首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   90篇
  免费   1篇
化学工业   12篇
建筑科学   1篇
轻工业   2篇
无线电   16篇
一般工业技术   5篇
冶金工业   7篇
自动化技术   48篇
  2022年   2篇
  2021年   1篇
  2017年   2篇
  2016年   1篇
  2015年   3篇
  2014年   1篇
  2013年   2篇
  2012年   4篇
  2011年   5篇
  2010年   9篇
  2009年   2篇
  2008年   5篇
  2007年   5篇
  2006年   3篇
  2005年   2篇
  2004年   2篇
  2003年   3篇
  2002年   2篇
  1999年   2篇
  1997年   7篇
  1996年   3篇
  1995年   1篇
  1993年   2篇
  1992年   1篇
  1991年   1篇
  1989年   1篇
  1986年   2篇
  1983年   1篇
  1981年   2篇
  1979年   1篇
  1978年   1篇
  1977年   1篇
  1976年   1篇
  1972年   1篇
  1970年   1篇
  1967年   4篇
  1966年   2篇
  1965年   2篇
排序方式: 共有91条查询结果,搜索用时 31 毫秒
1.
Modern vehicles are proficient in establishing a spontaneous connection over a wireless radio channel, synchronizing actions and information. Security infrastructure is most important in such a sensitive scope of vehicle communication for coordinating actions and avoiding accidents on the road. One of the first security issues that need to be established is authentication via IEEE 1609.2 security infrastructure. According to our preliminary work, vehicle owners are bound to preprocess a certificate from the certificate authority. The certificate carries vehicle static attributes (e.g., licence number, brand and color) certified together with the vehicle public key in a monolithic manner. Nevertheless, a malicious vehicle might clone the static attributes to impersonate a specific vehicle. Therefore, in this paper we consider a resource expensive attack scenario involving multiple malicious vehicles with identical visual static attributes. Apparently, dynamic attributes (e.g., location and direction) can uniquely define a vehicle and can be utilized to resolve the true identity of the vehicle. However, unlike static attributes, dynamic attributes cannot be signed by a trusted authority beforehand. We propose an approach to verify the coupling between non-certified dynamic attributes and certified static attributes on an auxiliary communication channel, for example, a modulated laser beam. Furthermore, we illustrate that the proposed approach can be used to facilitate the usage of existing authentication protocols such as NAXOS, in the new scope of ad-hoc vehicle networks. We use BAN logic to verify the security claims of the protocol against the passive and active interception.  相似文献   
2.
3.
Optical architectures that use exponential space for solving instances of the (non-necessarily-binary) permanent are presented. This is the first work to specifically focus on such hard on average problems. Two architectures are suggested the first is based on programmable masks, and the second on preprepared fixed number of masks.  相似文献   
4.
The Choice Coordination Problem requiresn asynchronous processes to reach a common choice of one out ofk possible alternatives. Processes communicate viak shared variables. Up tot, t, of the processes may fail to operate by suddenly quitting the protocol. Rabin (1982) presented lower and upper bounds for the extreme caset=n–1. We present deterministic and randomized algorithms for arbitraryt using an alphabet of sizeO(t 2). A semi-synchronous model is also studied. A reduction to a consensus problem proves the necessity to assume some powerful atomic shared-memory operations.  相似文献   
5.
This study examined the associations among mothers' insightfulness into their infants' internal experience, mothers' sensitivity to their infants' signals, and infants' security of attachment to their mothers. The insightfulness of 129 mothers of 12-month-old infants was assessed by showing mothers 3 videotaped segments of observations of their infants and themselves and interviewing them regarding their infants' and their own thoughts and feelings. Interviews were classified into 1 insightful and 3 noninsightful categories. Mothers' sensitivity was assessed during play sessions at home and at the laboratory, and infant-mother attachment was assessed with the Strange Situation. Mothers classified as positively insightful were rated as more sensitive and were more likely to have securely attached children than were mothers not classified as positively insightful. Insightfulness also accounted for variance in attachment beyond the variance explained by maternal sensitivity. These findings add an important dimension to research on caregiving, suggesting that mothers' seeking of explanations for the motives underlying their infants' behavior is related to both maternal sensitivity and infant attachment. (PsycINFO Database Record (c) 2010 APA, all rights reserved)  相似文献   
6.
We study the problem of parallel computation of a schedule for a system of n unit-length tasks on m identical machines, when the tasks are related by a set of precedence constraints. We present NC algorithms for computing an optimal schedule in the case where m, the number of available machines, does not vary with time and the precedence constraints are represented by a collection of outtrees. The algorithms run on an exclusive read, exclusive write (EREW) PRAM. Their complexities are O(log n) and O((log n)2) parallel time using O(n2) and O(n) processors, respectively. The schedule computed by our algorithms is a height-priority schedule. As a complementary result we show that it is very unlikely that computing such a schedule is in NC when any of the above conditions is significantly relaxed. We prove that the problem is P-complete under logspace reductions when the precedence constraints are a collection of intrees and outtrees, or for a collection of outtrees when the number of available machines is allowed to increase with time. The time span of a height-priority schedule for an arbitrary precedence constraints graph is at most 2 − 1/(m − 1) times longer than the optimal (N. E Chen and C. L. Liu, Proc. 1974 Sagamore Computer Conference on Parallel Processing, T. Fend (Ed.), Springer-Verlag, Berlin, 1975, pp. 1–16). Whereas it is P-complete to produce the classical height-priority schedules even for very restricted precedence constraints graphs, we present a simple NC parallel algorithm which produces a different schedule that is only 2 − 1/m times the optimal.  相似文献   
7.
8.
9.
10.
The effects of mental countermeasures on the efficiency of psychophysiological detection with the Guilty Knowledge Technique were examined in a mock-crime experiment with 4 groups of participants: innocent participants who were not involved in the mock crime, guilty controls who committed the mock crime but received no countermeasure instructions, guilty participants who received countermeasure instructions, and guilty participants who received countermeasure instructions and were allowed to practice the countermeasures. The countermeasure instructions encouraged participants to recall emotional situations from their past and imagine themselves in these situations during presentation of irrelevant questions. Results revealed a significant reduction in electrodermal detection efficiency under the 2 countermeasure conditions with no differences between them. No countermeasure effects were observed with the respiration line length measure. (PsycINFO Database Record (c) 2010 APA, all rights reserved)  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号