首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   30篇
  免费   0篇
化学工业   4篇
金属工艺   1篇
能源动力   1篇
无线电   2篇
一般工业技术   2篇
冶金工业   3篇
自动化技术   17篇
  2015年   1篇
  2013年   1篇
  2011年   2篇
  2007年   1篇
  2006年   2篇
  2005年   2篇
  2004年   4篇
  2003年   1篇
  2001年   1篇
  2000年   2篇
  1999年   1篇
  1998年   3篇
  1996年   1篇
  1994年   3篇
  1989年   1篇
  1986年   1篇
  1981年   1篇
  1970年   1篇
  1964年   1篇
排序方式: 共有30条查询结果,搜索用时 15 毫秒
1.
This paper addresses the problem of bandwidth allocation under the weighted maximum rate constrained link sharing policy and proves a key theory in the condition of allocation termination. We propose several algorithms with various worst-case and average-case time complexities, and evaluate their computation elapse times.  相似文献   
2.
The AT&T Internet Difference Engine (AIDE) is a system that finds and displays changes to pages on the World Wide Web. The system consists of several components, including a webcrawler that detects changes, an archive of past versions of pages, a tool called HtmlDiff to highlight changes between versions of a page, and a graphical interface to view the relationship between pages over time. This paper describes AIDE, with an emphasis on the evolution of the system and experiences with it. It also raises some sociological and legal issues.  相似文献   
3.
The security of information system is like a chain. Its strength is affected by the weakest knot. Since we can achieve 100% Information Security Management System (ISMS) security, we must cautiously fulfill the certification and accreditation of information security. In this paper, we analyzed, studied the evaluation knowledge and skills required for auditing the certification procedures for the three aspects of ISMS—asset, threat, and vulnerability.  相似文献   
4.
Inevitability properties in branching temporal logics are of the syntax foralldiamondsuit phi, where phi is an arbitrary (timed) CTL (Computation Tree Logic) formula. Such inevitability properties in dense-time logics can be analyzed with the greatest fixpoint calculation. We present algorithms to model-check inevitability properties. We discuss a technique for early decision on greatest fixpoint calculation which has shown promising performance against several benchmarks. We have experimented with various issues which may affect the performance of TCTL inevitability analysis. Specifically, our algorithms come with a parameter for the measurement of time-progress. We report the performance of our implementation with regard to various parameter values and with or without the non-Zeno computation requirement in the evaluation of greatest fixpoints. We have also experimented with safe abstraction techniques for model-checking TCTL inevitability properties. The experiment results help us in deducing rules for setting the parameter for verification performance. Finally, we summarize suggestions for configurations of efficient TCTL inevitability evaluation procedure.  相似文献   
5.
Results of a study on the effect of heating corn oil in air to a 200C temp are reported. Heated oil was separated on a silicic acid column into 8 fractions. The first four fractions, constituting about 62% original oil, were found to be unchanged triglycerides. The remaining 4 fractions constituted polymeric and degraded products of high molecular wt. Percentage losses from the respective positions in the oleo- and linoleoglyceride fractions suggest that fatty acids in primary positions are slightly more susceptible to heat than those in the 2-position. Assuming a 1,3-random 2-random distribution, triglyceride fraction in the heated oil contained 6.7% trilinolein as compared to 17.7% in fresh oil. Evidence is presented which shows presence of branching in short chain unsaturated acids and of hydroxy acids in the saponified polymeric fractions. Presented in part at the AOCS Meeting, New Orleans, 1962  相似文献   
6.
The female sex pheromone of the Asian com borer,Ostrinia furnacalis, widespread in Taiwan, was confirmed as (Z)-12-tetradecenyl acetate and its geometric isomer (E)-12-tetradecenyl acetate in a ratio of ca. 31 by gas chromatography and gas chromatography-mass spectrometry in selected ion monitoring mode. Males were attracted by the mixture of these two synthetic components in the field, but the attractiveness was less than by virgin females. The presence of minor components in the sex pheromone was therefore suggested.  相似文献   
7.
Seasonal variation in antarctic aerosol   总被引:1,自引:0,他引:1  
Antarctic aerosols were sampled from the Clean Air Facility at the Amundsen-Scott South Pole Station. Continuous measurements of condensation nucleus concentration and aerosol volumetric light scattering were made throughout the 1978–1979 austral summer and 1979 winter. In addition, size distribution and chemical composition were determined from samples taken on Nuclepore filters by scanning electron microscopy and X-ray energy spectrometry. This investigation showed not only a regular seasonal variation in concentration, size distribution and chemical composition, but also revealed events lasting several days in which the Antarctic inversion “lid” over the clean winter surface air broke down to allow an invasion by sea salt aerosol from the coast.  相似文献   
8.
9.
Wang  Farn  Lo  Chia-Tien 《Real-Time Systems》1999,16(1):81-114
We want to develop verification techniques for real-time concurrent system specifications with high-level behavior structures. This work identifies two common engineering guidelines respected in the development of real-world software projects, structured programming and local autonomy in concurrent systems, and experiments with special verification algorithm based on those engineering wisdoms. The algorithm we have adopted respects the integrity of program structures, treats each procedure as an entity instead of as a group of statements, allows local state space search to exploit the local autonomy in concurrent systems without calculating the Cartesian products of local state spaces, and derives from each procedure declaration characteristic information which can be utilized in the verification process anywhere the procedure is invoked. We have endeavored to implement our idea, test it against an abstract extension of a real-world protocol in a mobile communication environment, and report the data.  相似文献   
10.
Binary synchronization has been used extensively in the construction of mathematical models for the verification of embedded systems. Although it allows for the modeling of complex cooperation among many processes in a natural environment, not many tools have been developed to support the modeling capability in this regard. In this article, we first give examples to argue that special algorithms are needed for the efficient verification of systems with complex synchronizations. We then define our models of distributed real-time systems with synchronized cooperation among many processes. We present algorithms for the construction of BDD-like diagrams for the characterization of complex synchronizations among many processes. We present weakest precondition algorithms that take advantage of the just-mentioned BDD-like diagrams for the efficient verification of complex real-time systems. Finally, we report experiments and argue that the techniques could be useful in practice.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号