全文获取类型
收费全文 | 899篇 |
免费 | 112篇 |
国内免费 | 82篇 |
专业分类
电工技术 | 10篇 |
综合类 | 240篇 |
化学工业 | 2篇 |
机械仪表 | 3篇 |
能源动力 | 4篇 |
无线电 | 414篇 |
一般工业技术 | 41篇 |
自动化技术 | 379篇 |
出版年
2024年 | 2篇 |
2023年 | 12篇 |
2022年 | 30篇 |
2021年 | 36篇 |
2020年 | 44篇 |
2019年 | 31篇 |
2018年 | 44篇 |
2017年 | 39篇 |
2016年 | 37篇 |
2015年 | 48篇 |
2014年 | 108篇 |
2013年 | 84篇 |
2012年 | 97篇 |
2011年 | 100篇 |
2010年 | 65篇 |
2009年 | 73篇 |
2008年 | 58篇 |
2007年 | 72篇 |
2006年 | 87篇 |
2005年 | 12篇 |
2004年 | 2篇 |
2002年 | 2篇 |
2001年 | 1篇 |
2000年 | 2篇 |
1999年 | 1篇 |
1998年 | 1篇 |
1997年 | 1篇 |
1995年 | 2篇 |
1988年 | 2篇 |
排序方式: 共有1093条查询结果,搜索用时 31 毫秒
51.
Feng PanAuthor Vitae Jiandong WangAuthor VitaeXiaohui LinAuthor Vitae 《Neurocomputing》2011,74(5):812-819
Most manifold learning algorithms adopt the k nearest neighbors function to construct the adjacency graph. However, severe bias may be introduced in this case if the samples are not uniformly distributed in the ambient space. In this paper a semi-supervised dimensionality reduction method is proposed to alleviate this problem. Based on the notion of local margin, we simultaneously maximize the separability between different classes and estimate the intrinsic geometric structure of the data by both the labeled and unlabeled samples. For high-dimensional data, a discriminant subspace is derived via maximizing the cumulative local margins. Experimental results on high-dimensional classification tasks demonstrate the efficacy of our algorithm. 相似文献
52.
53.
Yanrong Lu Lixiang Li Haipeng Peng Yixian Yang 《Multimedia Tools and Applications》2017,76(2):1801-1815
The Session Initiation Protocol (SIP) is a signaling protocol widely applied in the world of multimedia communication. Numerous SIP authenticated key agreement schemes have been proposed with the purpose of ensuring security communication. Farash recently put forward an enhancement employing smart cards counted on Zhang et al.’s scheme. In this study, we observe that the enhanced scheme presented by Farash has also some security pitfalls, such as disclosure of user identity, lack of a pre-authentication in the smart card and vulnerability to key-compromise masquerading attack which results in an off-line guessing attack. We then propose an anonymous modified scheme with elliptic curve cryptography to eliminate the security leakages of the scheme proposed by Farash. We demonstrate that our scheme is immune to different kinds of attacks including attacks involved in Farash’s scheme. We mention Burrows-Abadi-Needham logic for completeness of the proposed scheme. Also, we compare the performance of our scheme with its predecessor schemes and the comparative results shows that it perfectly satisfies the needs of SIP. 相似文献
54.
We consider three different communication tasks for quantum broadcast channels, and we determine the capacity region of a Hadamard broadcast channel for these various tasks. We define a Hadamard broadcast channel to be such that the channel from the sender to one of the receivers is entanglement-breaking and the channel from the sender to the other receiver is complementary to this one. As such, this channel is a quantum generalization of a degraded broadcast channel, which is well known in classical information theory. The first communication task we consider is classical communication to both receivers, the second is quantum communication to the stronger receiver and classical communication to other, and the third is entanglement-assisted classical communication to the stronger receiver and unassisted classical communication to the other. The structure of a Hadamard broadcast channel plays a critical role in our analysis: The channel to the weaker receiver can be simulated by performing a measurement channel on the stronger receiver’s system, followed by a preparation channel. As such, we can incorporate the classical output of the measurement channel as an auxiliary variable and solve all three of the above capacities for Hadamard broadcast channels, in this way avoiding known difficulties associated with quantum auxiliary variables. 相似文献
55.
56.
Identity based broadcast encryption allows a centralized transmitter to send encrypted messages to a set of identities S, so that only the users with identity in S can decrypt these ciphertexts using their respective private key. Recently [Information Processing Letters 109 (2009)], an identity-based broadcast encryption scheme was proposed (Ren and Gu, 2009) [1], and it was claimed to be fully chosen-ciphertext secure without random oracles. However, by giving a concrete attack, we indicate that this scheme is even not chosen-plaintext secure. 相似文献
57.
数据竞争问题是并发程序开发与测试难题,发现数据竞争可能导致计算重复,重复会导致系统性能下降.从实例出发定义了并发计算重复问题(concurrent computation redundancy problem,简称CCRP),给出了相关性能指标和判断方法,设计了通用并发重复控制机制.并发程序一般都可以基于生产者-消费者模型进行CCRP分析.以带数据源的生产者-消费者为例详细分析了CCRP,给出了单条件、条件交叉两种重复控制算法,算法具有不同的适用范围,都可以作为固定模式来解决CCRP,基于Petri网作了相关性质的证明与仿真.并发程序实验结果说明了并发重复控制的必要性和有效性,比较了两种算法的差异.该研究对于数据竞争检测、并发程序设计具有参考价值. 相似文献
58.
59.
传统的结构化对等网络以分布式哈希表(DHT)为核心,只支持基于特定关键字的精确搜索,不支持语义搜索.而为支持语义搜索而提出的语义DHT网络存在路由层次多、查准率低等问题.为此,基于标准α稳定分布提出了语义相似哈希对Chord节点上资源进行标识符分配,使语义相似资源具有相近的标识符,从而可将语义相似资源存放在Chord中相同或相近的节点上,实现对语义搜索的支持.仿真结果表明,使用语义相似哈希分配资源标识符的Chord网络可以在1.07%的节点范围实现70%查全率和80%的查准率,在单层拓扑上实现了语义搜索功能. 相似文献
60.
面向SNS用户访问行为的Web缓存预测替换 总被引:1,自引:1,他引:0
为了提高web缓存性能,在已有缓存替换算法的基础上加入预测机制,提出了一种面向社交网站(SNS)用户访问行为特征的预测替换算法.通过研究SNS的用户行为模型,引入预测对象集,减小了替换风险,提高了缓存命中率.为了验证所提算法的性能,进行了大量仿真实验,结果表明,该算法在基于SNS使用行为的缓存方面,具有提高命中率的优越性. 相似文献