期刊文献+
共找到288篇文章
< 1 2 15 >
每页显示 20 50 100
The Meanings of Addresses and Their Proper Translations
1
作者 贾睿 《海外英语》 2011年第3X期126-127,共2页
This thesis aims at exploring meanings of different addresses and their correct and suitable translations in both Chinese and English. After the introduction to the definition and meaning of addresses, the whole thesi... This thesis aims at exploring meanings of different addresses and their correct and suitable translations in both Chinese and English. After the introduction to the definition and meaning of addresses, the whole thesis probes into this problem from two aspects: the reasons which lead to the differences in addresses among relatives in both Chinese and English, and the ways how to translate addresses properly according to the situations. With the exploration, the writer hopes to introduce the cultural differences from the perspective of translations of addresses. 展开更多
关键词 addresses MEANING CULTURAL DIFFERENCE transiation
下载PDF
New LNK302 Addresses Lower Power Home Appliance and Industrial Applications
2
《电源技术应用》 2004年第10期621-621,共1页
SAN JOSE,Calif.-September 9,2004-Power Integrations,Inc.(NASDAQ:POWI),the leading supplier of high-voltageanalog integrated circuits used in power conversion, todayintroduced LNK302,a new member of the company'sLi... SAN JOSE,Calif.-September 9,2004-Power Integrations,Inc.(NASDAQ:POWI),the leading supplier of high-voltageanalog integrated circuits used in power conversion, todayintroduced LNK302,a new member of the company'sLinkSwitch-TN family of AC- DC power conversion ICs.Designed as a cost-effective replacement for bulky,energy-wasting capacitive droppers and linear transformers,the LinkSwitch-TN family is ideal for use in home applianceand industrial control applications.The addition of 展开更多
关键词 HOME NASDAQ New LNK302 addresses Lower Power Home Appliance and Industrial Applications TN AC high
下载PDF
China-ROK Forum Addresses Monetary Issues
3
作者 陈伟 《China Economist》 2008年第4期13-24,共12页
On June 12th,2008,the China-Korea Forum was held in Shanghai to address hot issues in China's nancial sector such as banking reform,securities market and RMB appreciation,Vice Mayor of Shanghai,o cials from Shangh... On June 12th,2008,the China-Korea Forum was held in Shanghai to address hot issues in China's nancial sector such as banking reform,securities market and RMB appreciation,Vice Mayor of Shanghai,o cials from Shanghai Securities Exchange Research Center and the Korea Financial Service Commission were invited to share their wisdom on these issues. 展开更多
关键词 China-ROK Forum addresses Monetary Issues ROK
下载PDF
Notification China Today's new e-mall addresses for each edition are now in operation! So writel Share your views and comments with us,and with fellow subscribers
4
《China Today》 2002年第7期23-23,共1页
Dear Readers,Our email address, chinatoday@263.net, is defunct. We now have separateaddresses for each of our editions. They are:
关键词 Notification China Today’s new e-mall addresses for each edition are now in operation
下载PDF
Chinese-Spanish Translation of International Conference Addresses from the Perspective of Skopos Theory
5
作者 赵雨菡 《海外英语》 2019年第24期128-129,共2页
This paper chooses the Spanish translation of the address to the China-CELAC Forum opening ceremony as a research corpus and adopts Skopos theory and its three basic rules as a theoretical guide to discuss the princip... This paper chooses the Spanish translation of the address to the China-CELAC Forum opening ceremony as a research corpus and adopts Skopos theory and its three basic rules as a theoretical guide to discuss the principles of Spanish translation of the conference address,the features of translation of words and sentences with Chinese characteristics,and the applicability of three rules of Skopos theory to Chinese-Spanish translation of international conference addresses.In Chinese-Spanish translation,the translator should convey the meaning of the source text while meeting the desired needs of the target audience under the guidance of Skopos theory to avert conflict between output content and reader ideology and fulfill cross-cultural communication. 展开更多
关键词 Skopos theory conference addresses Chinese-Spanish translation
下载PDF
PREMIER LI PENG ADDRESSES CAS CONGRESS
6
作者 (CAS-Xinhua) 《Bulletin of the Chinese Academy of Sciences》 1996年第3期191-191,共1页
Meeting jointly for the first time,the country’s 800 academicians from both the Chinese Academy of Sciences (CAS) and the Chinese Academy of Engineering (CAE), as well as five foreign members of CAS,opened a five-day... Meeting jointly for the first time,the country’s 800 academicians from both the Chinese Academy of Sciences (CAS) and the Chinese Academy of Engineering (CAE), as well as five foreign members of CAS,opened a five-day conference in Beijing on June 3, 1996. The event combined the 8th Academic Congress of CAS and the 3rd Academic Congress of CAE. At the opening ceremony in the same day, Premier 展开更多
关键词 CAS PREMIER LI PENG addresses CAS CONGRESS
下载PDF
A Covert Communication Method Using Special Bitcoin Addresses Generated by Vanitygen 被引量:7
7
作者 Lejun Zhang Zhijie Zhang +4 位作者 Weizheng Wang Rasheed Waqas Chunhui Zhao Seokhoon Kim Huiling Chen 《Computers, Materials & Continua》 SCIE EI 2020年第10期597-616,共20页
As an extension of the traditional encryption technology,information hiding has been increasingly used in the fields of communication and network media,and the covert communication technology has gradually developed.T... As an extension of the traditional encryption technology,information hiding has been increasingly used in the fields of communication and network media,and the covert communication technology has gradually developed.The blockchain technology that has emerged in recent years has the characteristics of decentralization and tamper resistance,which can effectively alleviate the disadvantages and problems of traditional covert communication.However,its combination with covert communication thus far has been mostly at the theoretical level.The BLOCCE method,as an early result of the combination of blockchain and covert communication technology,has the problems of low information embedding efficiency,the use of too many Bitcoin addresses,low communication efficiency,and high costs.The present research improved on this method,designed the V-BLOCCE which uses base58 to encrypt the plaintext and reuses the addresses generated by Vanitygen multiple times to embed information.This greatly improves the efficiency of information embedding and decreases the number of Bitcoin addresses used.Under the premise of ensuring the order,the Bitcoin transaction OP_RETURN field is used to store the information required to restore the plaintext and the transactions are issued at the same time to improve the information transmission efficiency.Thus,a more efficient and feasible method for the application of covert communication on the blockchain is proposed.In addition,this paper also provides a more feasible scheme and theoretical support for covert communication in blockchain. 展开更多
关键词 Covert communication blockchain Bitcoin address
下载PDF
Cluster Analysis of New Year's Addresses Released by the Queen and Prime Minister of the United Kingdom
8
作者 江磊磊 《海外英语》 2017年第14期229-230,共2页
The United Kingdom are still facing great challenges in all aspects after about half a year's struggle since they had made the decision to Brexit. The authorities are also trying to convince the public of its auth... The United Kingdom are still facing great challenges in all aspects after about half a year's struggle since they had made the decision to Brexit. The authorities are also trying to convince the public of its authorities by all means, especially by public speeches. This paper is going to analyze how the Queen and the Prime Minster try to convince their public of a better future in their New Year Addresses through the method of cluster analysis. 展开更多
关键词 Brexit New Year Address Cluster Criticism
下载PDF
Method for Automated Georeferencing and Integrating Printed Maps in GIS for Collecting Addresses
9
作者 Mohamed El Imame Malaainine Hassane Rhinane +1 位作者 Lahcen Baidder Omar Bachir Alami 《Journal of Geographic Information System》 2013年第1期33-39,共7页
Addresses are important data for urban applications. About 80% of the information local authorities use have a geographic component that is generally related to addresses. Addressing systems efficiency depend on the q... Addresses are important data for urban applications. About 80% of the information local authorities use have a geographic component that is generally related to addresses. Addressing systems efficiency depend on the quality of addresses locators. There are several methods to collect data. Surveys from the field are essential: GPS and pre-printed maps can be used to achieve this goal. GPS surveys from the field may be a solution, but it remains practical only for limited areas. To insure an accepted accuracy, GPS methods need special considerations that are time and money consuming. For Casablanca’s addressing locators, an alternative approach was adopted to collect 400 000 points. It took two months, 200 operators and 3500 printed maps to cover a study area of1,226 km2. This paper is to develop an optimized approach based on automated procedure for reintegrating printed maps in a geographic information system (GIS). It saves georeferencing time from 5min to just seconds per document. It insures, more importantly, an accuracy that is between20 cmto1 mfor scales that are between 1/500 and 1/2500. It ensures maps’ integration, independently of base map and coordinates system by introducing the notion of Georeferencing Code (GC). 展开更多
关键词 GIS Addressing Reference GEOREFERENCING GEODATABASE RASTER Data NAC GC
下载PDF
~evelopment of the Political Discourse in Recent Decades in the United States Through the Inaugural Addresses
10
作者 Conchi Hernandez-Guerra 《Sociology Study》 2011年第6期407-414,共8页
The aim of this paper is twofold: firstly, to make an analysis of what have been considered as the most important global problems faced in recent decades as seen by American Presidents through their inaugural address... The aim of this paper is twofold: firstly, to make an analysis of what have been considered as the most important global problems faced in recent decades as seen by American Presidents through their inaugural addresses; and secondly, to consider how both parties have faced these problems. To do this, this paper will cover the period from the inaugural address by President Kennedy to that of President Obama. Although a president has repeated a term of government, only the first speech will be taken into consideration. 展开更多
关键词 Political discourse inaugural address RHETORIC
下载PDF
A Contrastive Analysis of the Theme and Thematic Progerssion Patterns in the Addresses Made by Xi Jinping and Obama in the APEC CEO Summit
11
作者 魏露飞 《海外英语》 2015年第8期229-232,共4页
The thematic progression Patterns help to clarify the semantic relationships between the sentences and the method of the development in the texts,and they have been one of the important methods to analyze the discours... The thematic progression Patterns help to clarify the semantic relationships between the sentences and the method of the development in the texts,and they have been one of the important methods to analyze the discourse sequences in the text linguistics and discourse analysis(Qi Yucun,1993).With the theoretical framework of Halliday’s theme-rheme theory and the thematic progression patterns coined by Danes and other major scholars,selecting the two addresses made by Xi Jinping and Obama in the APEC CEO Summit in November 9,2014 as the data resource,this article aims to find out the similarities and differences in the choice of Themes and Thematic Progression Patterns and dig out the possible reasons.Since the two addresses are of the same genre but with different languages,new ideas may be provided in the contrastive discourse studies and the theory of contrastive study on Chinese and American addresses will be enriched through this kind of research. 展开更多
关键词 THEME THEMATIC progression pattern leaders’ address CONTRASTIVE study
下载PDF
A Study of Conceptual Metaphors in Obama's Weekly Addresses
12
作者 刘春迪 《海外英语》 2017年第1期211-215,共5页
Conceptual metaphor plays an important role in delivering political speeches for it can make abstract and complicated political concepts into clear and vivid statements. Therefore, it is often used by politicians. The... Conceptual metaphor plays an important role in delivering political speeches for it can make abstract and complicated political concepts into clear and vivid statements. Therefore, it is often used by politicians. The American President Barack Obama often utilizes metaphors in his speeches and good at utilizing them. The weekly address is a typical representative of political discourse. This article is intended to analyze the conceptual metaphors used in Obama's weekly addresses on the basis of the conceptual metaphor theory proposed by Lakoff and Johnson.The analysis shows that there are three categories of conceptual metaphors used frequently in Obama's weekly addresses, which can be learned that how Obama uses conceptual metaphors to make speeches more vivid. 展开更多
关键词 weekly address conceptual metaphor LAKOFF OBAMA
下载PDF
Evicting and filling attack for linking multiple network addresses of Bitcoin nodes
13
作者 Huashuang Yang Jinqiao Shi +4 位作者 Yue Gao Xuebin Wang Yanwei Sun Ruisheng Shi Dongbin Wang 《Cybersecurity》 EI CSCD 2024年第3期49-68,共20页
Bitcoin is a decentralized P2P cryptocurrency.It supports users to use pseudonyms instead of network addresses to send and receive transactions at the data layer,hiding users'real network identities.Traditional tr... Bitcoin is a decentralized P2P cryptocurrency.It supports users to use pseudonyms instead of network addresses to send and receive transactions at the data layer,hiding users'real network identities.Traditional transaction tracing attack cuts through the network layer to directly associate each transaction with the network address that issued it,thus revealing the sender's network identity.But this attack can be mitigated by Bitcoin's network layer privacy protections.Since Bitcoin protects the unlinkability of Bitcoin addresses and there may be a many-to-one relation-ship between addresses and nodes,transactions sent from the same node via different addresses are seen as com-ing from different nodes because attackers can only use addresses as node identifiers.In this paper,we proposed the evicting and flling attack to expose the correlations between addresses and cluster transactions sent from different addresses of the same node.The attack exploited the unisolation of Bitcoin's incoming connection processing mecha-nism.In particular,an attacker can utilize the shared connection pool and deterministic connection eviction strategy to infer the correlation between incoming and evicting connections,as well as the correlation between releasing and flling connections.Based on inferred results,different addresses of the same node with these connections can be linked together,whether they are of the same or different network types.We designed a multi-step attack procedure,and set reasonable attack parameters through analyzing the factors that affect the attack effciency and accuracy.We mounted this attack on both our self-run nodes and multi-address nodes in real Bitcoin network,achieving an aver-age accuracy of 96.9% and 82%,respectively.Furthermore,we found that the attack is also applicable to Zcash,Litecoin,Dogecoin,Bitcoin Cash,and Dash.We analyzed the cost of network-wide attacks,the application scenario,and proposed countermeasures of this attack. 展开更多
关键词 Security and privacy Bitcoin Address linking
原文传递
Visiting Danish Prime Minister Addresses at Tsinghua
14
《Tsinghua Science and Technology》 SCIE EI CAS 2004年第3期316-316,共1页
关键词 Visiting Danish Prime Minister addresses at Tsinghua
原文传递
An Active Deception Defense Model Based on Address Mutation and Fingerprint Camouflage
15
作者 Wang Shuo Chu Jiang +3 位作者 Pei Qingqi Shao Feng Yuan Shuai Zhong Xiaoge 《China Communications》 SCIE CSCD 2024年第7期212-223,共12页
The static and predictable characteristics of cyber systems give attackers an asymmetric advantage in gathering useful information and launching attacks.To reverse this asymmetric advantage,a new defense idea,called M... The static and predictable characteristics of cyber systems give attackers an asymmetric advantage in gathering useful information and launching attacks.To reverse this asymmetric advantage,a new defense idea,called Moving Target Defense(MTD),has been proposed to provide additional selectable measures to complement traditional defense.However,MTD is unable to defeat the sophisticated attacker with fingerprint tracking ability.To overcome this limitation,we go one step beyond and show that the combination of MTD and Deception-based Cyber Defense(DCD)can achieve higher performance than either of them.In particular,we first introduce and formalize a novel attacker model named Scan and Foothold Attack(SFA)based on cyber kill chain.Afterwards,we develop probabilistic models for SFA defenses to provide a deeper analysis of the theoretical effect under different defense strategies.These models quantify attack success probability and the probability that the attacker will be deceived under various conditions,such as the size of address space,and the number of hosts,attack analysis time.Finally,the experimental results show that the actual defense effect of each strategy almost perfectly follows its probabilistic model.Also,the defense strategy of combining address mutation and fingerprint camouflage can achieve a better defense effect than the single address mutation. 展开更多
关键词 address mutation deception defense fingerprint camouflage moving target defense probabilistic model
下载PDF
Distributed Application Addressing in 6G Network
16
作者 Liu Jie Chen Sibo +4 位作者 Liu Yuqin Mo Zhiwei Lin Yilin Zhu Hongmei He Yufeng 《China Communications》 SCIE CSCD 2024年第4期193-207,共15页
To ensure the extreme performances of the new 6G services,applications will be deployed at deep edge,resulting in a serious challenge of distributed application addressing.This paper traces back the latest development... To ensure the extreme performances of the new 6G services,applications will be deployed at deep edge,resulting in a serious challenge of distributed application addressing.This paper traces back the latest development of mobile network application addressing,analyzes two novel addressing methods in carrier network,and puts forward a 6G endogenous application addressing scheme by integrating some of their essence into the 6G network architecture,combining the new 6G capabilities of computing&network convergence,endogenous intelligence,and communication-sensing integration.This paper further illustrates how that the proposed method works in 6G networks and gives preliminary experimental verification. 展开更多
关键词 application addressing CNC(Computing&Network Convergence) DNS(Domain Name System) ICN(Information-Centric Network) 6G
下载PDF
Application Strategies of Automatic Addressable Single-Lamp Control Technology in Tunnel Lighting
17
作者 Huiyan Yang 《Journal of World Architecture》 2024年第2期90-95,共6页
The article mainly studies the application strategy of automatic addressable single-lamp control technology in tunnel lighting.It encompasses an introduction to this technology,an analysis of the tunnel lighting syste... The article mainly studies the application strategy of automatic addressable single-lamp control technology in tunnel lighting.It encompasses an introduction to this technology,an analysis of the tunnel lighting system using automatic addressable single-lamp control technology,and outlines the main development direction for this technology in modern tunnel lighting.The aim is to offer insights that can inform the rational deployment of this technology,thereby enhancing the lighting control effectiveness in modern tunnels and meeting their specific lighting requirements more effectively. 展开更多
关键词 Tunnel lighting Automatic addressable single-lamp control technology System design Cascade control
下载PDF
CAM辅助的哈希表查找性能分析 被引量:3
18
作者 万成威 邬江兴 +1 位作者 李玉峰 兰巨龙 《电子与信息学报》 EI CSCD 北大核心 2011年第2期272-277,共6页
现有大规模IP流处理方式中,哈希机制极具优势而在高速网络环境下被广泛采用,但其查找性能直接受限于访存次数。该文主要研究了CAM(Content Addressable Memory)辅助的哈希表(CAHT)查找性能。利用合理的近似,推导了单函数CAHT查找时平均... 现有大规模IP流处理方式中,哈希机制极具优势而在高速网络环境下被广泛采用,但其查找性能直接受限于访存次数。该文主要研究了CAM(Content Addressable Memory)辅助的哈希表(CAHT)查找性能。利用合理的近似,推导了单函数CAHT查找时平均访存次数的理论下限;结合单函数CAHT的分析结论给出了多函数CAHT查找时达到平均访存次数最小的条件。最后,使用实际网络数据验证了分析结果的有效性,为准确评估CAHT处理能力提供了必要的理论依据。 展开更多
关键词 CAM(Content ADDRESSABLE Memory)辅助的哈希表(CAHT) 查找 平均访存次数下限 泊松分布
下载PDF
一种支持多维资源描述的高效P2P路由算法 被引量:1
19
作者 宋伟 李瑞轩 +1 位作者 卢正鼎 於光灿 《软件学报》 EI CSCD 北大核心 2007年第11期2851-2862,共12页
在分析现有P2P(peer to peer)路由算法的基础上,提出了一种基于二阶矩定位、支持多维资源数据描述的高效资源路由算法——FAN(flabellate addressable network)路由算法.FAN算法将节点映射到统一的多维笛卡尔空间,并以节点相对空间原点... 在分析现有P2P(peer to peer)路由算法的基础上,提出了一种基于二阶矩定位、支持多维资源数据描述的高效资源路由算法——FAN(flabellate addressable network)路由算法.FAN算法将节点映射到统一的多维笛卡尔空间,并以节点相对空间原点的二阶矩作为子空间管理和资源搜索的依据.FAN路由算法具有O(log(N/k))的高路由效率,在节点加入和退出FAN网络时,更新路由信息的代价为O(klog(N/k)).实验结果表明,FAN路由算法具有路由效率高、维护代价小的优点,是一种P2P环境中支持多维资源数据描述的高效结构化资源路由算法.而且,目前部分基于CAN(content-addressable network)网络的改进算法也可以在FAN网络中适用,并获得更好的路由效率和更低的维护代价. 展开更多
关键词 P2P(peer to peer) FAN(flabellate ADDRESSABLE network)路由算法 二阶矩定位 资源搜索 多维资源描述
下载PDF
基于XML和COM(MAPI)的通用地址簿设计 被引量:1
20
作者 葛春林 周杰 蔡磊 《计算机应用与软件》 CSCD 2009年第12期82-85,共4页
步入信息时代,邮箱、传真机已经成为人们通信的重要平台,一般的传真机、邮箱都携带自身的地址簿,并不是所有邮箱、传真机的地址簿都可以兼容。通用的地址簿,对于开发一个邮件系统或传真机的驱动就可以直接采用,提高效率以及代码的重用... 步入信息时代,邮箱、传真机已经成为人们通信的重要平台,一般的传真机、邮箱都携带自身的地址簿,并不是所有邮箱、传真机的地址簿都可以兼容。通用的地址簿,对于开发一个邮件系统或传真机的驱动就可以直接采用,提高效率以及代码的重用性。目前使用较多的地址簿有Microsoft的WAB(Windows address book)、Outlook Address Book等,但有些地址簿不兼容,即一种地址簿格式不能导入到另一种地址簿中,通过Microsoft提供的MAPI(Messaging Application Programming Interface)探讨了如何使用这种COM组件技术和XML来实现一个简单的支持多种格式的地址簿管理工具。 展开更多
关键词 COM MAPI Windows ADDRESS BOOK XML
下载PDF
上一页 1 2 15 下一页 到第
使用帮助 返回顶部