期刊文献+
共找到21篇文章
< 1 2 >
每页显示 20 50 100
A Discussion of Usefulness and Pitfall of Elicitation and Introspection
1
作者 陈燕娜 《海外英语》 2013年第17期214-215,共2页
Nowadays, many scholars would like to use evidence derived from elicitation and introspection in their research. Both elicitation and introspection are common methods of data collection. The essay discusses the useful... Nowadays, many scholars would like to use evidence derived from elicitation and introspection in their research. Both elicitation and introspection are common methods of data collection. The essay discusses the usefulness and pitfall of elicitation and introspection. It finds out that both elicitation and introspection have their own advantages and disadvantages. 展开更多
关键词 ELICITATION introspection USEFULNESS PITFALL
下载PDF
Reply to "Discussion 1 on 'Introspection on improper seismic retrofit of Basilica Santa Maria di Collemaggio after 2009 Italian earthquake' by G.P.Cimellaro,A.M.Reinhorn and A.De Stefano" by Vincenzo Ciampi
2
作者 Gian Paolo Cimellaro Andrei M.Reinhorn Alessandro De Stefano 《Earthquake Engineering and Engineering Vibration》 SCIE EI CSCD 2012年第2期283-288,共6页
The authors thank the discusser for his interest and careful review of the paper and his valuable comments. They also welcome this discussion,because it gives the authors the opportunity to clarify several points whic... The authors thank the discusser for his interest and careful review of the paper and his valuable comments. They also welcome this discussion,because it gives the authors the opportunity to clarify several points which were not explained in sufficient detail in the paper,due 展开更多
关键词 introspection on improper seismic retrofit of Basilica Santa Maria di Collemaggio after 2009 Italian earthquake by Vincenzo Ciampi Discussion 1 on Reply to De
下载PDF
Container Introspection: Using External Management Containers to Monitor Containers in Cloud Computing
3
作者 Dongyang Zhan Kai Tan +2 位作者 Lin Ye Haining Yu Hao Liu 《Computers, Materials & Continua》 SCIE EI 2021年第12期3783-3794,共12页
Cloud computing plays an important role in today’s Internet environment,which meets the requirements of scalability,security and reliability by using virtualization technologies.Container technology is one of the two... Cloud computing plays an important role in today’s Internet environment,which meets the requirements of scalability,security and reliability by using virtualization technologies.Container technology is one of the two mainstream virtualization solutions.Its lightweight,high deployment efficiency make container technology widely used in large-scale cloud computing.While container technology has created huge benefits for cloud service providers and tenants,it cannot meet the requirements of security monitoring and management from a tenant perspective.Currently,tenants can only run their security monitors in the target container,but it is not secure because the attacker is able to detect and compromise the security monitor.In this paper,a secure external monitoring approach is proposed to monitor target containers in another management container.The management container is transparent for target containers,but it can obtain the executing information of target containers,providing a secure monitoring environment.Security monitors running inside management containers are secure for the cloud host,since the management containers are not privileged.We implement the transparent external management containers by performing the one-way isolation of processes and files.For process one-way isolation,we leverage Linux namespace technology to let management container become the parent of target containers.By mounting the file system of target container to that of the management container,file system one-way isolation is achieved.Compared with the existing host-based monitoring approach,our approach is more secure and suitable in the cloud environment. 展开更多
关键词 Container introspection management container external approach one-way isolation
下载PDF
Reply to "Discussion 2 on 'Introspection on improper seismic retrofit of Basilica Santa Maria di Collemaggio after 2009 Italian earthquake' by G.P. Cimellaro, A.M. Reinhorn and A.De Stefano" by Enzo Cartapati
4
作者 Gian Paolo Cimellaro Andrei M. Reinhorn Alessandro De Stefano 《Earthquake Engineering and Engineering Vibration》 SCIE EI CSCD 2012年第2期291-292,共2页
The authors thank the discusser for the additional information,which is provided related to the historical interventions of the church through the centuries. This information was known to the authors,however they deci... The authors thank the discusser for the additional information,which is provided related to the historical interventions of the church through the centuries. This information was known to the authors,however they decided not to include it in the paper because of lack of space.Additional details regarding the retrofit 展开更多
关键词 Reply to A.M Reinhorn and A.De Stefano introspection on improper seismic retrofit of Basilica Santa Maria di Collemaggio after 2009 Italian earthquake by G.P Discussion 2 on DE
下载PDF
Discussion 1 on "Introspection on improper seismic retrofit of Basilica Santa Maria di Collemaggio after 2009 Italian earthquake" by G.P.Cimellaro,A.M.Reinhorn and A.De Stefano
5
作者 Vincenzo Ciampi 《Earthquake Engineering and Engineering Vibration》 SCIE EI CSCD 2012年第2期281-282,共2页
The thesis of the paper,which is the object of this Discussion,is that the considerable damage suffered by the Basilica,after the earthquake of L’Aquila in 2009,was the exclusive result of the intervention of seismic... The thesis of the paper,which is the object of this Discussion,is that the considerable damage suffered by the Basilica,after the earthquake of L’Aquila in 2009,was the exclusive result of the intervention of seismic improvement of the naves,made in 2000;such 展开更多
关键词 introspection on improper seismic retrofit of Basilica Santa Maria di Collemaggio after 2009 Italian earthquake Discussion 1 on by G.P.Cimellaro A.M.Reinhorn and A.De Stefano
下载PDF
More on Bounding Introspection in Modal Nonmonotonic Logics
6
作者 Xishun Zhao Decheng Ding Department of Mathematics. Nanjing University. Nanjing 210093, P. R. China 《Acta Mathematica Sinica,English Series》 SCIE CSCD 2000年第4期555-564,共10页
By L. we denote the set of all propositional fornmlas. Let C be the set of all clauses. Define C_n=C(Lη:η∈C}.In Sec. 2 of this paper. we prove that for normal modal logics S, the notions of (S. C_)-expansions and S... By L. we denote the set of all propositional fornmlas. Let C be the set of all clauses. Define C_n=C(Lη:η∈C}.In Sec. 2 of this paper. we prove that for normal modal logics S, the notions of (S. C_)-expansions and S-expansions coincide. In Sec. 3. we prove that if I consists of default clauses then the notions of S-expansions for I and (S.C)-expansions for I coincide. To this end. we first show. in Sec 3.that the notion of S-expansions for I is the same as that of (S.L)-expansions for I. 展开更多
关键词 Modal nonmonotonic logic EXPANSION Bounding introspection Default clause
原文传递
The Dilemma and Reflection of Art Criticism in the Internet Plus Era
7
作者 WEI Yulong 《Cultural and Religious Studies》 2023年第12期622-627,共6页
The vigorous development of the Internet is changing all aspects of our lives.Today’s“Internet plus”concept has played a vital role in the economic field with its unique advantages.In the cultural field,it still in... The vigorous development of the Internet is changing all aspects of our lives.Today’s“Internet plus”concept has played a vital role in the economic field with its unique advantages.In the cultural field,it still influences people’s spiritual and cultural life in a unique way.The free,open,and equal nature of the Internet provides an unprecedented broad platform for contemporary art criticism,and also frees it from the monopoly of a few authorities,entering the artistic life of the general public with a more humane and new attitude.This has played a certain guiding role in artistic creation,appreciation,dissemination,and popularization. 展开更多
关键词 Internet art criticism DIFFICULTIES introspection
下载PDF
Traditional Chinese Aesthetics and Urban Landscape Design
8
作者 魏晶晶 王琳 《Journal of Landscape Research》 2010年第3期49-51,共3页
Landscape designs for modern urban open spaces are studied on the basis of traditional aesthetics, while aesthetic basis and development orientation can be provided for such designs through studies on traditional aest... Landscape designs for modern urban open spaces are studied on the basis of traditional aesthetics, while aesthetic basis and development orientation can be provided for such designs through studies on traditional aesthetics. It is hoped that landscape designs from aesthetic perspective can correct people’s aesthetic attitudes towards the city, transform their habitual aesthetic modes, so as to cultivate new aesthetic tastes. 展开更多
关键词 Traditional aesthetics Do-nothing introspection LANDSCAPE
下载PDF
Network Security Situation Awareness Framework based on Threat Intelligence 被引量:3
9
作者 Hongbin Zhang Yuzi Yi +2 位作者 Junshe Wang Ning Cao Qiang Duan 《Computers, Materials & Continua》 SCIE EI 2018年第9期381-399,共19页
Network security situation awareness is an important foundation for network security management,which presents the target system security status by analyzing existing or potential cyber threats in the target system.In... Network security situation awareness is an important foundation for network security management,which presents the target system security status by analyzing existing or potential cyber threats in the target system.In network offense and defense,the network security state of the target system will be affected by both offensive and defensive strategies.According to this feature,this paper proposes a network security situation awareness method using stochastic game in cloud computing environment,uses the utility of both sides of the game to quantify the network security situation value.This method analyzes the nodes based on the network security state of the target virtual machine and uses the virtual machine introspection mechanism to obtain the impact of network attacks on the target virtual machine,then dynamically evaluates the network security situation of the cloud environment based on the game process of both attack and defense.In attack prediction,cyber threat intelligence is used as an important basis for potential threat analysis.Cyber threat intelligence that is applicable to the current security state is screened through the system hierarchy fuzzy optimization method,and the potential threat of the target system is analyzed using the cyber threat intelligence obtained through screening.If there is no applicable cyber threat intelligence,using the Nash equilibrium to make predictions for the attack behavior.The experimental results show that the network security situation awareness method proposed in this paper can accurately reflect the changes in the network security situation and make predictions on the attack behavior. 展开更多
关键词 Situation AWARENESS stochastic game cloud computing virtual machine introspection CYBER THREAT INTELLIGENCE NASH equilibrium
下载PDF
迈尔音乐风格理论的美学阐释 被引量:1
10
作者 高拂晓 《黄钟(武汉音乐学院学报)》 CSSCI 北大核心 2009年第3期11-19,共9页
迈尔在音乐风格理论中讨论了许多重要的美学问题。其中有关"形式主义"的观点实质上已超出"形式主义"本身,具有"超越形式主义"的性质。这种"超越形式主义"体现在两个层面:一是指形式结构自身的... 迈尔在音乐风格理论中讨论了许多重要的美学问题。其中有关"形式主义"的观点实质上已超出"形式主义"本身,具有"超越形式主义"的性质。这种"超越形式主义"体现在两个层面:一是指形式结构自身的创造性;二是指形式不能局限于技术,而应与交流和理解发生关系。本文把审美的现代性作为审视迈尔音乐风格理论的背景,阐释了迈尔的音乐风格理论所具有的美学内涵,其中最重要的是在审美的张力和矛盾中表现出来的风格的反思性与超越性。 展开更多
关键词 迈尔 音乐风格 美学 形式主义 反思性 超越性
下载PDF
On the Strategic Paths of the Going Global Strategy of Chinese Literature
11
作者 He Hongli 《学术界》 CSSCI 北大核心 2018年第8期259-267,共9页
The going global strategy of Chinese literature is a vital part of the going global strategy of Chinese culture. In recent years,the Chinese government has launched and strongly supported a series of activities and pr... The going global strategy of Chinese literature is a vital part of the going global strategy of Chinese culture. In recent years,the Chinese government has launched and strongly supported a series of activities and projects to promote this strategy,but little effect has been produced. Starting from analyzing the predicament and reasons of the current strategy,the essay suggests four strategic paths: enhancing the overall strength of the country to promote the international influence of Chinese culture,strengthening cultural awareness and cultural introspection,integrating the nationality and cosmopolitan of literature and establishing a market-oriented literary translation mechanism. 展开更多
关键词 GOING global of CHINESE LITERATURE strategic path international influence of CHINESE culture CULTURAL AWARENESS and introspection translation mechanism
下载PDF
Investigating the Implications of Virtualization for Digital Forensics
12
作者 Song Zheng Jin Bo +1 位作者 Zhu Yinghong Sun Yongqing 《China Communications》 SCIE CSCD 2010年第6期100-106,共7页
Research in virtualization technology has gained significant developments in recent years, which brings not only opportunities to the forensic community, but challenges as well. This paper discusses the potential role... Research in virtualization technology has gained significant developments in recent years, which brings not only opportunities to the forensic community, but challenges as well. This paper discusses the potential roles of virtualization in digital forensics, examines the recent progresses which use the virtualization techniques to support modem computer forensics. The influences on digital forensics caused by virtualization technology are identified. Tools and methods in common digital forensic practices are analyzed, and experiences of our practice and reflections in this field are shared. 展开更多
关键词 digital forensics VIRTUALIZATION forensic image booting virtual machine introspection
下载PDF
Economical Requirements Elicitation Techniques During COVID-19: A Systematic Literature Review
13
作者 Tauqeer ul Amin Basit Shahzad +1 位作者 Fazal-e-Amin Muhammad Shoaib 《Computers, Materials & Continua》 SCIE EI 2021年第5期2665-2680,共16页
Requirements elicitation is a fundamental phase of software development in which an analyst discovers the needs of different stakeholders and transforms them into requirements.This phase is cost-and time-intensive,and... Requirements elicitation is a fundamental phase of software development in which an analyst discovers the needs of different stakeholders and transforms them into requirements.This phase is cost-and time-intensive,and a project may fail if there are excessive costs and schedule overruns.COVID-19 has affected the software industry by reducing interactions between developers and customers.Such a lack of interaction is a key reason for the failure of software projects.Projects can also fail when customers do not know precisely what they want.Furthermore,selecting the unsuitable elicitation technique can also cause project failure.The present study,therefore,aimed to identify which requirements elicitation technique is the most cost-effective for large-scale projects when time to market is a critical issue or when the customer is not available.To that end,we conducted a systematic literature review on requirements elicitation techniques.Most primary studies identified introspection as the best technique,followed by survey and brainstorming.This finding suggests that introspection should be the first choice of elicitation technique,especially when the customer is not available or the project has strict time and cost constraints.Moreover,introspection should also be used as the starting point in the elicitation process of a large-scale project,and all known requirements should be elicited using this technique. 展开更多
关键词 COVID-19 software engineering requirements engineering requirements elicitation introspection project failure SLR on elicitation techniques large-scale projects economical elicitation techniques costeffective time constraints
下载PDF
An Asset-Based Approach to Mitigate Zero-Day Ransomware Attacks
14
作者 Farag Azzedin Husam Suwad Md Mahfuzur Rahman 《Computers, Materials & Continua》 SCIE EI 2022年第11期3003-3020,共18页
This article presents an asset-based security system where security practitioners build their systems based on information they own and not solicited by observing attackers’behavior.Current security solutions rely on... This article presents an asset-based security system where security practitioners build their systems based on information they own and not solicited by observing attackers’behavior.Current security solutions rely on information coming from attackers.Examples are current monitoring and detection security solutions such as intrusion prevention/detection systems and firewalls.This article envisions creating an imbalance between attackers and defenders in favor of defenders.As such,we are proposing to flip the security game such that it will be led by defenders and not attackers.We are proposing a security system that does not observe the behavior of the attack.On the contrary,we draw,plan,and follow up our own protection strategy regardless of the attack behavior.The objective of our security system is to protect assets rather than protect against attacks.Virtual machine introspection is used to intercept,inspect,and analyze system calls.The system callbased approach is utilized to detect zero-day ransomware attacks.The core idea is to take advantage of Xen and DRAKVUF for system call interception,and leverage system calls to detect illegal operations towards identified critical assets.We utilize our vision by proposing an asset-based approach to mitigate zero-day ransomware attacks.The obtained results are promising and indicate that our prototype will achieve its goals. 展开更多
关键词 Zero-day attacks ransomware system calls virtual machine introspection
下载PDF
Introspective Methods in Applied Linguistics
15
作者 张琪 《海外英语》 2013年第24期308-309,共2页
The present paper discusses introspective methods in applied linguistics. Introspective methods are ways of eliciting self-reflections from respondent. Two special techniques of introspective methods, namely, Think-al... The present paper discusses introspective methods in applied linguistics. Introspective methods are ways of eliciting self-reflections from respondent. Two special techniques of introspective methods, namely, Think-aloud and Retrospective in?terview are presented. Furthermore, an evaluation of these methods is also provided. 展开更多
关键词 LINGUISTICS Introspective METHODS
下载PDF
The Dark Reflection of Sadism within the Brilliance of the Narcissistic Persona
16
作者 Xanya Sofra 《Health》 2020年第9期1279-1298,共20页
<p align="justify"> <span style="font-family:Verdana;"></span>This double blind randomized clinical trial with 84 participants, revealed that mental patients diagnosed with narcis... <p align="justify"> <span style="font-family:Verdana;"></span>This double blind randomized clinical trial with 84 participants, revealed that mental patients diagnosed with narcissism, and narcissistic celebrities mirror each other’s paranoid, obsessive and histrionic symptomatology, grandiosity, manipulative charm, and inner emptiness. Elite narcissists manifested insidious sadism in the absence of depressive affect, while the narcissistic patients were differentiated by their depressive and masochistic symptomatology. Elite narcissists demonstrated advanced empathic skills, contradicting past literature. However, their empathic advantage appeared void of compassion, merely employed as a self-serving tactic to exploit, intimidate and subordinate. Both experimental narcissistic groups evidenced more prevalent psychopathology, yet, higher achievement, efficacy and ambition than their reciprocal control groups, confirming the narcissists’ finesse in concealing psychopathology under the brilliance of their pseudosuperiority. The main danger is the affinity between masochism and sadism, bonding low and high functioning narcissistic counterparts to endlessly feed from each-others’ pathology, forming dysfunctional interpersonal relationships, cults or disintegrating societies. This sadomasochistic dependency also reflects several countries’ authoritarian trends, where narcissistic constituents’ unyielding loyalty elevates idolized leaders to power, preluding the establishment of toxic tyrannical governments. </p> 展开更多
关键词 Narcissism SADISM MASOCHISM Obsessive Symptoms Histrionic Symptoms Paranoia Symptoms Personality Disorders Thematic Apperception Test Narcissistic Personality Inventory Anaclitic Depression Introspective Depression Empathy Dominance
下载PDF
AN INTROSPECTIVE STUDY ON TEST-TAKING PROCESS FOR BANKED CLOZE 被引量:4
17
作者 高晓莹 辜向东 《Chinese Journal of Applied Linguistics》 2008年第4期3-16,128,共15页
The present study investigates the testees' test-taking process for banked cloze, focusing on the following two aspects: the information sources and strategies. Employing simultaneous introspection and immediate r... The present study investigates the testees' test-taking process for banked cloze, focusing on the following two aspects: the information sources and strategies. Employing simultaneous introspection and immediate retrospection, the study is conducted among 18 non-English major students. After examining their test-taking processes, a framework for analyzing testees' test-taking processes for banked cloze test is put forward. And then the researcher applies this framework to analyze the testees' protocols. Results show that regarding information sources, clause-level information accounts for the largest proportion, followed by text-level information, sentence-level information and extra-textual information, and in terms of strategies, the testees show a clear preference for bottom-up processing strategies, followed by top-down processing strategies and test-wise processing strategies. The verbal protocols have further revealed that the proficient readers seem to have a context-based reading model and they prefer to grasp the gist of the text, whereas the less proficient readers often employ word-based approaches and they are apt to identify parts of the text. 展开更多
关键词 banked cloze test-taking process introspection
原文传递
REPORT ON BUSINESS ENGLISH MOCK COMPANIES PROGRAM
18
作者 赵金柱 王凤 V.Mellor 《Chinese Journal of Applied Linguistics》 2005年第6期117-119,129,共4页
Facing that the students were afraid of speaking English, we conducted a business English mock companies program to encourage students to communicate in English within a business environment. After fully preparation, ... Facing that the students were afraid of speaking English, we conducted a business English mock companies program to encourage students to communicate in English within a business environment. After fully preparation, students found they could speak English fluently to motivate their interest of English. This article is a report stating the aim, method, result and conclusion of this program. Besides, a foreign instructor gives her opinion of the mock program. 展开更多
关键词 mock companies program co-operative achievement introspection and self reports MOTIVATE 'performance avoidance'
原文传递
cMonitor: VMI-Based Fine-Grained Monitoring Mechanism in Cloud 被引量:1
19
作者 ZHANG Hao ZHAO Lei +1 位作者 XU Lai WANG Lina 《Wuhan University Journal of Natural Sciences》 CAS 2014年第5期393-397,共5页
For the lack of detailed semantic in prior works, a transparent fine-grained monitoring technique (cMonitor) is pro- posed. Deployed outside the virtual machines, the cMonitor util- izes the elevated privileges of t... For the lack of detailed semantic in prior works, a transparent fine-grained monitoring technique (cMonitor) is pro- posed. Deployed outside the virtual machines, the cMonitor util- izes the elevated privileges of the virtual machine monitor to monitor the network connection, the processes and the relationship between them in protected systems by reconstructing fine-grained system semantics. These semantics contain process states and corresponding network connection. Experimental results show that cMonitor not only can be rapidly deployed in realistic cloud, but also can effectively and universally obtain these fine-grained semantics to assist detection of some advanced network attack. Meanwhile, the network performance overhead is about 3%, which is acceptable. 展开更多
关键词 transparent monitoring virtual machine introspection fine-grained semantics
原文传递
Hidden Process Offline Forensic Based on Memory Analysis in Windows 被引量:1
20
作者 CUI Jingsong ZHANG Heng +2 位作者 QI Jing PENG Rong ZHANG Manli 《Wuhan University Journal of Natural Sciences》 CAS CSCD 2017年第4期346-354,共9页
Malicious software programs usually bypass the detection of anti-virus software by hiding themselves among apparently legitimate programs.In this work,we propose Windows Virtual Machine Introspection(WVMI)to accurat... Malicious software programs usually bypass the detection of anti-virus software by hiding themselves among apparently legitimate programs.In this work,we propose Windows Virtual Machine Introspection(WVMI)to accurately detect those hidden processes by analyzing memory data.WVMI dumps in-memory data of the target Windows operating systems from hypervisor and retrieves EPROCESS structures’address of process linked list first,and then generates Data Type Confidence Table(DTCT).Next,it traverses the memory and identifies the similarities between the nodes in process linked list and the corresponding segments in the memory by utilizing DTCT.Finally,it locates the segments of Windows’EPROCESS and identifies the hidden processes by further comparison.Through extensive experiments,our experiment shows that the WVMI detects the hidden process with high identification rate,and it is independent of different versions of Windows operating system. 展开更多
关键词 virtual machine introspection hidden process detection process linked list memory forensics
原文传递
上一页 1 2 下一页 到第
使用帮助 返回顶部