首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   32篇
  免费   0篇
电工技术   2篇
化学工业   3篇
无线电   1篇
一般工业技术   2篇
冶金工业   13篇
自动化技术   11篇
  2022年   1篇
  2021年   2篇
  2010年   1篇
  2009年   3篇
  2008年   2篇
  2007年   1篇
  2006年   3篇
  2005年   1篇
  2002年   1篇
  2001年   1篇
  1998年   5篇
  1997年   4篇
  1996年   1篇
  1994年   3篇
  1993年   1篇
  1991年   1篇
  1977年   1篇
排序方式: 共有32条查询结果,搜索用时 0 毫秒
1.
2.
Casual message-logging protocols have several attractive properties: they introduce no blocking, send no additional messages over those sent by the application, and never create orphans. Causal message logging, however, does require the casual effects of the deliveries of messages to be tracked. The information concerning causality tracking is piggybacked on application messages, and the amount of such information can become large. In this paper we study the cost of tracking causality in causal message-logging protocols. One can track causality as accurately as possible, but to do so requires piggybacking a considerable amount of additional information. One can reduce the amount of piggybacked information on each message by reducing the accuracy of causality tracking. But then, causal message logging may piggyback the reduced amount of information on more messages. We specify six different methods of tracking causality, each representing a natural choice based on the specification of causal message logging. We describe how these six methods can be implemented and compare them in terms of how large of a piggyback load they impose. This load depends on the application that is using causal message logging. We characterize some applications for which a given method has the smallest piggyback load, and study using simulation the size of the piggyback load for two different models of applications. Received: July 1999 / Accepted: July 2001  相似文献   
3.
Many replication protocols employ a threshold model when expressing failures they are able to tolerate. In this model, one assumes that no more than t out of n components can fail, which is a good representation when failures are independent and identically distributed (IID). In many real systems, however, failures are not IID, and a straightforward application of threshold protocols yields suboptimal results. Here, we examine the problem of transforming threshold protocols into survivor-set protocols tolerating dependent failures. Our main goal is to show the equivalence between the threshold model and the core/survivor set model. Toward this goal, we develop techniques to transform threshold protocols into survivor set ones. Our techniques do not require authentication, self-verification or encryption. Our results show in one case that we can transform a threshold protocol to a subset by spreading a number of processes across processors. This technique treats a given threshold algorithm as a black box, and consequently can transform any threshold algorithm. However, it has the disadvantage that the transformation is not possible for all sets of survivor sets. The second technique instead focuses on transforming voters: functions that evaluate to a value out of a set of tallied values in a replication protocol. Voters are an essential part of many fault-tolerant protocols, and we show a universal way of transforming them. With such a transformation we expect that a large number of protocols in the literature can be directly transformed with our technique. It is still an open problem, however, if the two models are equivalent, and our results constitute an important first step in this direction.  相似文献   
4.
Octreotide (OCT) administration provides a biochemical cure in most acromegalic patients. This drug, however, causes several side effects and is very expensive. Acute testing has been reported to predict chronic responsiveness to OCT administration. The aim of this retrospective study was to evaluate which test, if any, among acute testing, short-term (1 month) administration, and 111In-pentetreotide (111In-DTPA-Phe-D-OCT) scintigraphy, is best in predicting response to long-term OCT treatment. Sixty-eight patients with active acromegaly were studied. An acute test (100 micrograms sc OCT) was performed as usual: a GH decrease greater than or equal to 50% of baseline was considered a positive response. GH and insulin-like growth factor I (IGF-I) were then assayed after 1 month (300 micrograms daily) and 3 months (150-600 micrograms daily) of OCT administration. GH was considered normalized when decreased less than or equal to 5 micrograms/L. Twenty-six of 68 patients were subjected to 111In-pentetreotide scintigraphy. Linear correlation analysis of the results was performed. Sensitivity, specificity, and positive and negative predictive values of the three tests were also calculated. Thirty-eight of 68 patients (56%) responded to the acute test. Among these 38 patients, 20 experienced normalization of GH and IGF-I levels during long-term therapy, as did 8 patients who did not respond to the acute test. No significant correlation was found between GH percent decrease during acute testing and long-term therapy (r = 0.11). Seven patients who responded to the acute test and 2 who did not respond had adenoma shrinkage during therapy. Conversely, GH and IGF-I decrease after short-term treatment significantly correlated with long-term treatment (r = 0.76 and 0.64, P < 0.01). Of the 26 patients subjected to 111In-pentetreotide scintigraphy, 13 had significant tracer uptake: normalization of GH and IGF-I was obtained in 8 patients. A significant correlation was found between tracer uptake and GH/IGF-I inhibition after 3 months of therapy (r = 0.6; P < 0.05). In the whole population, the positive predictive value of acute testing, short-term OCT administration, and 111In-penetreotide scintigraphy was 53%, 70%, and 73%, respectively, when the GH normalization (< 5 micrograms/L) after 3 months of therapy was considered. Moreover, 111-In-pentetreotide scintigraphy had the highest specificity (100% in patients with baseline GH values below 50 micrograms/L) compared with that of acute testing and short-term OCT administration. The acute test cannot be considered as a valuable index to identify patients' responsiveness to long-term OCT therapy, but it can be useful to test tolerability. By contrast, 1 month of OCT administration or the in vivo imaging of somatostatin receptors by 111-In-pentetreotide might better indicate the patients who might effectively benefit from this treatment.  相似文献   
5.
While it is widely understood that criminal miscreants are subverting large numbers of Internet-connected computers (e.g., for bots, spyware, SPAM forwarding), it is less well appreciated that Internet routers are also being actively targeted and compromised. Indeed, due to its central role in end-to-end communication, a compromised router can be leveraged to empower a wide range of direct attacks including eavesdropping, man-in-the-middle subterfuge, and denial of service. In response, a range or specialized anomaly detection protocols has been proposed to detect misbehaving packet forwarding between routers. This article provides a general framework for understanding the design space of this work and reviews the capabilities of various detection protocols.  相似文献   
6.
1,2,4-Oxadiazole is a heterocycle with wide reactivity and many useful applications. The reactive O-N bond is usually reduced using molecular hydrogen to obtain amidine derivatives. NH4CO2H-Pd/C is here demonstrated as a new system for the O-N reduction, allowing us to obtain differently substituted acylamidine, acylguanidine and diacylguanidine derivatives. The proposed system is also effective for the achievement of a reductive rearrangement of 5-(2′-aminophenyl)-1,2,4-oxadiazoles into 1-alkylquinazolin-4(1H)-ones. The alkaloid glycosine was also obtained with this method. The obtained compounds were preliminarily tested for their biological activity in terms of their cytotoxicity, induced oxidative stress, α-glucosidase and DPP4 inhibition, showing potential application as anti-diabetics.  相似文献   
7.
Pretreatment with octreotide (OCT) in acromegaly has been reported to improve surgical outcome. The objective of this study was to analyze retrospectively the effects of a 3- to 6-month presurgical treatment with OCT in acromegalics focusing on electrocardiographic (ECG) records, blood pressure levels, glucose and lipid profile, tumor size and consistency, easy tumor removal at surgery, and morphological findings at pathology. Fifty-nine patients with acromegaly who were undergoing surgical treatment were studied randomly before surgery; 37 patients were untreated, and 22 were treated with OCT at doses ranging 150-600 micrograms/day for 3-6 months. At study entry, untreated and OCT-treated patients had similar circulating GH and insulin-like growth factor I (IGF-I), glucose, and cholesterol levels as well as prevalence of overt diabetes mellitus, hypertension, and ECG abnormalities. In untreated and OCT-treated patients, respectively, radiological imaging documented microadenoma in 0 and 1, intrasellar macroadenoma in 10 and 6, intra- and suprasellar macroadenoma in 18 and 11, invasive macroadenoma in 9 and 4 patients. Before surgery, serum GH and IGF-I levels significantly decreased in the 22 OCT-treated acromegalics, and in 5 of them, a significant shrinkage was documented. ECG abnormalities disappeared in 7 of 11 (63.6%) OCT-treated patients. In 3 of the 7 patients with diabetes mellitus, treatment with OCT together with low carbohydrate intake normalized blood glucose levels, whereas in 2 patients, insulin could be replaced by oral antidiabetics, and in 2 patients, the insulin dose was reduced. Presurgical blood glucose, total cholesterol and triglyceride levels, as well as systolic (145.2 +/- 3.4 vs. 132.9 +/- 2.5 mm Hg; P < 0.01) and diastolic (94.3 +/- 1.7 vs. 84.3 +/- 1.6 mm Hg; P < 0.001) blood pressure levels were significantly higher in untreated than in OCT-treated patients. Two weeks after surgery, circulating GH and IGF-I levels were normalized in 11 untreated (29.7%) and 12 OCT-treated (54.5%) patients (P < 0.005, by chi 2 test). Macroscopically, no difference was found between untreated and OCT-treated adenomas, whereas at pathology, a significant increases in cellular atypia (31.6% vs. 19.2%; P < 0.05) was found in OCT-treated adenomas. One patients in the untreated group died from cardiorespiratory arrest during the early postoperative period. Finally, the average duration of hospitalization after operation was longer in untreated than in OCT-treated patients (8.6 +/- 0.7 vs. 5.6 +/- 0.5 days). We conclude that a 3- to 6-month treatment with OCT before surgery for GH-secreting adenoma improved clinical conditions and surgical outcome and reduced the duration of hospitalization after operation.  相似文献   
8.
Riedel's thyroiditis is a very rare disease of unknown aetiology, occasionally associated with retroperitoneal and mediastinal fibrosis. It is a benign condition, but may be confused with an anaplastic carcinoma of the thyroid. The differential diagnosis with anaplastic carcinoma is assured only by intraoperative biopsy. The Authors report a clinical case: symptoms were a progressive enlargement of the thyroid gland, left recurrential palsy, dyspnoea and dysphagia. The surgical treatment was total thyroidectomy, performed with bilateral neurolysis of recurrent nerves. The patient was also under adjuvant corticosteroid treatment.  相似文献   
9.
BACKGROUND: Recent evidence suggests that, in coronary artery disease (CAD), myocardial blood flow (MBF) regulation is abnormal in regions supplied by apparently normal coronary arteries. However, the relation between this alteration and MBF response to increasing metabolic demand has not been fully elucidated. METHODS AND RESULTS: MBF was assessed at baseline, during atrial pacing tachycardia, and after dipyridamole (0.56 mg/kg IV over 4 minutes) in 9 normal subjects and in 24 patients with ischemia on effort, no myocardial infarction, and isolated left anterior descending (n = 19) or left circumflex (n = 5) coronary artery stenosis (> or = 50% diameter narrowing). Perfusion of both poststenotic (S) and normally supplied (N) areas was measured off therapy by positron emission tomography and [13N]ammonia. Normal subjects and CAD patients showed similar rate-pressure products at baseline, during pacing, and after dipyridamole. In CAD patients, MBF was lower in S than in N territories at rest (0.68 +/- 0.14 versus 0.74 +/- 0.18 mL.min-1.g-1, respectively, P < .05), during pacing (0.92 +/- 0.29 versus 1.16 +/- 0.40 mL.min-1.g-1, respectively, P < .01), and after dipyridamole (1.18 +/- 0.34 versus 1.77 +/- 0.71 mL.min-1.g-1, respectively, P < .01). However, normal subjects showed significantly higher values of MBF both at rest (0.92 +/- 0.13 mL.min-1.g-1, P < .05 versus both S and N areas), during pacing tachycardia (1.95 +/- 0.64 mL.min-1.g-1, P < .01 versus both S and N areas), and after dipyridamole (3.59 +/- 0.71 mL.min-1.g-1, P < .01 versus both S and N areas). The percent change in flow was strictly correlated with the corresponding change in rate-pressure product in normal subjects (r = .85, P < .01) but not in either S (r = .04, P = NS) or N regions (r = .08, P = NS) of CAD patients. CONCLUSIONS: Besides epicardial stenosis, further factors may affect flow response to increasing metabolic demand and coronary reserve in patients with CAD.  相似文献   
10.
Network routers occupy a unique role in modern distributed systems. They are responsible for cooperatively shuttling packets amongst themselves in order to provide the illusion of a network with universal point-to-point connectivity. However, this illusion is shattered—as are implicit assumptions of availability, confidentiality, or integrity—when network routers are subverted to act in a malicious fashion. By manipulating, diverting, or dropping packets arriving at a compromised router, an attacker can trivially mount denial-of-service, surveillance, or man-in-the-middle attacks on end host systems. Consequently, Internet routers have become a choice target for would-be attackers and thousands have been subverted to these ends. In this paper, we specify this problem of detecting routers with incorrect packet forwarding behavior and we explore the design space of protocols that implement such a detector. We further present a concrete protocol that is likely inexpensive enough for practical implementation at scale. Finally, we present a prototype system, called Fatih, that implements this approach on a PC router and describe our experiences with it. We show that Fatih is able to detect and isolate a range of malicious router actions with acceptable overhead and complexity. We believe our work is an important step in being able to tolerate attacks on key network infrastructure components.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号