首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   81篇
  免费   0篇
电工技术   1篇
化学工业   6篇
轻工业   1篇
无线电   1篇
一般工业技术   14篇
冶金工业   1篇
自动化技术   57篇
  2024年   1篇
  2022年   1篇
  2018年   1篇
  2015年   1篇
  2013年   3篇
  2012年   1篇
  2010年   2篇
  2009年   6篇
  2008年   2篇
  2007年   5篇
  2006年   1篇
  2005年   1篇
  2004年   8篇
  2003年   4篇
  2002年   1篇
  2001年   1篇
  2000年   6篇
  1999年   2篇
  1998年   6篇
  1997年   2篇
  1996年   2篇
  1995年   6篇
  1994年   1篇
  1993年   5篇
  1992年   4篇
  1991年   1篇
  1990年   2篇
  1987年   1篇
  1986年   1篇
  1984年   2篇
  1976年   1篇
排序方式: 共有81条查询结果,搜索用时 0 毫秒
51.
Secure Agents     
With the rapid proliferation of software agents, there comes an increased need for agents to ensure that they do not provide data and/or services to unauthorized users. We first develop an abstract definition of what it means for an agent to preserve data/action security. Most often, this requires an agent to have knowledge that is impossible to acquire – hence, we then develop approximate security checks that take into account, the fact that an agent usually has incomplete/approximate beliefs about other agents. We develop two types of security checks – static ones that can be checked prior to deploying the agent, and dynamic ones that are executed at run time. We prove that a number of these problems are undecidable, but under certain conditions, they are decidable and (our definition of) security can be guaranteed. Finally, we propose a language within which the developer of an agent can specify her security needs, and present provably correct algorithms for static/dynamic security verification.  相似文献   
52.
We show that stable models of logic programs may be viewed as minimal models of programs that satisfy certain additional constraints. To do so, we transform the normal programs into disjunctive logic programs and sets of integrity constraints. We show that the stable models of the normal program coincide with the minimal models of the disjunctive program thatsatisfy the integrity constraints. As a consequence, the stable model semantics can be characterized using theextended generalized closed world assumption for disjunctive logic programs. Using this result, we develop a bottomup algorithm for function-free logic programs to find all stable models of a normal program by computing the perfect models of a disjunctive stratified logic program and checking them for consistency with the integrity constraints. The integrity constraints provide a rationale as to why some normal logic programs have no stable models.  相似文献   
53.
54.
We describe how video data can be organized and structured so as to facilitate efficient querying. We develop a formal model for video data and show how spatial data structures, suitably modified, provide an elegant way of storing such data. We develop algorithms to process various kinds of video queries and show that, in most cases, the complexity of these algorithms is linear. A prototype system, called the Advanced Video Information System (AVIS), based on these concepts, has been designed at the University of Maryland.  相似文献   
55.
Dimensional analysis, traditionally used in physics and engineering to identify quantitative relationships, has recently been applied to qualitative reasoning of physical systems. We illustrate some problems of this approach. In the light of this, we reexamine the fundamentals of dimensional analysis in order to more precisely characterize its scope and limitations as a tool in qualitative reasoning. We also explore its relationship to state equation representations of physical systems. In particular, we describe its value in providing a set of constraints to reduce the ambiguity that bedevils qualitative reasoning schemes. We argue that dimensional analysis should not be seen as a substitute for knowledge about the physics but rather a supplement to other sources of knowledge.  相似文献   
56.
57.
Guest Editorial     
Multimedia Tools and Applications -  相似文献   
58.
There are now millions of PowerPoint documents available within corporate intranets and/or over the Internet. In this paper, we develop a formal model of PowerPoint databases. We propose a relational style algebra called pptA (PowerPoint Algebra) to query PowerPoint databases. The algebra contains some new operators (such as the APPLY operator that changes properties of objects, slides and presentations) as well as interesting twists on relational operators (e.g. join and cartesian product allow different entities being joined together to share attributes whose values may be merged). We prove a set of equivalence results within this algebra. We have implemented a version of pptA—the paper provides a cost model and experimental results on the conditions under which these equivalences are useful.  相似文献   
59.
Over the last few years, there has been a tremendous increase in the number of interactive multimedia presentations prepared by different individuals and organizations. In this paper, we present an algebra for creating and querying interactive multimedia presentation databases. This algebra operates on trees whose branches reflect different possible playouts of a set of presentations. The algebra not only extends all the classical relational operators to such databases, but also introduces a variety of novel operators for combining multiple presentations. As our algebra supports merging parts or all of existing presentations, this algebra can also be used as an authoring tool for creating multimedia presentations. We prove a host of equivalence results for queries in this algebra, which may be used to build query optimizers for interactive presentation databases.  相似文献   
60.
Creativity is central to human activity and is a powerful force in personal and organizational success. Approaches to supporting creativity are diverse and numerous. The only way to understand the diversity and utility of these methods is through their careful analysis. The analysis conducted in this paper is done with the aid of a theory. As a first step, we use infused design (ID) method to generate new concepts and methods in the classic discipline of statics, in addition to its prior use in the generation of a number of creative designs. The use of the ID method in the creative scientific discovery process is modeled with C–K design theory, leading to better understanding of ID and C–K. The exercise in this paper illustrates how the synthesis of a theory, a framework, and methods that support discovery and design is useful in modeling and evaluation of creativity methods. Several topics for future research are described in the discussion.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号