首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   429篇
  免费   15篇
电工技术   1篇
化学工业   74篇
金属工艺   17篇
机械仪表   28篇
建筑科学   5篇
能源动力   23篇
轻工业   30篇
水利工程   1篇
石油天然气   3篇
无线电   77篇
一般工业技术   97篇
冶金工业   61篇
原子能技术   3篇
自动化技术   24篇
  2024年   2篇
  2023年   9篇
  2022年   13篇
  2021年   15篇
  2020年   11篇
  2019年   8篇
  2018年   16篇
  2017年   15篇
  2016年   8篇
  2015年   4篇
  2014年   18篇
  2013年   26篇
  2012年   19篇
  2011年   16篇
  2010年   11篇
  2009年   10篇
  2008年   15篇
  2007年   16篇
  2006年   13篇
  2005年   10篇
  2004年   10篇
  2003年   13篇
  2002年   12篇
  2001年   11篇
  2000年   13篇
  1999年   5篇
  1998年   24篇
  1997年   10篇
  1996年   9篇
  1995年   10篇
  1994年   3篇
  1993年   8篇
  1992年   7篇
  1991年   9篇
  1990年   5篇
  1989年   2篇
  1988年   8篇
  1987年   3篇
  1986年   4篇
  1985年   3篇
  1984年   4篇
  1983年   5篇
  1982年   3篇
  1981年   2篇
  1979年   1篇
  1976年   2篇
  1973年   2篇
  1957年   1篇
排序方式: 共有444条查询结果,搜索用时 15 毫秒
1.
Dixit  S. Skelly  P. 《IEEE network》1995,9(5):30-40
Market growth for PC multimedia and digital video owes largely to the rapid adoption of ISO compression standards by the industry. For video dial tone (VDT) services, the MPEG-2 set of standards have clearly emerged as the preferred coding method for VDT networks. For point-to-point switched video or multimedia connections, ATM has emerged as the technology of choice for switching and transport. This article describes how compressed digital video is transported over a VDT network, what some of the issues are, and how they are being addressed by the industry. It describes a generic VDT reference architecture, and the delivery method of video and multimedia information over such a network  相似文献   
2.
This work introduces a novel formulation of system optimal dynamic traffic assignment that captures strategic route choice in users under demand uncertainty. We define strategic route choice to be that users choose a path prior to knowing the true travel demand which will be experienced (therefore users consider the full set of possible demand scenarios). The problem is formulated based on previous work by Ziliaskopoulos (Transp Sci 34(1):37–49, 2000). The resulting novel formulation requires substantial enhancement to account for path-based flows and scenario-based stochastic demands. Further, a numerical demonstration is presented on a network with different demand loading profiles. Finally, model complexity, implications on scalability and future research directions are discussed.  相似文献   
3.
We present a method to obtain Si-fins with a critical dimension (CD) below 20 nm, separated by a minimum distance of 25 nm and connected by a common source/drain (S/D) pad. The method comprises of recursive spacer defined patterning to quadruple the line density of a 350 nm pitch resist pattern defined by 193 nm lithography. Spacer defined patterning is combined with resist based patterning to simultaneously define fins and S/D pads in a Silicon on Insulator (SOI) film. CD and Line Width Roughness (LWR) analysis was done on top down SEM images taken in a center die and in an edge die of a 200 mm wafer. The average CD is 17 nm in the center of the wafer and 18 nm at the edge. The LWR is 3 nm for both center and edge. Additional process steps to remove etch damage and round the top corner of the fin (i.e. oxidation followed by H2 anneal) further reduce the CD to 13 nm.  相似文献   
4.
The development of future mobile networks will be driven, in large part, by content and web based services. In this paper, we examine several performance, scalability and architectural challenges faced by future mobile web applications and how advanced mobile content delivery techniques can address these challenges. We review existing content delivery using a taxonomy that consists of three categories: network scaling, end system acceleration, and content and protocol optimization. While wireline content delivery focuses on network and server scalability, mobile content delivery will likely benefit most from optimizing radio link usage. We also present our ongoing work in this area, which extends the functionality of edge caching to the terminal, uses user interest correlation information to maintain low terminal power consumption and adds a new dimension to radio resource management. This revised version was published online in August 2006 with corrections to the Cover Date.  相似文献   
5.
A hybrid wireless-optical broadband access network (WOBAN) is a promising architecture for future access networks. Recently, the WOBAN has been gaining increasing attention, and early versions are being deployed as municipal access solutions. This architecture saves on network deployment cost because fiber need not penetrate to each end user. However, a major research opportunity exists in developing an efficient routing algorithm for the wireless front-end of the WOBAN. We propose and investigate the characteristics of the delay-aware routing algorithm (DARA) that minimizes the average packet delay in the wireless front-end of a WOBAN. In DARA we model wireless routers as queues and predict wireless link states periodically. Our performance studies show that DARA achieves less delay and congestion, and improved load balancing compared to traditional approaches such as the minimum-hop routing algorithm, shortest-path routing algorithm, and predictive throughput routing algorithm.  相似文献   
6.
Dynamic bandwidth allocation for quality-of-service over Ethernet PONs   总被引:24,自引:0,他引:24  
Ethernet-based passive optical network (EPON) technology is being considered as a promising solution for next-generation broadband access networks due to the convergence of low-cost Ethernet equipment and low-cost fiber infrastructures. A major feature for this new architecture is the use of a shared transmission media between all users; hence, medium access control arbitration mechanisms are essential for the successful implementation of EPON: i.e., to ensure a contention-free transmission and provide end users with equal access to the shared media. We propose to use the multipoint control protocol defined by the IEEE 802.3ah task force to arbitrate the transmission of different users, and we present different dynamic bandwidth allocation (DBA) algorithms to allocate bandwidths effectively and fairly between end users. These DBA algorithms are also augmented to support differentiated services, a crucial requirement for a converged broadband access network with heterogeneous traffic. We show that queueing delays under strict bandwidth allocation algorithms result in an unexpected behavior for certain traffic classes, and we suggest the use of DBA with appropriate local queue management to alleviate this inappropriate behavior. We conduct detailed simulation experiments to study the performance and validate the effectiveness of the proposed protocols.  相似文献   
7.
8.

The proposed system portrays the application space examination of a diverse cryptosystem processor with dynamic reconfiguration abilities. It is appropriate to a variety of signal processing application domains namely telecommunications, image processing, video coding and cryptographic processing. To differentiate between application spaces of the processor, the performance is correlated with cutting edge devices, taking ability to program, energy efficiency and computational potential as the important factors. In general the conventional method of computation is processed by means of Virtual Secure Circuit (VSC) on Advanced Encryption Standard (AES) and performance of the device Field Programmable Gate Array (FPGA) after implementation is analyzed in terms of delay and throughput. In the conventional method area overhead and power consumption are less where as the architecture lags in performance and throughput. It has been overcome through the fully parallel pipelined Architecture of the VSC on AES which outperforms the existing method in terms of performance and throughput. The energy efficiency and performance are considerably more important than processor that are used for general purpose, while still preserving a Convenient approach of programming that mainly bank on software oriented languages. The exploit of VSC based AES is to formulate the cryptographic processor held against Side Channel Attacks like attacks based on power supply and electromagnetic signals. Then the experimental result shows the promising outcomes when compared to previous methods.

  相似文献   
9.
Dixit  S. 《Spectrum, IEEE》1995,32(4):64-65
As organisations with information to sell implement an array of multimedia services for the home, others, too, are hard at work. Telephone companies, as well as cable operators, are busy developing broadband intelligent networks to underpin those broadcast and interactive offerings. The phone companies define their network as a common-carrier transport service, in that it grants equal access to all information providers, including themselves, and enables consumers to "dial up" video or multimedia applications offered by third parties. This kind of service has become known as a video dial-tone network. The user first gets a menu from the network provider. He or she then picks an information provider, which sends its own interactive menu of services to the customer  相似文献   
10.
Photonic Network Communications - For serving futuristic applications like distributed robotic systems with robots equipped with humanoid intelligence, wireless access to high-performance computing...  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号