期刊文献+
共找到1,703篇文章
< 1 2 86 >
每页显示 20 50 100
表示“拥有”的own和possess可用于被动语态吗?
1
作者 李应清 《英语知识》 2004年第11期48-48,共1页
[问][431]表示“拥有”的own和possess 可用于被动语态吗? [答]静态动词(stative verb)have作“拥有”讲,不能用于被动语态,这是不争的事实。但是国内有些作者也许受此影响,在没有进行语言调查的情况下,宣称表示“拥有”的own和possess... [问][431]表示“拥有”的own和possess 可用于被动语态吗? [答]静态动词(stative verb)have作“拥有”讲,不能用于被动语态,这是不争的事实。但是国内有些作者也许受此影响,在没有进行语言调查的情况下,宣称表示“拥有”的own和possess均不能用于被动语态。如全国高等教育自学考试指定教材《现代英语语法》的配套参考书(中华书局,2003)的编者指出,作“拥有”解的possess不以被动语态的形式出现。实际上,情况并非如此。首先,请看own用于被动语态的例子: 展开更多
关键词 “拥有” OWN possess 被动语态 大学英语 学习难点 学习辅导
下载PDF
Reducing Computational and Communication Complexity for Dynamic Provable Data Possession
2
作者 刘妃妃 谷大武 +2 位作者 陆海宁 龙斌 李晓晖 《China Communications》 SCIE CSCD 2011年第6期67-75,共9页
Nowadays, an increasing number of persons choose to outsource their computing demands and storage demands to the Cloud. In order to ensure the integrity of the data in the untrusted Cloud, especially the dynamic files... Nowadays, an increasing number of persons choose to outsource their computing demands and storage demands to the Cloud. In order to ensure the integrity of the data in the untrusted Cloud, especially the dynamic files which can be updated online, we propose an improved dynamic provable data possession model. We use some homomorphic tags to verify the integrity of the file and use some hash values generated by some secret values and tags to prevent replay attack and forgery attack. Compared with previous works, our proposal reduces the computational and communication complexity from O(logn) to O(1). We did some experiments to ensure this improvement and extended the model to file sharing situation. 展开更多
关键词 cloud computing proofs of storage dynamic provable data possession file sharing
下载PDF
A Novel Provable Data Possession Scheme Based on Geographic Location Attribute
3
作者 Yaxing Zha Shoushan Luo +1 位作者 Jianchao Bian Wei Li 《China Communications》 SCIE CSCD 2016年第9期139-150,共12页
Increment of mobile cloud video motivates mobile users to utilize cloud storage service to address their demands, cloud storage provider always furnish a location-independent platform for managing user's data. Howeve... Increment of mobile cloud video motivates mobile users to utilize cloud storage service to address their demands, cloud storage provider always furnish a location-independent platform for managing user's data. However, mobile users wonder if their cloud video data leakage or dynamic migration to illegal service providers. In this paper, we design a novel provable data possession protocol based on data geographic location attribute, which allows data owner to auditing the integrity of their video data, which put forward an ideal choice for remote data possession checking in the mobile cloud storage. In our proposed scheme, we check out whether the video data dynamic migrate to an unspecified location (such as: overseas) by adding data geographic location attribute tag into provable data possession protocol. Moreover, we make sure the security of our proposed scheme under the Computational Diffic-Hellman assumption. The analysis and experiment results demonstrate that our proposed scheme is provably secure and efficient. 展开更多
关键词 cloud storage security provable data possession geographic location security boundary CDH assumption
下载PDF
Blockchain-Based Light-Weighted Provable Data Possession for Low Performance Devices
4
作者 Yining Qi Zhen Yang +2 位作者 Yubo Luo Yongfeng Huang Xing Li 《Computers, Materials & Continua》 SCIE EI 2022年第11期2205-2221,共17页
Provable Data Possession(PDP)schemes have long been proposed to solve problem of how to check the integrity of data stored in cloud service without downloading.However,with the emerging of network consisting of low pe... Provable Data Possession(PDP)schemes have long been proposed to solve problem of how to check the integrity of data stored in cloud service without downloading.However,with the emerging of network consisting of low performance devices such as Internet of Things,we find that there are still two obstacles for applying PDP schemes.The first one is the heavy computation overhead in generating tags for data blocks,which is essential for setting up any PDP scheme.The other one is how to resist collusion attacks from third party auditors with any possible entities participating the auditing.In this paper,we propose a novel blockchain-based light-weighted PDP scheme for low performance devices,with an instance deployed on a cloud server.We design a secure outsourced tag generating method for low performance devices,which enables a kind of“hash-sign-switch”two-phase tag computing.With this method,users with low performance devices can employ third party auditors to compute modular exponential operations that accounts for the largest portion of computation overhead in tag generation,without leaking their data content.Chaincodes in blockchain network ensure the correctness of such outsourcing and prevent collusion attacks.The security analysis and performance evaluation prove that our scheme is both secure and efficient. 展开更多
关键词 Provable data possession outsourced computation blockchain smart contract chameleon hash
下载PDF
ISOVALEROYL OXOKADSURANE,A NOVEL DIBENZOCYCLOOCTADIENE LIGNAN POSSESSING A SPIROBENZOPURANOID SKELETON
5
作者 Lian Niang LI Xiang Jun QI Cun Heng HE and Qi Tai ZHENG Institute of Materia Medica,Chinese Academy of Medical Sciences,Beijing 100050,China 《Chinese Chemical Letters》 SCIE CAS CSCD 1990年第1期37-38,共2页
Isovaleroyl oxokadsurane,a novel dibenzocyclooctadiene lignan pos- sessing a spirobenzofuranoid skeleton was isolated from the stems of Kadsura coccinea.Its structure and relative configuration were determined by X-ra... Isovaleroyl oxokadsurane,a novel dibenzocyclooctadiene lignan pos- sessing a spirobenzofuranoid skeleton was isolated from the stems of Kadsura coccinea.Its structure and relative configuration were determined by X-ray diffraction analysis. 展开更多
关键词 ISOVALEROYL OXOKADSURANE A NOVEL DIBENZOCYCLOOCTADIENE LIGNAN possessING A SPIROBENZOPURANOID SKELETON
下载PDF
Positive integers possessing a weak order
6
作者 刘弘泉 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2006年第4期502-503,共2页
Let m be a positive integer, g(m) be the number of integers t for which 1 ≤ t ≤ m and there does not exist a positive integer n satisfying ( t = t(n) ) t^n+1≡t(modm).For a number x≥3, let G(x)=∑m≤tg(... Let m be a positive integer, g(m) be the number of integers t for which 1 ≤ t ≤ m and there does not exist a positive integer n satisfying ( t = t(n) ) t^n+1≡t(modm).For a number x≥3, let G(x)=∑m≤tg(m) In this paper, we obtain the asymptotic formula: .G(x)=αx^2+O(xlogx),ax x→∞ Our result improves the corresponding result with an error term O(xlog^2 x) of Yang Zhaohua obtained in 1986 展开更多
关键词 integers possessing a weak order asymptotic formula
下载PDF
Possessions Ceded for the Benefit of the Hospitals and Churches From the Sighisoara County
7
作者 Mariana Borcoman 《Journal of Literature and Art Studies》 2013年第4期255-262,共8页
Transilvania is a province of the actual state of Romania, geographically situated in the middle of the country, in the inner arch of the Carpathians. Starting with the 10th century, the territory of Transilvania beca... Transilvania is a province of the actual state of Romania, geographically situated in the middle of the country, in the inner arch of the Carpathians. Starting with the 10th century, the territory of Transilvania became attractive for the neighboring Hungarian royalty and later on, in the 1 lth century it was annexed into Hungary. For a better control of the newly annexed territory and in order to convert the orthodox population to Catholicism, the Hungarian rulers brought the Szeklers to Transilvania and two centuries later, German originating populations, from Rhine, Luxemburg, and Saxony (the name of Sas people, or Saxon of Transilvania derives from "Saxony"). The aim of this paper is to focus on the Sighisoara County, namely on the easement of certain areas for temporary or permanent maintenance or use by the church and hospitals in the region. That was a common practice in Medieval Europe aimed at ensuring the survival means for these institutions. However, it was not the only one to serve this goal. There were also donations on behalf of various people or allocations of money by the county authorities. The documents attesting this are unpublished, unedited and are to be found in the archives of the Brasov County, Budapest, and Vienna. They are the stepping stone of this paper and hence, they grant its originality. The objectives of the paper are to bring arguments in favor of the thesis that community money was directed towards meeting the needs of the hospitals, as well as towards supporting the widows, the orphans, and the needy ones. Worth noting in this respect is the management of the funds ceded to the church and county hospitals and that actually benefitted the whole community. Moreover, the paper also emphasizes the role played by education, since the latter is an important landmark for a community's development level 展开更多
关键词 COUNTY CRAFT "dica" tax possessions great landed property MAGISTRATE bestowed properties
下载PDF
Morphosyntactic Structures of Existential, Possessive and Locative Constructions in Amharic
8
作者 Amare Getahun 《宏观语言学》 2021年第2期25-43,共19页
This paper lays out the morphosyntactic structures of existential,locative and possessive constructions in Amharic.Amharic belongs to South Ethio-Semitic language subfamily.It is natively spoken in the Amhara region a... This paper lays out the morphosyntactic structures of existential,locative and possessive constructions in Amharic.Amharic belongs to South Ethio-Semitic language subfamily.It is natively spoken in the Amhara region and used as the first and the second language for some urban dwellers in the country.It is a working language for the Federal Government of Ethiopia.It serves the same in Gambella,Southern Nations,Nationalities and Peoples’and Benishangul-Gumuz regional states.The Amharic existential,possessive and locative constructions are characterized by using the same existential verb stem all-‘exist’.The verb is defective in its derivation and conjugation.Unlike the prototypical verbs of the language,the existential verb uses a different verb for imperfective and past verb forms.Unlike the regular verbs of the language,the existential verb,which is perfective in form,conveys present tense.It has been observed that indefinite nominals appear as the E(Existent)in existentials and possessives,whereas definite ones appear in locatives.The morphosyntactic features of existentials and locatives are the same in every aspect except the use of definiteness of the E(Existent).The possessives differ from the two constructions in word order and morphological structure of the verb. 展开更多
关键词 ROOT RADICAL EXISTENCE location possessION morphosyntactic structures Amharic
下载PDF
Analysis of bona fide acquisition under possession reformulation
9
作者 Huochenchen 《International Journal of Technology Management》 2017年第3期23-25,共3页
The system of bona fide acquisition of movables is a very important system in civil law since modem times. However, in modem society, the further development of concept delivery makes the phenomenon of separation betw... The system of bona fide acquisition of movables is a very important system in civil law since modem times. However, in modem society, the further development of concept delivery makes the phenomenon of separation between possession and ownership become more and more universal. There is a potential conflict between possession reform and the announcement of property right of property as a sign of delivery, which has been brought up again in civil law circles. Based on the measure of interest and value analysis, on the possession case of bona fide acquisition system is discussed and reflection, in under the bona fide possession of the application, the modified say. With a view to China' s ongoing property rights legislation to benefit. 展开更多
关键词 possession modification bona fide acquisition PUBLICITY
下载PDF
A Special Report of Visit to Director Zhang Xiaolu of Department of Science &Technology and Environmental Protection, the State Power Corporation of China──Top Leveled Enterprise Must Possess Top Leveled Science & Technology Innovation Ability
10
《Electricity》 2000年第2期30-36,共7页
关键词 A Special Report of Visit to Director Zhang Xiaolu of Innovation Department of Science Power Corporation of China Technology Innovation Ability Technology and Environmental Protection Top Leveled Enterprise Must possess Top Leveled Science the State ZHANG
下载PDF
The Enclosed Personal Space and Female Identity Construction in A. S. Byatt's Possession
11
作者 叶柳影 《海外英语》 2018年第18期206-209,共4页
From the perspective of feminism, by analyzing single intellectual women's living states in enclosed personal spaces, andcomparing their different spatial changes triggered by external intrusions, this essay inten... From the perspective of feminism, by analyzing single intellectual women's living states in enclosed personal spaces, andcomparing their different spatial changes triggered by external intrusions, this essay intends to explore Byatt's ambivalent attitudestowards the feminists' pursuit for a room of one's own, and point out the significance of harmonious co-existence between men andwomen to female identity construction. 展开更多
关键词 A. S. BYATT possessION Space FEMALE IDENTITY HARMONIOUS CO-EXISTENCE
下载PDF
Paradise Archetype in Possession
12
作者 吴菲 TIAN Ye 《海外英语》 2018年第1期154-155,共2页
A.S.Byatt's Possession has its own appraisal of public and critic alike for its original structure, as well as for the novelty and complexity of its themes. With Northrop Frye's archetypal criticism, this pape... A.S.Byatt's Possession has its own appraisal of public and critic alike for its original structure, as well as for the novelty and complexity of its themes. With Northrop Frye's archetypal criticism, this paper analyzes the epic poems"The Garden of Proserpina"so as to identify the hidden creation theme from paradise archetype. 展开更多
关键词 paradise archetype Northrop Frye archetypal criticism A S BYATT possessION
下载PDF
The Quest Motif in Possession
13
作者 吴菲 《海外英语》 2018年第4期129-130,共2页
The author of the paper analyzes the story"Glass Coffin"in A. S. Byatt's Possession and compares it with Brothers Grimm's fairy tale with the same name. Through the study, the author identifies the q... The author of the paper analyzes the story"Glass Coffin"in A. S. Byatt's Possession and compares it with Brothers Grimm's fairy tale with the same name. Through the study, the author identifies the quest motif from our modern hero's discovery journey in Possession. 展开更多
关键词 "Glass Coffin" Brothers Grimm the quest motif A. S. Byatt possessION
下载PDF
On the Reason of Changes of Chinese Possession Institution——from the Perspective of Historical Institutionalism
14
作者 Zhang Yuxin 《学术界》 CSSCI 北大核心 2013年第12期272-276,共5页
It is the important part of historical institutionalism to explore the reason of the changes of institutions,which includes key issues of historical institutionalism—why do institutions change?How do institutions pla... It is the important part of historical institutionalism to explore the reason of the changes of institutions,which includes key issues of historical institutionalism—why do institutions change?How do institutions play a new role through changing?As far as the reason of the changes is concerned,there are social reasons,economic reasons,technological reasons as well as concept reasons.Being part of the China’s civil law system,the possession institution unexceptionally experiences changing process of establishment,amendment,reform and innovation.This paper attempts to analyze the reason of the changes of the possession institution from the perspective of institutional change theory of the historical institutionalism,giving historical explanation of institutional changes and putting forward historical interpretation and support for the perfection of the contemporary possession institution. 展开更多
关键词 中国历史 机构 变迁 主义 经济原因 理性 组成部分 法律制度
下载PDF
运输毒品罪的存在空间与合理界定 被引量:1
15
作者 李立丰 《中国应用法学》 2024年第4期115-126,共12页
《全国法院毒品案件审判工作会议纪要》对于运输毒品行为司法认定与刑罚适用的相关完善,进一步彰显出运输毒品罪的独立属性与存在价值。作为连接制毒源头与贩毒中端、贩毒中端与贩毒中端以及贩毒中端与消费终端的重要流通环节,运输毒品... 《全国法院毒品案件审判工作会议纪要》对于运输毒品行为司法认定与刑罚适用的相关完善,进一步彰显出运输毒品罪的独立属性与存在价值。作为连接制毒源头与贩毒中端、贩毒中端与贩毒中端以及贩毒中端与消费终端的重要流通环节,运输毒品行为独立成罪的本质在于运输者对于流通中毒品的事实占有或观念占有,以及由此形成的对于毒品流通过程的排他性控制。根据“空间转移”与“占有关系”这两个变量,可以更为合理地确定运输毒品行为的实行着手、停止形态与犯罪既遂,更为科学地厘定运输毒品罪与走私、贩卖、制造毒品罪,非法持有毒品罪的区别与联系,更为正当地适用包括死刑在内的法定刑罚。 展开更多
关键词 《昆明会议纪要》 运输毒品 占有 控制 等价
下载PDF
Sec-Auditor:A Blockchain-Based Data Auditing Solution for Ensuring Integrity and Semantic Correctness
16
作者 Guodong Han Hecheng Li 《Computers, Materials & Continua》 SCIE EI 2024年第8期2121-2137,共17页
Currently,there is a growing trend among users to store their data in the cloud.However,the cloud is vulnerable to persistent data corruption risks arising from equipment failures and hacker attacks.Additionally,when ... Currently,there is a growing trend among users to store their data in the cloud.However,the cloud is vulnerable to persistent data corruption risks arising from equipment failures and hacker attacks.Additionally,when users perform file operations,the semantic integrity of the data can be compromised.Ensuring both data integrity and semantic correctness has become a critical issue that requires attention.We introduce a pioneering solution called Sec-Auditor,the first of its kind with the ability to verify data integrity and semantic correctness simultaneously,while maintaining a constant communication cost independent of the audited data volume.Sec-Auditor also supports public auditing,enabling anyone with access to public information to conduct data audits.This feature makes Sec-Auditor highly adaptable to open data environments,such as the cloud.In Sec-Auditor,users are assigned specific rules that are utilized to verify the accuracy of data semantic.Furthermore,users are given the flexibility to update their own rules as needed.We conduct in-depth analyses of the correctness and security of Sec-Auditor.We also compare several important security attributes with existing schemes,demonstrating the superior properties of Sec-Auditor.Evaluation results demonstrate that even for time-consuming file upload operations,our solution is more efficient than the comparison one. 展开更多
关键词 Provable data possession public auditing cloud storage data integrity semantic correctness
下载PDF
论刑法修正案(八)第四十七条之再完善
17
作者 蒲方合 《黄河科技学院学报》 2024年第7期66-72,共7页
刑法修正案(八)第四十七条所指的罪名需进一步分解,其罪状表述需进一步规范。非法占有型采矿罪的刑罚设置需更好地适应抢劫矿产罪、抢夺矿产罪、盗采矿产罪之社会危害性。刑法修正案(八)第四十七条所指的罪名可分解为抢劫矿产罪、抢夺... 刑法修正案(八)第四十七条所指的罪名需进一步分解,其罪状表述需进一步规范。非法占有型采矿罪的刑罚设置需更好地适应抢劫矿产罪、抢夺矿产罪、盗采矿产罪之社会危害性。刑法修正案(八)第四十七条所指的罪名可分解为抢劫矿产罪、抢夺矿产罪、盗采矿产罪,进一步规范刑法修正案(八)第四十七条的罪状表述,准确把握抢劫矿产罪、抢夺矿产罪、盗采矿产罪的犯罪构成。在犯罪客观方面,正确理解情节严重的内涵。为了更好地与抢劫矿产罪、抢夺矿产罪、盗采矿产罪之社会危害性相适应,进一步调整刑法修正案(八)第四十七条设定的刑罚。 展开更多
关键词 非法占有型采矿罪 非法采矿罪 犯罪构成 罪状
下载PDF
分割数据产权的不适性——转向基于模块理论的数据持有权 被引量:3
18
作者 马斌 《东方法学》 北大核心 2024年第1期47-57,共11页
在数据经济时代,释放数据价值的方式是利益相关者为共同目标而协作使用数据,并非分割数据的使用。因此,不可将数据二十条中涉数据产权内容理解为三权分置,这既不符合财产法原理也不符合数据价值创造和实现方式。就制度设计而言,应以模... 在数据经济时代,释放数据价值的方式是利益相关者为共同目标而协作使用数据,并非分割数据的使用。因此,不可将数据二十条中涉数据产权内容理解为三权分置,这既不符合财产法原理也不符合数据价值创造和实现方式。就制度设计而言,应以模块原理构建数据产权制度。模块原理是标准化思维的产物,是一种利益相关者协同治理的产权形态,可为各利益相关者和整个数据生态系统创造价值,此为分割产权所不能及。数据持有权是模块结构的应用产物,因其制度设计旨在激励利益相关者治理数据从而生产出可交易数据,与数据价值创造和实现方式相契合。其中,可交易数据的流通是连接整个模块的核心,数据持有权利规范是整个模块治理的核心。 展开更多
关键词 三权分置 数据持有权 数据生产者 利益相关者 模块结构 数据治理
下载PDF
论财产犯罪中股权的占有及转移
19
作者 王昭武 杨晶 《云南大学学报(社会科学版)》 2024年第1期92-107,共16页
股权属于财产性利益,股权并不是抽象的公司财产,股权的财产属性体现为股东的盈余分配权及股权转让权。财产性利益的占有方式体现为对权力的实际行使和支配,股权的占有方式体现为实际行使具有财产属性的股东权利,股东凭借股东名册的记载... 股权属于财产性利益,股权并不是抽象的公司财产,股权的财产属性体现为股东的盈余分配权及股权转让权。财产性利益的占有方式体现为对权力的实际行使和支配,股权的占有方式体现为实际行使具有财产属性的股东权利,股东凭借股东名册的记载和登记机关登记行使股东权利并排他性地实现股权的占有。变更股东工商登记的行为是股权的转移占有行为,但只有在公司内部完全排除股东行使股东权利才是股权占有转移的完成。 展开更多
关键词 股权 财产性利益 占有 占有转移
下载PDF
过度维权与敲诈勒索罪的辨析——以限缩解释方法展开 被引量:1
20
作者 张子晗 《中州大学学报》 2024年第1期44-50,共7页
过度维权与敲诈勒索罪在行为方式上存在相似之处,但前者的社会危害性明显低于后者,不应轻易界定为犯罪。为平衡个人权利与社会利益,辨析二者时应采取限缩解释方法,将符合条件的维权行为进行出罪处理。在法益层面,由于正当权利基础的存在... 过度维权与敲诈勒索罪在行为方式上存在相似之处,但前者的社会危害性明显低于后者,不应轻易界定为犯罪。为平衡个人权利与社会利益,辨析二者时应采取限缩解释方法,将符合条件的维权行为进行出罪处理。在法益层面,由于正当权利基础的存在,维权行为并未造成被害人的实质财产损失,不具有财产方面的法益侵害性。判定权利基础时应采取尽可能宽松的标准,不论是法定权利还是自然权利抑或道德权利,都能够成为合理的权利来源。在主观目的层面,充分的维权依据能够在一定程度上排除行为人的非法占有目的,只有当行为人主观上完全出于故意侵犯他人财产的恶意时,才能认定其目的上的非法性。索赔数额与非法占有目的之间没有必然联系,高额索赔只是行为人进行谈判的手段,应尊重当事人的意思自治。在客观行为层面,过度维权也可能采取胁迫手段,虽然不一定构成敲诈勒索罪,但可能满足其他犯罪的成立条件,对其依照相关规定处理即可。 展开更多
关键词 过度维权 敲诈勒索罪 正当权利基础 限缩解释 非法占有目的
下载PDF
上一页 1 2 86 下一页 到第
使用帮助 返回顶部