期刊文献+
共找到6篇文章
< 1 >
每页显示 20 50 100
To Raise Safe and Economical Operation Level on Scientific and Technical Progress Basis
1
《Electricity》 1997年第1期20-22,共3页
关键词 To Raise Safe and Economical Operation level on Scientific and Technical Progress Basis
下载PDF
Design of secure operating systems with high security levels 被引量:5
2
作者 QING SiHan1,2 & SHEN ChangXiang3 1 Institute of Software, Chinese Academy of Sciences, Beijing 100080, China 2 School of Software and Microelectronics, Peking University, Beijing 102600, China 3 Institute of Computing Technology, Navy, Beijing 100841, China 《Science in China(Series F)》 2007年第3期399-418,共20页
Numerous Internet security incidents have shown that support from secure operating systems is paramount to fighting threats posed by modern computing environments. Based on the requirements of the relevant national an... Numerous Internet security incidents have shown that support from secure operating systems is paramount to fighting threats posed by modern computing environments. Based on the requirements of the relevant national and international standards and criteria, in combination with our experience in the design and development of the ANSHENG v4.0 secure operating system with high security level (hereafter simply referred to as ANSHENG OS), this paper addresses the following key issues in the design of secure operating systems with high security levels: security architecture, security policy models, and covert channel analysis. The design principles of security architecture and three basic security models: confidentiality, integrity, and privilege control models are discussed, respectively. Three novel security models and new security architecture are proposed. The prominent features of these proposals, as well as their applications to the ANSHENG OS, are elaborated. Cover channel analysis (CCA) is a well-known hard problem in the design of secure operating systems with high security levels since to date it lacks a sound theoretical basis and systematic analysis approach. In order to resolve the fundamental difficulties of CCA, we have set up a sound theoretical basis for completeness of covert channel identification and have proposed a unified framework for covert channel identification and an efficient backward tracking search method. The successful application of our new proposals to the ANSHENG OS has shown that it can help ease and speedup the entire CCA process. 展开更多
关键词 secure operating systems with high security levels ARCHITECTURE security model covert channel analysis
原文传递
PREDICTING ENVIRONMENTAL PERFORMANCE OF CONSTRUCTION PROJECTS BY USING LEAST-SQUARES FITTING METHOD AND ROBUST METHOD
3
作者 Vivian W.Y.Tam Khoa N.Le 《Journal of Green Building》 2007年第1期143-155,共13页
Recently,an Environmental Management System(EMS)has been used to promote effective environmental protection.Environmental Performance Assessment(EPA)is a critical tool of the EMS in checking,reviewing,monitoring and e... Recently,an Environmental Management System(EMS)has been used to promote effective environmental protection.Environmental Performance Assessment(EPA)is a critical tool of the EMS in checking,reviewing,monitoring and evaluating environmental performance of organizations.To implement EPA,the relations between Environmental Operational Indicators(EOIs)used in EPA and Environmental Performance Indicators(EPIs)are required,which,however,are lacking in the construction industry.This paper attempts to develop a series of EOIs and EPIs of individual construction projects for EPA and to measure their relations by using least-squares fitting and robust fitting methods.The results show that the defined EOIs correlate strongly with EPIs.Therefore,EPA can be used to identify areas for continuous improvement,and also can provide an early indication of the environmental performance for an organization. 展开更多
关键词 environmental management system environmental performance assessment operational levels
下载PDF
QCD factorization semi-inclusive deep inelastic scattering diffractive deep inelastic scattering
4
作者 周高亮 《Communications in Theoretical Physics》 SCIE CAS CSCD 2016年第2期204-212,共9页
The operator level proof of factorization theorem exhibited in [ar Xiv:hep-ph/1307.4194] is extended to the semi-inclusive deep inelastic scattering process(SIDIS). Factorization theorem can be proved at operator l... The operator level proof of factorization theorem exhibited in [ar Xiv:hep-ph/1307.4194] is extended to the semi-inclusive deep inelastic scattering process(SIDIS). Factorization theorem can be proved at operator level if there are not detected soft hadrons. The key point is that the initial one-nucleon state is the eigenstate of QCD. 展开更多
关键词 QCD Factorization of Semi-Inclusive DIS Process at operator level
原文传递
QCD factorization Drell–Yan process
5
作者 周高亮 《Communications in Theoretical Physics》 SCIE CAS CSCD 2016年第2期193-203,共11页
An alternative proof of factorization theorem for Drell–Yan process that works at operator level is presented in this paper. Contributions of interactions after the hard collision for such inclusive processes are pro... An alternative proof of factorization theorem for Drell–Yan process that works at operator level is presented in this paper. Contributions of interactions after the hard collision for such inclusive processes are proved to be canceled at operator level according to the unitarity of time evolution operator. After this cancellation, there are no longer leading pinch singular surface in Glauber region in the time evolution of electromagnetic currents. Effects of soft gluons are absorbed into Wilson lines of scalar-polarized gluons. Cancelation of soft gluons is attribute to unitarity of time evolution operator and such Wilson lines. 展开更多
关键词 A Proof of Factorization Theorem of Drell–Yan Process at operator level
原文传递
View Creation for Queriesin Object Oriented Databases
6
作者 RajeshNarang K.D.Sharma 《Journal of Computer Science & Technology》 SCIE EI CSCD 1999年第4期349-362,共14页
A view in object oriented databases corresponds to virtual schemawith restructured generalization and decomposition hierarchies. Numbers of viewcreation methodologies have been proposed. A major drawback of existing m... A view in object oriented databases corresponds to virtual schemawith restructured generalization and decomposition hierarchies. Numbers of viewcreation methodologies have been proposed. A major drawback of existing method-ologies is that they do not maintain the closure property. That is, the result of aquery does not have the same semantics as embodied in the object oriented datamodel. Therefore, this paper presents a view creation methodology that derives aclass in response to a user's query, integrates derived class in global schema (i.e.,considers the problem of classes moving in class hierarchy) and selects the requiredclasses from global schema to create the view for user's query. Novel idea of viewcreation includes: (a) an object algebra for class derivation and customization (wherethe derived classes in terms of object instances and procedure/methods are studied),(b) maintenance of closure property, and (c) classification algorithm which providesmechanism to deal with the problem of a class moving in a class hierarchy. 展开更多
关键词 object manipulation type level operation instance level operation object algebra object operator operator syntax operator semantics derived class class integration view creation algorithm
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部