首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   322篇
  免费   20篇
电工技术   2篇
化学工业   32篇
金属工艺   1篇
机械仪表   6篇
建筑科学   10篇
矿业工程   1篇
能源动力   4篇
轻工业   13篇
水利工程   2篇
石油天然气   1篇
无线电   49篇
一般工业技术   73篇
冶金工业   34篇
自动化技术   114篇
  2023年   2篇
  2022年   4篇
  2021年   7篇
  2020年   10篇
  2019年   16篇
  2018年   11篇
  2017年   8篇
  2016年   13篇
  2015年   5篇
  2014年   12篇
  2013年   31篇
  2012年   21篇
  2011年   30篇
  2010年   25篇
  2009年   17篇
  2008年   15篇
  2007年   14篇
  2006年   19篇
  2005年   11篇
  2004年   7篇
  2003年   4篇
  2002年   2篇
  2001年   2篇
  2000年   4篇
  1999年   4篇
  1998年   7篇
  1997年   7篇
  1996年   6篇
  1995年   4篇
  1994年   1篇
  1993年   1篇
  1992年   2篇
  1991年   1篇
  1990年   1篇
  1988年   1篇
  1987年   2篇
  1985年   1篇
  1984年   1篇
  1983年   1篇
  1982年   2篇
  1981年   2篇
  1979年   1篇
  1978年   1篇
  1977年   1篇
  1975年   3篇
  1973年   1篇
  1972年   1篇
排序方式: 共有342条查询结果,搜索用时 15 毫秒
41.
Secure Distributed Key Generation for Discrete-Log Based Cryptosystems   总被引:4,自引:0,他引:4  
A Distributed Key Generation (DKG) protocol is an essential component of threshold cryptosystems required to initialize the cryptosystem securely and generate its private and public keys. In the case of discrete-log-based (dlog-based) threshold signature schemes (ElGamal and its derivatives), the DKG protocol is further used in the distributed signature generation phase to generate one-time signature randomizers (r = gk). In this paper we show that a widely used dlog-based DKG protocol suggested by Pedersen does not guarantee a uniformly random distribution of generated keys: we describe an efficient active attacker controlling a small number of parties which successfully biases the values of the generated keys away from uniform. We then present a new DKG protocol for the setting of dlog-based cryptosystems which we prove to satisfy the security requirements from DKG protocols and, in particular, it ensures a uniform distribution of the generated keys. The new protocol can be used as a secure replacement for the many applications of Pedersen's protocol. Motivated by the fact that the new DKG protocol incurs additional communication cost relative to Pedersen's original protocol, we investigate whether the latter can be used in specific applications which require relaxed security properties from the DKG protocol. We answer this question affirmatively by showing that Pedersen's protocol suffices for the secure implementation of certain threshold cryptosystems whose security can be reduced to the hardness of the discrete logarithm problem. In particular, we show Pedersen's DKG to be sufficient for the construction of a threshold Schnorr signature scheme. Finally, we observe an interesting trade-off between security (reductions), computation, and communication that arises when comparing Pedersen's DKG protocol with ours.  相似文献   
42.
43.
Measurements of particle deposition and mobilization in water-saturated porous columns were performed using nuclear magnetic resonance imaging (MRI). The use of MRI enabled the acquisition of detailed, noninvasive measurements that quantify spatial and temporal evolution of particle transport patterns and porosity changes due to particle deposition. Measurements indicate that for the considered particle sizes and flow conditions significant particle deposition occurs at some distance into the column. Because identification of unique parametrizations for processes of particle straining, deposition, and detachment is complex and nonunique, a simple phenomenological model of particle deposition and porosity reduction is suggested. This model captures the essential features of the experimental measurements on spatial and temporal flow and deposition patterns.  相似文献   
44.
45.
The effect of bicycle crank-length variation upon power performance   总被引:2,自引:0,他引:2  
O Inbar  R Dotan  T Trousil  Z Dvir 《Ergonomics》1983,26(12):1139-1146
  相似文献   
46.
Wireless ad hoc networks are characterized by several performance metrics, such as bandwidth, transport, delay, power, etc. These networks are examined by constructing a tree network. A core node is usually chosen to be the median or center of the multicast tree network with a tendency to minimize a performance metric, such as delay or transport. In this paper, we present a new efficient strategy for constructing and maintaining a core node in a multicast tree for wireless ad hoc networks undergoing dynamic changes, based on local information. The new core (centdian) function is defined by a convex combination signifying total transport and delay metrics. We provide two bounds of O(d) and O(d+l) time for maintaining the centdian using local updates, where l is the hop count between the new center and the new centdian, and d is the diameter of the tree network. We also show an O(n log n) time solution for finding the centdian in the Euclidian complete network. Finally, an extensive simulation for the construction algorithm and the maintenance algorithm is presented along with an interesting observation. Copyright © 2009 John Wiley & Sons, Ltd.  相似文献   
47.
48.
International Journal of Computer Vision - We identify two issues as key to developing effective face recognition systems: maximizing the appearance variations of training images and minimizing...  相似文献   
49.
50.
Replacement of the damaged scar tissue created by a myocardial infarction is the goal of cardiac tissue engineering. However, once the implanted tissue is in place, monitoring its function is difficult and involves indirect methods, while intervention necessarily requires an invasive procedure and available medical attention. To overcome this, methods of integrating electronic components into engineered tissues have been recently presented. These allow for remote monitoring of tissue function as well as intervention through stimulation and controlled drug release. Here, an improved hybrid microelectronic tissue construct capable of withstanding the dynamic environment of the beating heart without compromising electronic or mechanical functionality is reported. While the reported system is enabled to sense the function of the engineered tissue and provide stimulation for pacing, an electroactive polymer on the electronics enables it to release multiple drugs in parallel. It is envisioned that the integration of microelectronic devices into engineered tissues will provide a better way to monitor patient health from afar, as well as provide facile, more exact methods to control the healing process.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号