首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   450篇
  免费   16篇
  国内免费   16篇
电工技术   3篇
综合类   6篇
化学工业   5篇
金属工艺   20篇
机械仪表   33篇
建筑科学   31篇
矿业工程   3篇
能源动力   3篇
轻工业   7篇
水利工程   5篇
石油天然气   12篇
武器工业   1篇
无线电   28篇
一般工业技术   17篇
冶金工业   7篇
原子能技术   1篇
自动化技术   300篇
  2023年   1篇
  2022年   1篇
  2021年   2篇
  2020年   1篇
  2019年   3篇
  2017年   3篇
  2016年   4篇
  2015年   6篇
  2014年   18篇
  2013年   11篇
  2012年   23篇
  2011年   23篇
  2010年   17篇
  2009年   32篇
  2008年   34篇
  2007年   28篇
  2006年   35篇
  2005年   27篇
  2004年   23篇
  2003年   19篇
  2002年   24篇
  2001年   12篇
  2000年   20篇
  1999年   16篇
  1998年   16篇
  1997年   14篇
  1996年   7篇
  1995年   7篇
  1994年   14篇
  1993年   9篇
  1992年   13篇
  1991年   2篇
  1990年   1篇
  1989年   2篇
  1988年   4篇
  1987年   1篇
  1986年   2篇
  1985年   2篇
  1984年   2篇
  1983年   1篇
  1981年   1篇
  1980年   1篇
排序方式: 共有482条查询结果,搜索用时 15 毫秒
11.
Stepwise refinement is a crucial conceptual tool for system development, encouraging program construction via a number of separate correctness-preserving stages which ideally can be understood in isolation. A crucial conceptual component of security is an adversary’s ignorance of concealed information. We suggest a novel method of combining these two ideas.Our suggestion is based on a mathematical definition of “ignorance-preserving” refinement that extends classical refinement by limiting an adversary’s access to concealed information: moving from specification to implementation should never increase that access. The novelty is the way we achieve this in the context of sequential programs.Specifically we give an operational model (and detailed justification for it), a basic sequential programming language and its operational semantics in that model, a “logic of ignorance” interpreted over the same model, then a program-logical semantics bringing those together — and finally we use the logic to establish, via refinement, the correctness of a real (though small) protocol: Rivest’s Oblivious Transfer. A previous report? treated Chaum’s Dining Cryptographers similarly.In passing we solve the Refinement Paradox for sequential programs.  相似文献   
12.
13.
Fault based testing aims at detecting hypothesized faults based on specifications or program source. There are some fault based techniques for testing Boolean expressions which are commonly used to model conditions in specifications as well as logical decisions in program source. The MUMCUT strategy has been proposed to generate test cases from Boolean expressions. Moreover, it detects eight common types of hypothesized faults provided that the original expression is in irredundant disjunctive normal form, IDNF. Software practitioners are more likely to write the conditions and logical decisions in general form rather than IDNF. Hence, it is interesting to investigate the fault detecting capability of the MUMCUT strategy with respect to general form Boolean expressions. In this article, we perform empirical studies to investigate the fault detection capability of the MUMCUT strategy with respect to general form Boolean expressions as well as mutated expressions. A mutated expression can be obtained from the original given Boolean expression by making a syntactic change based on a particular type of fault.
M. F. LauEmail:

T. Y. Chen   obtained his BSc and MPhil from the University of Hong Kong, MSc and DIC from the Imperial College of Science and Technology, PhD from the University of Melbourne. He is currently a Professor of Software Engineering at the Swinburne University of Technology. Prior to joining Swinburne, he has taught at the University of Hong Kong and the University of Melbourne. His research interests include software testing, debugging, maintenance, and validation of requirements. M. F. Lau   received the Ph.D. degree in Software Engineering from the University of Melbourne, Australia. He is currently a Senior Lecturer in the Faculty of Information and Communication Technologies, Swinburne University of Technology, Australia. His research publications have appeared in various scholarly journals, including ACM Transactions on Software Engineering and Methodology, The Journal of Systems and Software, The Computer Journal, Software Testing, Verification and Reliability, Information and Software Technology, Information Sciences, and Information Processing Letters. His research interests include software testing, software quality, software specification and computers in education. K. Y. Sim   received his Bachelor of Engineering in Electrical, Electronics and Systems from the National University of Malaysia in 1999 and the Master of Computer Science from the University of Malaya, Malaysia in 2001. Currently, he is a Senior Lecturer in the School of Engineering, Swinburne University of Technology, Sarawak Campus, Malaysia. His current research interests include software testing and information security. C. A. Sun   received the PhD degree in Computer Software and Theory in 2002 from Beijing University of Aeronautics and Astronautics, China; the bachelor degree in Computer and Its application in 1997 from University of Science and Technology Beijing, China. He is currently an Assistant Professor in the School of Computer and Information Technology, Beijing Jiaotong University, China. His research areas are software testing, software architecture and service-oriented computing. He has published about 40 referred papers in the above areas. He is an IEEE member.   相似文献   
14.
基于NDIS中间层驱动程序的隐蔽通道   总被引:5,自引:0,他引:5       下载免费PDF全文
李频  包涵卿  陈丹伟 《计算机工程》2009,35(16):151-153
通过一个基于网络驱动程序接口规范中间层的驱动,在Windows网络协议栈下建立一个隐蔽通道,使应用程序可利用其直接与外界通信。该通道的作用位置相比防火墙对于协议栈的控制更为底层,可直接从网卡读写数据进行网络通信。分析防火墙由于未对网络进行完整防护而被穿透的原因,探讨抵御该类攻击的方法。  相似文献   
15.
In this paper we give a formal definition of the requirements translation language Behavior Trees. This language has been used with success in industry to systematically translate large, complex, and often erroneous requirements documents into a structured model of the system. It contains a mixture of state-based manipulations, synchronisation, message passing, and parallel, conditional, and iterative control structures. The formal semantics of a Behavior Tree is given via a translation to a version of Hoare’s process algebra CSP, extended with state-based constructs such as guards and updates, and a message passing facility similar to that used in publish/subscribe protocols. We first provide the extension of CSP and its operational semantics, which preserves the meaning of the original CSP operators, and then the Behavior Tree notation and its translation into the extended version of CSP.  相似文献   
16.
廖宇  杨大军 《计算机工程》2000,26(9):140-142
PV查斯坦福机构开发的强大的规约。验证系统,它的适用领域广泛,在概要介绍PVS的构成。功能后,着重分析了PVS的规约语言,验证系统的特点,以及使得PVS灵活,强大的设计决策和内在机制。  相似文献   
17.
The paper addresses a notion of configuring systems, constructing them from specified component parts with specified sharing. This notion is independent of any underlying specification language and has been abstractly identified with the taking of colimits in category theory. Mathematically it is known that these can be expressed by presheaves and the present paper applies this idea to configuration. We interpret the category theory informally as follows. Suppose ? is a category whose objects are interpreted as specifications, and for which each morphism u : XY is interpreted as contravariant ‘instance reduction’, reducing instances of specification Y to instances of X. Then a presheaf P: Set ?op represents a collection of instances that is closed under reduction. We develop an algebraic account of presheaves in which we present configurations by generators (for components) and relations (for shared reducts), and we outline a proposed configuration language based on the techniques. Oriat uses diagrams to express colimits of specifications, and we show that Oriat's category Diag(?) of finite diagrams is equivalent to the category of finitely presented presheaves over ?. Received May 1998 / Accepted in revised form August 2000  相似文献   
18.
19.
Cognitive engineering has developed enormously over the last fifteen years. Yet, despite many excellent research projects and publications, its full potential has not been embraced into mainstream system design. This paper will examine the reasons for this failure and argue that the problem is not simply inertia or lack of education. There are strong organisational influences that cause resistance to this particular approach. The discipline itself has characteristics that make it fragile in the modern corporate structure. In addition, the cognitive engineers themselves are not blameless in the equation. They appear to have done exactly what they criticise the engineering community for doing: they have packaged their product in a manner that is not ‘user friendly’ to its target population, not structured to suit its application, and not output in the format required. Suggestions will be made to rectify the situation: a list of actions is proposed for practising cognitive engineers to make their product more likely to enjoy widespread uptake.  相似文献   
20.
目前,OPC技术在过程控制系统中获得了广泛的应用,但OPC技术以Microsoft公司的OLE/COM技术为基础,应用基本上仍然局限在Windows系统平台,而目前企业级的上层应用系统大多采用的是J2EE体系结构,如何在J2EE体系结构下应用OPC技术这将是本文要讨论的问题。本文探讨了Java与OPC相结合的技术,并构建了一种基于OPC和Java技术的分布式远程监控系统。这种系统具有良好的开放性、可扩展性和平台无关性特点。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号