首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   72篇
  免费   3篇
综合类   3篇
化学工业   6篇
金属工艺   2篇
机械仪表   1篇
建筑科学   6篇
矿业工程   1篇
一般工业技术   7篇
冶金工业   8篇
原子能技术   1篇
自动化技术   40篇
  2017年   1篇
  2016年   3篇
  2013年   4篇
  2012年   1篇
  2011年   4篇
  2010年   5篇
  2009年   2篇
  2008年   9篇
  2007年   3篇
  2006年   8篇
  2005年   9篇
  2003年   2篇
  2002年   2篇
  2001年   3篇
  1999年   2篇
  1998年   1篇
  1995年   2篇
  1994年   2篇
  1993年   3篇
  1992年   3篇
  1990年   1篇
  1989年   1篇
  1985年   1篇
  1984年   1篇
  1982年   1篇
  1980年   1篇
排序方式: 共有75条查询结果,搜索用时 14 毫秒
21.
模型转换是MDA框架中的重要环节之一,以往的模型转换方法可能会因为缺乏语义保证而出现错误。本文通过本体映射来研究MDA模型转换,提出实现MDA模型语义层转换的方法,并提高模型转换的效率和准确率。  相似文献   
22.
Resource management is essential to build reliable middleware and to host potentially untrusted software components. Resource accounting allows to study and optimize program performance and to charge users for the resource consumption of their deployed components, while resource control can limit the resource consumption of components in order to prevent denial-of-service attacks. In the approach presented here, program transformations enable resource management in Java-based environments, even though the underlying runtime system may not expose information concerning the resource consumption of applications. We present a fully portable program transformation scheme to enhance standard Java runtime systems with mechanisms for CPU management. We implemented several optimizations in order to reduce the overhead of our CPU accounting scheme. Detailed performance measurements quantify this overhead and show the impact of various optimizations.  相似文献   
23.
On transformation of authorization policies   总被引:3,自引:0,他引:3  
Yun  Vijay   《Data & Knowledge Engineering》2003,45(3):333-357
In this paper, we propose a logic based approach to specify and to reason about transformation of authorization policies. The authorization policy is specified using a policy base which comprises a finite set of facts and access constraints. We define the structure of the policy transformation and employ a model-based semantics to perform the transformation under the principle of minimal change. Furthermore, we extend model-based semantics by introducing preference ordering to resolve possible conflicts during transformation of policies. We also discuss the implementation of the model-based transformation approach and analyse the complexity of the algorithms introduced. Our system is able to represent both implicit and incomplete authorization requirements and reason about nonmonotonic properties.  相似文献   
24.
Extended Transformed Stress Space for Geomaterials and Its Application   总被引:1,自引:0,他引:1  
Because the three-dimensional strength of soil, rock, and concrete is influenced nonlinearly by the hydrostatic pressure and Lode’s angle, the failure surface is irregular in stress space, especially in the large stress range. Based on Lade’s criterion, exponential failure function in coordinate p-q, and the concept of original transformed stress space, an extended transformed stress space and its corresponding transformed stress tensors are proposed in this paper. Compared with original transformed stress space, the extended one would be suitable to the large stress range. Processing test results in extended transformed stress space, the unified stress-strain relationship for a certain geomaterial can be easily obtained from the test results. The validity of extended transformed stress space is confirmed by test results of soil, rock, and concrete. Based on extended transformed stress space and the Modified Cam-Clay Model, a new constitutive model is also proposed in this paper, which can be used to predict three-dimensional stress-strain relationship for soils in the large stress range. The capacity of this model is demonstrated using triaxial test results of Toyoura sand with different stress paths in the large stress range.  相似文献   
25.
肝-胆排泄模型的数学表达   总被引:1,自引:1,他引:0  
李士骏 《辐射防护》2002,22(1):39-43
本文提出肝-胆排泄模型的数学表达,以注入血液的^99mTc标记的亚氨基二乙酸(IDA)衍生物为例,说明该数学表达的应用,得到与ICRP相应值几无差别的结果。  相似文献   
26.
    
G. E. P. Box 《TEST》1980,31(1):366-381
Summary Scientific learning is seen as an iterative process employing Criticism and Estimation. Sampling theory use of predictive distributions for model criticism is examined and also the implications for significance tests and the theory of precise measurement. Normal theory examples and ridge estimates are considered. Predictive checking functions for transformation, serial correlation, and bad values are reviewed as is their relation with Bayesian options. Robustness is seen from a Bayesian view point and examples are given The bad value problem is also considered and comparison withM estimators is made. This is an extended abstract of the paper “Sampling and Bayes’ Inference in Scientific Modelling and Robustness” later read before the Royal Statistical Society at Cardiff, Wales, on May 15th, 1980 and published inJ. Roy. Statist. Soc. A,143.  相似文献   
27.
28.
Recently a transformation approach for noncoherent radar detector design has been introduced, where the classical constant false alarm rate detectors for Exponentially distributed clutter are modified to operate in any clutter intensity model of interest. Recent applications of this approach have introduced new decision rules for target detection in Pareto and Weibull distributed clutter. These transformed detectors tended to lose the constant false alarm rate property with respect to one of the clutter parameters. A closer examination of this transformation process yields conditions under which the constant false alarm rate property can be retained. Based upon this, a new model for X-band maritime radar returns is investigated, and corresponding detectors are developed. The relative merits of this new development are investigated with synthetic and real X-band data.  相似文献   
29.
Parallelization of divide-and-conquer in the Bird-Meertens formalism   总被引:1,自引:0,他引:1  
An SPMD parallel implementation schema for divide-and-conquer specifications is proposed and derived by formal refinement (transformation) of the specification schema. The specification is in the form of a mutually recursive functional definition. In a first phase, a parallel functional program schema is constructed which consists of a communication tree and a functional program that is shared by all nodes of the tree. The fact that this phase proceeds by semantics-preserving transformations in the Bird-Meertens formalism of higher-order functions guarantees the correctness of the resulting functional implementation. A second phase yields an imperative distributed message-passing implementation of this schema. The derivation process is illustrated with an example: a two-dimensional numerical integration algorithm.Parts of this paper were presented at the International Parallel Processing Symposium, Mexico, 1994 [GoL94] and at the World Transputer Congress, Italy, 1994 [Gor94]  相似文献   
30.
We propose a method for calculating deformations of models by deforming a low‐resolution mesh and adding details while ensuring that the details we add satisfy a set of constraints. Our method builds a low‐resolution representation of a mesh by using edge collapses and performs an as‐rigid‐as‐possible deformation on the simplified mesh. We then add back details by reversing edge‐collapses so that the shape of the mesh is locally preserved. While adding details, we deform the mesh to match the predicted positions of constraints so that constraints on the full‐resolution mesh are met. Our method operates on meshes with arbitrary triangulations, satisfies constraints over the full‐resolution mesh and converges quickly.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号