indistinguishable i.e. bisimilar, by adding virtual (dummy) states and transitions to the original processes (padding). Instead of padding the processes with whole virtual copies of their counterparts - as done by some padding algorithms - we present an algorithm that uses the bisimulation equivalence relation - computed as a lumping partition - as the main criterion to optimise the padding procedure. 相似文献
16.
Wiretapping and surveillance are often covered by veils of secrecy that intelligence and law enforcement agencies reflexively apply to what they consider their most sensitive operations. Unfortunately, when the veils are lifted, we frequently discover that the technologies at the root of surveillance systems are often deeply flawed. 相似文献
17.
18.
SQL查询中外联结的使用 总被引:1,自引:0,他引:1
SQL语言是数据库应用中的一种查询语言,在多库查询中,经常用到联结的操作,本文讨论了SQL语言中外联结的使用,并给出了几个具体的例子. 相似文献
19.