首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   66篇
  免费   1篇
化学工业   2篇
能源动力   1篇
无线电   1篇
一般工业技术   5篇
冶金工业   14篇
自动化技术   44篇
  2022年   1篇
  2017年   3篇
  2016年   4篇
  2013年   2篇
  2012年   6篇
  2011年   1篇
  2010年   2篇
  2009年   3篇
  2008年   1篇
  2007年   2篇
  2006年   2篇
  2005年   1篇
  2004年   1篇
  2003年   2篇
  2002年   3篇
  2001年   4篇
  1998年   5篇
  1997年   3篇
  1996年   2篇
  1995年   2篇
  1993年   3篇
  1992年   2篇
  1988年   1篇
  1986年   1篇
  1985年   1篇
  1984年   1篇
  1983年   2篇
  1982年   2篇
  1981年   1篇
  1980年   1篇
  1976年   2篇
排序方式: 共有67条查询结果,搜索用时 15 毫秒
11.
Seventeen placentas from term gestation complicated by toxemia of pregnancy and 17 normal controls were tested by the fluorescent antibody technic. Antisera to normal placental connective tissue and toxemic placental connective tissue were used. The antisera were obtained by the injection into rabbits of placental extracts rich in connective tissue elements from normal and toxemic placentas. The antitoxemic antisera, after absorption with soluble sonic fraction of normal placentas, stained the following elements exclusively in 14 of the 17 placentas: part of the syncytial knots, fibrillar elements in the adventitia of blood vessels, and amorphous deposition of connective tissue. In each of the remaining three placentas at least two of the lesions were observed. The observation of bright fluorescence in part of the syncytiotrophoblasts and the syncytial knots in toxemic placentas led to the suggestion that they arise late in pregnancy during the disease. The thin fibrillar elements and the amorphous deposition of connective tissue were documented in the various developmental stages in toxemic and normal placentas as well. These findings established possible characteristic lesions in the placenta of pregnancies complicated by toxemia.  相似文献   
12.
It is known that under a wide variety of assumptions a database decomposition is lossless if and only if the database scheme has a lossless join. Biskup, Dayal and Bernstein (1979) have shown that when the given dependencies are functional, the database scheme has a lossless join if and only if one of the relation schemes is a key for the universal scheme. In this note we supply an alternative proof of that characterization. The proof uses tools from the theory of embedded join dependencies and the theory of tuple and equality generating dependencies, but is, nevertheless, much simpler than the previously published proof.  相似文献   
13.
14.
Module Checking   总被引:1,自引:0,他引:1  
In computer system design, we distinguish between closed and open systems. A closed system is a system whose behavior is completely determined by the state of the system. An open system is a system that interacts with its environment and whose behavior depends on this interaction. The ability of temporal logics to describe an ongoing interaction of a reactive program with its environment makes them particularly appropriate for the specification of open systems. Nevertheless, model-checking algorithms used for the verification of closed systems are not appropriate for the verification of open systems. Correct model checking of open systems should check the system with respect to arbitrary environments and should take into account uncertainty regarding the environment. This is not the case with current model-checking algorithms and tools. In this paper we introduce and examine the problem of model checking of open systems (module checking, for short). We show that while module checking and model checking coincide for the linear-time paradigm, module checking is much harder than model checking for the branching-time paradigm. We prove that the problem of module checking is EXPTIME-complete for specifications in CTL and 2EXPTIME-complete for specifications in CTL*. This bad news is also carried over when we consider the program-complexity of module checking. As good news, we show that for the commonly-used fragment of CTL (universal, possibly, and always possibly properties), current model-checking tools do work correctly, or can be easily adjusted to work correctly, with respect to both closed and open systems.  相似文献   
15.
The 2009 CAV (Computer-Aided Verification) award was presented to seven individuals who made major advances in creating high-performance Boolean satisfiability solvers. This annual award recognizes a specific fundamental contribution or series of outstanding contributions to the CAV field.  相似文献   
16.
We describe a reduction from temporal property verification to a program analysis problem. First we present a proof system that, unlike the standard formulation, is more amenable to reasoning about infinite-state systems: disjunction is treated by partitioning, rather than enumerating, the state space and temporal operators are characterized with special sets of states called frontiers. We then describe a transformation that, with the use of procedures and nondeterminism, enables off-the-shelf program analysis tools to naturally perform the reasoning necessary for proving temporal properties (e.g. backtracking, eventuality checking, tree counterexamples for branching-time properties, abstraction refinement, etc.). Using examples drawn from the PostgreSQL database server, Apache web server, and Windows OS kernel, we demonstrate the practical viability of our work.  相似文献   
17.
The 2011 CAV (Computer-Aided Verification) Award was presented on July 17, 2011 at the 23rd annual CAV conference in Snowbird, Utah to Thomas Ball and Sriram Rajamani of Microsoft Research for their contributions to software model checking, specifically the development of the SLAM/SDV software model checker, which successfully demonstrated computer-aided verification techniques on real programs.  相似文献   
18.
Radiofrequency catheter ablation has been useful in the treatment of ventricular tachycardia (VT) in selected patients with healed myocardial infarction. Previous studies have demonstrated success rates of 60% to 96% for targeted VT morphologies; however, these studies included patients only after they have had successful mapping procedures and have received radiofrequency lesions. All patients referred for VT ablation from July 1992 to November 1996 were included in this analysis on an intention-to-treat basis. Ninety-five procedures were performed in 66 patients for 77 distinct presentations with tolerated, sustained VT. Fifty-five procedures were successful (58%) and 40 procedures failed. Reasons for procedural failure included failed radiofrequency application despite adequate VT mapping (21 procedures), no tolerated VT induced (12), and aborted procedures due to complications or technical difficulties (7). Fifty-five patients (71%) eventually had a successful VT ablation, although 10 required > 1 procedure. This analysis revealed factors that contribute to failure of VT ablation procedures in addition to inadequate mapping and lesion formation. Procedural difficulties, particularly the inability to induce tolerated VT, frequently prevent successful catheter ablation in patients who present with tolerated, sustained VT.  相似文献   
19.
State space minimization techniques are crucial for combating state explosion. A variety of explicit-state verification tools use bisimulation minimization to check equivalence between systems, to minimize components before composition, or to reduce a state space prior to model checking. Experimental results on bisimulation minimization in symbolic model checking contexts, however, are mixed. This paper explores bisimulation minimization as an optimization in symbolic model checking of invariance properties. We consider three bisimulation minimization algorithms. From each, we produce a BDD-based model checker for invariant properties and compare this model checker to a conventional one based on backwards reachability. Our comparisons, both theoretical and experimental, suggest that bisimulation minimization is not viable in the context of invariance verification, because performing the minimization requires as many, if not more, computational resources as model checking the unminimized system through backwards reachability.  相似文献   
20.
This paper presents an introduction to and a formal connection between synthesis problems for discrete event systems that have been considered, largely separately, in the two research communities of supervisory control in control engineering and reactive synthesis in computer science. By making this connection mathematically precise in a paper that attempts to be as self-contained as possible, we wish to introduce these two research areas to non-expert readers and at the same time to highlight how they can be bridged in the context of classical synthesis problems. After presenting general introductions to supervisory control theory and reactive synthesis, we provide a novel reduction of the basic supervisory control problem, non-blocking case, to a problem of reactive synthesis with plants and with a maximal permissiveness requirement. The reduction is for fully-observed systems that are controlled by a single supervisor/controller. It complements prior work that has explored problems at the interface of supervisory control and reactive synthesis. The formal bridge constructed in this paper should be a source of inspiration for new lines of investigation that will leverage the power of the synthesis techniques that have been developed in these two areas.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号