全文获取类型
收费全文 | 8981篇 |
免费 | 1369篇 |
国内免费 | 1127篇 |
专业分类
电工技术 | 1121篇 |
综合类 | 903篇 |
化学工业 | 320篇 |
金属工艺 | 114篇 |
机械仪表 | 456篇 |
建筑科学 | 130篇 |
矿业工程 | 162篇 |
能源动力 | 112篇 |
轻工业 | 234篇 |
水利工程 | 61篇 |
石油天然气 | 126篇 |
武器工业 | 63篇 |
无线电 | 1807篇 |
一般工业技术 | 421篇 |
冶金工业 | 202篇 |
原子能技术 | 29篇 |
自动化技术 | 5216篇 |
出版年
2024年 | 70篇 |
2023年 | 239篇 |
2022年 | 358篇 |
2021年 | 491篇 |
2020年 | 470篇 |
2019年 | 344篇 |
2018年 | 344篇 |
2017年 | 429篇 |
2016年 | 425篇 |
2015年 | 517篇 |
2014年 | 887篇 |
2013年 | 695篇 |
2012年 | 894篇 |
2011年 | 887篇 |
2010年 | 547篇 |
2009年 | 618篇 |
2008年 | 574篇 |
2007年 | 580篇 |
2006年 | 503篇 |
2005年 | 448篇 |
2004年 | 331篇 |
2003年 | 255篇 |
2002年 | 157篇 |
2001年 | 122篇 |
2000年 | 81篇 |
1999年 | 49篇 |
1998年 | 36篇 |
1997年 | 16篇 |
1996年 | 17篇 |
1995年 | 5篇 |
1994年 | 7篇 |
1993年 | 9篇 |
1992年 | 7篇 |
1991年 | 4篇 |
1990年 | 8篇 |
1989年 | 1篇 |
1988年 | 6篇 |
1987年 | 2篇 |
1986年 | 1篇 |
1985年 | 15篇 |
1984年 | 9篇 |
1983年 | 8篇 |
1982年 | 7篇 |
1981年 | 3篇 |
1980年 | 1篇 |
排序方式: 共有10000条查询结果,搜索用时 31 毫秒
941.
冯登国 《信息安全与通信保密》1996,(4)
简述了基本的Nyberg-Rueppel认证方案和HMP认证方案,指出了LC认证方案是HMP认证方案的一个特例。 相似文献
942.
广义GM概率公开钥密码体制的多项式安全性证明 总被引:3,自引:0,他引:3
基于Zn*中二次剩余问题,Goldwasser与Micali[1]首先提出了一种具有多项式安全的概率公开钥密码体制。由此几种基于Zn*中γ—次剩余问题的概率加密体制也被建立起来(本文称之为广义GM体制)。概率公开钥密码体制只有是多项式安全的,才能体现它作为一种概率加密体制所特有的特点,但广义GM体制的多项式安全性并没有得到证明。本文用较独特的方法证明了广义GM体制是多项式安全的。 相似文献
943.
An open question about the asymptotic
cost of connecting many processors to a
large memory using three dimensions for wiring
is answered, and this result is used
to find the full cost of several
cryptanalytic attacks. In many cases this full
cost is higher than the accepted complexity
of a given algorithm based on the number of processor
steps. The full costs of several
cryptanalytic attacks are determined, including
Shanks method for computing discrete
logarithms in cyclic groups of prime order n,
which requires n1/2+o(1) processor steps, but,
when all factors are taken into account, has full
cost n2/3+o(1). Other attacks analyzed are
factoring with the number field sieve, generic
attacks on block ciphers, attacks on double
and triple encryption, and finding hash collisions.
In many cases parallel collision search
gives a significant asymptotic advantage over
well-known generic attacks. 相似文献
944.
Eiichiro Fujisaki Tatsuaki Okamoto David Pointcheval Jacques Stern 《Journal of Cryptology》2004,17(2):81-104
Recently Victor Shoup noted that there is a gap in the widely believed security
result of OAEP against adaptive chosen-ciphertext attacks. Moreover, he showed
that, presumably, OAEP cannot be proven secure from the one-wayness of the underlying
trapdoor permutation. This paper establishes another result on the security of OAEP.
It proves that OAEP offers semantic security against adaptive chosen-ciphertext attacks,
in the random oracle model, under the partial-domain one-wayness of the underlying
permutation. Therefore, this uses a formally stronger assumption. Nevertheless, since
partial-domain one-wayness of the RSA function is equivalent to its (full-domain) onewayness,
it follows that the security of RSA-OAEP can actually be proven under the
sole RSA assumption, although the reduction is not tight. 相似文献
945.
Igor E. Shparlinski 《Information Processing Letters》2004,92(3):143-147
Let us fix a security parameter n and a sufficiently large encryption exponent e. We show that for a random choice of the RSA modulus m=pq, where p and q are n-bit primes, the decryption exponent d, defined by is uniformly distributed modulo φ(m). It is known, due to recent work of Boneh, Durfee and Frankel, that additional information about some bits of d may turn out to be dramatic for the security of the whole cryptosystem. Our uniformity of distribution result implies that sufficiently long strings of the most and the least significant bits of d, which are vulnerable to such attacks, behave as random binary vectors. 相似文献
946.
This work is concerned with online learning from expert advice. Extensive work on this problem generated numerous expert advice algorithms whose total loss is provably bounded above in terms of the loss incurred by the best expert in hindsight. Such algorithms were devised for various problem variants corresponding to various loss functions. For some loss functions, such as the square, Hellinger and entropy losses, optimal algorithms are known. However, for two of the most widely used loss functions, namely the 0/1 and absolute loss, there are still gaps between the known lower and upper bounds.In this paper we present two new expert advice algorithms and prove for them the best known 0/1 and absolute loss bounds. Given an expert advice algorithm ALG, the goal is to form an upper bound on the regret
L
ALG – L* of ALG, where L
ALG is the loss of ALG and L* is the loss of the best expert in hindsight. Typically, regret bounds of a canonical form C ·
are sought where N is the number of experts and C is a constant. So far, the best known constant for the absolute loss function is C = 2.83, which is achieved by the recent IAWM algorithm of Auer et al. (2002). For the 0/1 loss function no bounds of this canonical form are known and the best known regret bound is
, where C
1 = e – 2 and C
2 = 2
. This bound is achieved by a P-norm algorithm of Gentile and Littlestone (1999). Our first algorithm is a randomized extension of the guess and double algorithm of Cesa-Bianchi et al. (1997). While the guess and double algorithm achieves a canonical regret bound with C = 3.32, the expected regret of our randomized algorithm is canonically bounded with C = 2.49 for the absolute loss function. The algorithm utilizes one random choice at the start of the game. Like the deterministic guess and double algorithm, a deficiency of our algorithm is that it occasionally restarts itself and therefore forgets what it learned. Our second algorithm does not forget and enjoys the best known asymptotic performance guarantees for both the absolute and 0/1 loss functions. Specifically, in the case of the absolute loss, our algorithm is canonically bounded with C approaching
and in the case of the 0/1 loss, with C approaching 3/
. In the 0/1 loss case the algorithm is randomized and the bound is on the expected regret. 相似文献
947.
Yu-YueDu Chang-JunJiang 《计算机科学技术学报》2004,19(2):0-0
Temporal colored Petri nets, an extension of temporal Petri nets, are introduced in this paper. It can distinguish the personality of individuals (tokens), describe clearly the causal and temporal relationships betwee nevents in concurrent systems, and represent elegantly certain fundamental properties of concurrent systems, such as eventuality and fairness. The use of this method is illustrated with an example of modeling and formal verification of an online stock trading system. The functional correctness of the modeled system is formally verified based on the temporal colored Petri net model and temporal assertions. Also, some main properties of the system are analyzed. It has been demonstrated sufficiently that temporal colored Petri nets can verify efficiently some time-related properties of concurrent systems, and provide both the power of dynamic representation graphically and the function of logical inference formally. Finally. future work is described. 相似文献
948.
949.
950.
利用SST89C58的IAP/ISP实现的在线仿真技术 总被引:1,自引:0,他引:1
“在线仿真”技术提出了一种代替仿真器的方法,其关键部分是监控程序、仿真程序和PC机与单片机的通信,在两部分程序相配合的情况下,利用IAP/ISP技术即可对系统进行实时调试。用户可不必购买仿真器,从而节省费用,对学校的单片机教学提供了一条新的途径。 相似文献