全文获取类型
收费全文 | 375084篇 |
免费 | 23483篇 |
国内免费 | 12015篇 |
专业分类
电工技术 | 16894篇 |
技术理论 | 31篇 |
综合类 | 19859篇 |
化学工业 | 61909篇 |
金属工艺 | 21897篇 |
机械仪表 | 21744篇 |
建筑科学 | 25514篇 |
矿业工程 | 10230篇 |
能源动力 | 9153篇 |
轻工业 | 21181篇 |
水利工程 | 6171篇 |
石油天然气 | 20817篇 |
武器工业 | 2360篇 |
无线电 | 40857篇 |
一般工业技术 | 50243篇 |
冶金工业 | 17986篇 |
原子能技术 | 3179篇 |
自动化技术 | 60557篇 |
出版年
2024年 | 1301篇 |
2023年 | 4913篇 |
2022年 | 8415篇 |
2021年 | 12086篇 |
2020年 | 9009篇 |
2019年 | 7631篇 |
2018年 | 21550篇 |
2017年 | 21733篇 |
2016年 | 17508篇 |
2015年 | 12266篇 |
2014年 | 14648篇 |
2013年 | 17280篇 |
2012年 | 21336篇 |
2011年 | 28782篇 |
2010年 | 25053篇 |
2009年 | 21504篇 |
2008年 | 22220篇 |
2007年 | 22874篇 |
2006年 | 16411篇 |
2005年 | 15542篇 |
2004年 | 10305篇 |
2003年 | 9151篇 |
2002年 | 7995篇 |
2001年 | 6710篇 |
2000年 | 7365篇 |
1999年 | 8610篇 |
1998年 | 6924篇 |
1997年 | 5877篇 |
1996年 | 5527篇 |
1995年 | 4538篇 |
1994年 | 3784篇 |
1993年 | 2651篇 |
1992年 | 2158篇 |
1991年 | 1630篇 |
1990年 | 1177篇 |
1989年 | 942篇 |
1988年 | 773篇 |
1987年 | 524篇 |
1986年 | 390篇 |
1985年 | 266篇 |
1984年 | 184篇 |
1983年 | 123篇 |
1982年 | 132篇 |
1981年 | 86篇 |
1980年 | 73篇 |
1968年 | 43篇 |
1966年 | 42篇 |
1965年 | 46篇 |
1955年 | 63篇 |
1954年 | 68篇 |
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
941.
Yu Zhang Zang Li Trappe W. 《Information Forensics and Security, IEEE Transactions on》2008,3(2):259-272
Location information should be verifiable in order to support new computing and information services. In this paper, we adapt the classical challenge-response method for authentication to the task of verifying an entity's location. Our scheme utilizes a collection of transmitters, and adapts the power allocations across these transmitters to verify a user's claimed location. This strategy, which we call a power-modulated challenge response, is able to be used with existing. wireless sensor networks. First, we propose a direct method, where some transmitters are selected to send ldquochallengesrdquo that the claimant node should be able to witness based on its claimed location, and for which the claimant node must correctly respond to in order to prove its location. Second, we reverse the strategy by presenting an indirect method, where some transmitters send challenges that the claimant node should not be able to witness. Then, we present a signal-strength-based method, where the node responds with its received signal strength and thereby provides improved location verification. To evaluate our schemes, we examine different adversarial models for the claimant, and characterize the performance of our power-modulated challenge response schemes under these adversarial models. Further, we propose a new localization attack, where a set of nodes collaborates to pretend that there is a node at the claimed location. This collusion attack can do tremendous harm to localization and the performance of the aforementined methods under collusion attack are explained. Finally, we propose the use of a rotational directional power-modulated challenge response, where directional antennas are used to defend against collusion attacks. 相似文献
942.
Partial cognates are pairs of words in two languages that have the same meaning in some, but not all contexts. Detecting the
actual meaning of a partial cognate in context can be useful for Machine Translation tools and for Computer-Assisted Language
Learning tools. We propose a supervised and a semi-supervised method to disambiguate partial cognates between two languages:
French and English. The methods use only automatically-labeled data; therefore they can be applied to other pairs of languages
as well. The aim of our work is to automatically detect the meaning of a French partial cognate word in a specific context.
相似文献
Diana InkpenEmail: |
943.
Kenji Imamoto Jianying Zhou Kouichi Sakurai 《International Journal of Information Security》2008,7(6):383-394
Certified email is a system which enables a sender to prove a receiver’s receipt of email. Such a system can be used for applications
related to electronic commerce on the Internet. This paper considers a situation where a sender or a receiver wants to change
his/her mind due to the change of mail content value (e.g., stock, auction, gambling) during the transaction. We point out
that no traditional certified email systems have been designed for such a case, thus one of the participants can be at a disadvantage.
To avoid this problem, we propose an evenhanded certified email system in which each participant can change his/her choice,
either cancel or finish the transaction, at any time during the transaction.
相似文献
Kouichi SakuraiEmail: |
944.
Andrew Walenstein Rachit Mathur Mohamed R. Chouchane Arun Lakhotia 《Journal in Computer Virology》2008,4(4):307-322
A malware mutation engine is able to transform a malicious program to create a different version of the program. Such mutation
engines are used at distribution sites or in self-propagating malware in order to create variation in the distributed programs.
Program normalization is a way to remove variety introduced by mutation engines, and can thus simplify the problem of detecting
variant strains. This paper introduces the “normalizer construction problem” (NCP), and formalizes a restricted form of the
problem called “NCP=”, which assumes a model of the engine is already known in the form of a term rewriting system. It is
shown that even this restricted version of the problem is undecidable. A procedure is provided that can, in certain cases,
automatically solve NCP= from the model of the engine. This procedure is analyzed in conjunction with term rewriting theory
to create a list of distinct classes of normalizer construction problems. These classes yield a list of possible attack vectors.
Three strategies are defined for approximate solutions of NCP=, and an analysis is provided of the risks they entail. A case
study using the virus suggests the approximations may be effective in practice for countering mutated malware.
R. Mathur is presently at McAfee AVERT Labs. 相似文献
945.
The Fisher Linear Discriminant (FLD) is commonly used in pattern recognition. It finds a linear subspace that maximally separates class patterns according to the Fisher Criterion. Several methods of computing the FLD have been proposed in the literature, most of which require the calculation of the so-called scatter matrices. In this paper, we bring a fresh perspective to FLD via the Fukunaga-Koontz Transform (FKT). We do this by decomposing the whole data space into four subspaces with different discriminability, as measured by eigenvalue ratios. By connecting the eigenvalue ratio with the generalized eigenvalue, we show where the Fisher Criterion is maximally satisfied. We prove the relationship between FLD and FKT analytically, and propose a unified framework to understanding some existing work. Furthermore, we extend our our theory to Multiple Discriminant Analysis (MDA). This is done by transforming the data into intra- and extra-class spaces, followed by maximizing the Bhattacharyya distance. Based on our FKT analysis, we identify the discriminant subspaces of MDA/FKT, and propose an efficient algorithm, which works even when the scatter matrices are singular, or too large to be formed. Our method is general and may be applied to different pattern recognition problems. We validate our method by experimenting on synthetic and real data. 相似文献
946.
We consider the edit distance with moves on the class of words and the class of ordered trees. We first exhibit a simple tester
for the class of regular languages on words and generalize it to the class of ranked and unranked regular trees. We also show
that this distance problem is
-complete on ordered trees.
A preliminary version of this paper appeared in Proceedings of 31st International Colloquium on Automata, Languages and Programming, volume 3142 of Lecture Notes in Computer Science, pages 932–944, Springer, 2005. Work supported by ACI Sécurité Informatique: VERA of the French Ministry of research. 相似文献
947.
948.
基于实体模型的三维真实感流动模拟软件的研究与开发 总被引:6,自引:0,他引:6
注射成型的流动模拟在预测复杂薄壁型腔的流动行为方面已经比较准确。现行的数值方法主要采用基于中性层的有限元/有限差分/控制体积法,但中性层模型的引入使得模拟软件在应用中具有极大的局限性。本文采用实体模型取代中性层模型,开发了三维真实感流动模拟软件。最后,应用实例证明此模型能够处理由流行CAD系统生成的复杂型腔模型。 相似文献
949.
The election problem in asynchronous distributed systems with bounded faulty processes 总被引:1,自引:1,他引:0
Sung Hoon Park 《The Journal of supercomputing》2007,41(1):89-104
Determining the “weakest” failure detectors is a central topic in solving many agreement problems such as Consensus, Non-Blocking
Atomic Commit and Election in asynchronous distributed systems. So far, this has been studied extensively for several such
fundamental problems. It is stated that Perfect Failure Detector P is the weakest failure detector to solve the Election problem with any number of faulty processes. In this paper, we introduce
Modal failure detector M and show that to solve Election, M is the weakest failure detector to solve election when the number of faulty processes is less than ⌈n/2⌉. We also show that it is strictly weaker than P.
相似文献
Sung Hoon ParkEmail: |
950.
Authentication and authorization in many distributed systems rely on the use of cryptographic credentials that in most of
the cases have a defined lifetime. This feature mandates the use of mechanisms able to determine whether a particular credential
can be trusted at a given moment. This process is commonly named validation. Among available validation mechanisms, the Online Certificate Status Protocol (OCSP) stands out due to its ability to carry
near real time certificate status information. Despite its importance for security, OCSP faces considerable challenges in
the computational Grid (i.e. Proxy Certificate’s validation) that are being studied at the Global Grid Forum’s CA Operations
Work Group (CAOPS-WG). As members of this group, we have implemented an OCSP validation infrastructure for the Globus Toolkit
4, composed of the CertiVeR Validation Service and our Open GRid Ocsp (OGRO) client library, which introduced the Grid Validation Policy. This paper summarizes our experiences on that work and the results obtained up to now. Furthermore we introduce the prevalidation concept, a mechanism analogous to the Authorization Push-Model, capable of improving OCSP validation performance in Grids.
This paper also reports the results obtained with OGRO’s prevalidation rules for Grid Services as a proof of concept.
相似文献
Oscar MansoEmail: |