首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1220篇
  免费   56篇
  国内免费   12篇
电工技术   26篇
综合类   16篇
化学工业   47篇
金属工艺   18篇
机械仪表   18篇
建筑科学   29篇
矿业工程   7篇
能源动力   17篇
轻工业   26篇
水利工程   35篇
石油天然气   8篇
武器工业   3篇
无线电   50篇
一般工业技术   44篇
冶金工业   29篇
原子能技术   6篇
自动化技术   909篇
  2024年   1篇
  2023年   16篇
  2022年   25篇
  2021年   31篇
  2020年   23篇
  2019年   12篇
  2018年   11篇
  2017年   27篇
  2016年   16篇
  2015年   21篇
  2014年   12篇
  2013年   13篇
  2012年   15篇
  2011年   805篇
  2010年   40篇
  2009年   72篇
  2008年   15篇
  2007年   6篇
  2006年   6篇
  2005年   3篇
  2004年   1篇
  2003年   2篇
  2002年   3篇
  2001年   1篇
  2000年   1篇
  1999年   1篇
  1998年   79篇
  1997年   19篇
  1996年   6篇
  1993年   2篇
  1992年   1篇
  1991年   1篇
  1980年   1篇
排序方式: 共有1288条查询结果,搜索用时 15 毫秒
101.
To protect the remote server from various malicious attacks, many authentication schemes have been proposed. Some schemes have to maintain a password verification table in the remote server for checking the legitimacy of the login users. To overcome potential risks of verification tables, researchers proposed remote user authentication schemes using smartcard, in which the remote server only keeps a secret key for computing the user’s passwords and does not need any verification table for verifying legal user. In 2003 Shen, Lin, and Hwang proposed a timestamp-based password authentication scheme using smartcards in which the remote server does not need to store the passwords or verification table for user authentication. Unfortunately, this scheme is vulnerable to some deadly attacks. In this paper, we analyze few attacks and finally propose an improved timestamp-based remote user authentication scheme. The modified scheme is more efficient and secure than original scheme.  相似文献   
102.
Coherence protocols consume an important fraction of power to determine which coherence action to perform. Specifically, on CMPs with shared cache and directory-based coherence protocol implemented as a duplicate of local caches tags, we have observed that a big fraction of directory lookups cause a miss, because the block looked up is not allocated in any local cache. To reduce the number of directory lookups and therefore the power consumption, we propose to add a filter before the directory access.We introduce two filter implementations. In the first one, filtering information is explicitly kept in the shared cache for every block. In the second one, filtering information is decoupled from the shared cache organization, so the filter size does not depend on the shared cache size.We evaluate our filters in a CMP with 8 in-order processors with 4 threads each and a memory hierarchy with write-through local caches and a shared cache. We show that, for SPLASH2 benchmarks, the proposed filters reduce the number of directory lookups performed by 60% while power consumption is reduced by ∼28%. For Specweb2005, the number of directory lookups performed is reduced by 68% (44%), while directory power consumption is reduced by 19% (9%) using the first (second) filter implementation.  相似文献   
103.
104.
This paper presents a distributed architecture for the provision of seamless and responsive mobile multimedia services. This architecture allows its user applications to use concurrently all the wireless network interface cards (NICs) a mobile terminal is equipped with. In particular, as mobile multimedia services are usually implemented using the UDP protocol, our architecture enables the transmission of each UDP datagram through the “most suitable” (e.g. most responsive, least loaded) NIC among those available at the time a datagram is transmitted. We term this operating mode of our architecture Always Best Packet Switching (ABPS). ABPS enables the use of policies for load balancing and recovery purposes. In essence, the architecture we propose consists of the following two principal components: (i) a fixed proxy server, which acts as a relay for the mobile node and enables communications from/to this node regardless of possible firewalls and NAT systems, and (ii) a proxy client running in the mobile node responsible for maintaining a multi-path tunnel, constructed out of all the node's NICs, with the above mentioned fixed proxy server. We show how the architecture supports multimedia applications based on the SIP and RTP/RTCP protocols, and avoids the typical delays introduced by the two way message/response handshake of the SIP signaling protocol. Experimental results originated from the implementation of a VoIP application on top of the architecture we propose show the effectiveness of our approach.  相似文献   
105.
106.
Cybercrime and cybercriminal activities continue to impact communities as the steady growth of electronic information systems enables more online business. The collective views of sixty-six computer users and organizations, that have an exposure to cybercrime, were analyzed using concept analysis and mapping techniques in order to identify the major issues and areas of concern, and provide useful advice. The findings of the study show that a range of computing stakeholders have genuine concerns about the frequency of information security breaches and malware incursions (including the emergence of dangerous security and detection avoiding malware), the need for e-security awareness and education, the roles played by law and law enforcement, and the installation of current security software and systems. While not necessarily criminal in nature, some stakeholders also expressed deep concerns over the use of computers for cyberbullying, particularly where younger and school aged users are involved. The government’s future directions and recommendations for the technical and administrative management of cybercriminal activity were generally observed to be consistent with stakeholder concerns, with some users also taking practical steps to reduce cybercrime risks.  相似文献   
107.
A new DFM approach to combine machining and additive manufacturing   总被引:1,自引:0,他引:1  
Design for manufacturing (DFM) approaches aim to integrate manufacturability aspects during the design stage. Most of DFM approaches usually consider only one manufacturing process, but product competitiveness may be improved by designing hybrid modular products, in which products are seen as 3-D puzzles with modules realized individually by the best manufacturing process and further gathered. A new DFM system is created in order to give quantitative information during the product design stage of which modules will benefit in being machined and which ones will advantageously be realized by an additive process (such as Selective Laser Sintering or laser deposition). A methodology for a manufacturability evaluation in case of a subtractive or an additive manufacturing process is developed and implemented in a CAD software. Tests are carried out on industrial products from automotive industry.  相似文献   
108.
RFID has emerged as a potential tool to combat product counterfeiting, which undermines the global economy hugely. Recently, a number of anti-counterfeiting approaches have been proposed for such purpose. This paper presents a track-and-trace system for RFID-based anti-counterfeiting, and addresses possible implementation issues, such as tag selection, product tagging, tag programming and locking. A packaging line for bottled products is developed and integrated with the proposed system for investigation of these issues. Experiments are conducted to determine the critical tag moving speed beyond which the tag programming rate or reliability of tagged products being transferred on a convey drops significantly. The critical tag moving speed is vital not only for determining the maximum production throughput possible, but also for setting up RFID equipment needed to ensure tagged products with erroneous tagging can be sorted out from the packaging line accordingly.  相似文献   
109.
The scope of this paper is to review and evaluate all constant round Group Key Agreement (GKA) protocols proposed so far in the literature. We have gathered all GKA protocols that require 1,2,3,4 and 5 rounds and examined their efficiency. In particular, we calculated each protocol’s computation and communication complexity and using proper assessments we compared their total energy cost. The evaluation of all protocols, interesting on its own, can also serve as a reference point for future works and contribute to the establishment of new, more efficient constant round protocols.  相似文献   
110.
This paper proposes a complete framework to assess the overall performance of classification models from a user perspective in terms of accuracy, comprehensibility, and justifiability. A review is provided of accuracy and comprehensibility measures, and a novel metric is introduced that allows one to measure the justifiability of classification models. Furthermore, taxonomy of domain constraints is introduced, and an overview of the existing approaches to impose constraints and include domain knowledge in data mining techniques is presented. Finally, justifiability metric is applied to a credit scoring and customer churn prediction case.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号