期刊文献+
共找到99篇文章
< 1 2 5 >
每页显示 20 50 100
刘醒龙《分享艰难》对时代艰难的良知抒写
1
作者 覃碧卿 《湖北经济学院学报(人文社会科学版)》 2007年第1期125-126,124,共3页
刘醒龙的小说《分享艰难》和他的其它小说一样闪耀着一种精神光芒,小说以一个作家、一个知识分子的良知通过农村基层干部在农村转型时期当与民众分享艰难的问题,表现了对社会时代问题的关注,同时又以正视现实的眼光,表达了这种分享艰难... 刘醒龙的小说《分享艰难》和他的其它小说一样闪耀着一种精神光芒,小说以一个作家、一个知识分子的良知通过农村基层干部在农村转型时期当与民众分享艰难的问题,表现了对社会时代问题的关注,同时又以正视现实的眼光,表达了这种分享艰难的艰难。 展开更多
关键词 刘醒龙 《分享艰难》 乡镇现实 艰难
下载PDF
分享
2
作者 吴余青 《湖南包装》 2016年第1期I0002-I0002,共1页
第一次认真思考“分享”这个词是在10年前的墨尔本,导师Hoffert教授告诉我,澳洲是个大展厅,文化是‘share’。从此,我开始认真体会“分享”这个词,并且有了特别的感触。
关键词 中国 当代文学 散文 《分享》
下载PDF
分享
3
作者 郏希希 《课堂内外(创新作文)(高中版)》 2010年第6期37-37,共1页
高山青青,溪水潺潺,谁来赏识你的风姿.谁来瞩目你高洁的品性? 孤寂人生,谁来宽慰你那受伤的灵魂,谁来聆听你心中的苦悲?
关键词 《分享》 中学 作文 郏希希
下载PDF
分享
4
《大学(高考金刊)》 2018年第3期76-76,共1页
青春是即使我什么也没有,也一定要坚强,永不退缩!分享几首励志歌曲,高考fighting,身体和精神都要在路上!我爱这艰难又拼尽了全力的每一天,我会怀念所有的这些曲折.朴树《空帆船》
关键词 《分享》 中国 当代文学 杂文
下载PDF
分享艰难(中篇小说梗概)
5
作者 刘醒龙 岑霜 《领导科学》 北大核心 2003年第2期48-50,共3页
关键词 《分享艰难》 中国 故事梗概 中篇小说
下载PDF
刘醒龙:在《分享艰难》中执著追求的《天行者》
6
作者 陈蕾 《语文世界(中旬刊)》 2014年第6期7-9,共3页
知道刘醒龙这个名字,是从阅读中国当代文学史开始的,简要概括的介绍,让我初识这位已在文坛行走了多年的作家;走近刘醒龙,是从他的长篇小说《天行者》开始的,他以饱满的笔墨真实立体地呈现了众多底层民办教师的形象,感人至深。
关键词 《分享艰难》 刘醒龙 行者 中国当代文学史 执著 长篇小说 民办教师
下载PDF
真情交流和心灵沟通——《分享的快乐》教学案例
7
作者 阮雪君 《小学教学参考(综合版)》 2006年第6期36-37,共2页
关键词 心灵沟通 人间真情 教学案例 教学理念 活动性 社会课 《分享的快乐》
下载PDF
分享信任的时刻
8
作者 陈荣生 《成才之路》 2011年第23期I0017-I0017,共1页
有天晚上,我以近100千米的时速驾车行驶在一条两车道的公路上。这时,一辆车以同样速度迎面而来。在我们相擦而过的时候,我看到了那位司机的眼睛,但那仅仅是一秒钟的事情。当时我想,他是否跟我一样也在想着,那个时刻我们的命运完全取决... 有天晚上,我以近100千米的时速驾车行驶在一条两车道的公路上。这时,一辆车以同样速度迎面而来。在我们相擦而过的时候,我看到了那位司机的眼睛,但那仅仅是一秒钟的事情。当时我想,他是否跟我一样也在想着,那个时刻我们的命运完全取决于对方。 展开更多
关键词 《分享信任的时刻》 随笔 杂文 杂谈
下载PDF
分享时代
9
作者 Danielle Sacks 方金凤 《疯狂英语(阅读版)》 2011年第12期33-37,共5页
早上8点30分,尼尔·格伦弗洛已经在硅谷忙着其一系列的共享生活了。
关键词 英语教学 教学方法 阅读教学 《分享时代》
下载PDF
分享勇往直前的喜悦
10
作者 雁飞 《今日民航》 2004年第3期62-63,共2页
最近在星空卫视很欣喜地发现了一档全新的节目——《勇往直前》,这是一档精彩的汽车竞赛类节目.每期都有六组参赛者踏遍五湖四海.挑战路途中的重重困难只有到达终点并且拿到过关证明才算胜利。自节目开播以来.我们全家每期必看我们... 最近在星空卫视很欣喜地发现了一档全新的节目——《勇往直前》,这是一档精彩的汽车竞赛类节目.每期都有六组参赛者踏遍五湖四海.挑战路途中的重重困难只有到达终点并且拿到过关证明才算胜利。自节目开播以来.我们全家每期必看我们的心总会跟着参赛选手们的表现而起伏不定.和他们一起分享成功的喜悦.体会失败的滋味!短短半小时的节目却总能让我们回味许久。 展开更多
关键词 《分享勇往直前的喜悦》 杂文 星空卫视 人生体味
下载PDF
分享节让我快乐成长
11
作者 金海纳 《江苏教育研究(职教)(C版)》 2012年第3期33-34,共2页
不知不觉中,我在实验小学已度过快六年的时光了。回想六年的点点滴滴,最让我难忘的便是那一年一度的“分享节”。分享节是我成长的里程碑。它给了我勇气、信心,让我学会了信任,使我快乐健康地成长!
关键词 《分享节让我快乐成长》 小学生 作文 语文学习
下载PDF
尴尬的文坛地位与暧昧的文学史段落——“主旋律”小说的文学处境及现实命运 被引量:13
12
作者 刘复生 《当代作家评论》 CSSCI 北大核心 2005年第3期90-96,共7页
关键词 文坛地位 “主旋律” 小说创作 乡土题材 《分享艰难》 文学评论
下载PDF
“史诗”信念与民族文化的深层传达——论刘醒龙的长篇小说《圣天门口》 被引量:6
13
作者 洪治纲 《当代作家评论》 CSSCI 北大核心 2006年第6期140-147,共8页
关键词 刘醒龙 长篇小说 民族文化 信念 天门 史诗 现实主义传统 《分享艰难》
下载PDF
Security investment and information sharing for complementary firms with heterogeneous monetary loss
14
作者 蔡传晰 梅姝娥 仲伟俊 《Journal of Southeast University(English Edition)》 EI CAS 2017年第2期241-248,共8页
Two complementary firms' information sharing and security investment are investigated. When two complementary firms with heterogeneous assets are both breached, it is assumed that they suffer different losses which a... Two complementary firms' information sharing and security investment are investigated. When two complementary firms with heterogeneous assets are both breached, it is assumed that they suffer different losses which are associated with their information assets. Some insights about optimal strategies for the firms and the attacker are obtained by the game theory, which forms a comparison with those derived from substitutable firms, and those derived from complementary firms with homogenous loss. In addition, both the unit transform cost of investment and the extent of firms'loss affect the optimal strategies.Assuming that firms can control information sharing, security investments and both of them, respectively, the effect of the social planner is further analyzed on the information sharing, firms' aggregate defence, the aggregate attack and social total cost. Finally, some policy advice is provided through numerical simulation. Results show that firms are willing to choose security investment centrally rather than individually, but an intervention in information sharing by the social planner may not necessarily be preferable. 展开更多
关键词 complementary firm contest success function security investment information sharing leakage cost
下载PDF
ON A PROBLEM OF F.GROSS
15
作者 方明亮 徐万松 《Transactions of Nanjing University of Aeronautics and Astronautics》 EI 1995年第2期203-205,共3页
This paper deals with the problem of uniqueness of meromorphic functions with two deficient values and obtains a result which is an improvement of that of F.Gross and Yi Hongxun.
关键词 complex analysis meromorphic functions UNIQUENESS deficient value shared value
下载PDF
Research and implementation of a new web cache strategy
16
作者 易法令 谢长生 +1 位作者 韩德志 蔡斌 《Journal of Southeast University(English Edition)》 EI CAS 2004年第4期448-453,共6页
This paper presented a new shared cache technique-the grouping cache, which could solve many invalid queries in the broadcast probe and the control bottleneck of the centralized web cache by dividing all cooperative c... This paper presented a new shared cache technique-the grouping cache, which could solve many invalid queries in the broadcast probe and the control bottleneck of the centralized web cache by dividing all cooperative caches into several groups according to their positions in the network topology. The technique has the following characteristics: The overhead of multi-cache query can be reduced efficiently by the cache grouping scheme; the compact summary of the cache directory can rapidly determine if a request exists in a cache within the group; the distribution algorithm based on the web-access logs can effectively balance the load among all the groups. The simulation test demonstrated that the grouping cache was more effective than any other existing shared cache techniques. 展开更多
关键词 Bandwidth BROADCASTING Electric network topology HTTP Internet Schematic diagrams World Wide Web
下载PDF
Tripartite Arbitrary Two-Qutrit Quantum State Sharing 被引量:3
17
作者 YUAN Hao LIU Yi-Min +1 位作者 HAN Lian-Fang ZHANG Zhan-Jun 《Communications in Theoretical Physics》 SCIE CAS CSCD 2008年第5期1191-1194,共4页
A tripartite scheme for securely sharing an arbitrary unknown two-qutrit state is proposed, where two generalized Greenberger-Horne-Zeilinger (GHZ) states serve as the quantum channel linking the three legitimate pa... A tripartite scheme for securely sharing an arbitrary unknown two-qutrit state is proposed, where two generalized Greenberger-Horne-Zeilinger (GHZ) states serve as the quantum channel linking the three legitimate parties. The quantum information (i.e., the arbitrary unknown two-qutrit state) from the sender can be split in such a way that it can be reconstructed deterministically by any agent via a proper unitary operation provided that both agents collaborates together. Moreover, the generalization of the tripartite scheme to more-party case is also outlined. 展开更多
关键词 quantum state sharing arbitrary two-qutrit state generalized GHZ state
下载PDF
Robust Multiparty Quantum Secret Key Sharing Over Two Collective-Noise Channels via Three-Photon Mixed States 被引量:7
18
作者 WANG Zhang-Yin YUAN Hao GAO Gan Shou-Hua 《Communications in Theoretical Physics》 SCIE CAS CSCD 2006年第4X期607-609,共3页
We present a robust (n, n)-threshold scheme for multiparty quantum secret sharing of key over two collectivenoise channels (i.e., the collective dephasing channel and the collective rotating channel) via three-pho... We present a robust (n, n)-threshold scheme for multiparty quantum secret sharing of key over two collectivenoise channels (i.e., the collective dephasing channel and the collective rotating channel) via three-photon mixed states, In our scheme, only if all the sharers collaborate together can they establish a joint key with the message sender and extract the secret message from the sender's encrypted message. This scheme can be implemented using only a Bell singlet, a one-qubit state and polarization identification of single photon, so it is completely feasible according to the present-day technique. 展开更多
关键词 multiparty quantum secret key sharing collective-noise channel
下载PDF
Evaluation of the Strategic Tolerance Human Resource Management Based on Matter-Element Analysis Method 被引量:2
19
作者 高宏 《Journal of Donghua University(English Edition)》 EI CAS 2011年第5期533-538,共6页
The main features and connotation of the tolerance human resource management based on strategy are analyzed and summarized. The theory and method of systematic engineering is used to build the evaluation index systems... The main features and connotation of the tolerance human resource management based on strategy are analyzed and summarized. The theory and method of systematic engineering is used to build the evaluation index systems for the tolerance human resource management. On the basis of it, by using the theory of matter-element analysis, the matter-element models are formulated for the evaluation of the tolerance human resource management. Regarding annual tolerance human resource management as the object of matter-dement, the tolerance human resource :management for two years are analyzed and evaluated through using the matter. element models proposed. A ease study is carried out and the satisfactory results are obtained. A new scientific methed is provided for the evaluation of human resource management based on strategy. 展开更多
关键词 matter-element analysis strategy tolerance human resource management EVALUATION FAIR SHARE
下载PDF
Quantum Secret Sharing Based on Chinese Remainder Theorem 被引量:3
20
作者 施荣华 粟倩 +1 位作者 郭迎 李门浩 《Communications in Theoretical Physics》 SCIE CAS CSCD 2011年第4期573-578,共6页
A novel quantum secret sharing (QSS) scheme is proposed on the basis of Chinese Remainder Theorem (CRT). In the scheme, the classical messages are mapped to secret sequences according to CRT equations, and distrib... A novel quantum secret sharing (QSS) scheme is proposed on the basis of Chinese Remainder Theorem (CRT). In the scheme, the classical messages are mapped to secret sequences according to CRT equations, and distributed to different receivers by different dimensional superdense-coding respectively. CRT's secret sharing function, together with high-dimensional superdense-eoding, provide convenience, security, and large capability quantum channel for secret distribution and recovering. Analysis shows the security of the scheme. 展开更多
关键词 quantum secret sharing Chinese Remainder Theorem quantum superdense-coding
下载PDF
上一页 1 2 5 下一页 到第
使用帮助 返回顶部