首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   375084篇
  免费   23483篇
  国内免费   12015篇
电工技术   16894篇
技术理论   31篇
综合类   19859篇
化学工业   61909篇
金属工艺   21897篇
机械仪表   21744篇
建筑科学   25514篇
矿业工程   10230篇
能源动力   9153篇
轻工业   21181篇
水利工程   6171篇
石油天然气   20817篇
武器工业   2360篇
无线电   40857篇
一般工业技术   50243篇
冶金工业   17986篇
原子能技术   3179篇
自动化技术   60557篇
  2024年   1301篇
  2023年   4913篇
  2022年   8415篇
  2021年   12086篇
  2020年   9009篇
  2019年   7631篇
  2018年   21550篇
  2017年   21733篇
  2016年   17508篇
  2015年   12266篇
  2014年   14648篇
  2013年   17280篇
  2012年   21336篇
  2011年   28782篇
  2010年   25053篇
  2009年   21504篇
  2008年   22220篇
  2007年   22874篇
  2006年   16411篇
  2005年   15542篇
  2004年   10305篇
  2003年   9151篇
  2002年   7995篇
  2001年   6710篇
  2000年   7365篇
  1999年   8610篇
  1998年   6924篇
  1997年   5877篇
  1996年   5527篇
  1995年   4538篇
  1994年   3784篇
  1993年   2651篇
  1992年   2158篇
  1991年   1630篇
  1990年   1177篇
  1989年   942篇
  1988年   773篇
  1987年   524篇
  1986年   390篇
  1985年   266篇
  1984年   184篇
  1983年   123篇
  1982年   132篇
  1981年   86篇
  1980年   73篇
  1968年   43篇
  1966年   42篇
  1965年   46篇
  1955年   63篇
  1954年   68篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
941.
Location information should be verifiable in order to support new computing and information services. In this paper, we adapt the classical challenge-response method for authentication to the task of verifying an entity's location. Our scheme utilizes a collection of transmitters, and adapts the power allocations across these transmitters to verify a user's claimed location. This strategy, which we call a power-modulated challenge response, is able to be used with existing. wireless sensor networks. First, we propose a direct method, where some transmitters are selected to send ldquochallengesrdquo that the claimant node should be able to witness based on its claimed location, and for which the claimant node must correctly respond to in order to prove its location. Second, we reverse the strategy by presenting an indirect method, where some transmitters send challenges that the claimant node should not be able to witness. Then, we present a signal-strength-based method, where the node responds with its received signal strength and thereby provides improved location verification. To evaluate our schemes, we examine different adversarial models for the claimant, and characterize the performance of our power-modulated challenge response schemes under these adversarial models. Further, we propose a new localization attack, where a set of nodes collaborates to pretend that there is a node at the claimed location. This collusion attack can do tremendous harm to localization and the performance of the aforementined methods under collusion attack are explained. Finally, we propose the use of a rotational directional power-modulated challenge response, where directional antennas are used to defend against collusion attacks.  相似文献   
942.
Partial cognates are pairs of words in two languages that have the same meaning in some, but not all contexts. Detecting the actual meaning of a partial cognate in context can be useful for Machine Translation tools and for Computer-Assisted Language Learning tools. We propose a supervised and a semi-supervised method to disambiguate partial cognates between two languages: French and English. The methods use only automatically-labeled data; therefore they can be applied to other pairs of languages as well. The aim of our work is to automatically detect the meaning of a French partial cognate word in a specific context.
Diana InkpenEmail:
  相似文献   
943.
Certified email is a system which enables a sender to prove a receiver’s receipt of email. Such a system can be used for applications related to electronic commerce on the Internet. This paper considers a situation where a sender or a receiver wants to change his/her mind due to the change of mail content value (e.g., stock, auction, gambling) during the transaction. We point out that no traditional certified email systems have been designed for such a case, thus one of the participants can be at a disadvantage. To avoid this problem, we propose an evenhanded certified email system in which each participant can change his/her choice, either cancel or finish the transaction, at any time during the transaction.
Kouichi SakuraiEmail:
  相似文献   
944.
A malware mutation engine is able to transform a malicious program to create a different version of the program. Such mutation engines are used at distribution sites or in self-propagating malware in order to create variation in the distributed programs. Program normalization is a way to remove variety introduced by mutation engines, and can thus simplify the problem of detecting variant strains. This paper introduces the “normalizer construction problem” (NCP), and formalizes a restricted form of the problem called “NCP=”, which assumes a model of the engine is already known in the form of a term rewriting system. It is shown that even this restricted version of the problem is undecidable. A procedure is provided that can, in certain cases, automatically solve NCP= from the model of the engine. This procedure is analyzed in conjunction with term rewriting theory to create a list of distinct classes of normalizer construction problems. These classes yield a list of possible attack vectors. Three strategies are defined for approximate solutions of NCP=, and an analysis is provided of the risks they entail. A case study using the virus suggests the approximations may be effective in practice for countering mutated malware. R. Mathur is presently at McAfee AVERT Labs.  相似文献   
945.
The Fisher Linear Discriminant (FLD) is commonly used in pattern recognition. It finds a linear subspace that maximally separates class patterns according to the Fisher Criterion. Several methods of computing the FLD have been proposed in the literature, most of which require the calculation of the so-called scatter matrices. In this paper, we bring a fresh perspective to FLD via the Fukunaga-Koontz Transform (FKT). We do this by decomposing the whole data space into four subspaces with different discriminability, as measured by eigenvalue ratios. By connecting the eigenvalue ratio with the generalized eigenvalue, we show where the Fisher Criterion is maximally satisfied. We prove the relationship between FLD and FKT analytically, and propose a unified framework to understanding some existing work. Furthermore, we extend our our theory to Multiple Discriminant Analysis (MDA). This is done by transforming the data into intra- and extra-class spaces, followed by maximizing the Bhattacharyya distance. Based on our FKT analysis, we identify the discriminant subspaces of MDA/FKT, and propose an efficient algorithm, which works even when the scatter matrices are singular, or too large to be formed. Our method is general and may be applied to different pattern recognition problems. We validate our method by experimenting on synthetic and real data.  相似文献   
946.
We consider the edit distance with moves on the class of words and the class of ordered trees. We first exhibit a simple tester for the class of regular languages on words and generalize it to the class of ranked and unranked regular trees. We also show that this distance problem is -complete on ordered trees. A preliminary version of this paper appeared in Proceedings of 31st International Colloquium on Automata, Languages and Programming, volume 3142 of Lecture Notes in Computer Science, pages 932–944, Springer, 2005. Work supported by ACI Sécurité Informatique: VERA of the French Ministry of research.  相似文献   
947.
多级故障诊断系统   总被引:5,自引:1,他引:4  
介绍了为提高故障诊断的正确率,将一混合故障诊断专家系统中的基于BP神经网络诊断模块、基于自组织神经网络诊断模块和基于小波分析诊断模块设计成多级诊断系统。对多级诊断系统的性能进行了分析,给出了多级诊断系统的拒绝输出策略。  相似文献   
948.
基于实体模型的三维真实感流动模拟软件的研究与开发   总被引:6,自引:0,他引:6  
注射成型的流动模拟在预测复杂薄壁型腔的流动行为方面已经比较准确。现行的数值方法主要采用基于中性层的有限元/有限差分/控制体积法,但中性层模型的引入使得模拟软件在应用中具有极大的局限性。本文采用实体模型取代中性层模型,开发了三维真实感流动模拟软件。最后,应用实例证明此模型能够处理由流行CAD系统生成的复杂型腔模型。  相似文献   
949.
Determining the “weakest” failure detectors is a central topic in solving many agreement problems such as Consensus, Non-Blocking Atomic Commit and Election in asynchronous distributed systems. So far, this has been studied extensively for several such fundamental problems. It is stated that Perfect Failure Detector P is the weakest failure detector to solve the Election problem with any number of faulty processes. In this paper, we introduce Modal failure detector M and show that to solve Election, M is the weakest failure detector to solve election when the number of faulty processes is less than ⌈n/2⌉. We also show that it is strictly weaker than P.
Sung Hoon ParkEmail:
  相似文献   
950.
Authentication and authorization in many distributed systems rely on the use of cryptographic credentials that in most of the cases have a defined lifetime. This feature mandates the use of mechanisms able to determine whether a particular credential can be trusted at a given moment. This process is commonly named validation. Among available validation mechanisms, the Online Certificate Status Protocol (OCSP) stands out due to its ability to carry near real time certificate status information. Despite its importance for security, OCSP faces considerable challenges in the computational Grid (i.e. Proxy Certificate’s validation) that are being studied at the Global Grid Forum’s CA Operations Work Group (CAOPS-WG). As members of this group, we have implemented an OCSP validation infrastructure for the Globus Toolkit 4, composed of the CertiVeR Validation Service and our Open GRid Ocsp (OGRO) client library, which introduced the Grid Validation Policy. This paper summarizes our experiences on that work and the results obtained up to now. Furthermore we introduce the prevalidation concept, a mechanism analogous to the Authorization Push-Model, capable of improving OCSP validation performance in Grids. This paper also reports the results obtained with OGRO’s prevalidation rules for Grid Services as a proof of concept.
Oscar MansoEmail:
  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号