期刊文献+
共找到125篇文章
< 1 2 7 >
每页显示 20 50 100
论战国问对体文献起源于“访问”制度 被引量:1
1
作者 刘全志 《聊城大学学报(社会科学版)》 2011年第1期70-73,共4页
战国问对体文献有众多独特的言说方式,其中最为本质的特征应该是主动性咨询、请教行为。流行于整个春秋时期的"访问"制度,在言说方式上与战国问对体文献有着众多本质特征的一致性。具体考察"访问"行为的文本事例,... 战国问对体文献有众多独特的言说方式,其中最为本质的特征应该是主动性咨询、请教行为。流行于整个春秋时期的"访问"制度,在言说方式上与战国问对体文献有着众多本质特征的一致性。具体考察"访问"行为的文本事例,可以断定问对体文献应直接来源于"访问"制度。在从"访问"行为走向诸子问对体文献的过程中,孔子及稍后的七十子著述起着重要的桥梁,对战国问对体散文而言,他们的努力无疑具有开创性质。 展开更多
关键词 问对体文献 “访问”制度 言说方式 孔子
下载PDF
种种“访问”
2
作者 刘洪毓 《中学英语园地(高中一二年级)》 2004年第3期7-9,共3页
关键词 “访问” 中学 英语 词汇 VISIT SEE CALL dropin INTERVIEW 词义 用法
下载PDF
清华简《殷高宗问于三寿》与先秦“访问”制度 被引量:1
3
作者 张朋兵 《史学理论与史学史学刊》 CSSCI 2017年第1期71-84,共14页
清华简《殷高宗问于三寿》源自可靠的战国问对文献,简文所言商王咨政之事为研究先秦'访问'制度提供了新的证据。先秦'访问'仪式有其一套完整的程式,咨谋者是问对的主体,问询内容是咨访行为的关键。耆老由于德高望劭与... 清华简《殷高宗问于三寿》源自可靠的战国问对文献,简文所言商王咨政之事为研究先秦'访问'制度提供了新的证据。先秦'访问'仪式有其一套完整的程式,咨谋者是问对的主体,问询内容是咨访行为的关键。耆老由于德高望劭与巫职背景,故有'献言'之责,君王也有'养老乞言'之需,这都源自周代咨政礼仪。访问仪式及活动直接催生了问对文献的生成,曾流布于社会上关乎邦国成败的'德言'也被大量辑录而成'语'类文献。 展开更多
关键词 清华简 《殷高宗问于三寿》 “访问”制度 咨政 耆老 问对体
下载PDF
高职院校实施“访问工程师”制度的意义与实践 被引量:19
4
作者 朱方鸣 《教育与职业》 北大核心 2007年第14期60-61,共2页
本文结合高职院校的实际情况,重点阐述了高职院校实施“访问工程师”制度的意义、具体做法以及实施过程中的问题与对策,以期为高职院校的持续稳步发展提供借鉴和思考。
关键词 高等职业教育 “访问工程师”制度 意义 策略 问题对策
下载PDF
Visual Studio 2010中访问VFP表方法研究 被引量:2
5
作者 贾志先 《软件》 2015年第3期15-18,共4页
针对在Visual Studio 2010中的VB.NET下如何访问VFP表的方法进行了研究和讨论。常用的访问数据库表的方式有ADO、RDO和Ole Db等。主要讨论了ADO和RDO两种访问VFP表的方式。研究发现ADO方式访问VFP表存在一些BUG,会使程序出现异常。使用... 针对在Visual Studio 2010中的VB.NET下如何访问VFP表的方法进行了研究和讨论。常用的访问数据库表的方式有ADO、RDO和Ole Db等。主要讨论了ADO和RDO两种访问VFP表的方式。研究发现ADO方式访问VFP表存在一些BUG,会使程序出现异常。使用RDO方式访问VFP表,在软件发布时,需要将VFP的ODBC驱动程序vfpodbc.dll、组件文件Interop.RDO.dll和文件MSRDO20.dll进行打包,并对MSRDO20.dll进行注册。本文中给出了MSRDO20.dll的注册项和注册值,以及在应用Setup Factory 9建立的软件安装包中所要输入的注册代码。 展开更多
关键词 VISUAL STUDIO 2010 ADO RDO 访问VFP表
下载PDF
高职高专实施“访问工程师”制度的思考——以扬州工业职业技术学院为例 被引量:5
6
作者 张瑞云 《重庆科技学院学报(社会科学版)》 2011年第23期199-201,共3页
在高职院校实施"访问工程师"制度是加快"双师型"教师培养的重要举措。介绍了扬州工业职业技术学院实施"访问工程师"项目的做法及其取得的效果,并分析了存在的问题,提出了完善这项制度的建议。
关键词 高职院校 “双师型”教师培养 “访问工程师”制度 校企合作
下载PDF
高职院校“访问工程师”制度实施的保障机制研究
7
作者 翟建 姜春华 《科技资讯》 2012年第24期233-233,共1页
本文总结了高职院校推行"访问工程师"制度五年以来取得的成果与存在的问题,提出要从制度、时间和经济方面进行有效地保障才能确保访问工程师制度在高职院校中稳步、健康、有序的开展,才能使其真正起到提高师资队伍质量的作用。
关键词 高职院校 “访问工程师” 保障机制
下载PDF
对日语教师参与独立学院“访问工程师”项目的一些探究与思考
8
作者 尉海莹 《教育教学论坛》 2018年第40期59-60,共2页
"访问工程师"项目作为培养双师型队伍的有效途径之一,得到了相关院校的普遍认可。本文作者于2017-2018年度参与了所在独立学院的该项目培训。在访问企业的过程中,作者对日语教学与应用型人才培养之间的相辅相成关系做了一些... "访问工程师"项目作为培养双师型队伍的有效途径之一,得到了相关院校的普遍认可。本文作者于2017-2018年度参与了所在独立学院的该项目培训。在访问企业的过程中,作者对日语教学与应用型人才培养之间的相辅相成关系做了一些探究与思考。认为"访问工程师"项目的设立是祖国科教兴国之所需,参与此项目的培训是独立学院日语教师努力探索,成为新时代双师型教师的可行之路之一。 展开更多
关键词 “访问工程师”项目 应用型人才培养 日语教师自身发展
下载PDF
Attribute-based access control policy specification language 被引量:6
9
作者 叶春晓 钟将 冯永 《Journal of Southeast University(English Edition)》 EI CAS 2008年第3期260-263,共4页
This paper first introduces attribute expression to describe attribute-based access control policy.Secondly,an access control policy enforcement language named A-XACML (attribute-XACML)is proposed,which is an extens... This paper first introduces attribute expression to describe attribute-based access control policy.Secondly,an access control policy enforcement language named A-XACML (attribute-XACML)is proposed,which is an extension of XACML.A-XACML is used as a simple,flexible way to express and enforce access control policies,especially attribute-based access control policy,in a variety of environments.The language and schema support include data types,functions,and combining logic which allow simple and complex policies to be defined.Finally,a system architecture and application case of user-role assignment is given to show how attribute expressions and A-XACML work in access control policy description and enforcement.The case shows that attribute expression and A-XACML can describe and enforce the complex access control policy in a simple and flexible way. 展开更多
关键词 role-based access control POLICY XML XACML
下载PDF
Database-oriented storage based on LMDB and linear octree for massive block model 被引量:6
10
作者 毕林 赵辉 贾明涛 《Transactions of Nonferrous Metals Society of China》 SCIE EI CAS CSCD 2016年第9期2462-2468,共7页
Data organization requires high efficiency for large amount of data applied in the digital mine system. A new method of storing massive data of block model is proposed to meet the characteristics of the database, incl... Data organization requires high efficiency for large amount of data applied in the digital mine system. A new method of storing massive data of block model is proposed to meet the characteristics of the database, including ACID-compliant, concurrency support, data sharing, and efficient access. Each block model is organized by linear octree, stored in LMDB(lightning memory-mapped database). Geological attribute can be queried at any point of 3D space by comparison algorithm of location code and conversion algorithm from address code of geometry space to location code of storage. The performance and robustness of querying geological attribute at 3D spatial region are enhanced greatly by the transformation from 3D to 2D and the method of 2D grid scanning to screen the inner and outer points. Experimental results showed that this method can access the massive data of block model, meeting the database characteristics. The method with LMDB is at least 3 times faster than that with etree, especially when it is used to read. In addition, the larger the amount of data is processed, the more efficient the method would be. 展开更多
关键词 block model linear octree lightning memory-mapped database mass data access digital mine etree
下载PDF
A New Role Hierarchy Model for Role Based Access Control 被引量:2
11
作者 吕宜洪 宋瀚涛 龚元明 《Journal of Beijing Institute of Technology》 EI CAS 2002年第4期409-413,共5页
A new role hierarchy model for RBAC (role-based access control) is presented and its features are illustrated through examples. Some new concepts such as private permission, public permission and special permission ar... A new role hierarchy model for RBAC (role-based access control) is presented and its features are illustrated through examples. Some new concepts such as private permission, public permission and special permission are introduced, based on the RRA97 model. Some new role-role inheriting forms such as normal inheritance, private inheritance, public inheritance and special-without inheritance are defined. Based on the ideas mentioned, the new role hierarchy model is formulated. It is easier and more comprehensible to describe role-role relationships through the new model than through the traditional ones. The new model is closer to the real world and its mechanism is more powerful. Particularly it is more suitable when used in large-scale role hierarchies. 展开更多
关键词 RBAC access control ROLE INHERIT role hierarchy
下载PDF
Novel scheme to specify and integrate RBAC policy based on ontology 被引量:1
12
作者 孙小林 卢正鼎 +2 位作者 李瑞轩 王治刚 文坤梅 《Journal of Southeast University(English Edition)》 EI CAS 2007年第3期394-398,共5页
To describe and integrate various policies applied in different domains, the definition of the family of OntoRBAC based on the ontology of a general role-based access control (RBAC) policy is proposed, which can sup... To describe and integrate various policies applied in different domains, the definition of the family of OntoRBAC based on the ontology of a general role-based access control (RBAC) policy is proposed, which can support and extend the RBAC96 model. The uniform ontology-based description mechanism of secure policies is applied in OntoRBAC, which can be used to describe different secure policies in distributed systems and integrate policies in semantic level with upper concepts. In addition, some rules have been defined to reason within the OntoRBAC to extend the inference algorithms in ontology, which makes the system accommodate itself to RBAC policies better. 展开更多
关键词 ONTOLOGY POLICY role-based access control
下载PDF
Agent based automated trust negotiation model 被引量:1
13
作者 李开 卢正鼎 +1 位作者 李瑞轩 唐卓 《Journal of Southeast University(English Edition)》 EI CAS 2007年第3期469-473,共5页
To enhance the practicability of the trust negotiation system, an agent based automated trust negotiation model (ABAM) is proposed. The ABAM introduces an agent to keep the negotiation process with no human interven... To enhance the practicability of the trust negotiation system, an agent based automated trust negotiation model (ABAM) is proposed. The ABAM introduces an agent to keep the negotiation process with no human intervention. Meanwhile, the ABAM specifies the format of a meta access control policy, and adopts credentials with flexible format to meet the requirements of access control policies instead of disclosing the whole contents of a certificate. Furthermore, the ABAM uses asymmetric functions with a high security intensity to encrypt the transmitting message, which can prevent information from being attacked. Finally, the ABAM presents a new negotiation protocol to guide the negotiation process. A use case is studied to illuminate that the ABAM is sound and reasonable. Compared with the existing work, the intelligence, privacy and negotiation efficiency are improved in the ABAM. 展开更多
关键词 automated trust negotiation AGENT CREDENTIAL access control policy negotiation protocol
下载PDF
Multi-level access control model for tree-like hierarchical organizations
14
作者 於光灿 李瑞轩 +3 位作者 卢正鼎 Mudar Sarem 宋伟 苏永红 《Journal of Southeast University(English Edition)》 EI CAS 2008年第3期393-396,共4页
An access control model is proposed based on the famous Bell-LaPadula (BLP) model.In the proposed model,hierarchical relationships among departments are built,a new concept named post is proposed,and assigning secur... An access control model is proposed based on the famous Bell-LaPadula (BLP) model.In the proposed model,hierarchical relationships among departments are built,a new concept named post is proposed,and assigning security tags to subjects and objects is greatly simplified.The interoperation among different departments is implemented through assigning multiple security tags to one post, and the more departments are closed on the organization tree,the more secret objects can be exchanged by the staff of the departments.The access control matrices of the department,post and staff are defined.By using the three access control matrices,a multi granularity and flexible discretionary access control policy is implemented.The outstanding merit of the BLP model is inherited,and the new model can guarantee that all the information flow is under control.Finally,our study shows that compared to the BLP model,the proposed model is more flexible. 展开更多
关键词 multi-level access control hierarchical organization multiple security tags
下载PDF
A method based on vector type for sparse storage and quick access to projection matrix
15
作者 杨娟 侯慧玲 石浪 《Journal of Measurement Science and Instrumentation》 CAS CSCD 2015年第1期53-56,共4页
For sparse storage and quick access to projection matrix based on vector type, this paper proposes a method to solve the problems of the repetitive computation of projection coefficient, the large space occupation and... For sparse storage and quick access to projection matrix based on vector type, this paper proposes a method to solve the problems of the repetitive computation of projection coefficient, the large space occupation and low retrieval efficiency of projection matrix in iterative reconstruction algorithms, which calculates only once the projection coefficient and stores the data sparsely in binary format based on the variable size of library vector type. In the iterative reconstruction process, these binary files are accessed iteratively and the vector type is used to quickly obtain projection coefficients of each ray. The results of the experiments show that the method reduces the memory space occupation of the projection matrix and the computation of projection coefficient in iterative process, and accelerates the reconstruction speed. 展开更多
关键词 projection matrix sparse storage quick access vector type
下载PDF
由“下”到“赴”的思考 被引量:1
16
作者 徐正东 《科技信息》 2010年第30期239-239,共1页
为了加快"双师型"教师培养,进一步加强师资队伍建设,我省的高职高专院校先后开始实施"访问工程师"项目。"访问工程师"制度是提高双师素质增强师资队伍建设的有效途径。本文从"态度"出发,提出了... 为了加快"双师型"教师培养,进一步加强师资队伍建设,我省的高职高专院校先后开始实施"访问工程师"项目。"访问工程师"制度是提高双师素质增强师资队伍建设的有效途径。本文从"态度"出发,提出了对"访问工程师"制度的理解。 展开更多
关键词 “态度” “访问工程师” “双师型”
下载PDF
A Low-Power Super-Performance Four-Way Set-Associative CMOS Cache Memory 被引量:1
17
作者 孙慧 李文宏 章倩苓 《Journal of Semiconductors》 EI CAS CSCD 北大核心 2004年第4期366-371,共6页
A 1.8-V 64-kb four-way set-associative CMOS cache memory implemented by 0.18μm/1.8V 1P6M logic CMOS technology for a super performance 32-b RISC microprocessor is presented.For comparison,a conventional parallel acce... A 1.8-V 64-kb four-way set-associative CMOS cache memory implemented by 0.18μm/1.8V 1P6M logic CMOS technology for a super performance 32-b RISC microprocessor is presented.For comparison,a conventional parallel access cache with the same storage and organization is also designed and simulated using the same technology.Simulation results indicate that by using sequential access,power reduction of 26% on a cache hit and 35% on a cache miss is achieved.High-speed approaches including modified current-mode sense amplifier and split dynamic tag comparators are adopted to achieve fast data access.Simulation results indicate that a typical clock to data access of 2.7ns is achieved... 展开更多
关键词 CACHE set-associative sequential access parallel access current-mode sense amplifier COMPARATOR
下载PDF
Attribute-Based Access Control for Multi-Authority Systems with Constant Size Ciphertext in Cloud Computing 被引量:16
18
作者 CHEN Yanli SONG Lingling YANG Geng 《China Communications》 SCIE CSCD 2016年第2期146-162,共17页
In most existing CP-ABE schemes, there is only one authority in the system and all the public keys and private keys are issued by this authority, which incurs ciphertext size and computation costs in the encryption an... In most existing CP-ABE schemes, there is only one authority in the system and all the public keys and private keys are issued by this authority, which incurs ciphertext size and computation costs in the encryption and decryption operations that depend at least linearly on the number of attributes involved in the access policy. We propose an efficient multi-authority CP-ABE scheme in which the authorities need not interact to generate public information during the system initialization phase. Our scheme has constant ciphertext length and a constant number of pairing computations. Our scheme can be proven CPA-secure in random oracle model under the decision q-BDHE assumption. When user's attributes revocation occurs, the scheme transfers most re-encryption work to the cloud service provider, reducing the data owner's computational cost on the premise of security. Finally the analysis and simulation result show that the schemes proposed in this thesis ensure the privacy and secure access of sensitive data stored in the cloud server, and be able to cope with the dynamic changes of users' access privileges in large-scale systems. Besides, the multi-authority ABE eliminates the key escrow problem, achieves the length of ciphertext optimization and enhances the effi ciency of the encryption and decryption operations. 展开更多
关键词 cloud computing attribute-basedencryption access control multi-authority constant ciphertext length attribute revocation
下载PDF
Role based access control design using Triadic concept analysis 被引量:9
19
作者 Ch.Aswani Kumar S.Chandra Mouliswaran +1 位作者 LI Jin-hai C.Chandrasekar 《Journal of Central South University》 SCIE EI CAS CSCD 2016年第12期3183-3191,共9页
Role based access control is one of the widely used access control models.There are investigations in the literature that use knowledge representation mechanisms such as formal concept analysis(FCA),description logics... Role based access control is one of the widely used access control models.There are investigations in the literature that use knowledge representation mechanisms such as formal concept analysis(FCA),description logics,and Ontology for representing access control mechanism.However,while using FCA,investigations reported in the literature so far work on the logic that transforms the three dimensional access control matrix into dyadic formal contexts.This transformation is mainly to derive the formal concepts,lattice structure and implications to represent role hierarchy and constraints of RBAC.In this work,we propose a methodology that models RBAC using triadic FCA without transforming the triadic access control matrix into dyadic formal contexts.Our discussion is on two lines of inquiry.We present how triadic FCA can provide a suitable representation of RBAC policy and we demonstrate how this representation follows role hierarchy and constraints of RBAC on sample healthcare network available in the literature. 展开更多
关键词 access control concept lattice role based access control role hierarchy triadic context triadic concept analysis
下载PDF
Accessing Web Heterogeneous Databases Based on CORBA
20
作者 刘健 梁允荣 杨军 《Journal of Beijing Institute of Technology》 EI CAS 2002年第1期81-84,共4页
The future usage of heterogeneous databases will consist of the WWW and CORBA environments. The integration of the WWW databases and CORBA standards are discussed. These two techniques need to merge together to make d... The future usage of heterogeneous databases will consist of the WWW and CORBA environments. The integration of the WWW databases and CORBA standards are discussed. These two techniques need to merge together to make distributed usage of heterogeneous databases user friendly. In an environment integrating WWW databases and CORBA technologies, CORBA can be used to access heterogeneous data sources in the internet. This kind of applications can achieve distributed transactions to assure data consistency and integrity. The application of this technology is with a good prospect. 展开更多
关键词 CORBA CORBAWeb heterogeneous database WEB
下载PDF
上一页 1 2 7 下一页 到第
使用帮助 返回顶部