共查询到20条相似文献,搜索用时 46 毫秒
1.
2.
3.
4.
5.
6.
William D. Harkins 《Journal of The Franklin Institute》1922,193(5):645-681
7.
Edwin J. Houston 《Journal of The Franklin Institute》1872,94(3):184-197
9.
10.
Armando Menéndez-Viso 《Ethics and Information Technology》2009,11(2):155-162
Transparency has evolved from an individual, dangerous power in Plato to a desirable, collective property in the contemporary world. This paper intends to give a brief account of this long and somehow surprising path and extract some interesting consequences for economic and political activities, as well as for information technologies. Six literary masterpieces are used to highlight the contradictions and dangers entailed by the abuse of the fascinating metaphor of transparency. In the end, what is usually intended when demanding transparency from a corporation, a firm or a state is more (or more accessible) information about it, i.e., understandable and abundant black and white data. This means reporting, picturing, producing material, becoming apparent, which is precisely the contrary of being transparent. We don’t want to look through, but to look directly at. The question, then, is not transparency, but opacity: what do we need and want to see, and how is this going to be produced? 相似文献
11.
12.
13.
14.
15.
从南美白对虾生物学特性、养殖条件、池塘清理、虾苗选择及放养密度、饲料投喂及日常管理、病害防治等几个方面对美白对虾的健康养殖进行了阐述。 相似文献
16.
《Journal of The Franklin Institute》2023,360(6):4196-4218
Under the influence of additive communication noises and system noises, we investigate the event-triggered control problem for second-order multi-agent systems composed of double integrators or LC oscillators under random denial-of-service (DoS) attacks. Different from the previous cases where the attackers completely interrupt communication networks, we consider that attackers interrupt the communication network with a specific probability and can attack part or all communication links randomly. Based on this, the conditions on the attack duration and attack success probability are given when the system can still achieve consensus under random DoS attacks. In addition, the consensus bounds are expressed. Finally, two types of LC oscillator systems are used to illustrate the effectiveness of results. 相似文献
17.
18.
19.