首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   31篇
  免费   0篇
  国内免费   3篇
电工技术   1篇
机械仪表   2篇
矿业工程   1篇
无线电   2篇
一般工业技术   2篇
冶金工业   2篇
自动化技术   24篇
  2020年   1篇
  2019年   2篇
  2017年   1篇
  2016年   1篇
  2014年   2篇
  2012年   1篇
  2010年   3篇
  2009年   1篇
  2006年   2篇
  2005年   3篇
  2003年   2篇
  2002年   1篇
  2001年   4篇
  2000年   2篇
  1999年   1篇
  1997年   1篇
  1995年   1篇
  1993年   2篇
  1992年   1篇
  1991年   2篇
排序方式: 共有34条查询结果,搜索用时 15 毫秒
1.
We present a new concurrency model for the Eiffel programming language. The model is motivated by describing a number of semantic problems with the leading concurrency model for Eiffel, namely SCOOP. Our alternative model aims to preserve the existing behaviour of sequential programs and libraries wherever possible. Comparison with the SCOOP model is made. The concurrency aspects of the alternative model are presented in CSP along with a model of exceptions. The results show that while the new model provides increased parallelism, this comes with the price of increased overhead due to lock management.  相似文献   
2.
The frequent occurrence of implicitly thrown exceptions poses one of the challenges present in a Java compiler. Not only do these implicitly thrown exceptions directly affect the performance by requiring explicit checks, they also indirectly impact the performance by restricting code movement in order to satisfy the precise exception model in Java. In particular, instruction scheduling is one transformation that is restricted by implicitly thrown exceptions due to the heavy reliance on reordering instructions to exploit maximum hardware performance. The goal of this study is two-fold: first, investigate the degree to which implicitly thrown exceptions in Java hinder instruction scheduling, and second, find new techniques for allowing more efficient execution of Java programs containing implicitly thrown exceptions. Experimental results show that with aggressive scheduling techniques, such as superblock scheduling, the negative performance impact can be greatly reduced.  相似文献   
3.
面向意外处理的工作流系统建模与执行   总被引:7,自引:0,他引:7  
产生于工作流系统的执行阶段、未在系统建模阶段进行描述和定义的突发事件,称为工作流意外事件,对应意外事件的处理过程,称为意外处理。该文针对意外事件,从系统建模与模型执行两个方面对工作流意外处理进行了探讨,在系统建模阶段,通过拓展Petri网中的基本概念,提出并构造了组成工作流的过程单元,在将工作流内在的逻辑关系分解为控制流与数据流的基础上,讨论了一个面向意外处理的工作流系统复合建模方法,对应工作流的模型执行,定义了两类意外处理,用矩阵形式分别表示或标识控制流、数据流和意外事件,经过矩阵分析与变换,对意外事件的影响区域进行范围界定。最后,探讨了这种意外处理方法在数据流意外处理中的实例应用。  相似文献   
4.
The paper reviews copyright philosophical, economic and social justification confronted by the dematerialization of creative outputs. Digital Rights Management (DRM) is the tool implemented by copyright owners to adjust to the advent of the Digital Era. The claim is that DRM effectively addresses digital threats and market failures. If this is true, what is left of the role of copyright law in the digital environment? This review suggests an argument for traditional copyright justifications to resist in the digital environment. As a consequence, digital tools such as DRM need to be engineered according to these justifications, in order to preserve the balance between law and technology.  相似文献   
5.
This article introduces and uses a representation of defeasible inheritance networks where links in the network are viewed as propositions, and where defeasible links are tagged with a quantitative indication of the proportion of exceptions, called the doubt index. This doubt index is used for restricting the length of the chains of inference.The representation also introduces the use of defeater literals that disable the chaining of subsumption links. The use of defeater literals replaces the use of negative defeasible inheritance links, expressing “most A are not B”. The new representation improves the expressivity significantly.Inference in inheritance networks is defined by a combination of axioms that constrain the contents of network extensions, a heuristic restriction that also has that effect, and a nonmonotonic operation of minimizing the set of defeater literals while retaining consistency.We introduce an underlying semantics that defines the meaning of literals in a network, and prove that the axioms are sound with respect to this semantics. We also discuss the conditions for obtaining completeness.Traditional concepts, assumptions and issues in research on nonmonotonic or defeasible inheritance are reviewed in the perspective of this approach.  相似文献   
6.
The ethical treatment of human participants in psychological research is regulated by both federal guidelines and the ethical standards of the American Psychological Association (APA). Under certain circumstances, however, both APA standards and federal regulations allow for exceptions for informed consent. In spite of the possibility of exception, a number of factors have made it difficult to conduct and publish research that does not incorporate informed consent. The authors consider these factors and propose 2 approaches that may reduce reluctance to consider exceptions to informed consent under appropriate circumstances. First, journals should not rely on informed consent as the only method of screening research for the ethical treatment of human participants. Second, efforts must be made to work with institutional review boards and other units that review psychological research to ensure that their members are aware of the conditions under which informed consent is considered reasonable. Failure to consider ethical research without informed consent may have serious ethical consequences for research. (PsycINFO Database Record (c) 2010 APA, all rights reserved)  相似文献   
7.
Induction of ripple-down rules applied to modeling large databases   总被引:1,自引:0,他引:1  
A methodology forthe modeling of large data sets is described which results in rule sets having minimal inter-rule interactions, and being simply maintained. An algorithm for developing such rule sets automatically is described and its efficacy shown with standard test data sets. Comparative studies of manual and automatic modeling of a data set of some nine thousand five hundred cases are reported. A study is reported in which ten years of patient data have been modeled on a month by month basis to determine how well a diagnostic system developed by automated induction would have performed had it been in use throughout the project.  相似文献   
8.
This paper presents a modified YCN cryptographic key assignment scheme in a hierarchy with exceptions which is secure against Hwang's attack.  相似文献   
9.
A Nearest Hyperrectangle Learning Method   总被引:5,自引:0,他引:5  
Salzberg  Steven 《Machine Learning》1991,6(3):251-276
This paper presents a theory of learning called nested generalized exemplar (NGE) theory, in which learning is accomplished by storing objects in Euclidean n-space, En, as hyperrectangles. The hyperrectangles may be nested inside one another to arbitrary depth. In contrast to generalization processes that replace symbolic formulae by more general formulae, the NGE algorithm modifies hyperrectangles by growing and reshaping them in a well-defined fashion. The axes of these hyperrectangles are defined by the variables measured for each example. Each variable can have any range on the real line; thus the theory is not restricted to symbolic or binary values.This paper describes some advantages and disadvantages of NGE theory, positions it as a form of exemplarbased learning, and compares it to other inductive learning theories. An implementation has been tested in three different domains, for which results are presented below: prediction of breast cancer, classification of iris flowers, and prediction of survival times for heart attack patients. The results in these domains support the claim that NGE theory can be used to create compact representations with excellent predictive accuracy.  相似文献   
10.
季振华 《微计算机信息》2006,(2Z):137-139,256
介绍了ARM7TDMI的7种工作模式及各种工作模式下处理器的基本功能、适用的条件以及在嵌入式系统设计中的重要性。详细分析了复位、快速中断和普通中断的编程要点以及在嵌入程序设计中的作用,并结合S3C44BO示例程序分析了CPU对异常处理的方法。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号