期刊文献+
共找到6篇文章
< 1 >
每页显示 20 50 100
从儒家伦理看虚拟企业的组织结构及企业文化建设
1
作者 余允球 《现代企业》 2004年第2期40-41,共2页
虚拟企业是一种对市场环境极为敏感的企业组织形式.当它一有新的产品创意,就可以马上从网上寻找合适的厂商进行外包生产,寻找专业化的营销企业进行营销,做到规模化生产,规模化销售,在不建立自己的生产基地的前提下,跨地区、跨行业的引... 虚拟企业是一种对市场环境极为敏感的企业组织形式.当它一有新的产品创意,就可以马上从网上寻找合适的厂商进行外包生产,寻找专业化的营销企业进行营销,做到规模化生产,规模化销售,在不建立自己的生产基地的前提下,跨地区、跨行业的引进资金、设备、技术、人才等要素.而如果虚拟企业中的核心企业(产品)销路不畅时,它的合作伙伴,也就是虚拟组织中的节点企业则可以结合自身条件,迅速调整营运范围,重组资源,主动向外寻找机会,减少经营风险. 展开更多
关键词 儒家伦理 虚拟企业 组织结构 企业文化 网络经济 企业管理 名分制 爱有等差原理 兼爱理论
下载PDF
A Fair E-Cash Scheme Based on Elliptic Curve Cryptography
2
作者 WANGChangji WUJianping DUANHaixin 《Geo-Spatial Information Science》 2004年第3期231-234,共4页
A new fair off-line electronic cash scheme on elliptic curve cryptography was presented. The new scheme is more efficient than those by extending fair off-line electronic cash scheme from finite field into elliptic cu... A new fair off-line electronic cash scheme on elliptic curve cryptography was presented. The new scheme is more efficient than those by extending fair off-line electronic cash scheme from finite field into elliptic curve cryptography and introducing a new elliptic curve discrete logarithm assumption. The expiry date and denomination are embedded into the blindly signed coin by integrating partially blind signature with restrictive blind signature. A bank need not use different public keys for different coin values, shops and users need not carry a list of bank’s public keys to verify in their electronic wallet. At the same time, the bank just needs to keep undue electronic coins for double spending check in his database, thus bank’s database can be dramatically reduced. 展开更多
关键词 partially blind signature restrictive blind signature elliptic curvecryptography
下载PDF
Building a Secure Block Ciper on Small and Non- Binary Domain
3
作者 HU Dongping CUIYongquan +4 位作者 YINAihua CHEN Liang CUI Chunying ZOU Deqing HANLansheng 《China Communications》 SCIE CSCD 2014年第9期160-172,共13页
We design a practical and provablysecure block ciper over small domain and non-binary inputs,which is also can be considered as a pseudorandom permutation on N elements.Our work is based on a relation we found between... We design a practical and provablysecure block ciper over small domain and non-binary inputs,which is also can be considered as a pseudorandom permutation on N elements.Our work is based on a relation we found between the small domain ciper and the negative hypergeometric probability(NHG) distribution.We prove that our block ciper achieves ideal security,that is,it is indistinguishable from a random permutation even if the adversary had already observed N plaintext-cipertext pairs.In particular,we initiate an efficient and sufficiently precise sampling algorithm for negative hypergeometric distribution. 展开更多
关键词 block cipher small block pseudorandom permutation negativehypergeometric distribution
下载PDF
Object and Its Worry about Existence
4
作者 Martin Vlcek 《Journal of Philosophy Study》 2015年第7期342-348,共7页
The presented work describes principles of functioning of the object as a philosophical category on the basis of principles discovered in different, concrete objects. At the beginning, a supposition is thus made that ... The presented work describes principles of functioning of the object as a philosophical category on the basis of principles discovered in different, concrete objects. At the beginning, a supposition is thus made that principles are common and describe the fundamental mode of the organization of matter. The regeneration of its elements is the basic goal of the control of an object. The control systems try to allow elements to optimize their state depending on circumstances and occasionally in advance. The input system is the first one from these systems. It controls the input of material for the regeneration and at the same time is the source of primary information concerning its state in the environment and its development in time. The system of the control of the distribution of the energy named TOT is another element of the control. The system named EM0 controls the process of the regeneration on the basis of information about the successfulness of elements involved into the regeneration. Finally, the system named EM 1 controls the dynamics of the boundary of the object on the basis of information describing the tension on this boundary. The second goal of the control of an object, besides the regeneration, is to optimize the existence of the object as whole. New global criteria arise and are used throughout the process of the control for this sake. 展开更多
关键词 OBJECT EXISTENCE CONTROL SATISFACTION tension
下载PDF
Network Traffic Signature Generation Mechanism Using Principal Component Analysis
5
作者 牟澄 黄小红 +1 位作者 吴军 马严 《China Communications》 SCIE CSCD 2013年第11期95-106,共12页
The Deep Packet Inspection(DPI)method is a popular method that can accurately identify the flow data and its corresponding application.Currently,the DPI method is widely used in common network management systems.Howev... The Deep Packet Inspection(DPI)method is a popular method that can accurately identify the flow data and its corresponding application.Currently,the DPI method is widely used in common network management systems.However,the major limitation of DPI systems is that their signature library is mainly extracted manually,which makes it hard to efficiently obtain the signature of new applications.Hence,in this paper,we propose an automatic signature extraction mechanism using Principal Component Analysis(PCA)technology,which is able to extract the signature automatically.In the proposed method,the signatures are expressed in the form of serial consistent sequences constructed by principal components instead of normally separated substrings in the original data extracted from the traditional methods.Extensive experiments based on numerous sets of data have been carried out to evaluate the performance of the proposed scheme,and the results prove that the newly proposed method can achieve good performance in terms of accuracy and efficiency. 展开更多
关键词 network traffic classification aut-omatic signature generation deep packet in-spection principal component analysis
下载PDF
A simple control system of quantum key distribution with high visibility 被引量:1
6
作者 马海强 汪龙 +2 位作者 李申 焦荣珍 吴令安 《Optoelectronics Letters》 EI 2012年第4期318-320,共3页
A relatively simple plug-and-play control system of quantum key distribution (QKD) based on PCI7300 card is demonstrated, including mechanism design, key generation and key acquisition. The system works very well at... A relatively simple plug-and-play control system of quantum key distribution (QKD) based on PCI7300 card is demonstrated, including mechanism design, key generation and key acquisition. The system works very well at the repetition frequency of 1 MHz, and the key generation rate is 100 k/s. A visibility of better than 95% over 50 km-long fiber at 1.31 gm is obtained, which is stable under ordinary lab conditions for 24 h without any feedback control or adjustment. The presented system is a quite promising candidate to realize the QKD in the future. 展开更多
关键词 Machine design VISIBILITY
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部