首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   32篇
  免费   0篇
化学工业   3篇
轻工业   2篇
无线电   1篇
一般工业技术   5篇
冶金工业   2篇
自动化技术   19篇
  2022年   1篇
  2020年   1篇
  2019年   2篇
  2018年   1篇
  2012年   3篇
  2011年   2篇
  2010年   1篇
  2009年   1篇
  2008年   1篇
  2007年   2篇
  2006年   2篇
  2005年   2篇
  2003年   1篇
  2002年   1篇
  2001年   3篇
  2000年   3篇
  1998年   1篇
  1995年   2篇
  1994年   1篇
  1979年   1篇
排序方式: 共有32条查询结果,搜索用时 15 毫秒
21.
A folic acid sensor was prepared via an electropolymerized molecularly imprinted polymer (E-MIP) film of a bis-terthiophene dendron on a quartz crystal microbalance (QCM). The cyclic voltammetry (CV) electrodeposition of the imprinted polymer film was monitored by electrochemical QCM or E-QCM, enabling in situ monitoring and characterization of E-MIP film formation and the viscoelastic behavior of the film. A key component of the E-MIP process is the use of a bifunctional monomer design to precomplex with the template and function as a cross-linker. The complex was electropolymerized and cross-linked by CV to form a polythiophene matrix. Stable cavities were formed that specifically fit the size and shape of the folic acid template. The same substrate surface was used for folic acid sensing. The predicted geometry of the 1:2 folic acid/terthiophene complex was obtained through semiempirical AM1 quantum calculations. The analytical performance, expressed through the figures of merit, of the sensor in aqueous solutions of the analyte was investigated. A relatively good linearity, R(2) = 0.985, was obtained within the concentration range 0-100 μM folic acid. The detection limit was found to be equal to 15.4 μM (6.8 μg). The relative cross selectivity of the folic acid imprinted polymer against the three molecules follows this trend: pteroic acid (= 50%) > caffeine (= 41%) > theophylline (= 6%). The potential and limitations of the E-MIP method were also discussed.  相似文献   
22.
Byzantine quorum systems   总被引:12,自引:0,他引:12  
Summary. Quorum systems are well-known tools for ensuring the consistency and availability of replicated data despite the benign failure of data repositories. In this paper we consider the arbitrary (Byzantine) failure of data repositories and present the first study of quorum system requirements and constructions that ensure data availability and consistency despite these failures. We also consider the load associated with our quorum systems, i.e., the minimal access probability of the busiest server. For services subject to arbitrary failures, we demonstrate quorum systems over servers with a load of , thus meeting the lower bound on load for benignly fault-tolerant quorum systems. We explore several variations of our quorum systems and extend our constructions to cope with arbitrary client failures. Received: October 1996 / Accepted June 1998  相似文献   
23.
Purpose: We explored the eating habits of Arab immigrants to determine whether they have maintained their traditional diet or have consumed a more Westernized diet since immigrating to Canada. Methods: Arab immigrants who had been in Canada for at least eight years and were currently living in the Greater Toronto Area were recruited. A sample of 24 Arab immigrants completed a mailed, self-administered questionnaire, and six participated in a focus group. The focus group discussion was transcribed verbatim and results were recorded. Latent content analysis was used to analyze, code, and categorize emerging themes. Results: Arab immigrants consumed a mixture of both Arabic and Western food and perceived their current diet to be healthier than it was before they immigrated to Canada. Factors that influenced their food choices included increased nutrition health awareness, differences in food preferences and preparation methods, and preservation of dietary practices in the new environment. Conclusions: Our findings will help dietitians who work with Arab immigrants to become more aware of factors that motivate this group's food choices, and to create nutrition programs that are more culturally sensitive.  相似文献   
24.
We propose a unifying family of quadratic cost functions to be used in Peer-to-Peer ratings. We show that our approach is general since it captures many of the existing algorithms in the fields of visual layout, collaborative filtering and Peer-to-Peer rating, among them Koren spectral layout algorithm, Katz method, Spatial ranking, Personalized PageRank and Information Centrality. Besides of the theoretical interest in finding common basis of algorithms that where not linked before, we allow a single efficient implementation for computing those various rating methods. We introduce a distributed solver based on the Gaussian Belief Propagation algorithm which is able to efficiently and distributively compute a solution to any single cost function drawn from our family of quadratic cost functions. By implementing our algorithm once, and choosing the computed cost function dynamically on the run we allow a high flexibility in the selection of the rating method deployed in the Peer-to-Peer network. Using simulations over real social network topologies obtained from various sources, including the MSN Messenger social network, we demonstrate the applicability of our approach. We report simulation results using networks of millions of nodes.
Danny BicksonEmail:

Danny Bickson   is a Ph.D. candidate at the Hebrew University of Jerusalem. He received his M.Sc. and B.Sc. degree is 2003 and 1999 respectively at the Hebrew University of Jerusalem. His research interests include linear dynamical systems, message-passing algorithms applied in distributed settings and Peer-to-Peer networks. Dahlia Malkhi   is a Principal Researcher in the Microsoft Research Silicon Valley lab. She received her Ph.D., M.Sc. and B.Sc. degrees in 1994, 1988, 1985, respectively, from the Hebrew University of Jerusalem, Israel. During the years 1995–1999 she was a member of the Secure Systems Research Department at AT&T Labs-Research in Florham Park, New Jersey. From 1999 to 2007, she was a member of the faculty at the Institute of Computer Science, the Hebrew University of Jerusalem. Her research interests include all areas of distributed systems.   相似文献   
25.
3K3A-Activated Protein C (APC) is a recombinant variant of the physiological anticoagulant APC with pleiotropic cytoprotective properties albeit without the bleeding risks. The anti-inflammatory activities of 3K3A-APC were demonstrated in multiple preclinical injury models, including various neurological disorders. We determined the ability of 3K3A-APC to inhibit ocular inflammation in a murine model of lipopolysaccharide (LPS)-induced uveitis. Leukocyte recruitment, microglia activation, NLRP3 inflammasome and IL-1β levels were assessed using flow cytometry, retinal cryosection histology, retinal flatmount immunohistochemistry and vascular imaging, with and without 3K3A-APC treatment. LPS triggered robust inflammatory cell recruitment in the posterior chamber. The 3K3A-APC treatment significantly decreased leukocyte numbers and inhibited leukocyte extravasation from blood vessels into the retinal parenchyma to a level similar to controls. Resident microglia, which underwent an inflammatory transition following LPS injection, remained quiescent in eyes treated with 3K3A-APC. An inflammation-associated increase in retinal thickness, observed in LPS-injected eyes, was diminished by 3K3A-APC treatment, suggesting its clinical relevancy. Finally, 3K3A-APC treatment inhibited inflammasome activation, determined by lower levels of NLRP3 and its downstream effector IL-1β. Our results highlight the anti-inflammatory properties of 3K3A-APC in ocular inflammation and suggest its potential use as a novel treatment for retinal diseases associated with inflammation.  相似文献   
26.
We present Byzantine Disk Paxos, an asynchronous shared-memory consensus algorithm that uses a collection of n < 3t disks, t of which may fail by becoming non-responsive or arbitrarily corrupted. We give two constructions of this algorithm; that is, we construct two different t-tolerant (i.e., tolerating up to t disk failures) building blocks, each of which can be used, along with a leader oracle, to solve consensus. One building block is a t-tolerant wait-free shared safe register. The second building block is a t-tolerant regular register that satisfies a weaker termination (liveness) condition than wait freedom: its write operations are wait-free, whereas its read operations are guaranteed to return only in executions with a finite number of writes. We call this termination condition finite writes (FW), and show that wait-free consensus is solvable with FW-terminating registers and a leader oracle. We construct each of these t-tolerant registers from n < 3t base registers, t of which can be non-responsive or Byzantine. All the previous t-tolerant wait-free constructions in this model used at least 4t + 1 fault-prone registers, and we are not familiar with any prior FW-terminating constructions in this model. We further show tight lower bounds on the number of invocation rounds required for optimal resilience reliable register constructions, or more generally, constructions that use less than 4t + 1 fault-prone registers. Our lower bounds show that such constructions are inherently more costly than constructions that use 4t + 1 registers, and that our constructions have optimal round complexity. Furthermore, our wait-free construction is early-stopping, and it achieves the optimal round complexity with any number of actual failures. A preliminary version of this paper, by the same authors and with the same title, appears in Proceedings of the 23rd ACM Symposium on Principles of Distributed Computing (PODC ’04), July 2004, pages 226–235.  相似文献   
27.
In this paper, we provide a method to safely store a document in perhaps the most challenging settings, a highly decentralized replicated storage system where up to half of the storage servers may incur arbitrary failures, including alterations to data stored in them. Using an error correcting code (ECC), e.g., a Reed–Solomon code, one can take n pieces of a document, replace each piece with another piece of size larger by a factor of such that it is possible to recover the original set even when up to t of the larger pieces are altered. For t close to n/2 the space blowup factor of this scheme is close to n, and the overhead of an ECC such as the Reed–Solomon code degenerates to that of a trivial replication code. We show a technique to reduce this large space overhead for high values of t. Our scheme blows up each piece by a factor slightly larger than two using an erasure code which makes it possible to recover the original set using n/2−O(n/d) of the pieces, where d≈80 is a fixed constant. Then we attach to each piece O(d log n/log d) additional bits to make it possible to identify a large enough set of unmodified pieces, with negligible error probability, assuming that at least half the pieces are unmodified and with low complexity. For values of t close to n/2 we achieve a large asymptotic space reduction over the best possible space blowup of any ECC in deterministic setting. Our approach makes use of a d-regular expander graph to compute the bits required for the identification of n/2−O(n/d) good pieces.  相似文献   
28.
Work to date on algorithms for message-passing systems has explored a wide variety of types of faults, but corresponding work on shared memory systems has usually assumed that only crash faults are possible. In this work, we explore situations in which processes accessing shared objects can fail arbitrarily (Byzantine faults). Received: December 2000 / Accepted: July 2002 RID="*" ID="*" A preliminary version of the results presented in this paper appeared in Proceedings of the 14th International Symposium on Distributed Computing, Toledo, Spain, October 2000.  相似文献   
29.
Aguilera et al. and Malkhi et al. presented two system models, which are weaker than all previously proposed models where the eventual leader election oracle Ω can be implemented, and thus, consensus can also be solved. The former model assumes unicast steps and at least one correct process with f outgoing eventually timely links, whereas the latter assumes broadcast steps and at least one correct process with f bidirectional but moving eventually timely links. Consequently, those models are incomparable. In this paper, we show that Ω can also be implemented in a system with at least one process with f outgoing moving eventually timely links, assuming either unicast or broadcast steps. It seems to be the weakest system model that allows to solve consensus via Ω-based algorithms known so far. We also provide matching lower bounds for the communication complexity of Ω in this model, which are based on an interesting “stabilization property” of infinite runs. Those results reveal a fairly high price to be paid for this further relaxation of synchrony properties.  相似文献   
30.
Probabilistic Quorum Systems   总被引:1,自引:0,他引:1  
We initiate the study of probabilistic quorum systems, a technique for providing consistency of replicated data with high levels of assurance despite the failure of data servers. We show that this technique offers effective load reduction on servers and high availability. We explore probabilistic quorum systems both for services tolerant of benign server failures and for services tolerant of arbitrary (Byzantine) ones. We also prove bounds on the server load that can be achieved with these techniques.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号