期刊文献+
共找到1,435篇文章
< 1 2 72 >
每页显示 20 50 100
Cross-modal learning using privileged information for long-tailed image classification
1
作者 Xiangxian Li Yuze Zheng +3 位作者 Haokai Ma Zhuang Qi Xiangxu Meng Lei Meng 《Computational Visual Media》 SCIE EI CSCD 2024年第5期981-992,共12页
The prevalence of long-tailed distributions in real-world data often results in classification models favoring the dominant classes,neglecting the less frequent ones.Current approaches address the issues in long-taile... The prevalence of long-tailed distributions in real-world data often results in classification models favoring the dominant classes,neglecting the less frequent ones.Current approaches address the issues in long-tailed image classification by rebalancing data,optimizing weights,and augmenting information.However,these methods often struggle to balance the performance between dominant and minority classes because of inadequate representation learning of the latter.To address these problems,we introduce descriptional words into images as cross-modal privileged information and propose a cross-modal enhanced method for long-tailed image classification,referred to as CMLTNet.CMLTNet improves the learning of intraclass similarity of tail-class representations by cross-modal alignment and captures the difference between the head and tail classes in semantic space by cross-modal inference.After fusing the above information,CMLTNet achieved an overall performance that was better than those of benchmark long-tailed and cross-modal learning methods on the long-tailed cross-modal datasets,NUS-WIDE and VireoFood-172.The effectiveness of the proposed modules was further studied through ablation experiments.In a case study of feature distribution,the proposed model was better in learning representations of tail classes,and in the experiments on model attention,CMLTNet has the potential to help learn some rare concepts in the tail class through mapping to the semantic space. 展开更多
关键词 long-tailed classification cross-modal learning representation learning privileged infor-mation
原文传递
Research on User Permission Isolation for Multi-Users Service-Oriented Program 被引量:1
2
作者 Li Yu Jiang Wei +4 位作者 Lin Li Zhan Jing Liang Peng Yingxu Lai Shupo Bu 《International Journal of Communications, Network and System Sciences》 2012年第2期105-110,共6页
For the super user privilege control problem in system services, a user permission isolation method is proposed. Based on virtualization technology, the permission limited environments are constructed for different us... For the super user privilege control problem in system services, a user permission isolation method is proposed. Based on virtualization technology, the permission limited environments are constructed for different users. According to privilege sets, the users, mapping relations are built among users, isolated domains and program modules. Besides, we give an algorithm for division of program permissions based on Concept Lattices. And the security strategies are designed for different isolated domains. Finally, we propose the implications of least privilege, and prove that the method eliminates the potential privileged users in system services. 展开更多
关键词 Least privilegE VIRTUALIZATION ISOLATION privileged USER Domain System Service
下载PDF
Learning with privileged information using Bayesian networks 被引量:1
3
作者 Shangfei WANG Menghua HE +3 位作者 Yachen ZHU Shan HE Yue LIU Qiang JI 《Frontiers of Computer Science》 SCIE EI CSCD 2015年第2期185-199,共15页
For many supervised learning applications, addi- tional information, besides the labels, is often available dur- ing training, but not available during testing. Such additional information, referred to the privileged ... For many supervised learning applications, addi- tional information, besides the labels, is often available dur- ing training, but not available during testing. Such additional information, referred to the privileged information, can be exploited during training to construct a better classifier. In this paper, we propose a Bayesian network (BN) approach for learning with privileged information. We propose to in- corporate the privileged information through a three-node BN. We further mathematically evaluate different topologies of the three-node BN and identify those structures, through which the privileged information can benefit the classifica- tion. Experimental results on handwritten digit recognition, spontaneous versus posed expression recognition, and gender recognition demonstrate the effectiveness of our approach. 展开更多
关键词 Bayesian network privileged information clas-sification maximum likelihood estimation
原文传递
有特权者的门限代理签名方案 被引量:3
4
作者 李志敏 王勇兵 《西北师范大学学报(自然科学版)》 CAS 北大核心 2013年第3期46-50,共5页
针对当前门限代理签名中代理签名人权限相同的问题,基于双线性对提出了一个有特权者的门限代理签名方案.该方案实现了n个代理签名人中(t-1)个普通成员和1个特权者成员共同产生有效的代理签名,适用于有特权者参与的防止代理权滥用的签名... 针对当前门限代理签名中代理签名人权限相同的问题,基于双线性对提出了一个有特权者的门限代理签名方案.该方案实现了n个代理签名人中(t-1)个普通成员和1个特权者成员共同产生有效的代理签名,适用于有特权者参与的防止代理权滥用的签名场合.详细阐述了部分代理签名和门限代理签名的生成和验证过程,并证明了方案的正确性和安全性. 展开更多
关键词 代理签名 门限代理签名 特权者 双线性对 数字签名
下载PDF
Comparing of the Passing Experience of Clare in Quicksand and Passing and Birdie in Caucasia
5
作者 张子婵 《海外英语》 2018年第17期178-179,共2页
This article aims at comparing and contrasting the passing experience of Clare in Larsen Nella’s Quicksand and Passing and Birdie in Danzy Senna's Caucasia.These two characters both have light skin and look white... This article aims at comparing and contrasting the passing experience of Clare in Larsen Nella’s Quicksand and Passing and Birdie in Danzy Senna's Caucasia.These two characters both have light skin and look white.They both try to pass to the privileged identity(White for Clare;Black for Birdie)and they suffer and struggle on the edge of the color line.The author believes that these two characters are victims of the society divided by race.For people with biracial identity,their experience of having to adopt the privileged identity and giving up who they really are can be extremely painful. 展开更多
关键词 privileged IDENTITY QUICKSAND and PASSING Caucasia
下载PDF
Free energy perturbation(FEP)-guided scaffold hopping 被引量:1
6
作者 Deyan Wu Xuehua Zheng +8 位作者 Runduo Liu Zhe Li Zan Jiang Qian Zhou Yue Huang Xu-Nian Wu Chen Zhang Yi-You Huang Hai-Bin Luo 《Acta Pharmaceutica Sinica B》 SCIE CAS CSCD 2022年第3期1351-1362,共12页
Scaffold hopping refers to computer-aided screening for active compounds with different structures against the same receptor to enrich privileged scaffolds,which is a topic of high interest in organic and medicinal ch... Scaffold hopping refers to computer-aided screening for active compounds with different structures against the same receptor to enrich privileged scaffolds,which is a topic of high interest in organic and medicinal chemistry.However,most approaches cannot efficiently predict the potency level of candidates after scaffold hopping.Herein,we identified potent PDE5 inhibitors with a novel scaffold via a free energy perturbation(FEP)-guided scaffold-hopping strategy,and FEP shows great advantages to precisely predict the theoretical binding potenciesΔGFEPbetween ligands and their target,which were more consistent with the experimental binding potenciesΔGEXP(the mean absolute deviations|ΔGFEP-ΔGEXP|<2 kcal/mol)than thoseΔGMM-PBSAorΔGMM-GBSApredicted by the MM-PBSA or MM-GBSA method.Lead L12 had an IC_(50) of 8.7 nmol/L and exhibited a different binding pattern in its crystal structure with PDE5 from the famous starting drug tadalafil.Our work provides the first report via the FEPguided scaffold hopping strategy for potent inhibitor discovery with a novel scaffold,implying that it will have a variety of future applications in rational molecular design and drug discovery. 展开更多
关键词 Free energy perturbation Scaffold hopping privileged scaffolds Drug discovery Binding potencies Molecular design PDE5 inhibitors Pulmonary arterial hypertension
原文传递
Hero as Pariah: Trotsky’s Struggle Against Stalinism
7
作者 Dibyajit Mukherjee 《International Relations and Diplomacy》 2020年第9期398-408,共11页
Leon Trotsky's contribution to the Marxist position in philosophy and his role in the Russian Revolution of October 1917 had been politically maneuvered,tampered with,fabricated and covered by a muck heap of Stali... Leon Trotsky's contribution to the Marxist position in philosophy and his role in the Russian Revolution of October 1917 had been politically maneuvered,tampered with,fabricated and covered by a muck heap of Stalinist slander.By Stalinism,I am referring to the narrative which was born from the bureaucratic degeneration of the Soviet Union,after the failure of working class to consolidate and capture state power in Hungary,Germany,Italy and other western countries which was materially in an advanced position than early 20th Century Russia.It was also the political ideology which was born as a result of civil far,famine,pandemic and the invasion of the newly formed Russian worker's state by more than fifteen foreign countries with colonial objectives.Trotsky's role in creating the Red Army,which was a different to that of a standing army and supporters of Trotsky in the Left Opposition were not only vilified and charged with false accusations but violently purged.In this paper I have highlighted how Stalinism marked a revolution against the revolution of 1917 and how Trotsky continuously struggled against the bureaucratic despotism over the working class in post 1917 Russia. 展开更多
关键词 BUREAUCRACY Stalinism privileged caste permanent revolution TROTSKY
下载PDF
Identity Governance Framework for Privileged Users
8
作者 Mansour Hammoud Alruwies Shailendra Mishra Mohammed Abdul Rahman AlShehri 《Computer Systems Science & Engineering》 SCIE EI 2022年第3期995-1005,共11页
Information technology companies have grown in size and recognized the need to protect their valuable assets.As a result,each IT application has its authentication mechanism,and an employee needs a username and passwo... Information technology companies have grown in size and recognized the need to protect their valuable assets.As a result,each IT application has its authentication mechanism,and an employee needs a username and password.As the number of applications increased,as a result,it became increasingly complex to manage all identities like the number of usernames and passwords of an employee.All identities had to be retrieved by users.Both the identities and the access rights associated with those identities had to be protected by an administrator.Management couldn’t even capture such access rights because they couldn’t verify things like privacy and security.Identity management can help solve this problem.The concept behind identity management is to centralize identity management and manage access identity centrally rather than multiple applications with their authentication and authorization mechanisms.In this research work,we develop governance and an identity management framework for information and technology infrastructures with privileged access management,consisting of cybersecurity policies and strategies.The results show the efficiency of the framework compared to the existing information security components.The integrated identity and access management and privileged access management enable organizations to respond to incidents and facilitate compliance.It can automate use cases that manage privileged accounts in the real world. 展开更多
关键词 privileged access management(PAM) lightweight directory access protocol(LDAP) identity management access control cyber-attack
下载PDF
Thread Private Variable Access Optimization Technique for Sunway High-Performance Multi-core Processors
9
作者 Jinying Kong Kai Nie +2 位作者 Qinglei Zhou Jinlong Xu Lin Han 《国际计算机前沿大会会议论文集》 2021年第1期180-189,共10页
The primary way to achieve thread-level parallelism on the Sunwayhigh-performance multicore processor is to use the OpenMP programming technique.To address the problem of low parallelism efficiency caused by slow acce... The primary way to achieve thread-level parallelism on the Sunwayhigh-performance multicore processor is to use the OpenMP programming technique.To address the problem of low parallelism efficiency caused by slow accessto thread private variables in the compilation of Sunway OpenMP programs, thispaper proposes a thread private variable access technique based on privilegedinstructions. The privileged instruction-based thread-private variable access techniquecentralizes the implementation of thread-private variables at the compilerlevel, eliminating the model switching overhead of invoking OS core processingand improving the speed of accessing thread-private variables. On the Sunway1621 server platform, NPB3.3-OMP and SPEC OMP2012 achieved 6.2% and6.8% running efficiency gains, respectively. The results show that the techniquesproposed in this paper can provide technical support for giving full play to theadvantages of Sunway’s high-performance multi-core processors. 展开更多
关键词 Sunway high-performance multi-core processors OpenMP programming technique privileged instruction-based thread-private variable access technique Sunway 1621 processor
原文传递
Use and Abuse of Privileged Information in Italian Listed Companies
10
作者 Annalisa Baldissera 《Chinese Business Review》 2019年第1期14-29,共16页
Privileged information has significant importance to listed companies, given both the extent of the markets in which it is used and the relevant effects that it can produce on the prices of financial instruments. The ... Privileged information has significant importance to listed companies, given both the extent of the markets in which it is used and the relevant effects that it can produce on the prices of financial instruments. The term “privileged information” means information that has not yet been made known to the public, which, if disclosed, is able to affect significantly the prices of the securities of listed issuers. This article aims to prove that in many cases, the effects of privileged information can be adequately represented in financial statements, despite their “confidential” nature. For this purpose, this research proposes the existence of a relationship—which can be virtuous or vicious—between financial statements and privileged information. In order to demonstate this thesis, the author carried out an empirical survey concerning both the economic and the legal sector. For the first one, the research considered the price-sensitive information published by companies listed on the Italian Stock Exchange during the first half of 2018, and the result shows that a lot of privileged information is able to generate accounting effects;for the second one, the empirical survey analyzed some significant judgments passed by the Italian Court of Cassation in the 2000s which confirm the companies’ violation of the duty to present privileged information in financial statements. 展开更多
关键词 privileged INFORMATION FINANCIAL statements LISTED COMPANIES
下载PDF
腹腔镜下微创手术治疗特殊部位子宫肌瘤的效果及对卵巢内分泌功能的影响 被引量:53
11
作者 黄勇 李彦曦 刁蓉 《重庆医学》 CAS 2019年第3期407-410,共4页
目的研究腹腔镜下微创手术治疗特殊部位子宫肌瘤的效果及对卵巢内分泌功能的影响。方法选择该院收治的子宫肌瘤患者104例,对照组(52例)采取开腹子宫肌瘤切除术,观察组(52例)行腹腔镜下子宫肌瘤切除术。应用ELISA法检测两组肿瘤坏死因子(... 目的研究腹腔镜下微创手术治疗特殊部位子宫肌瘤的效果及对卵巢内分泌功能的影响。方法选择该院收治的子宫肌瘤患者104例,对照组(52例)采取开腹子宫肌瘤切除术,观察组(52例)行腹腔镜下子宫肌瘤切除术。应用ELISA法检测两组肿瘤坏死因子(TNF)-α、白细胞介素(IL)-1、IL-6及心肌细胞P物质(SP)水平;应用放射免疫分析法(RIA)检测雌二醇(E2)、卵泡刺激素(FSH)、促黄体生成素(LH)水平。记录患者随访2年的情况。结果观察组患者所用手术时间明显长于对照组(P<0.01),观察组留置尿管时间、术中出血量、术后排气和排便时间、术后留置引流管时间、住院时间,以及术后3d的TNF-α、IL-1及IL-6水平均明显低于对照组(P<0.05)。术后,与对照组相比,观察组患者血清中SP、FSH和LH水平明显降低(P<0.05),E2水平明显升高(P<0.05)。两组患者手术中均未发生血管及脏器损伤。结论经腹腔镜下手术切除治疗特殊部位子宫肌瘤手术创伤小,减少手术导致机体的应激反应与疼痛反应,可加快卵巢分泌功能的恢复,利于术后康复。 展开更多
关键词 腹腔镜手术 特殊部位子宫肌瘤 炎性反应 卵巢功能 开腹手术
下载PDF
有限责任公司股东优先购买权问题研究 被引量:24
12
作者 于华江 《政法论坛》 CSSCI 北大核心 2003年第4期150-155,共6页
有限责任公司股东优先购买权的法理基础在于期待权和有限责任公司的理论。股东优先购买权是一项法定权利 ,是股东基于股东资格而享有的请求权 ,其行使须依法定程序。股东优先购买权的效力及法律保护须考虑公司资本利益和股东有限责任原... 有限责任公司股东优先购买权的法理基础在于期待权和有限责任公司的理论。股东优先购买权是一项法定权利 ,是股东基于股东资格而享有的请求权 ,其行使须依法定程序。股东优先购买权的效力及法律保护须考虑公司资本利益和股东有限责任原则的衡平以及如何防止股权转让自由的滥用。 展开更多
关键词 有限责任公司 股东 优先购买权 公司法 法律救济 法律保护
原文传递
一个修改BLP安全模型的设计及在SecLinux上的应用 被引量:14
13
作者 刘文清 卿斯汉 刘海峰 《软件学报》 EI CSCD 北大核心 2002年第4期567-573,共7页
建立了一个面向最小特权管理的修改BLP安全模型.该模型引入了角色管理、域隔离、隐蔽通道限制、病毒防护等概念,并实际应用于自主开发的安全操作系统SecLinux中.
关键词 安全操作系统 设计 最小特权管理 域隔离 SecLinux BLP安全模型
下载PDF
从特权福利到公民权利——解读《国务院关于当前发展学前教育的若干意见》中的普惠性原则 被引量:23
14
作者 王海英 《幼儿教育(教育科学)》 2011年第1期7-11,共5页
《国务院关于当前发展学前教育的若干意见》(国发[2010]41号)明确提出,“发展学前教育,必须坚持公益性和普惠性”。对学前教育普惠性原则的坚持受到国家福利制度改革、义务教育均衡化发展要求、学前教育自身发展三方面因素的影响。... 《国务院关于当前发展学前教育的若干意见》(国发[2010]41号)明确提出,“发展学前教育,必须坚持公益性和普惠性”。对学前教育普惠性原则的坚持受到国家福利制度改革、义务教育均衡化发展要求、学前教育自身发展三方面因素的影响。普惠性学前教育的核心内涵是普遍惠及、人人享有,其基本属性是高包容性、非竞争性、非排他性。在现阶段实施普惠性学前教育,有助于通过教育公平实现社会公平,阻断贫困代际循环。坚持学前教育普惠性原则,必须从农村、西部等薄弱地区开始,由政府主导,多种形式举办普惠性幼儿园,以满足人民群众自由选择幼儿园的需要。 展开更多
关键词 《国务院关于当前发展学前教育的若干意见》 特权福利 公民权利 普惠性 学前教育
原文传递
高校学生管理的行政法分析 被引量:11
15
作者 邓姗姗 李文 《江西教育学院学报》 2003年第2期40-43,共4页
 高校学生管理讼案的迅速增加要求将高校学生管理工作纳入法治化轨道,必须从行政法角度规范高校性质与法律地位、高校与学生的法律关系、高校学生管理行为原则以及高校学生管理的监督与救济。
关键词 高校 学生管理 行政法 法律关系 监督 管理秩序 管理改革 管理制度
下载PDF
广谱抗病毒药物研究进展 被引量:20
16
作者 黄天广 孙林 +1 位作者 展鹏 刘新泳 《药学学报》 CAS CSCD 北大核心 2020年第4期679-693,共15页
病毒感染一直威胁着人类的生命健康。广谱抗病毒药物可以通过靶向对病毒复制至关重要的宿主蛋白,作用于多种病毒或同一病毒的多种基因型,来发挥广谱抗病毒作用、并减少耐药性的发生。本文精选近几年最具代表性的研究实例,从药物化学的... 病毒感染一直威胁着人类的生命健康。广谱抗病毒药物可以通过靶向对病毒复制至关重要的宿主蛋白,作用于多种病毒或同一病毒的多种基因型,来发挥广谱抗病毒作用、并减少耐药性的发生。本文精选近几年最具代表性的研究实例,从药物化学的角度总结了具有特定优势结构和靶向病毒生命周期中特定靶标的广谱抗病毒药物的最新进展。 展开更多
关键词 广谱 抗病毒药物 药物靶标 优势结构
原文传递
优先购买权的法律性质及其制度价值 被引量:6
17
作者 刘文娟 《贵州民族学院学报(哲学社会科学版)》 2003年第5期67-70,共4页
优先购买权制度是民商法上一项十分重要的法律制度。本文对优先购买权的法律性质及其制度价值 进行了探讨,从而提出了肯定这一制度的主张。
关键词 优先购买权 性质 价值 探讨
下载PDF
药物分子设计的策略:论药效团和骨架迁越 被引量:16
18
作者 郭宗儒 《中国药物化学杂志》 CAS CSCD 2008年第2期147-157,共11页
药物分子是由药效团和结构骨架构成的,药效团是由不连续的离散的原子、基团或片断所构成,但需结合在分子骨架上,形成具体的分子。骨架具有连续性,相同的药效团附着在不同的分子骨架上,构成了作用于同一靶标而结构多样的化合物。骨架依... 药物分子是由药效团和结构骨架构成的,药效团是由不连续的离散的原子、基团或片断所构成,但需结合在分子骨架上,形成具体的分子。骨架具有连续性,相同的药效团附着在不同的分子骨架上,构成了作用于同一靶标而结构多样的化合物。骨架依据受体的柔性和可塑性形成了"杂乱性"的空间,显示了受体结合部位的杂乱性。杂乱性越大,可容纳的配体分子的结构多样性就越多,意味着结构修饰与变换的余地大,成药的机会多。由苗头化合物演化成先导物,进而优化成候选药物,这由化合物变革成安全、有效、稳定、可控的药物过程就是保持药效团、变换分子骨架、修饰基团和边链的过程。结构骨架的变化可分为3个层次:以电子等排原理变换骨架结构;以优势结构为导向变换骨架结构;以结构-活性演化的方式变换骨架结构,即骨架迁越。骨架迁越的目的是改善分子的物化、药代、稳定性和赋予分子的结构新颖性。该文以实例阐述了骨架变换的方法与技巧。 展开更多
关键词 药效团 电子等排 优势结构 骨架迁越
下载PDF
有限公司股东优先购买权司法争议问题探析 被引量:18
19
作者 李激汉 《河北法学》 CSSCI 北大核心 2014年第10期165-172,共8页
股东对外转让股权合同效力以及规避股东优先购买权合同效力的争议均集中于股东购买权性质,然而,目前法院对股权性质的认识仍停留于对权利行使方式的考察,而未有对权利背后具体基础关系的探究,因此形成了理解上的本末倒置。股东优先购买... 股东对外转让股权合同效力以及规避股东优先购买权合同效力的争议均集中于股东购买权性质,然而,目前法院对股权性质的认识仍停留于对权利行使方式的考察,而未有对权利背后具体基础关系的探究,因此形成了理解上的本末倒置。股东优先购买权的基础关系是公司组织合同关系,因此,将其定性为请求权比较妥当。规避股东优先购买权是因为其效力"射程"极为有限。如果根据"请求权说"适当扩展其"射程",将从根本上解决对规避行为进行司法制裁的疑难问题。 展开更多
关键词 股东 优先购买权 性质 效力 理论
原文传递
对弱势群体体育健身需要、意愿和态度的研究 被引量:15
20
作者 鲁长芬 罗小兵 王健 《武汉体育学院学报》 CSSCI 北大核心 2006年第11期25-29,共5页
弱势群体体育健身需要、意愿和态度水平,是影响体育健身动机、形成体育健身行为的重要驱动力。从性别、婚姻状况、年龄、经济收入、文化程度、类型和地区7个人口学变量,考察了弱势群体的体育健身需要、意愿和态度,以期为培养弱势群体的... 弱势群体体育健身需要、意愿和态度水平,是影响体育健身动机、形成体育健身行为的重要驱动力。从性别、婚姻状况、年龄、经济收入、文化程度、类型和地区7个人口学变量,考察了弱势群体的体育健身需要、意愿和态度,以期为培养弱势群体的健身动机提供依据,为全民健身计划第二期工程的全面实施提供参考。 展开更多
关键词 弱势群体 体育健身 健身意愿 健身态度 健身需要 全民健身计划
下载PDF
上一页 1 2 72 下一页 到第
使用帮助 返回顶部