全文获取类型
收费全文 | 81篇 |
免费 | 0篇 |
专业分类
电工技术 | 1篇 |
化学工业 | 6篇 |
轻工业 | 1篇 |
无线电 | 1篇 |
一般工业技术 | 14篇 |
冶金工业 | 1篇 |
自动化技术 | 57篇 |
出版年
2024年 | 1篇 |
2022年 | 1篇 |
2018年 | 1篇 |
2015年 | 1篇 |
2013年 | 3篇 |
2012年 | 1篇 |
2010年 | 2篇 |
2009年 | 6篇 |
2008年 | 2篇 |
2007年 | 5篇 |
2006年 | 1篇 |
2005年 | 1篇 |
2004年 | 8篇 |
2003年 | 4篇 |
2002年 | 1篇 |
2001年 | 1篇 |
2000年 | 6篇 |
1999年 | 2篇 |
1998年 | 6篇 |
1997年 | 2篇 |
1996年 | 2篇 |
1995年 | 6篇 |
1994年 | 1篇 |
1993年 | 5篇 |
1992年 | 4篇 |
1991年 | 1篇 |
1990年 | 2篇 |
1987年 | 1篇 |
1986年 | 1篇 |
1984年 | 2篇 |
1976年 | 1篇 |
排序方式: 共有81条查询结果,搜索用时 0 毫秒
51.
Piero A. Bonatti Sarit Kraus V.S. Subrahmanian 《Annals of Mathematics and Artificial Intelligence》2003,37(1-2):169-235
With the rapid proliferation of software agents, there comes an increased need for agents to ensure that they do not provide data and/or services to unauthorized users. We first develop an abstract definition of what it means for an agent to preserve data/action security. Most often, this requires an agent to have knowledge that is impossible to acquire – hence, we then develop approximate security checks that take into account, the fact that an agent usually has incomplete/approximate beliefs about other agents. We develop two types of security checks – static ones that can be checked prior to deploying the agent, and dynamic ones that are executed at run time. We prove that a number of these problems are undecidable, but under certain conditions, they are decidable and (our definition of) security can be guaranteed. Finally, we propose a language within which the developer of an agent can specify her security needs, and present provably correct algorithms for static/dynamic security verification. 相似文献
52.
José Alberto Fernández Jorge Lobo Jack Minker V. S. Subrahmanian 《Annals of Mathematics and Artificial Intelligence》1993,8(3-4):449-474
We show that stable models of logic programs may be viewed as minimal models of programs that satisfy certain additional constraints. To do so, we transform the normal programs into disjunctive logic programs and sets of integrity constraints. We show that the stable models of the normal program coincide with the minimal models of the disjunctive program thatsatisfy the integrity constraints. As a consequence, the stable model semantics can be characterized using theextended generalized closed world assumption for disjunctive logic programs. Using this result, we develop a bottomup algorithm for function-free logic programs to find all stable models of a normal program by computing the perfect models of a disjunctive stratified logic program and checking them for consistency with the integrity constraints. The integrity constraints provide a rationale as to why some normal logic programs have no stable models. 相似文献
53.
54.
Sibel Adalı K. Selçuk Candan Su-Shing Chen Kutluhan Erol V.S. Subrahmanian 《Multimedia Systems》1996,4(4):172-186
We describe how video data can be organized and structured so as to facilitate efficient querying. We develop a formal model
for video data and show how spatial data structures, suitably modified, provide an elegant way of storing such data. We develop
algorithms to process various kinds of video queries and show that, in most cases, the complexity of these algorithms is linear.
A prototype system, called the Advanced Video Information System (AVIS), based on these concepts, has been designed at the
University of Maryland. 相似文献
55.
Dimensional analysis, traditionally used in physics and engineering to identify quantitative relationships, has recently been applied to qualitative reasoning of physical systems. We illustrate some problems of this approach. In the light of this, we reexamine the fundamentals of dimensional analysis in order to more precisely characterize its scope and limitations as a tool in qualitative reasoning. We also explore its relationship to state equation representations of physical systems. In particular, we describe its value in providing a set of constraints to reduce the ambiguity that bedevils qualitative reasoning schemes. We argue that dimensional analysis should not be seen as a substitute for knowledge about the physics but rather a supplement to other sources of knowledge. 相似文献
56.
57.
Multimedia Tools and Applications - 相似文献
58.
There are now millions of PowerPoint documents available within corporate intranets and/or over the Internet. In this paper, we develop a formal model of PowerPoint databases. We propose a relational style algebra called pptA (PowerPoint Algebra) to query PowerPoint databases. The algebra contains some new operators (such as the APPLY operator that changes properties of objects, slides and presentations) as well as interesting twists on relational operators (e.g. join and cartesian product allow different entities being joined together to share attributes whose values may be merged). We prove a set of equivalence results within this algebra. We have implemented a version of pptA—the paper provides a cost model and experimental results on the conditions under which these equivalences are useful. 相似文献
59.
Over the last few years, there has been a tremendous increase in the number of interactive multimedia presentations prepared
by different individuals and organizations. In this paper, we present an algebra for creating and querying interactive multimedia
presentation databases. This algebra operates on trees whose branches reflect different possible playouts of a set of presentations.
The algebra not only extends all the classical relational operators to such databases, but also introduces a variety of novel
operators for combining multiple presentations. As our algebra supports merging parts or all of existing presentations, this
algebra can also be used as an authoring tool for creating multimedia presentations. We prove a host of equivalence results
for queries in this algebra, which may be used to build query optimizers for interactive presentation databases. 相似文献
60.
Offer Shai Yoram Reich Armand Hatchuel Eswaran Subrahmanian 《Research in Engineering Design》2013,24(2):201-214
Creativity is central to human activity and is a powerful force in personal and organizational success. Approaches to supporting creativity are diverse and numerous. The only way to understand the diversity and utility of these methods is through their careful analysis. The analysis conducted in this paper is done with the aid of a theory. As a first step, we use infused design (ID) method to generate new concepts and methods in the classic discipline of statics, in addition to its prior use in the generation of a number of creative designs. The use of the ID method in the creative scientific discovery process is modeled with C–K design theory, leading to better understanding of ID and C–K. The exercise in this paper illustrates how the synthesis of a theory, a framework, and methods that support discovery and design is useful in modeling and evaluation of creativity methods. Several topics for future research are described in the discussion. 相似文献