期刊文献+
共找到31篇文章
< 1 2 >
每页显示 20 50 100
What the Chinese Government Asserts——Speech by Peng Peiyun, Deputy Head of the Chinese Government Delegation and State Councilor, at the Fourth World Conference on Women
1
《Women of China》 1996年第1期15-16,共2页
First of all, I would like to express, on behalf of the Chinese Government and people, our warm welcome to those friends who have come to Beijing
关键词 Deputy Head of the Chinese Government Delegation and State Councilor Speech by Peng Peiyun What the Chinese Government asserts at the Fourth World Conference on Women World
原文传递
New method for query answering in semantic web 被引量:1
2
作者 林培光 刘弘 +1 位作者 樊孝忠 王涛 《Journal of Southeast University(English Edition)》 EI CAS 2006年第3期319-323,共5页
To promote the efficiency of knowledge base retrieval based on description logic, the concept of assertional graph (AG), which is directed labeled graph, is defined and a new AG-based retrieval method is put forward... To promote the efficiency of knowledge base retrieval based on description logic, the concept of assertional graph (AG), which is directed labeled graph, is defined and a new AG-based retrieval method is put forward. This method converts the knowledge base and query clause into knowledge AG and query AG by making use of the given rules and then makes use of graph traversal to carry out knowledge base retrieval. The experiment indicates that the efficiency of this method exceeds, respectively, the popular RACER and KAON2 system by 0.4% and 3.3%. This method can obviously promote the efficiency of knowledge base retrieval. 展开更多
关键词 description logic assertional graph semantic web information retrieval
下载PDF
基于断言的硬件功能验证技术
3
作者 杜宁 吴国增 《电子测试》 2007年第10期51-53,共3页
针对排除芯片设计流程中RTL级的错误时,需要花费大量时间看仿真波形与日志文件的问题,本文介绍了基于断言的硬件功能验证技术的基础,以及利用断言技术在黑盒验证中测试一设备输出信号时的应用,总结了断言验证的优点,以及断言与半形式化... 针对排除芯片设计流程中RTL级的错误时,需要花费大量时间看仿真波形与日志文件的问题,本文介绍了基于断言的硬件功能验证技术的基础,以及利用断言技术在黑盒验证中测试一设备输出信号时的应用,总结了断言验证的优点,以及断言与半形式化验证结合的特点,断言技术与动态仿真、形式验证、激励自动生成等技术结合,能更快更有效的发现硬件设计过程中RTL级的错误,成为验证方法学的焦点。 展开更多
关键词 断言 OVA(open VERA assertion) ABV 形式化验证
下载PDF
断言技术在SOC验证中的应用
4
作者 丁婷婷 申敏 《山西电子技术》 2007年第5期3-4,27,共3页
主要阐述了基于断言技术新硬件验证平台用于实时监测设计描述是否违反了设计目标,提出了OVA的特点及应用,并以LCD controller的sharp接口时序为实例讲解了该方法的优点。
关键词 检查库 OVA ASSERTION 形式验证 LCD SHARP INTERFACE
下载PDF
SoC中多层AHB总线的断言验证应用 被引量:1
5
作者 宋小明 薛红喜 +1 位作者 刘斌 李宏 《现代电子技术》 2011年第22期84-87,共4页
随着SoC设计复杂程度的不断提高,芯片的功能验证面临的挑战越来越大。断言作为一种描述属性的方法,可以快速地验证设计代码是否满足系统要求。基于断言的验证方法学近年来发展极为迅速,应用也越来越广泛。在基于Multi-layer AHB总线架... 随着SoC设计复杂程度的不断提高,芯片的功能验证面临的挑战越来越大。断言作为一种描述属性的方法,可以快速地验证设计代码是否满足系统要求。基于断言的验证方法学近年来发展极为迅速,应用也越来越广泛。在基于Multi-layer AHB总线架构上的SoC系统验证过程中,采用System Verilog Assertion验证方法,证明SVA是SoC设计过程中功能验证的一种有效的验证方法。 展开更多
关键词 断言 SYSTEM VERILOG ASSERTION AHB 验证
下载PDF
一种基于SAML带自验证的单点登录模型
6
作者 龚家兵 曹彩凤 崔方龙 《计算机系统应用》 2005年第10期54-57,共4页
应用系统的安全问题一直备受重视,身份认证是一种常用的安全实现方式。本文分析了现有的身份认证方式的种种弊端,提出了一种基于SAML技术的带自验证单点登录模型,并对这种模型进行了安全性分析。
关键词 SAML(Security ASSERTION MARKUP Language) 自验证 单点登录 模型 SAML 验证 安全问题
下载PDF
Multiple Factorial Analysis of Symbolic Data 被引量:3
7
作者 Barnabé Tang Ahanda Jean Gérard Aghoukeng Jiofack +1 位作者 Romain Germain Nzangué Gilbert Hapi Mbiakop 《Applied Mathematics》 2012年第12期2148-2154,共7页
This document presents an extension of the multiple factorial analysis to symbolic data and especially to space data. The analysis makes use of the characteristic coding method to obtain active individuals and the rec... This document presents an extension of the multiple factorial analysis to symbolic data and especially to space data. The analysis makes use of the characteristic coding method to obtain active individuals and the reconstitutive coding method for additional individuals in order to conserve the variability of assertion objects. Traditional analysis methods of the main components are applied to coded objects. Certain interpretation aids are presented after the coding process. This method was applied to poverty data. 展开更多
关键词 SYMBOLIC OBJECT ASSERTION OBJECT MULTIPLE FACTORIAL ANALYSIS Principle Components ANALYSIS Poverty
下载PDF
SystemVerilog断言及其应用 被引量:5
8
作者 陈先勇 徐伟俊 +1 位作者 杨鑫 夏宇闻 《中国集成电路》 2007年第9期19-24,共6页
在介绍SystemVerilog断言的概念、使用断言的好处、断言的分类、断言的组成以及断言如何被插入到被测设计(DUT)的基础上,本文详细地介绍了如何使用不同的断言语句对信号之间的复杂时序关系进行严格的检查,并针对每个例子展示了在ModelSi... 在介绍SystemVerilog断言的概念、使用断言的好处、断言的分类、断言的组成以及断言如何被插入到被测设计(DUT)的基础上,本文详细地介绍了如何使用不同的断言语句对信号之间的复杂时序关系进行严格的检查,并针对每个例子展示了在ModelSim6.1b仿真环境中所显示的波形。本文旨在帮助读者理解如何使用断言对设计中信号间复杂时序关系进行验证的方法,并由此介绍一些基本的SystemVerilog断言、操作符、代码段和断言验证方法学。 展开更多
关键词 字:SystemVerilog 断言 DUT SVA ASSERTION
下载PDF
断言(assert)在c\c++编程中的使用
9
作者 鲍宁 《无线电工程》 2003年第4期35-36,共2页
该文主要讨论assert宏在c\c++编程中的作用、用法以及使用的原则和注意事项。
关键词 assert 无错代码 DEBUG RELEASE C/C++编程 宏命令
下载PDF
如何在先进工艺节点利用Virtuoso Check/Assertion Flow
10
作者 王超 刘欢艳 《电子技术应用》 北大核心 2016年第8期28-32,共5页
Virtuoso和MMSIM有效结合,完整的Check/Assertion flow包含:在图形界面设置Check/Assert,通过仿真得到Check/Assert的结果,在图形界面直接显示Check/Assert的结果,对结果进行各种灵活的后处理,并在schematic直接进行反标。该流程可以覆... Virtuoso和MMSIM有效结合,完整的Check/Assertion flow包含:在图形界面设置Check/Assert,通过仿真得到Check/Assert的结果,在图形界面直接显示Check/Assert的结果,对结果进行各种灵活的后处理,并在schematic直接进行反标。该流程可以覆盖电路设计常用check需求,完全不依赖脚本,图形界面让工程师更容易上手,基于瞬态仿真的Dynamic Check相比其他工具更具优势。有效利用Check/Assert flow,可以帮助避免或及早发现设计中的一些常见问题,从而减少设计迭代,该流程在TSMC 16 nm和Intel 14 nm实际项目上得到应用,很大程度地提高了设计效率。 展开更多
关键词 Assert DEVICE CHECKING CIRCUIT CHECK Check/Assertion FLOW
下载PDF
自定义ASSERT宏 被引量:1
11
作者 江华 《电脑编程技巧与维护》 2006年第2期84-87,共4页
提出修改标准的ASSERT宏的方法,对断言进行改进。详细分析在某些场合, 标准断言无法发挥作用的原因,通过分析Windows下的结构化异常处理机制给出修改方案;为了方便进一步修改断言对话框的显示内容和功能,重写调用断言对话框函数。
关键词 ASSERT(断言) 结构化异常处理
下载PDF
Intelligent binary schema matching system in heterogeneity environment
12
作者 Mbale J +1 位作者 徐晓飞 邓胜春 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2002年第4期376-382,共7页
For the past three decades, interoperability among heterogeneous systems had been a hard nut to crack due to the schematic and semantic perspectives that exist between objects. These systems were built under different... For the past three decades, interoperability among heterogeneous systems had been a hard nut to crack due to the schematic and semantic perspectives that exist between objects. These systems were built under different data models. As such, levels of the local schemas are semantically very poor due to the limited expressiveness of traditional data models in which they were designed. Further more, most of the existing schema integration architectural components are inadequately equipped to handle the mapping schemas, especially when the semantics and structural conflicts are involved. This paper introduces an Intelligent Binary Schema Matching system (IBSMS), which exploits the phenomenon of making its components intelligent. That’s equipping its components such as translators and integrators with adequate knowledge about various data models. This allows the components acquire enough intelligence to maneuver or manipulate the correspondence between constructs from different models. In addition, the system has a Binary Matcher, which compares the attribute correspondences of various databases in a pairwise form, in order to establish the equivalences. With the establishment of the mappings, the users shall be able to access them (mappings) for their desired usage. 展开更多
关键词 Inter-schema CORRESPONDENCE ASSERTIONS integration rules ATTRIBUTE CORRESPONDENCES semantics mapping and SCHEMA matching
下载PDF
Design and Implementation of DBC Based on Dynamic AOP
13
作者 WEN Jing YING Shi +1 位作者 LI Hui JIA Xiangyang 《Wuhan University Journal of Natural Sciences》 CAS 2008年第2期159-164,共6页
Traditional approach of design by contract, due to mixing the contract code with application code, is difficult for the extensibility and reusability of software system. This paper presents a framework named JADBC for... Traditional approach of design by contract, due to mixing the contract code with application code, is difficult for the extensibility and reusability of software system. This paper presents a framework named JADBC for design by contract based on Aspect-Oriented Programming (AOP) to resolve these problems. By providing a new modularized element, aspect, the framework successfully separates the contracts in design by contract, from functional codes. The implementation of this framework is based on dynamic AOP which can have the contract changed at rtmtime, consequently, enhancing program flexibility. JADBC framework modularizes the contracts in a clear-cut fashion that is easier to design, implement, and maintain. 展开更多
关键词 design by contract ASSERTION dynamic AOP aspectoriented programming
下载PDF
Peer educator training program for enhancing knowledge on issues in the growth and development of adolescents and risk behavior problems in Indonesian context
14
作者 Tantut Susanto lis Rahmawati Wantiyah 《Frontiers of Nursing》 CAS 2018年第3期185-191,共7页
Objective: This article aimed to evaluate the effects of an educational intervention programme on improving peer educator (PE) knowledge in issues around growth and development and its risk behavior problems of ado... Objective: This article aimed to evaluate the effects of an educational intervention programme on improving peer educator (PE) knowledge in issues around growth and development and its risk behavior problems of adolescents in Indonesia. Methods: The study was conducted in 31 of PEs to evaluate their knowledge in adolescents. The PEs received health education and were assessed by individual work during the structured three-week programme. Data were collected before and after the training programme as pre- and post-tests. Results: The PE demonstrated significant improvements in their knowledge after attending the three-week structured training programme. The post-test scores had significant effects on the dimensions of PE knowledge scores. The PE become knowledgeable to maintain and monitor adolescents health issues around growth and development and its risk behavior problems of adolescents. Conclusions: The PE become knowledgeable to respond to the adolescent problems and readiness to become PE during puberty. 展开更多
关键词 peer educator adolescent development risk behavior assertive
下载PDF
An Approach to Assertive and Non-assertive Epistemic Modality in Virginia Woolf's Essays
15
作者 Margarita Esther Sanchez Cuervo 《Sino-US English Teaching》 2011年第3期200-205,共6页
This study entails a first approach to epistemic modality in Woolf's essays. In particular, we will distinguish between assertive and non-assertive epistemic modality. Woolf uses assertive epistemic modality when tra... This study entails a first approach to epistemic modality in Woolf's essays. In particular, we will distinguish between assertive and non-assertive epistemic modality. Woolf uses assertive epistemic modality when transmitting her criticism to, sometimes, women's inferiority condition in history, revealing Woolf's more confident stance. These markers are different from those used in more "gentle" themes related to reviewing an author and her work. In this second case, non-assertive epistemic modality is more frequent. Being less harsh towards an author's surroundings and her literary production, Woolf's stance proves less self-assured. The corpus consists of 10 short essays. We also refer to her longer essays A Room of One's Own (1929) and Three Guineas 0938). They were selected bearing in mind their subject-matter. Half of them deal with literature and women writers, their lives and works; the other half ones also have to do with women-related topics, but referring to their position in history and their difficulties to undertake, for example, a literary career. Some concluding remarks indicate the predominance of non-assertive epistemic modality in relation to an intersubjective reading of her texts. This reading favours the inclusion of her audience in her commentary about women writing. 展开更多
关键词 Virginia Woolf ESSAYS women writing MODALITY EPISTEMIC assertive non-assertive
下载PDF
The Turn of the Tide:Explaining China’s Growing Assertiveness in the South China Sea
16
作者 Jaebeom Kwon 《International Relations and Diplomacy》 2019年第2期49-65,共17页
Before the late 2000s,China employed a diplomatic“next generation”approach to its territorial disputes in the South China Sea(SCS).Beginning in the late 2000s,however,China has assumed threatening attitudes,and take... Before the late 2000s,China employed a diplomatic“next generation”approach to its territorial disputes in the South China Sea(SCS).Beginning in the late 2000s,however,China has assumed threatening attitudes,and taken a strong stand against other disputants.Why has China recently shown its assertiveness when dealing with the South China Sea issue?This study argues that two factors-China’s growing naval capabilities and the growing presence of China’s strategic rivals around the South China Sea-led China to adopt a more assertive policy regarding the South China Sea issue. 展开更多
关键词 the rise of China South China Sea disputes Sino-Southeast Asia relations China’s ASSERTIVENESS
下载PDF
OVA技术在接口时序验证中的应用
17
作者 丁婷婷 申敏 《微计算机信息》 北大核心 2008年第11期117-119,共3页
本文主要阐述了基于断言技术并结合动态仿真,形式测试,测试激励自动化等方法的新硬件验证平台,着重介绍了O-VA的特点及运用,并以LCD controller的sharp接口为实例讲解了该方法的优点。
关键词 OVA ASSERTION 检查库 形式验证 LCDcontrollerSharp
下载PDF
Extremist Politics as an Instrument of Ethnic Assertions among the Bodos of Northeast India
18
作者 Susmita Sen Gupta 《Journalism and Mass Communication》 2014年第8期527-534,共8页
Ethnic assertions worldwide have assumed different forms ranging from moderate methods of articulation of autonomy to extremist means of violent struggle. Resort to extremism by some sections of an ethnic group usuall... Ethnic assertions worldwide have assumed different forms ranging from moderate methods of articulation of autonomy to extremist means of violent struggle. Resort to extremism by some sections of an ethnic group usually triggers inter-ethnic conflicts with other groups on the one hand and leads to confrontation with the state on the other. This paper seeks to examine the dynamics of this phenomenon in the context of Bodos, the largest plains tribe of Assam, a State of Northeast India. The paper enquires as to whether extremist politics has met the Bodo aspirations for self-determination or has intensified the conflicts and contradictions within the Bodo society with ramifications for other ethnic groups inhabiting the Bodo-dominated areas. It is also necessary to explore the responses of the Union and State governments to Bodo extremist politics for an understanding of the conflict management process. 展开更多
关键词 EXTREMISM extremist politics ethnic assertions conflict management
下载PDF
Issues and Perspectives on Nigeria's International Economic Relations
19
作者 Dele Seteolu 《International Relations and Diplomacy》 2017年第4期225-232,共8页
The integration of Nigeria's economy into the international capitalist system was a defining context of its international economic relations. The country was integrated into the international capitalist system as dep... The integration of Nigeria's economy into the international capitalist system was a defining context of its international economic relations. The country was integrated into the international capitalist system as dependent, peripheral, neo-colonial formation. The nature of external debt, foreign direct investment and economic policy choices reflect the influence of the global north on Nigeria's international economic relations. The management of the national economy and external economic relations respond to the logic of externally defined economic policy choices. This article examines strands of Nigeria's international economic relations and it offers positions to mediate the country's peripheral status. The article prescribes state-led development paradigm and assertive state to address the country's underdevelopment and actualizes robust and assertive foreign economic relations. The state-led development paradigm negates the neo-liberal policy and its preference for state withdrawal. The article insists that the state should play leading role in the development process to reverse the country's underdevelopment and reequip its foreign economic relations. 展开更多
关键词 neo-liberal neo-colonial dependent PERIPHERAL state-led development paradigm assertive state global north external debt foreign direct investment (FDI)
下载PDF
Separation of Fault Tolerance and Non-Functional Concerns: Aspect Oriented Patterns and Evaluation
20
作者 Kashif Hameed Rob Williams Jim Smith 《Journal of Software Engineering and Applications》 2010年第4期303-311,共9页
Dependable computer based systems employing fault tolerance and robust software development techniques demand additional error detection and recovery related tasks. This results in tangling of core functionality with ... Dependable computer based systems employing fault tolerance and robust software development techniques demand additional error detection and recovery related tasks. This results in tangling of core functionality with these cross cutting non-functional concerns. In this regard current work identifies these dependability related non-functional and cross-cutting concerns and proposes design and implementation solutions in an aspect oriented framework that modularizes and separates them from core functionality. The degree of separation has been quantified using software metrics. A Lego NXT Robot based case study has been completed to evaluate the proposed design framework. 展开更多
关键词 ASPECT Oriented Design and Programming SEPARATION of CONCERNS EXECUTABLE ASSERTIONS EXCEPTION Handling Fault Tolerance Software Metrics
下载PDF
上一页 1 2 下一页 到第
使用帮助 返回顶部