全文获取类型
收费全文 | 322篇 |
免费 | 20篇 |
专业分类
电工技术 | 2篇 |
化学工业 | 32篇 |
金属工艺 | 1篇 |
机械仪表 | 6篇 |
建筑科学 | 10篇 |
矿业工程 | 1篇 |
能源动力 | 4篇 |
轻工业 | 13篇 |
水利工程 | 2篇 |
石油天然气 | 1篇 |
无线电 | 49篇 |
一般工业技术 | 73篇 |
冶金工业 | 34篇 |
自动化技术 | 114篇 |
出版年
2023年 | 2篇 |
2022年 | 4篇 |
2021年 | 7篇 |
2020年 | 10篇 |
2019年 | 16篇 |
2018年 | 11篇 |
2017年 | 8篇 |
2016年 | 13篇 |
2015年 | 5篇 |
2014年 | 12篇 |
2013年 | 31篇 |
2012年 | 21篇 |
2011年 | 30篇 |
2010年 | 25篇 |
2009年 | 17篇 |
2008年 | 15篇 |
2007年 | 14篇 |
2006年 | 19篇 |
2005年 | 11篇 |
2004年 | 7篇 |
2003年 | 4篇 |
2002年 | 2篇 |
2001年 | 2篇 |
2000年 | 4篇 |
1999年 | 4篇 |
1998年 | 7篇 |
1997年 | 7篇 |
1996年 | 6篇 |
1995年 | 4篇 |
1994年 | 1篇 |
1993年 | 1篇 |
1992年 | 2篇 |
1991年 | 1篇 |
1990年 | 1篇 |
1988年 | 1篇 |
1987年 | 2篇 |
1985年 | 1篇 |
1984年 | 1篇 |
1983年 | 1篇 |
1982年 | 2篇 |
1981年 | 2篇 |
1979年 | 1篇 |
1978年 | 1篇 |
1977年 | 1篇 |
1975年 | 3篇 |
1973年 | 1篇 |
1972年 | 1篇 |
排序方式: 共有342条查询结果,搜索用时 15 毫秒
41.
A Distributed Key Generation (DKG) protocol is an essential component of threshold cryptosystems required to initialize the
cryptosystem securely and generate its private and public keys. In the case of discrete-log-based (dlog-based) threshold signature
schemes (ElGamal and its derivatives), the DKG protocol is further used in the distributed signature generation phase to generate
one-time signature randomizers (r = gk). In this paper we show that a widely used dlog-based DKG protocol suggested by Pedersen does not guarantee a uniformly random
distribution of generated keys: we describe an efficient active attacker controlling a small number of parties which successfully
biases the values of the generated keys away from uniform. We then present a new DKG protocol for the setting of dlog-based
cryptosystems which we prove to satisfy the security requirements from DKG protocols and, in particular, it ensures a uniform
distribution of the generated keys. The new protocol can be used as a secure replacement for the many applications of Pedersen's
protocol. Motivated by the fact that the new DKG protocol incurs additional communication cost relative to Pedersen's original
protocol, we investigate whether the latter can be used in specific applications which require relaxed security properties
from the DKG protocol. We answer this question affirmatively by showing that Pedersen's protocol suffices for the secure implementation
of certain threshold cryptosystems whose security can be reduced to the hardness of the discrete logarithm problem. In particular,
we show Pedersen's DKG to be sufficient for the construction of a threshold Schnorr signature scheme. Finally, we observe
an interesting trade-off between security (reductions), computation, and communication that arises when comparing Pedersen's
DKG protocol with ours. 相似文献
42.
43.
Measurements of particle deposition and mobilization in water-saturated porous columns were performed using nuclear magnetic resonance imaging (MRI). The use of MRI enabled the acquisition of detailed, noninvasive measurements that quantify spatial and temporal evolution of particle transport patterns and porosity changes due to particle deposition. Measurements indicate that for the considered particle sizes and flow conditions significant particle deposition occurs at some distance into the column. Because identification of unique parametrizations for processes of particle straining, deposition, and detachment is complex and nonunique, a simple phenomenological model of particle deposition and porosity reduction is suggested. This model captures the essential features of the experimental measurements on spatial and temporal flow and deposition patterns. 相似文献
44.
45.
46.
Wireless ad hoc networks are characterized by several performance metrics, such as bandwidth, transport, delay, power, etc. These networks are examined by constructing a tree network. A core node is usually chosen to be the median or center of the multicast tree network with a tendency to minimize a performance metric, such as delay or transport. In this paper, we present a new efficient strategy for constructing and maintaining a core node in a multicast tree for wireless ad hoc networks undergoing dynamic changes, based on local information. The new core (centdian) function is defined by a convex combination signifying total transport and delay metrics. We provide two bounds of O(d) and O(d+l) time for maintaining the centdian using local updates, where l is the hop count between the new center and the new centdian, and d is the diameter of the tree network. We also show an O(n log n) time solution for finding the centdian in the Euclidian complete network. Finally, an extensive simulation for the construction algorithm and the maintenance algorithm is presented along with an interesting observation. Copyright © 2009 John Wiley & Sons, Ltd. 相似文献
47.
48.
Masi Iacopo Trần Anh Tuấn Hassner Tal Sahin Gozde Medioni Gérard 《International Journal of Computer Vision》2019,127(6-7):642-667
International Journal of Computer Vision - We identify two issues as key to developing effective face recognition systems: maximizing the appearance variations of training images and minimizing... 相似文献
49.
50.
Ron Feiner Lior Wertheim Danielle Gazit Or Kalish Gal Mishal Assaf Shapira Tal Dvir 《Small (Weinheim an der Bergstrasse, Germany)》2019,15(14)
Replacement of the damaged scar tissue created by a myocardial infarction is the goal of cardiac tissue engineering. However, once the implanted tissue is in place, monitoring its function is difficult and involves indirect methods, while intervention necessarily requires an invasive procedure and available medical attention. To overcome this, methods of integrating electronic components into engineered tissues have been recently presented. These allow for remote monitoring of tissue function as well as intervention through stimulation and controlled drug release. Here, an improved hybrid microelectronic tissue construct capable of withstanding the dynamic environment of the beating heart without compromising electronic or mechanical functionality is reported. While the reported system is enabled to sense the function of the engineered tissue and provide stimulation for pacing, an electroactive polymer on the electronics enables it to release multiple drugs in parallel. It is envisioned that the integration of microelectronic devices into engineered tissues will provide a better way to monitor patient health from afar, as well as provide facile, more exact methods to control the healing process. 相似文献