首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   2283篇
  免费   389篇
  国内免费   353篇
电工技术   171篇
综合类   128篇
化学工业   51篇
金属工艺   6篇
机械仪表   40篇
建筑科学   21篇
矿业工程   2篇
能源动力   14篇
轻工业   30篇
水利工程   6篇
石油天然气   6篇
武器工业   20篇
无线电   426篇
一般工业技术   62篇
冶金工业   47篇
原子能技术   3篇
自动化技术   1992篇
  2024年   39篇
  2023年   99篇
  2022年   114篇
  2021年   142篇
  2020年   145篇
  2019年   115篇
  2018年   129篇
  2017年   137篇
  2016年   144篇
  2015年   103篇
  2014年   172篇
  2013年   252篇
  2012年   132篇
  2011年   138篇
  2010年   78篇
  2009年   85篇
  2008年   122篇
  2007年   120篇
  2006年   129篇
  2005年   106篇
  2004年   76篇
  2003年   73篇
  2002年   53篇
  2001年   45篇
  2000年   33篇
  1999年   35篇
  1998年   30篇
  1997年   17篇
  1996年   27篇
  1995年   19篇
  1994年   10篇
  1993年   13篇
  1992年   8篇
  1991年   11篇
  1990年   6篇
  1989年   5篇
  1988年   8篇
  1987年   5篇
  1986年   4篇
  1985年   7篇
  1984年   14篇
  1983年   12篇
  1982年   9篇
  1977年   1篇
  1974年   1篇
  1964年   1篇
  1957年   1篇
排序方式: 共有3025条查询结果,搜索用时 15 毫秒
1.
Future generation wireless multimediacommunications will require efficient Medium AccessControl (MAC) protocols able to guarantee suitable Qualityof Service (QoS) levels for different traffic classes whileachieving a high utilization of radio resources. This paperproposes a new scheduling technique to be adopted at the MAClevel in wireless access systems, named Dynamic Scheduling-Time DivisionDuplexing (DS-TDD), that efficiently managesvideo, voice, Web and background traffics. A theoretical approachis proposed in this paper to evaluate the DS-TDD performance withvoice and Web traffics. Simulation results have permitted tohighlight the following promising characteristics of the DS-TDDscheme: (i) a high capacity of real-time traffics isattained with a QoS insensitive to Web and background trafficloads; (ii) a high throughput can be guaranteed whilepreserving the QoS levels of the different traffic classes;(iii) heavier downlink traffic loads do not modify the QoSof uplink traffics. Finally, extensive comparisons with differentscheduling schemes proposed in the literature have permitted tohighlight the better performanceof DS-TDD.  相似文献   
2.
赵邑新  尹霞  吴建平 《高技术通讯》2002,12(2):10-15,20
在分析路由协议的特性及其测试需求的基础上,提出利用窗口黑盒来描述被测协议,利用多通道测试方法扩展对被测实现的控制和观察,通过扩充参考实现增强系统的测试能力。将这些理论,技术应用于系统中,对路由协议开展了有效的测试活动,为国产高性能路由器的开发提供了有力的支持,也进一步增强了PITS系统的功能和适用性。  相似文献   
3.
In this paper, we discuss average consensus problem in undirected networks of dynamic agents with fixed and switching topologies as well as multiple time-varying communication delays. By employing a linear matrix inequality method, we prove that all the nodes in the network achieve average consensus asymptotically for appropriate communication delays if the network topology is connected. Particularly, several feasible linear matrix inequalities are established to determine the maximal allowable upper bound of time-varying communication delays. Numerical examples are given to demonstrate the effectiveness and the sharpness of the theoretical results.  相似文献   
4.
5.
In the last three years or so we at Enterprise Platforms Group at Intel Corporation have been applying formal methods to various problems that arose during the process of defining platform architectures for Intel's processor families. In this paper we give an overview of some of the problems we have worked on, the results we have obtained, and the lessons we have learned. The last topic is addressed mainly from the perspective of platform architects.  相似文献   
6.
In this paper the performance of a packet mobile radio network is studied inthe presence of shadow fading outage intervals.Under quite general assumptions for the medium access protocol,the probability mass function of the sequence of packets that may be lostdue to an outage interval is derived. It is seen that long sequences of lostpackets are likely to occur for typical values of the mobile speed andshadowing correlation parameters.For delay constrained sources, e.g., voice, the analysis is mainly focused atderiving the probability function of the sequence of dropped packetsand the probability of dropping. For data sources, the delay statistic isalso derived. In the latter case, the effect of finite buffer length isaddressed. Simulation is used to verify the accuracy of approximations introduced in the analysis.  相似文献   
7.
In this paper, we propose an ID-based non-interactive zero-knowledge proof system based on the 1-out-of-2 noninteractive oblivious transfer protocol. This zero-knowledge proof system is secure against a newly discovered cheating attack.  相似文献   
8.
Precise timing and asynchronous I/O are appealing features for many applications. Unix kernels provide such features on a per‐process basis, using signals to communicate asynchronous events to applications. Per‐process signals and timers are grossly inadequate for complex multithreaded applications that require per‐thread signals and timers that operate at finer granularity. To respond to this need, we present a scheme that integrates asynchronous (Unix) signals with user‐level threads, using the ARIADNE system as a platform. This is done with a view towards support for portable, multithreaded, and multiprotocol distributed applications, namely the CLAM (connectionless, lightweight, and multiway) communications library. In the same context, we propose the use of continuations as an efficient mechanism for reducing thread context‐switching and busy‐wait overheads in multithreaded protocols. Our proposal for integrating timers and signal‐handling mechanisms not only solves problems related to race conditions, but also offers an efficient and flexible interface for timing and signalling threads. Copyright © 2006 John Wiley & Sons, Ltd.  相似文献   
9.
10.
A (t, n)-locally random reduction maps a problem instancex into a set of problem instancesy 1,...,y n in such a way that it is easy to construct the answer tox from the answers toy 1,...,y n, and yet the distribution ont-element subsets ofy 1,...,y n depends only on |x|. In this paper we formalize such reductions and give improved methods for achieving them. Then we give a cryptographic application, showing a new way to prove in perfect zero knowledge that committed bitsx 1,...,x m satisfy some predicateQ. Unlike previous techniques for such perfect zero-knowledge proofs, ours uses an amount of communication that is bounded by a fixed polynomial inm, regardless of the computational complexity ofQ. These results were presented in preliminary form at the 10th Annual Crypto Conference, Santa Barbara, CA, August 1990. The work of D. Beaver was done at Harvard University, supported in part by NSF Grant CCR-870-4513. The work of J. Kilian was done at MIT and Harvard University, supported by an NSF postdoctoral fellowship.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号