首页 | 官方网站   微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   53篇
  免费   4篇
  国内免费   2篇
工业技术   59篇
  2022年   1篇
  2021年   1篇
  2020年   2篇
  2017年   2篇
  2016年   3篇
  2014年   2篇
  2013年   1篇
  2012年   3篇
  2011年   2篇
  2010年   4篇
  2009年   2篇
  2008年   3篇
  2007年   5篇
  2006年   3篇
  2005年   8篇
  2004年   2篇
  2003年   3篇
  2002年   4篇
  2001年   2篇
  1999年   1篇
  1997年   1篇
  1996年   1篇
  1994年   1篇
  1993年   1篇
  1986年   1篇
排序方式: 共有59条查询结果,搜索用时 15 毫秒
21.
Data-intensive workflows are generally computing- and data-intensive with large volume of data generated during their execution. Therefore, some of the data should be saved to avoid the expensive re-execution of tasks in case of exceptions. However, cloud-based data storage services come at some expense. In this paper, we introduce the risk evaluation model tailored for workflow structure to measure and achieve the trade-off between the overhead of backup storage and the cost of data regeneration in failure, making the service selection and execution more efficient and robust. The proposed method computes and compares the potential loss with and without data backup to achieve the trade-off between overhead of intermediate dataset backup and task re-execution after exceptions. We also design the utility function with the model and apply a genetic algorithm to find the optimized schedule. The results show that the robustness of the schedule is increased while the possible risk of failure is minimized, especially when the volume of generated data is not large in comparison with the input.  相似文献   
22.
A parallel and distributed simulation (federation) is composed of a number of simulation components (federates). Since the federates may be developed by different participants and executed on different platforms, they are subject to Byzantine failures. Moreover, the failure may propagate in the federation, resulting in epidemic effect. In this article, a three-phase (i.e., detection, location, and recovery) Byzantine Fault Tolerance (BFT) mechanism is proposed based on a transparent middleware approach. The replication, checkpointing and message logging techniques are integrated in the mechanism for the purpose of enhancing simulation performance and reducing fault tolerance cost. In addition, mechanisms are provided to remove the epidemic effects of Byzantine failures. Our experiments have verified the correctness of the three-phase BFT mechanism and illustrated its high efficiency and good scalability. For some simulation executions, the BFT mechanism may even achieve performance enhancement and Byzantine fault tolerance simultaneously.  相似文献   
23.
为了最大限度地减少检测点设置和卷回恢复的时间,空间开销,提出了基于异步消息记录的卷回恢复算法,同以前的算法相比较,该算法一方面节省了用于进程之间同步的时间开销,另一方面检测点设置及卷回过程中只涉及少量的相关进程,并且减少了保存检测点的空间开销,文中对算法的正确性进行了证明,并通过模拟实验给出了算法的开销。  相似文献   
24.
Scope: Cell cycle regulation is a critical issue in cancer treatment. Previously, gallic acid (GA) has been reported to possess anticancer ability. Here, we have evaluated the molecular mechanism of GA on cell cycle modulation in a human bladder transitional carcinoma cell line (TSGH‐8301 cell). Methods and results: Using flow cytometer analysis, exposure of the cells to 40 μM GA resulted in a statistically significant increase in G2/M phase cells, which was accompanied by a decrease in G0/G1 phase cells. GA‐treated cells resulted in significant growth inhibition in a dose‐dependent manner accompanied by a decrease in cyclin‐dependent kinases (Cdk1), Cyclin B1, and Cdc25C, but significant increases in p‐cdc2 (Tyr‐15) and Cip1/p21 by western blotting. Additional mechanistic studies showed that GA induces phosphorylation of Cdc25C at Ser‐216. This mechanism leads to its translocation from the nucleus to the cytoplasm resulting in an increased binding with 14‐3‐3β. When treated with GA, phosphorylated Cdc25C can be activated by ataxia telangiectasia‐mutated checkpoint kinase 2 (Chk2). This might be a DNA damage response as indicated by Ser‐139 phosphorylation of histine H2A.X. Furthermore, treatment of the cells with a Chk2 inhibitor significantly attenuated GA‐induced G2/M phase arrest. Conclusion: These results indicate that GA can induce cell cycle arrest at G2/M phase via Chk2‐mediated phosphorylation of Cdc25C in a bladder transitional carcinoma cell line.  相似文献   
25.
Is copying necessarily a bad thing? Theorists from Walter Benjamin to Richard Dawkins, and from Judith Butler to Homi Bhabha, have suggested not. Drawing on their work, Neil Leach , Professor of Digital Design at the European Graduate School and Visiting Professor at Harvard Graduate School of Design, challenges the notion of authenticity and argues that the entire history of human culture is built on a constant process of replication.  相似文献   
26.
Simulated fault injection (SFI) is widely used to assess the effectiveness of fault tolerance mechanisms in safety‐critical embedded systems (SCESs) because of its advantages such as controllability and observability. However, the long test time of SFI due to the large number of test cases and the complex simulation models of modern SCESs has been identified as a limiting factor. We present a method that can accelerate an SFI tool using a checkpoint forwarding (CF) technique. To evaluate the performance of CF‐based SFI (CF‐SFI), we have developed a CF mechanism using Verilog fault‐injection tools and two systems under test (SUT): a single‐core‐based co‐simulation model and a triple modular redundant co‐simulation model. Both systems use the Verilog simulation model of the OpenRISC 1200 processor and can execute the embedded benchmarks from MiBench. We investigate the effectiveness of the CF mechanism and evaluate the two SUTs by measuring the test time as well as the failure rates. Compared to the SFI with no CF mechanism, the proposed CF‐SFI approach reduces the test time of the two SUTs by 29%–45%.  相似文献   
27.
支持文件迁移的Linux检查点机制的实现   总被引:2,自引:2,他引:0       下载免费PDF全文
杨晖  陈闳中 《计算机工程》2010,36(3):266-268
在BLCR系统的基础上实现一种支持进程打开文件迁移的检查点机制,给出该机制的总体框架、关键技术、进程打开文件保存恢复、状态保存和恢复的流程。实验结果表明,该机制支持多线程、信号、进程打开文件及管道等的保存与恢复,无需重编译内核,对用户具有良好的透明性。  相似文献   
28.
设置检查点是保存和恢复进程运行状态的一种重要技术,是实现容错、卷回调试和进程迁移的重要手段。本文研究了全透明检查点系统Epckpt在系统Ⅴ共享内存方面的实现方法和不足,给出了自己的改进,从而更好地实现了系统Ⅴ共享内存的保存与恢复。  相似文献   
29.
实时数据库系统的内存数据库组织与故障恢复   总被引:9,自引:0,他引:9  
本文给出一种在内存数据库中能有效节约内存空间的数据组织结构--内存数据库图(MMDBG),然后给出MMDBG的物理组织形式.并重点讨论了基于MMDBG的事务恢复和系统恢复算法,在最大程度上提高系统的响应时间和支持实时事务.  相似文献   
30.
This paper deals with the impact of fault prediction techniques on checkpointing strategies. We extend the classical first-order analysis of Young and Daly in the presence of a fault prediction system, characterized by its recall and its precision. In this framework, we provide optimal algorithms to decide whether and when to take predictions into account, and we derive the optimal value of the checkpointing period. These results allow us to analytically assess the key parameters that impact the performance of fault predictors at very large scale.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号