期刊文献+
共找到10篇文章
< 1 >
每页显示 20 50 100
Simulation of Space Charge Effect in Field Emission from a Nanowire 被引量:1
1
作者 裴铁 张耿民 《Chinese Physics Letters》 SCIE CAS CSCD 2005年第3期648-650,共3页
下载PDF
Dependence of Electromagnetically Induced Transparency on Laser Linewidth 被引量:1
2
作者 郭瑞民 肖峰 +2 位作者 刘成 张宇 陈徐宗 《Chinese Physics Letters》 SCIE CAS CSCD 2003年第9期1507-1510,共4页
下载PDF
Field emission from zinc oxide nanowires
3
作者 陈亮 张耿民 +1 位作者 王鸣生 张琦锋 《Chinese Physics B》 SCIE EI CAS CSCD 2005年第1期181-185,共5页
下载PDF
Investigation of spontaneous magnetization of coupled 2×2 superconducting π ring array
4
作者 李壮志 王福仁 +5 位作者 杨涛 刘新元 马平 谢飞翔 聂瑞娟 戴远东 《Chinese Physics B》 SCIE EI CAS CSCD 2004年第4期532-537,共6页
下载PDF
Development of 1.3GHz high-Tc rf SQUID
5
作者 刘新元 谢飞翔 +6 位作者 孟树超 戴远东 李壮志 马平 杨涛 聂瑞娟 王福仁 《Chinese Physics B》 SCIE EI CAS CSCD 2004年第1期100-104,共5页
下载PDF
Velocity Transfer Spectroscopy of Rb 420 nm Transition
6
作者 张理国 刘忠征 +2 位作者 陶智明 凌俐 陈景标 《Chinese Physics Letters》 SCIE CAS CSCD 2014年第8期46-48,共3页
We propose and demonstrate the velocity transfer spectroscopy of a V-type energy structure with Rb atoms at 420nm transition. The weak oscillator strength of a lower excited state for V-type energy structure atoms lim... We propose and demonstrate the velocity transfer spectroscopy of a V-type energy structure with Rb atoms at 420nm transition. The weak oscillator strength of a lower excited state for V-type energy structure atoms limits the high signal-to-noise ratio of atomic laser spectroscopy, which can be usually realized by optical-optical double-resonance or double-resonance optical pumping for cascade-type energy structure atoms. For ^87Rb atoms, the weak 420 nm transition spectrum between the energy level of 5^2S1/2 and 6^2P3/2 is transferred to the spectrum on lower excited states at 780nm with strong oscillator strength, which is recorded by a 780 nm probe laser. This method, which & similar to the electron-shelving detection method, at a certain degree can indirectly measure a higher excited state transition with weak oscillator strength for any V-type energy structure of atoms by transferring the transition spectrum information of the very weak oscillator strength to the strong oscillator strength in an optical-optical double-resonance configuration. 展开更多
下载PDF
Efficient Incremental Maintenance of Frequent Patterns with FP-Tree 被引量:9
7
作者 Xiu-LiMa Yun-HaiTong +1 位作者 Shi-WeiTang Dong-QingYang 《Journal of Computer Science & Technology》 SCIE EI CSCD 2004年第6期876-884,共9页
Mining frequent patterns has been studied popularly in data mining area. However, little work has been done on mining patterns when the database has an influx of fresh data constantly. In these dynamic scenarios, effi... Mining frequent patterns has been studied popularly in data mining area. However, little work has been done on mining patterns when the database has an influx of fresh data constantly. In these dynamic scenarios, efficient maintenance of the discovered patterns is crucial. Most existing methods need to scan the entire database repeatedly, which is an obvious disadvantage. In this paper, an efficient incremental mining algorithm, Incremental-Mining (IM), is proposed for maintenance of the frequent patterns when incremental data come. Based on the frequent pattern tree (FP-tree) structure, IM gives a way to make the most of the things from the previous mining process, and requires scanning the original data once at most. Furthermore, IM can identify directly the differential set of frequent patterns, which may be more informative to users. Moreover, IM can deal with changing thresholds as well as changing data, thus provide a full maintenance scheme. IM has been implemented and the performance study shows it outperforms three other incremental algorithms: FUP, DB-tree and re-running frequent pattern growth (FP-growth). Keywords data mining - association rule mining - frequent pattern mining - incremental mining Supported by the National Basic Research 973 Program of China under Grant No.G1999032705.Xiu-Li Ma received the Ph.D. degree in computer science from Peking University in 2003. She is currently a postdoctoral researcher at National Lab on Machine Perception of Peking University. Her main research interests include data warehousing, data mining, intelligent online analysis, and sensor network.Yun-Hai Tong received the Ph.D. degree in computer software from Peking University in 2002. He is currently an assistant professor at School of Electronics Engineering and Computer Science of Peking University. His research interests include data warehousing, online analysis processing and data mining.Shi-Wei Tang received the B.S. degree in mathematics from Peking University in 1964. Now, he is a professor and Ph.D. supervisor at School of Electronics Engineering and Computer Science of Peking University. His research interests include DBMS, information integration, data warehousing. OLAP, and data mining, database technology in specific application fields. He is the vice chair of the Database Society of China Computer Federation.Dong-Qing Yang received the B.S. degree in mathematics from Peking University in 1969. Now, she is a professor and Ph.D supervisor at School of Electronics Engineering and Computer Science of Peking University. Her research interests include database design methodology, database system implementation techniques, data warehousing and data mining, information integration and sharing in Web environment. She is a member of academic committee of Database Society of China Computer Federation. 展开更多
关键词 data mining association rule mining frequent pattern mining incremental mining
原文传递
Runtime software architecture based on reflective middleware 被引量:18
8
作者 HUANGGang MEIHong YANGFuqing 《Science in China(Series F)》 2004年第5期555-576,共22页
There exists a consensus that software architecture (SA) plays a central role in software development and also plays an important role in the lifecycle phases after software delivery. Particularly, SA can be used to r... There exists a consensus that software architecture (SA) plays a central role in software development and also plays an important role in the lifecycle phases after software delivery. Particularly, SA can be used to reduce the great difficulty and cost of software maintenance and evolution. In this paper, runtime software architecture (RSA) based on reflective middleware is proposed to support architecture-based software maintenance and evolution. In this approach, the actual states and behaviors of the runtime system can be observed and manipulated in a consistent and understandable way through its architectural view. Being an accurate, up-to-date, semantic and operable view of SA, RSA looks components and connectors as white-box entities to accurately and thoroughly describe the runtime system, extends traditional architecture description languages to formally describe itself and naturally inherit plentiful semantics in traditional views of SA, and utilizes reflective middleware to observe and manipulate the runtime system. In order to demonstrate the feasibility of this approach, a reflective J2EE application server, called PKUAS, is implemented to observe and manipulate the components, connectors and constraints in the runtime system. Finally, the performance evaluation proves that making RSA explicit and operable at runtime has little effect on the runtime system. 展开更多
关键词 software architecture software maintenance software evolution reflective middleware.
原文传递
Mapping PUNITY to UniNet 被引量:3
9
作者 周国富 袁崇义 《Journal of Computer Science & Technology》 SCIE EI CSCD 2003年第3期378-387,共10页
To solve the problems of the interleaving assumption and the single resource inPUNITY (Petri net and UNITY) and Petri net respectively, this paper proposes a set of mappingrules from PUNITY to UniNet. Based on these r... To solve the problems of the interleaving assumption and the single resource inPUNITY (Petri net and UNITY) and Petri net respectively, this paper proposes a set of mappingrules from PUNITY to UniNet. Based on these rules, problems of one field can be transformed toproblems of the other field and powerful tools of Petri net and UNITY can be used. The papergives a sketch of the mapping rules and applies the rules to an example. Meanwhile, the mappingrules can help computer to translate PUNITY to UniNet easily. 展开更多
关键词 PETRI网 UNINET PUNITY UNITY 映射规则
原文传递
基于频繁模式树的频繁模式高效增量维护
10
作者 Xiu-LiMa Yun-HaiTong +1 位作者 Shi-WeiTang Dong-QingYang 《Journal of Computer Science & Technology》 SCIE EI CSCD 2004年第C00期76-76,共1页
频繁模式的挖掘是数据挖掘领域中一个非常重要的问题,目前在高效、可扩展的频繁模式挖掘算法方面有大量研究。已有频繁模式挖掘算法大致分为两类:基于候选生成一测试策略的Apriori算法以及基于分而治之策略的频繁模式增长算法。已有... 频繁模式的挖掘是数据挖掘领域中一个非常重要的问题,目前在高效、可扩展的频繁模式挖掘算法方面有大量研究。已有频繁模式挖掘算法大致分为两类:基于候选生成一测试策略的Apriori算法以及基于分而治之策略的频繁模式增长算法。已有的工作大多都假设待挖掘的数据是不变的。 展开更多
关键词 频繁模式树 挖掘算法 分而治之 可扩展 APRIORI算法 数据挖掘 测试策略 增量 问题 假设
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部