期刊文献+
共找到574篇文章
< 1 2 29 >
每页显示 20 50 100
如何在先进工艺节点利用Virtuoso Check/Assertion Flow
1
作者 王超 刘欢艳 《电子技术应用》 北大核心 2016年第8期28-32,共5页
Virtuoso和MMSIM有效结合,完整的Check/Assertion flow包含:在图形界面设置Check/Assert,通过仿真得到Check/Assert的结果,在图形界面直接显示Check/Assert的结果,对结果进行各种灵活的后处理,并在schematic直接进行反标。该流程可以覆... Virtuoso和MMSIM有效结合,完整的Check/Assertion flow包含:在图形界面设置Check/Assert,通过仿真得到Check/Assert的结果,在图形界面直接显示Check/Assert的结果,对结果进行各种灵活的后处理,并在schematic直接进行反标。该流程可以覆盖电路设计常用check需求,完全不依赖脚本,图形界面让工程师更容易上手,基于瞬态仿真的Dynamic Check相比其他工具更具优势。有效利用Check/Assert flow,可以帮助避免或及早发现设计中的一些常见问题,从而减少设计迭代,该流程在TSMC 16 nm和Intel 14 nm实际项目上得到应用,很大程度地提高了设计效率。 展开更多
关键词 assert DEVICE CHECKING CIRCUIT CHECK Check/assertion FLOW
在线阅读 下载PDF
An Approach to Assertive and Non-assertive Epistemic Modality in Virginia Woolf's Essays
2
作者 Margarita Esther Sanchez Cuervo 《Sino-US English Teaching》 2011年第3期200-205,共6页
This study entails a first approach to epistemic modality in Woolf's essays. In particular, we will distinguish between assertive and non-assertive epistemic modality. Woolf uses assertive epistemic modality when tra... This study entails a first approach to epistemic modality in Woolf's essays. In particular, we will distinguish between assertive and non-assertive epistemic modality. Woolf uses assertive epistemic modality when transmitting her criticism to, sometimes, women's inferiority condition in history, revealing Woolf's more confident stance. These markers are different from those used in more "gentle" themes related to reviewing an author and her work. In this second case, non-assertive epistemic modality is more frequent. Being less harsh towards an author's surroundings and her literary production, Woolf's stance proves less self-assured. The corpus consists of 10 short essays. We also refer to her longer essays A Room of One's Own (1929) and Three Guineas 0938). They were selected bearing in mind their subject-matter. Half of them deal with literature and women writers, their lives and works; the other half ones also have to do with women-related topics, but referring to their position in history and their difficulties to undertake, for example, a literary career. Some concluding remarks indicate the predominance of non-assertive epistemic modality in relation to an intersubjective reading of her texts. This reading favours the inclusion of her audience in her commentary about women writing. 展开更多
关键词 Virginia Woolf ESSAYS women writing MODALITY EPISTEMIC assertive non-assertive
在线阅读 下载PDF
机舱资源管理“assertiveness(决断力)”的原意 被引量:1
3
作者 仉大志 《中国航海》 CSCD 北大核心 2017年第3期30-32,共3页
"assertiveness"是机舱资源管理的一项重要原则,是STCW公约对轮机员机舱资源管理培训的强制性适任能力要求,STCW中文译本将其翻译为"决断力",主要的培训教材均将其理解为决策能力。"决断力"不是"ass... "assertiveness"是机舱资源管理的一项重要原则,是STCW公约对轮机员机舱资源管理培训的强制性适任能力要求,STCW中文译本将其翻译为"决断力",主要的培训教材均将其理解为决策能力。"决断力"不是"assertiveness"的原意,这种误读导致不能进行有效的培训。在对"assertiveness"的英文原意及中文翻译进行分析论证的基础上,给出"assertiveness"不是决策能力而是一种人际沟通能力,合适的中文翻译不是"决断力"而是"自信"的结论。进一步分析"assertiveness(自信)"能力在机舱资源管理中的意义,给出培训建议。 展开更多
关键词 机舱资源管理 决断力 自信训练
在线阅读 下载PDF
断言(assert)在c\c++编程中的使用
4
作者 鲍宁 《无线电工程》 2003年第4期35-36,共2页
该文主要讨论assert宏在c\c++编程中的作用、用法以及使用的原则和注意事项。
关键词 assert 无错代码 DEBUG RELEASE C/C++编程 宏命令
在线阅读 下载PDF
自定义ASSERT宏 被引量:1
5
作者 江华 《电脑编程技巧与维护》 2006年第2期84-87,共4页
提出修改标准的ASSERT宏的方法,对断言进行改进。详细分析在某些场合, 标准断言无法发挥作用的原因,通过分析Windows下的结构化异常处理机制给出修改方案;为了方便进一步修改断言对话框的显示内容和功能,重写调用断言对话框函数。
关键词 assert(断言) 结构化异常处理
在线阅读 下载PDF
Extremist Politics as an Instrument of Ethnic Assertions among the Bodos of Northeast India
6
作者 Susmita Sen Gupta 《Journalism and Mass Communication》 2014年第8期527-534,共8页
Ethnic assertions worldwide have assumed different forms ranging from moderate methods of articulation of autonomy to extremist means of violent struggle. Resort to extremism by some sections of an ethnic group usuall... Ethnic assertions worldwide have assumed different forms ranging from moderate methods of articulation of autonomy to extremist means of violent struggle. Resort to extremism by some sections of an ethnic group usually triggers inter-ethnic conflicts with other groups on the one hand and leads to confrontation with the state on the other. This paper seeks to examine the dynamics of this phenomenon in the context of Bodos, the largest plains tribe of Assam, a State of Northeast India. The paper enquires as to whether extremist politics has met the Bodo aspirations for self-determination or has intensified the conflicts and contradictions within the Bodo society with ramifications for other ethnic groups inhabiting the Bodo-dominated areas. It is also necessary to explore the responses of the Union and State governments to Bodo extremist politics for an understanding of the conflict management process. 展开更多
关键词 EXTREMISM extremist politics ethnic assertions conflict management
在线阅读 下载PDF
Literature Assertions of John Dryden Reflected in Mac Flecknoe
7
作者 景韵 《海外英语》 2015年第7期233-235,共3页
John Dryden’s poem Mac Flecknoe satirizes his literary enemy Thomas Shadwell by the aid of the image of Flecknoewhile it reveals some of his literature assertions.This paper tries to expound them from the following t... John Dryden’s poem Mac Flecknoe satirizes his literary enemy Thomas Shadwell by the aid of the image of Flecknoewhile it reveals some of his literature assertions.This paper tries to expound them from the following three perspectives:the attitudes towards Ben Johnson,the proposals for drama language and the selection,and the attitudes towards French classicism forthe purpose of a further understanding about John Dryden. 展开更多
关键词 John Dryden MAC Flecknoe LITERATURE assertION
在线阅读 下载PDF
SAGA:Sumn arization-Guided Assert Statement Generation
8
作者 Yu-Wei Zhang Zhi Jin +2 位作者 Ze-Jun Wang Ying Xing Ge Li 《Journal of Computer Science & Technology》 2025年第1期138-157,共20页
Generating meaningful assert statements is one of the key challenges in automated test case generation,which requires understanding the intended functionality of the tested code.Recently,deep learning based models hav... Generating meaningful assert statements is one of the key challenges in automated test case generation,which requires understanding the intended functionality of the tested code.Recently,deep learning based models have shown promise in improving the performance of assert statement generation.However,the existing models only rely on the test prefixes along with their corresponding focal methods,yet ignore the developer-written summarization.Based on our observations,the summarization contents usually express the intended program behavior or contain parameters that will appear directly in the assert statement.Such information will help existing models address their current inability to accurately predict assert statements.This paper presents a summarization-guided approach for automatically generating assert statements.To derive generic representations for natural language(i.e.,summarization)and programming language(i.e.,test prefixes and focal methods),we leverage a pre-trained language model as the reference architecture and fine-tune it on the task of assert statement generation.To the best of our knowledge,the proposed approach makes the first attempt to leverage the summarization of focal methods as the guidance for making the generated assert statements more accurate.We demonstrate the effectiveness of our approach on two real-world datasets compared with state-of-the-art models. 展开更多
关键词 assert generation deep learning method summarization pre-trained language model unit testing
原文传递
PyABV:a framework for enhancing PyRTL with assertion-based verification
9
作者 Yue CHENG Tun LI +1 位作者 Hongji ZOU Wanxia QU 《Frontiers of Computer Science》 2025年第7期153-154,共2页
1 Introduction The past decades have seen the emergence of hardware agile design methodology(HADM)[1]that prompts design productivity with novel hardware construction languages(HCLs).In contrast to its agility for des... 1 Introduction The past decades have seen the emergence of hardware agile design methodology(HADM)[1]that prompts design productivity with novel hardware construction languages(HCLs).In contrast to its agility for design ability,HCLs are weak in verification capabilities such as assertion-based verification(ABV). 展开更多
关键词 hardware agile design methodology hardware agile design methodology hadm assertion based verification hardware construction languages hcls design productivity hardware construction languages
原文传递
Evaluating and Constraining Hardware Assertions with Absent Scenarios
10
作者 Hui-Na Chao Hua-Wei Li +2 位作者 Xiaoyu Song Tian-Cheng Wang Xiao-Wei Li 《Journal of Computer Science & Technology》 SCIE EI CSCD 2020年第5期1198-1216,共19页
Mining from simulation data of the golden model in hardware design verification is an effective solution to assertion generation.While the simulation data is inherently incomplete,it is necessary to evaluate the truth... Mining from simulation data of the golden model in hardware design verification is an effective solution to assertion generation.While the simulation data is inherently incomplete,it is necessary to evaluate the truth values of the mined assertions.This paper presents an approach to evaluating and constraining hardware assertions with absent scenarios.A Belief-fail Rate metric is proposed to predict the truth/falseness of generated assertions.By considering both the occurrences of free variable assignments and the conflicts of absent scenarios,we use the metric to sort true assertions in higher ranking and false assertions in lower ranking.Our Belief-failRate guided assertion constraining method leverages the quality of generated assertions.The experimental results show that the Belief-failRate framework performs better than the existing methods.In addition,the assertion evaluating and constraining procedure can find more assertions that cover new design functionality in comparison with the previous methods. 展开更多
关键词 hardware formal verification assertion generation data mining assertion evaluation assertion coverage
原文传递
Resource Nationalism in Its Third Wave:Challenges and Protection for China’s Overseas Interests
11
作者 Zhou Guangjun Wang Xueman 《China International Studies》 2025年第4期5-30,共26页
In April 2022,then-President of Mexico Andrés Manuel López Obrador officially implemented the lithium resources nationalization law and established the state-owned enterprise LitioMx to oversee their explora... In April 2022,then-President of Mexico Andrés Manuel López Obrador officially implemented the lithium resources nationalization law and established the state-owned enterprise LitioMx to oversee their exploration,extraction,and processing.His successor,Claudia Sheinbaum,reaffirmed this assertive resource governance policy in October 2024.As a direct consequence,the operations of the Chinese firm,Ganfeng Lithium in Mexico,experienced significant disruption. 展开更多
关键词 assertive resource governance resource nationalism lithium Mexico lithium resources nationalization China state owned enterprise overseas interests
在线阅读 下载PDF
社交焦虑对消费行为的影响:研究述评与展望 被引量:1
12
作者 曹菲 王雨欣 吴波 《外国经济与管理》 北大核心 2025年第5期100-117,共18页
社交焦虑是个体在社交情境中因被审视或者可能面临负面评价而产生的一种非理性恐惧和社交回避状态。社交焦虑已成为一种较普遍的焦虑心理,但现有研究在社交焦虑如何影响消费行为方面缺乏系统梳理和总结。为此,本文首先厘清了社交焦虑的... 社交焦虑是个体在社交情境中因被审视或者可能面临负面评价而产生的一种非理性恐惧和社交回避状态。社交焦虑已成为一种较普遍的焦虑心理,但现有研究在社交焦虑如何影响消费行为方面缺乏系统梳理和总结。为此,本文首先厘清了社交焦虑的概念,总结了测量与操纵社交焦虑的方法;其次,应用社交焦虑的认知行为模型、印象管理理论和自我调节理论,分别从认知机制、印象管理策略视角和自我调节资源视角剖析了社交焦虑影响不同消费行为的理论机制;再次,按照社交焦虑消费者采取的印象管理策略和是否拥有自我调节资源,将社交焦虑对消费行为的影响分为获得性消费、防御性消费和非理性消费三类,并进一步指出了社交焦虑影响不同消费行为的调节因素;最后,构建了社交焦虑影响消费行为的研究框架,并提出了探讨不同类别社交焦虑对消费行为的影响以及丰富社交焦虑影响获得性消费行为的研究等未来研究方向。本文有助于理解社交焦虑影响消费行为的机制,并为企业针对不同水平社交焦虑消费者制定营销策略提供了参考。 展开更多
关键词 社交焦虑 社交焦虑的认知行为模型 获得性消费 防御性消费 非理性消费
原文传递
A QUANTIFIER-ELIMINATION BASED HEURISTIC FOR AUTOMATICALLY GENERATING INDUCTIVE ASSERTIONS FOR PROGRAMS 被引量:3
13
作者 Deepak KAPUR 《Journal of Systems Science & Complexity》 SCIE EI CSCD 2006年第3期307-330,共24页
A method using quantifier-elimination is proposed for automatically generating program invariants/inductive assertions. Given a program, inductive assertions, hypothesized as parameterized formulas in a theory, are as... A method using quantifier-elimination is proposed for automatically generating program invariants/inductive assertions. Given a program, inductive assertions, hypothesized as parameterized formulas in a theory, are associated with program locations. Parameters in inductive assertions are discovered by generating constraints on parameters by ensuring that an inductive assertion is indeed preserved by all execution paths leading to the associated location of the program. The method can be used to discover loop invariants-properties of variables that remain invariant at the entry of a loop. The parameterized formula can be successively refined by considering execution paths one by one; heuristics can be developed for determining the order in which the paths are considered. Initialization of program variables as well as the precondition and postcondition, if available, can also be used to further refine the hypothesized invariant. The method does not depend on the availability of the precondition and postcondition of a program. Constraints on parameters generated in this way are solved for possible values of parameters. If no solution is possible, this means that an invariant of the hypothesized form is not likely to exist for the loop under the assumptions/approximations made to generate the associated verification condition. Otherwise, if the parametric constraints are solvable, then under certain conditions on methods for generating these constraints, the strongest possible invariant of the hypothesized form can be generated from most general solutions of the parametric constraints. The approach is illustrated using the logical languages of conjunction of polynomial equations as well as Presburger arithmetic for expressing assertions. 展开更多
关键词 Automated software analysis and verification inductive assertion loop invariant quantifier elimination.
原文传递
基于可追责断言的支付通道网络性能优化研究
14
作者 李雯琪 应作斌 +2 位作者 臧嘉威 熊金波 刘西蒙 《网络与信息安全学报》 2025年第1期66-78,共13页
针对区块链技术在区块大小和生成速率上的固有限制导致的可扩展性问题,支付通道网络(payment channel network,PCN)提供了链下扩容的有效方案。然而,传统的使用可锁定结构的PCN存在以下两个缺点:存在作恶方时该结构只能结束交易过程,却... 针对区块链技术在区块大小和生成速率上的固有限制导致的可扩展性问题,支付通道网络(payment channel network,PCN)提供了链下扩容的有效方案。然而,传统的使用可锁定结构的PCN存在以下两个缺点:存在作恶方时该结构只能结束交易过程,却无法对恶意行为者实施识别与惩罚;某一笔交易需要复盘时,PCN中出现的所有交易都需要恢复,导致巨大的计算开销。鉴于此,提出了一种基于可追责断言性能优化的支付通道网络方案——AAPO-PCN(accountable assertions performance optimization-payment channel network)。AAPO-PCN通过引进可追责断言算法,构建了一种可编辑的Merkle树结构。不同于传统Merkle树,该方案采用变色龙哈希函数替换原有哈希算法,并整合可追责断言机制,旨在有效识别恶意用户。通过这种方式,不仅令相关交易的恢复更加高效,同时也大幅减少了计算开销。最后提供了全面的安全性分析与实验,结果表明,AAPO-PCN在不牺牲安全性的情况下,具有更优的计算效率与通信开销。 展开更多
关键词 支付通道网络 可追责断言 MERKLE树 变色龙哈希函数
在线阅读 下载PDF
江西吉水方言表确认和惊异的“话”
15
作者 李桂兰 《汉语学报》 北大核心 2025年第2期106-116,共11页
学界过去很少刻画言说动词的确认功能及其与惊异范畴的关联。本文描写吉水方言“话”的确认和惊异功能、特点,思考它们的来源和语义关联,最后讨论汉语方言中源于言说动词的确认和惊异功能的一些问题。表确认的“话”无句类限制,包括祈... 学界过去很少刻画言说动词的确认功能及其与惊异范畴的关联。本文描写吉水方言“话”的确认和惊异功能、特点,思考它们的来源和语义关联,最后讨论汉语方言中源于言说动词的确认和惊异功能的一些问题。表确认的“话”无句类限制,包括祈使句和偏向问句,可激活和确认说话人预期,凸显说话人的认识权威;表惊异的“话”具有五种语义,通常反说话人的无定预期,且用于陈述句和感叹句句末、句首。本文主张“话”的确认功能源于话语标记“我话”的省缩和重新分析,而且确认功能词“话”是句首惊异助词“话”的一种语义来源。基于方言平行例证,本文进一步论证言说动词的确认、惊异功能与言者的认识地位、认知推理有关。 展开更多
关键词 吉水方言 言说动词 确认 惊异 话语标记
原文传递
Default Logic About Assertions
16
作者 苏开乐 丁德成 《Science China Mathematics》 SCIE 1994年第11期1399-1408,共10页
G.Brewka presented a modified default logic (CDL) and obtained some properties of CDL,such as the existence of extensions,semimonotonicity,which the Reiters normal default logic shares.The Reiter’s default has been g... G.Brewka presented a modified default logic (CDL) and obtained some properties of CDL,such as the existence of extensions,semimonotonicity,which the Reiters normal default logic shares.The Reiter’s default has been generalized,a default logic about assertion’s has been obtained,and the assertion that the Brewka’s CDL is a special normal default logic of the new version has been proved. 展开更多
关键词 assertION DEFAULT LOGIC NORMAL default.
原文传递
认同标记“正是”强断言的立场建构与历时演变
17
作者 刘超 《河北科技师范学院学报(社会科学版)》 2025年第2期83-90,共8页
认同标记“正是”具有强断言性,并通过认识立场的浮现与认识权威的升级进行立场建构。演变过程为偏正短语“正是1”先用于判断,后用于强调时词汇化为副词“正是2”,又分别语法化为强断言标记“正是3”、认同标记“正是4”,认同标记“正... 认同标记“正是”具有强断言性,并通过认识立场的浮现与认识权威的升级进行立场建构。演变过程为偏正短语“正是1”先用于判断,后用于强调时词汇化为副词“正是2”,又分别语法化为强断言标记“正是3”、认同标记“正是4”,认同标记“正是4”的演变主要涉及互动动因与删略等机制。 展开更多
关键词 认同标记 “正是” 强断言性 认识权威 词汇化
在线阅读 下载PDF
李贺诗歌的自称和自我审视
18
作者 苗雨青 《洛阳理工学院学报(社会科学版)》 2025年第5期53-57,共5页
李贺诗歌中的自称和自我审视是研究李贺思想和诗歌创作的角度和切入点。第一人称是诗人对自身主体性的强调,李贺在创作时对“我”和“吾”作了有意的区分,用“我”来抒情言志,而用“吾”来叙事或突显庄重。李贺对第一人称的使用较少,缘... 李贺诗歌中的自称和自我审视是研究李贺思想和诗歌创作的角度和切入点。第一人称是诗人对自身主体性的强调,李贺在创作时对“我”和“吾”作了有意的区分,用“我”来抒情言志,而用“吾”来叙事或突显庄重。李贺对第一人称的使用较少,缘于他的创作以乐府诗为主,性格较为内敛。第三人称不仅寄寓了李贺宗室情结的彷徨、身体缺陷的补偿、“垂翅客”“书客”的落寞,还展现了中唐时期士人普遍的心态演变,即从盛唐的自信乐观到中唐的忧虑无奈。 展开更多
关键词 李贺 自称 自我审视 士人心态
在线阅读 下载PDF
基于KAP理论的护理模式对哮喘患儿自我管理行为的影响
19
作者 赵春燕 吴海涛 《智慧健康》 2025年第4期174-176,180,共4页
目的 知信行(KAP)理论的护理模式对哮喘患儿自我管理行为的影响。选取2022年10月—2024年10月本院收治的60例哮喘患儿为研究对象,遵随机数字表法将其分为两组,每组30例。常规组采取常规护理模式,KAP组采取基于KAP理论的护理模式。比较... 目的 知信行(KAP)理论的护理模式对哮喘患儿自我管理行为的影响。选取2022年10月—2024年10月本院收治的60例哮喘患儿为研究对象,遵随机数字表法将其分为两组,每组30例。常规组采取常规护理模式,KAP组采取基于KAP理论的护理模式。比较两组哮喘发作情况及哮喘控制测试(TRACK)评分以及干预前后患儿自我管理能力及生活质量。结果 干预后,KAP组哮喘发作人数占比低于常规组(P<0.05);两组TRACK、自我管理能力各维度评分及生活质量评分均较干预前升高(P<0.05),且KAP组上述指标均显著高于常规组(P<0.05)。基于KAP理论的护理模式能有效减少哮喘发作次数,增强患儿自我管理能力,并提高其生活质量。 展开更多
关键词 知信行理论 护理 哮喘 自我管理
暂未订购
让儿童积极地表达自我主张——基于规训权力理论的反思
20
作者 朱娅 马维林 《陕西学前师范学院学报》 2025年第8期90-98,共9页
儿童“不规范”的自我主张表达是创造力与主体性的鲜活呈现,是教育中的重要资源。然而幼儿园实践中规训权力的隐形延续,使得儿童“失语”的教育现象凸显。本文以福柯规训权力理论为反思视角,剖析实践中规训权力如何通过空间、时间、身... 儿童“不规范”的自我主张表达是创造力与主体性的鲜活呈现,是教育中的重要资源。然而幼儿园实践中规训权力的隐形延续,使得儿童“失语”的教育现象凸显。本文以福柯规训权力理论为反思视角,剖析实践中规训权力如何通过空间、时间、身体、话语和监控消解儿童自我主张;探讨规训机制的双重性及其微观渗透和内化特征,揭示规训权力与儿童自我主张发展的张力关系。研究提出通过“表达空间”的环境重构、“表达同构者”的教师角色转型以及“表达赋能”的制度支持,构建儿童表达支持体系,助力儿童积极地表达自我主张,实现“儿童中心”的深层回归。 展开更多
关键词 学前儿童 自我主张 表达支持 规训权力 福柯理论
在线阅读 下载PDF
上一页 1 2 29 下一页 到第
使用帮助 返回顶部