首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   21篇
  免费   0篇
无线电   2篇
冶金工业   5篇
自动化技术   14篇
  2014年   2篇
  2012年   2篇
  2011年   2篇
  2008年   1篇
  2007年   2篇
  2006年   1篇
  2004年   1篇
  2003年   2篇
  1999年   1篇
  1998年   3篇
  1997年   2篇
  1996年   1篇
  1994年   1篇
排序方式: 共有21条查询结果,搜索用时 31 毫秒
1.
The combination of SGML and database technology allows to refine both declarative and navigational access mechanisms for structured document collection: with regard to declarative access, the user can formulate complex information needs without knowing a query language, the respective document type definition (DTD) or the underlying modelling. Navigational access is eased by hyperlink-rendition mechanisms going beyond plain link-integrity checking. With our approach, the database-internal representation of documents is configurable. It allows for an efficient implementation of operations, because DTD knowledge is not needed for document structure recognition. We show how the number of method invocations and the cost of parsing can be significantly reduced. Edited by Y.C. Tay. Received April 22, 1996 / Accepted March 16, 1997  相似文献   
2.
The incidence of allergy to airborne proteins derived from tree and grass pollen, feces of mites, spores of molds, and pet dander has been increasing over the last decades. Since precise diagnosis is a prerequisite for successful immunotherapy, there is a rising demand for rapid, reliable, and inexpensive screening methods such as dipstick assays. With the purified recombinant major birch-pollen allergen rBet v 1a as model protein, crystalline bacterial cell-surface layers (S-layers) were tested for their applicability as an immobilization matrix for dipstick development. For this purpose, S-layers were deposited on a mechanically stable microporous support, cross-linked with glutaraldehyde, and free carboxylic acid groups of the S-layer protein were activated with carbodiimide. In the present test system, rBet v 1a was immobilized via the monoclonal mouse antibody BIP 1, which, unlike the allergen, is too large to enter the pores of the S-layer lattice, and which therefore formed a closed monolayer on the outermost surface of the crystal lattice. Moreover, BIP 1 is known to modulate IgE binding to the allergen. After incubation of the dipsticks in serum, washing of the reaction zone under tap water, and binding of an anti-IgE alkaline phosphatase conjugate, 5-bromo-4-chloro-3-indolyl phosphate/nitro blue tetrazolium was used as substrate, forming an IgE concentration-dependent colored precipitate on the S-layer surface. The investigation of patient sera previously tested with the CAP system confirmed the specificity of the S-layer-based dipstick assay. Since the dipstick is easy to handle and the whole test procedure takes only 90 min, this test system should be applicable for rapid determination of specific IgE and for first screening in the doctor's practice.  相似文献   
3.
Principles of self-organisation are presented and are applied to the fields of the Web, which has developed its form from the bottom up; e-science, in which a grid of intelligent components interacted towards a greater understanding of the science concerned; peer-to-peer systems, that lend themselves to information systems that do not work with centralized authority; software and hardware agents; and mobile applications, which often defy centralized control.  相似文献   
4.
5.
The participatory sensing paradigm, through the growing availability of cheap sensors in mobile devices, enables applications of great social and business interest, e.g., electrosmog exposure measurement and early earthquake detection. However, users’ privacy concerns regarding their activity traces need to be adequately addressed as well. The existing static privacy-enabling approaches, which hide or obfuscate data, offer some protection at the expense of data value. These approaches do not offer privacy guarantees and heterogeneous user privacy requirements cannot be met by them. In this paper, we propose a user-side privacy-protection scheme; it adaptively adjusts its parameters, in order to meet personalized location-privacy protection requirements against adversaries in a measurable manner. As proved by simulation experiments with artificial- and real-data traces, when feasible, our approach not only always satisfies personal location-privacy concerns, but also maximizes data utility (in terms of error, data availability, area coverage), as compared to static privacy-protection schemes.  相似文献   
6.
One fundamental issue with existing reputation systems, particularly those implemented in open and decentralized environments, is whitewashing attacks by opportunistic participants. If identities are cheap, it is beneficial for a rational provider to simply defect when selling services to its clients, leave the system to avoid punishment and then rejoin with a new identity. Current work usually assumes the existence of an effective identity management scheme to avoid the problem, without proposing concrete solutions to directly prevent this unwanted behavior. This article presents and analyzes an incentive mechanism to effectively motivate honesty of rationally opportunistic providers in the aforementioned scenario, by eliminating incentives of providers to change their identities. The main idea is to give each provider an identity premium, with which the provider may sell services at higher prices depending on the duration of its presence in the system. Our price‐based incentive mechanism, implemented with the use of a reputation‐based provider selection protocol and a reverse auction scheme, is shown to significantly reduce the impact of malicious and strategic ratings, while still allowing explicit competition among the providers. It is proven that if the temporary cheating gain by a provider is bounded and small and given a trust model with a reasonable low error bound in identifying malicious ratings, our approach can effectively eliminate irrationally malicious providers and enforce honest behavior of rationally opportunistic ones, even when cheap identities are available. We suggest an identity premium function that helps such honesty to be sustained given a certain cost of identities and analyze incentives of participants in accepting the proposed premium. Related implementation issues in different application scenarios are also discussed.  相似文献   
7.
Twenty years ago, a concept of psoriasis pathogenesis was proposed in which epidermal proliferation of psoriatic lesions was the consequence of immunological abnormalities. This concept has subsequently been supported by the remarkable efficacy of immunosuppressive drugs. Moreover, recent experimental data indicate that activated psoriatic lymphocytes are capable of inducing keratinocyte proliferation. However, we have still to explain the mechanism by which lymphocytes act on keratinocytes and to find out what antigenic material could be responsible for their activation.  相似文献   
8.
Many structured overlay networks rely on a ring invariant as a core network connectivity element. The responsibility ranges of the participating peers and navigability principles (greedy routing) heavily depend on the ring structure. For correctness guarantees, each node needs to eagerly maintain its immediate neighboring links - the ring invariant. However, the ring maintenance is an expensive task and it may not even be possible to maintain the ring invariant continuously under high churn, particularly as the network size grows. Furthermore, routing anomalies in the network, peers behind firewalls and Network Address Translators (NATs) create non-transitivity effects, which inevitably lead to the violation of the ring invariant. We argue that reliance on the ring structure is a serious impediment for real life deployment and scalability of structured overlays. In this paper we propose an overlay called Fuzzynet, which does not rely on the ring invariant, yet has all the functionalities of structured overlays. Fuzzynet takes the idea of lazy overlay maintenance further by dropping any explicit connectivity and data maintenance requirement, relying merely on the actions performed when new Fuzzynet peers join the network. We show that with sufficient amount of neighbors (O(log N), comparable to traditional structured over-lays), even under high churn, data can be retrieved in Fuzzynet w.h.p. We validate our novel design principles by simulations as well as PlanetLab experiments and compare them with ring based overlays.  相似文献   
9.
A sliding-window k-NN query (k-NN/w query) continuously monitors incoming data stream objects within a sliding window to identify k closest objects to a query. It enables effective filtering of data objects streaming in at high rates from potentially distributed sources, and offers means to control the rate of object insertions into result streams. Therefore k-NN/w processing systems may be regarded as one of the prospective solutions for the information overload problem in applications that require processing of structured data in real-time, such as the Sensor Web. Existing k-NN/w processing systems are mainly centralized and cannot cope with multiple data streams, where data sources are scattered over the Internet. In this paper, we propose a solution for distributed continuous k-NN/w processing of structured data from distributed streams. We define a k-NN/w processing model for such setting, and design a distributed k-NN/w processing system on top of the Content-Addressable Network (CAN) overlay. An extensive evaluation using both real and synthetic data sets demonstrates the feasibility of the proposed solution because it balances the load among the peers, while the messaging overhead within the P2P network remains reasonable. Moreover, our results clearly show the solution is scalable for an increasing number of queries and peers.  相似文献   
10.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号