期刊文献+
共找到14篇文章
< 1 >
每页显示 20 50 100
《议案2000》与中东欧国家加入欧盟的实际影响
1
作者 危素华 《经济科学》 CSSCI 北大核心 2001年第4期120-128,共9页
随着中东欧国家加入欧盟的大趋势不断明朗 ,欧盟委员会于 1 997年公布了《议案 2 0 0 0》,指出了欧盟吸收中东欧国家可能会带来的四大不利影响。但通过考察欧盟与中东欧国家的贸易格局变化 ,回顾有关的调查资料并结合劳动力市场的需求... 随着中东欧国家加入欧盟的大趋势不断明朗 ,欧盟委员会于 1 997年公布了《议案 2 0 0 0》,指出了欧盟吸收中东欧国家可能会带来的四大不利影响。但通过考察欧盟与中东欧国家的贸易格局变化 ,回顾有关的调查资料并结合劳动力市场的需求分析模型 ,我们发现对于中东欧国家加入欧盟造成负面冲击的过分担心是不必要的 ,也可以看到欧盟在劳动力市场和共同农业政策等问题上需要做出一定的调整。 展开更多
关键词 中东欧国家 欧盟 《议案2000》 影响 劳动力市场 共同农业政策
下载PDF
《议案2000》与中东欧国家加入欧盟的实际影响
2
作者 危素华 《世界经济文汇》 CSSCI 北大核心 2001年第3期30-35,共6页
在1989年剧变之后不久,中东欧国家出于政治、经济上的长远考虑表现出了加入欧盟的极大热情.从1991年中到1992年底,波兰、匈牙利等中东欧十国先后与欧盟签订了《欧洲协定(the European Agreements)》,迈出了加入欧盟的第一步.《欧洲协定... 在1989年剧变之后不久,中东欧国家出于政治、经济上的长远考虑表现出了加入欧盟的极大热情.从1991年中到1992年底,波兰、匈牙利等中东欧十国先后与欧盟签订了《欧洲协定(the European Agreements)》,迈出了加入欧盟的第一步.《欧洲协定》旨在建立一个欧盟--中东欧国家间的自由贸易区,首先从贸易上将中东欧国家纳入欧盟的经济大气候.从1994年4月到1997年1月,中东欧国家又先后正式提出了加入欧盟的申请,而1994年以来的历届欧洲理事会则提出了一系列中东欧国家加入欧盟的前提条件:如坚定的民主制度、正常运转的市场经济、应付国际竞争的能力、接受欧盟《内部市场法(Internal Market Naw)》等.为了满足这些条件,近年来中东欧国家一直在积极努力,其中波兰、匈牙利、捷克等国在保持政治稳定、培养市场体系、改革企业制度等方面已取得有目共睹的成果. 展开更多
关键词 《议案2000》 中东欧国家 欧盟 影响 企业
下载PDF
中国历史上的标点符号规范化 被引量:7
3
作者 萧世民 《郑州大学学报(哲学社会科学版)》 CSSCI 北大核心 2004年第6期121-124,共4页
中国的标点符号产生得很早。但是早期阶段处于一种自发状态,形式多样,极不统一,很不规范,无形中降底了其应有的效应。我国历史上曾经有过几次大的对标点符号进行规范化的运动,这些规范化运动对于引领标点符号的正确发展,指导民众书面语... 中国的标点符号产生得很早。但是早期阶段处于一种自发状态,形式多样,极不统一,很不规范,无形中降底了其应有的效应。我国历史上曾经有过几次大的对标点符号进行规范化的运动,这些规范化运动对于引领标点符号的正确发展,指导民众书面语的使用,提高民众文化素质起到了重要作用。 展开更多
关键词 标点符号 规范化 说文解字 校雠 《议案》 《训令》
下载PDF
AN ENHANCEMENT SCHEME OF TCP PROTOCOL IN MOBILE AD HOC NETWORKS:MME-TCP
4
作者 Kai Caihong Yu Nenghai Chen Yuzhong 《Journal of Electronics(China)》 2007年第1期1-9,共9页
Transmission Control Protocol (TCP) optimization in Mobile Ad hoc NETworks (MANETs) is a challenging issue because of some unique characteristics of MANETs. In this paper,a new end-to-end mechanism based on multiple m... Transmission Control Protocol (TCP) optimization in Mobile Ad hoc NETworks (MANETs) is a challenging issue because of some unique characteristics of MANETs. In this paper,a new end-to-end mechanism based on multiple metrics measurement is proposed to improve TCP performance in MANETs. Multi-metric Measurement based Enhancement of TCP (MME-TCP) designs the metrics and the identification algorithm according to the characteristics of MANETs and the experiment results. Furthermore,these metrics are measured at the sender node to reduce the overhead of control information over networks. Simulation results show that MME-TCP mechanism achieves a significant performance improvement over standard TCP in MANETs. 展开更多
关键词 Ad hoc networks Transmission Control Protocol (TCP) Network states End-to-end metrics Identification algorithms
下载PDF
Tribal Councils as a Decision-Making Mechanism for Post-disaster Reconstructions: A Case Study of Ulaljuc
5
作者 Chaohsing Huang Paiteng Cheng +2 位作者 Hsin-Chieh Kao Tjepelang Ruvaniyaw Yuhsin Chen 《Sociology Study》 2013年第4期261-268,共8页
Since the 1990s, indigenous people in Taiwan have engaged in tribal councils for the purpose of integrating the tribal authority and the modern administrative system. The establishment of tribal councils provides a co... Since the 1990s, indigenous people in Taiwan have engaged in tribal councils for the purpose of integrating the tribal authority and the modern administrative system. The establishment of tribal councils provides a communicative forum for tribal leaders, village, and the association of community development to make decisions of common tribal affairs. When disasters happen, the internal tribal response strategies and external assistance mechanisms might cooperate through either traditional or modern administrative systems. The research focused on how these organizations, while in interim housing, influenced the reconstruction and rehabilitation after disasters. The research's findings suggested that tribal councils, a pre-existing mechanism, seemed to be an appropriate forum for negotiation and decision-making for tribal affairs. 展开更多
关键词 Interim housing tribal council post-disaster reconstruction
下载PDF
Quantum Secret Sharing Using GHZ-Like State 被引量:2
6
作者 谢朝任 蔡家纬 黄宗立 《Communications in Theoretical Physics》 SCIE CAS CSCD 2010年第12期1019-1022,共4页
This paper presents a simple and novel quantum secret sharing scheme using GHZ-like state. The characteristics of the GHZ-like state are used to develop the quantum secret sharing scheme. In contrast with the other GH... This paper presents a simple and novel quantum secret sharing scheme using GHZ-like state. The characteristics of the GHZ-like state are used to develop the quantum secret sharing scheme. In contrast with the other GHZ-based QSS protocols with the same assumptions, the proposed protocol provides the best quantum bit efficiency. 展开更多
关键词 quantum cryptography quantum secret sharing GHZ-like state
下载PDF
Robust Multiparty Quantum Secret Sharing against Participant Forcible Manipulation
7
作者 孙莹 温巧燕 朱甫臣 《Communications in Theoretical Physics》 SCIE CAS CSCD 2010年第7期89-92,共4页
The security of the multiparty quantum secret sharing protocol proposed by Gao [G.Gao,Commun.Theor.Phys.52 (2009) 421] is analyzed.It is shown that this protocol is vulnerable since the agents' imperfectencryption... The security of the multiparty quantum secret sharing protocol proposed by Gao [G.Gao,Commun.Theor.Phys.52 (2009) 421] is analyzed.It is shown that this protocol is vulnerable since the agents' imperfectencryption scheme can be attacked by a powerful participant.We introduce a attack strategy called participant forciblemanipulation and analyze the information leakage in this protocol under this attack.At last,we give an improved versionof the original protocol.The improved protocol is robust and has the same efficiency as the original one. 展开更多
关键词 two-level systems quantum secret sharing quantum information
下载PDF
A Comparison of Three Surrogacy Agreement Cases Using AHP
8
作者 Cynthia L. Knott Susanne Bruno Ninassi Alyson Eisenhardt 《Chinese Business Review》 2011年第2期152-156,共5页
This paper builds on the previous work of Knott, Ninassi and Eisenhardt's 2009 paper, "Using the Analytic Hierarchy Process (AHP) to Look at the Tradeoffs Among Stakeholders in the Case of Surrogacy, when the Init... This paper builds on the previous work of Knott, Ninassi and Eisenhardt's 2009 paper, "Using the Analytic Hierarchy Process (AHP) to Look at the Tradeoffs Among Stakeholders in the Case of Surrogacy, when the Initial Intention of the Parties Involved Change After the Pregnancy Has Ensued". This paper proposes a new methodology for analyzing cases involving stakeholders in disputed surrogacy arrangement. The methodology utilized is the Analytic Hierarchy Process, which allows users to weigh different criteria based on their own opinions and background. Three case studies involved a surrogacy arrangement among three stakeholders: the biological mother, the biological father and the surrogate mother. The base for the model was that all parties had entered into an agreement, and that after the agreement had been made, a situation changed, such that a decision as to who had parental rights over the fetus became an issue. The criteria used in the decision making process in the three case studies were legal, health and ethical. The criteria differed based upon each stakeholder's point of view. In this paper, the three models were developed using the AI-tP methodology and judgments were gathered for each of the three cases to derive the priorities for the criteria in each model. Each author took the role of one of the three stakeholders. 展开更多
关键词 the analytic hierarchy process SURROGACY legal issues ethical issues health issues decision making model
下载PDF
On ASGS framework:general requirements and an example of implementation
9
作者 KULESZA Kamil KOTULSKI Zbigniew 《Journal of Zhejiang University-Science A(Applied Physics & Engineering)》 SCIE EI CAS CSCD 2007年第4期511-521,共11页
In the paper we propose a general, abstract framework for Automatic Secret Generation and Sharing (ASGS) that should be independent of underlying Secret Sharing Scheme (SSS). ASGS allows to prevent the Dealer from kno... In the paper we propose a general, abstract framework for Automatic Secret Generation and Sharing (ASGS) that should be independent of underlying Secret Sharing Scheme (SSS). ASGS allows to prevent the Dealer from knowing the secret. The Basic Property Conjecture (BPC) forms the base of the framework. Due to the level of abstraction, results are portable into the realm of quantum computing. Two situations are discussed. First concerns simultaneous generation and sharing of the random, prior nonexistent secret. Such a secret remains unknown until it is reconstructed. Next, we propose the framework for automatic sharing of a known secret. In this case the Dealer does not know the secret and the secret Owner does not know the shares. We present opportunities for joining ASGS with other extended capabilities, with special emphasis on PVSS and pre-positioned secret sharing. Finally, we illustrate framework with practical implementation. 展开更多
关键词 Secret sharing Security protocols Dependable systems Authentication management
下载PDF
A Resistant Quantum Key Exchange Protocol and Its Corresponding Encryption Scheme 被引量:11
10
作者 MAO Shaowu ZHANG Huanguo WU Wanqing LIU Jinhui LI Shuanbao Wang Houzhen 《China Communications》 SCIE CSCD 2014年第9期124-134,共11页
The emergence of quantum computer will threaten the security of existing public-key cryptosystems, including the Diffie Hellman key exchange protocol, encryption scheme and etc, and it makes the study of resistant qua... The emergence of quantum computer will threaten the security of existing public-key cryptosystems, including the Diffie Hellman key exchange protocol, encryption scheme and etc, and it makes the study of resistant quantum cryptography very urgent. This motivate us to design a new key exchange protocol and eneryption scheme in this paper. Firstly, some acknowledged mathematical problems was introduced, such as ergodic matrix problem and tensor decomposition problem, the two problems have been proved to NPC hard. From the computational complexity prospective, NPC problems have been considered that there is no polynomial-time quantum algorithm to solve them. From the algebraic structures prospective, non-commutative cryptography has been considered to resist quantum. The matrix and tensor operator we adopted also satisfied with this non-commutative algebraic structures, so they can be used as candidate problems for resisting quantum from perspective of computational complexity theory and algebraic structures. Secondly, a new problem was constructed based on the introduced problems in this paper, then a key exchange protocol and a public key encryption scheme were proposed based on it. Finally the security analysis, efficiency, recommended parameters, performance evaluation and etc. were also been given. The two schemes has the following characteristics, provable security,security bits can be scalable, to achieve high efficiency, quantum resistance, and etc. 展开更多
关键词 ergodic matrix tensor problem resist quantum key exchange protocol ENCRYPTION
下载PDF
Formal Verification in 3oux Tripartite Diffie-Hellman Protocol
11
作者 祝烈煌 张子剑 +2 位作者 王峰 郭聪 袁彩霞 《China Communications》 SCIE CSCD 2012年第3期153-163,共11页
Security analysis of cryptographic protocols has been widely studied for many years.As far as we know,we have not found any methods to effectively analyze group key exchange protocols for the three parties yet,which d... Security analysis of cryptographic protocols has been widely studied for many years.As far as we know,we have not found any methods to effectively analyze group key exchange protocols for the three parties yet,which did not sacrifice the soundness of cryptography.Recently,Canetti and Herzog have proposed Universally Composable Symbolic Analysis(UCSA) of two-party mutual authentication and key exchange protocol which is based on the symmetric encryption schemes.This scheme can analyze the protocols automatically and guarantee the soundness of cryptography.Therefore,we discuss group key exchange protocol which is based on Joux Tripartite Diffie-Hellman(JTDH) using UCSA.Our contribution is analyzing group key exchange protocol effectively without damaging the soundness of cryptography. 展开更多
关键词 UCSA computationally sound JTDH group key exchange protocol
下载PDF
《议案追踪》开拓了人大报道的新模式
12
《新闻与写作》 北大核心 2002年第11期46-46,共1页
北京电视台BTV-1“北京您早”栏目在市人大常委会办公厅新闻处。代表联络室的大力支持和协助下,在其新闻版块中开设了一个崭新的窗口:《议案追踪》。这个以追踪人大代表议案及批评建议办理情况为内容的新闻性节目一改以往人大报道死板... 北京电视台BTV-1“北京您早”栏目在市人大常委会办公厅新闻处。代表联络室的大力支持和协助下,在其新闻版块中开设了一个崭新的窗口:《议案追踪》。这个以追踪人大代表议案及批评建议办理情况为内容的新闻性节目一改以往人大报道死板、表面化的形式,以深入的调查为基础,如实反映人大代表广泛联系群众,积极反映问题,认真履行代表职责,以及政府部门在认真办理代表议案及批评建议、为民办实事工作中的成绩和存在的问题。涉及的问题更具体,报道更深入,是人大报道的一次改革和创新。节目开播两个月来,收到了良好的效果。《议案追踪》每两周播出一期,每期大约六分钟,隔周的周六、周日分上下两辑在“北京您早”的新闻中播出。 展开更多
关键词 《议案追踪》 人大报道 北京电视台 新闻报道 舆论监督
原文传递
Where Should the Start Zone Be Located for Xiong'an New Area? A Land Use Perspective 被引量:3
13
作者 JIANG Luguang LV Peiyi +1 位作者 FENG Zhiming LIU Ye 《Journal of Resources and Ecology》 CSCD 2018年第4期374-381,共8页
China announced plans on April 1,2017 to create Xiong'an New Area,a new economic zone about 110 km southwest of Beijing.The new area of national significance covers the three counties of Xiongxian,Rongcheng and Anxin... China announced plans on April 1,2017 to create Xiong'an New Area,a new economic zone about 110 km southwest of Beijing.The new area of national significance covers the three counties of Xiongxian,Rongcheng and Anxin in Hebei Province,and is home to Baiyangdian,a major wetland in northern China.It will cover around 100 km2 initially(called "Starting Zone") and will be expanded to 200 km2 in the mid-term and about 2000 km2 in the long term.In this context,it is important to assess the land use pattern for the new area's planning and development.Based on remote sensing interpretation of Landsat OLI images,we examine the current land use features,the potential for built-up land saving and intensive use,and the spatial variation of arable land quality.The results indicate that the arable lands,built-up lands and wetlands account for around 60%,20% and 10%,respectively.The potential for rural built-up land saving and intensive use is quite large.The arable land quality and use intensity in Rongcheng and Anxin counties are much better than that of Xiongxian.The pros and cons for three potential options for the Starting Zone are listed and compared.The eastern area of Rongcheng county,to the north of Baiyangdian,is believed to be the most suitable Starting Zone.Policy recommendations for built-up land expansion,farmland saving and flood risk mitigation for Xiong'an New Area are also proposed in this paper. 展开更多
关键词 Xiong'an New Area land use start zone options comparison policy options
原文传递
A Universal Composability Framework for Analysis of Proxy Threshold Signature
14
作者 洪璇 李详学 +1 位作者 龚征 陈克非 《Journal of Shanghai Jiaotong university(Science)》 EI 2009年第1期107-111,共5页
The universal composability framework is a new approach for designing and analyzing the security of cryptographic protocols.In this framework,the security of protocols is maintained under a general protocol compositio... The universal composability framework is a new approach for designing and analyzing the security of cryptographic protocols.In this framework,the security of protocols is maintained under a general protocol composition operation.In the paper,we propose the universal composability framework for the analysis of proxy threshold signature and present a universally composable secure proxy threshold signature scheme which is the first one in this area.The proposed scheme is suitable for the mobile agents,which should migrate across different environment through network.Furthermore,we give the concrete analysis of the reduction to prove the security of the proposed scheme. 展开更多
关键词 proxy threshold signature universal composability RSA cryptosystem mobile agents
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部