全文获取类型
收费全文 | 210篇 |
免费 | 17篇 |
国内免费 | 2篇 |
专业分类
电工技术 | 1篇 |
化学工业 | 55篇 |
机械仪表 | 1篇 |
建筑科学 | 2篇 |
能源动力 | 9篇 |
轻工业 | 13篇 |
石油天然气 | 2篇 |
无线电 | 30篇 |
一般工业技术 | 44篇 |
冶金工业 | 6篇 |
原子能技术 | 10篇 |
自动化技术 | 56篇 |
出版年
2023年 | 4篇 |
2022年 | 15篇 |
2021年 | 9篇 |
2020年 | 5篇 |
2019年 | 5篇 |
2018年 | 5篇 |
2017年 | 13篇 |
2016年 | 12篇 |
2015年 | 11篇 |
2014年 | 3篇 |
2013年 | 10篇 |
2012年 | 9篇 |
2011年 | 25篇 |
2010年 | 15篇 |
2009年 | 14篇 |
2008年 | 15篇 |
2007年 | 9篇 |
2006年 | 5篇 |
2005年 | 6篇 |
2004年 | 1篇 |
2003年 | 4篇 |
2002年 | 3篇 |
2001年 | 2篇 |
2000年 | 2篇 |
1998年 | 3篇 |
1997年 | 3篇 |
1996年 | 1篇 |
1994年 | 1篇 |
1992年 | 3篇 |
1991年 | 2篇 |
1989年 | 2篇 |
1988年 | 1篇 |
1987年 | 1篇 |
1986年 | 1篇 |
1985年 | 1篇 |
1983年 | 2篇 |
1981年 | 3篇 |
1979年 | 1篇 |
1978年 | 1篇 |
1970年 | 1篇 |
排序方式: 共有229条查询结果,搜索用时 15 毫秒
161.
We consider the problem of time-constrained scheduling of packets in a communication network. Each packet has, in addition
to its source and its destination, a release time and a deadline. The goal of an algorithm is to maximize the number of packets
that arrive to their destinations by their respective deadlines, given the network constraints. 相似文献
162.
Many computers emit a high-pitched noise during operation, due to vibration in some of their electronic components. These acoustic emanations are more than a nuisance: They can convey information about the software running on the computer and, in particular, leak sensitive information about security-related computations. In a preliminary presentation (Eurocrypt’04 rump session), we have shown that different RSA keys induce different sound patterns, but it was not clear how to extract individual key bits. The main problem was the very low bandwidth of the acoustic side channel (under 20 kHz using common microphones, and a few hundred kHz using ultrasound microphones), and several orders of magnitude below the GHz-scale clock rates of the attacked computers. In this paper, we describe a new acoustic cryptanalysis key extraction attack, applicable to GnuPG’s implementation of RSA. The attack can extract full 4096-bit RSA decryption keys from laptop computers (of various models), within an hour, using the sound generated by the computer during the decryption of some chosen ciphertexts. We experimentally demonstrate such attacks, using a plain mobile phone placed next to the computer, or a more sensitive microphone placed 10 meters away. 相似文献
163.
164.
Yuval Emek Pierre Fraigniaud Amos Korman Adi Rosén 《Information Processing Letters》2010,110(24):1120-1123
We consider the Work Function Algorithm for the k-server problem (Chrobak and Larmore, 1991; Koutsoupias and Papadimitriou, 1995) [2] and [4]. We show that if the Work Function Algorithm is c-competitive, then it is also strictly(2c)-competitive. As a consequence of (Koutsoupias and Papadimitriou, 1995) [4] this also shows that the Work Function Algorithm is strictly (4k−2)-competitive. 相似文献
165.
Elena Andreeva Charles Bouillaguet Orr Dunkelman Pierre-Alain Fouque Jonathan Hoch John Kelsey Adi Shamir Sébastien Zimmer 《Journal of Cryptology》2016,29(4):657-696
In this work, we present several new generic second-preimage attacks on hash functions. Our first attack is based on the herding attack and applies to various Merkle–Damgård-based iterative hash functions. Compared to the previously known long-message second-preimage attacks, our attack offers more flexibility in choosing the second-preimage message at the cost of a small computational overhead. More concretely, our attack allows the adversary to replace only a few blocks in the original target message to obtain the second preimage. As a result, our new attack is applicable to constructions previously believed to be immune to such second-preimage attacks. Among others, these include the dithered hash proposal of Rivest, Shoup’s UOWHF, and the ROX constructions. In addition, we also suggest several time-memory-data tradeoff attack variants, allowing for a faster online phase, and even finding second preimages for shorter messages. We further extend our attack to sequences stronger than the ones suggested in Rivest’s proposal. To this end we introduce the kite generator as a new tool to attack any dithering sequence over a small alphabet. Additionally, we analyse the second-preimage security of the basic tree hash construction. Here we also propose several second-preimage attacks and their time-memory-data tradeoff variants. Finally, we show how both our new and the previous second-preimage attacks can be applied even more efficiently when multiple short messages, rather than a single long target message, are available. 相似文献
166.
This paper describes a computer graphics system that enables users to define virtual marionette puppets, operate them using relatively simple hardware input devices, and display the scene from a given viewpoint on the computer screen. This computerized marionette theater has the potential to become a computer game for children, an interaction tool over the Internet, enabling the creation of simultaneously viewed and operated marionette show by users on the World Wide Web, and, most importantly, a versatile and efficient professional animation system. 相似文献
167.
Modular Graphene‐Based 3D Covalent Networks: Functional Architectures for Energy Applications 下载免费PDF全文
Xiaoyan Zhang Artur Ciesielski Fanny Richard Pengkun Chen Eko Adi Prasetyanto Luisa De Cola Paolo Samorì 《Small (Weinheim an der Bergstrasse, Germany)》2016,12(8):1044-1052
The development of ordered graphene‐based materials combining high stability, large surface areas, ability to act as absorbent of relevant chemical species, and solution processability is of significance for energy applications. A poorly explored approach relies on the controlled nanostructuration of graphene into robust and highly ordered 3D networks as a route to further leverage the exceptional properties of this unique material. Here, a simple yet effective and scalable one‐step method is reported to prepare graphene‐based 3D covalent networks (G3DCNs) with tunable interlayer distance via controlled polymerization of benzidines with graphene oxide at different reaction temperatures under catalyst‐ and template‐free conditions. The reduced form of G3DCNs is used as electrodes in supercapacitors; it reveals a high specific capacitance of 156 F g?1 at a current density of 1 A g?1 in a two‐electrode configuration and 460 F g?1 at a current density of 0.5 A g?1 in a three‐electrode configuration, combined with an excellent cycling stability over 5000 cycles. The present study will promote the quantitative understanding of structure–property relationship, for the controlled fabrication of 3D graphene‐based multifunctional materials. 相似文献
168.
Riccardo Marega Eko Adi Prasetyanto Carine Michiels Luisa De Cola Davide Bonifazi 《Small (Weinheim an der Bergstrasse, Germany)》2016,12(39):5431-5441
Understanding the targeted cellular uptake of nanomaterials is an essential step to engineer and program functional and effective biomedical devices. In this respect, the targeting and ultrafast uptake of zeolite nanocrystals functionalized with Cetuximab antibodies (Ctxb) by cells overexpressing the epidermal growth factor receptor are described here. Biochemical assays show that the cellular uptake of the bioconjugate in the targeted cancer cells already begins 15 min after incubation, at a rate around tenfold faster than that observed in the negative control cells. These findings further show the role of Ctxb exposed at the surfaces of the zeolite nanocrystals in mediating the targeted and rapid cellular uptake. By using temperature and pharmacological inhibitors as modulators of the internalization pathways, the results univocally suggest a dissipative uptake mechanism of these nanomaterials, which seems to occur using different internalization pathways, according to the targeting properties of these nanocrystals. Owing to the ultrafast uptake process, harmless for the cell viability, these results further pave the way for the design of novel theranostic tools based on nanozeolites. 相似文献
169.
Adi?Karpel Giyora?Gur Ziv?Atzmon Wayne?D.?KaplanEmail author 《Journal of Materials Science》2007,42(7):2334-2346
In this study the interface morphology of a model 99.999% (5N) Au wire bonded to Al pads in the as-bonded state was examined
by scanning/transmission electron microscopy with energy dispersive spectroscopy. Specimens for transmission electron microscopy
were prepared using the lift-out method in a dual-beam focused ion beam system. Analysis of the bond microstructure was conducted
as a function of the Al pad content and as a function of the bonding temperature. Additions of Si and Cu to the Al pad affect
the morphology and the uniformity of the interface. A characteristic-void line is formed between two intermetallic regions
with different morphologies in the as-bonded samples. According to the morphological analysis it was concluded that a liquid
phase forms during the bonding stage, and the void-line formed in the intermetallic region is the result of shrinkage upon
solidification and not the Kirkendall effect. 相似文献
170.
Degradation of 1,1,1-trichloro-2,2-bis (4-chlorophenyl) ethane (DDT) by brown-rot fungi 总被引:1,自引:0,他引:1
Twelve species of brown-rot fungi (BRF) have been investigated for their ability to degrade 1,1,1-trichloro-2,2-bis (4-chlorophenyl) ethane (DDT). In potato dextrose broth (PDB) medium, Gloeophyllum trabeum, Fomitopsis pinicola and Daedalea dickinsii showed a high ability to degrade DDT. 1,1-Dichloro-2,2-bis (4-chlorophenyl) ethane (DDD), 1,1-dichloro-2,2-bis (4-chlorophenyl) ethylene (DDE) and 4,4-dichlorobenzophenone (DBP) were detected as metabolic products of DDT degradation by G. trabeum in PDB medium. The DDT degradation pathway in G. trabeum is proposed, which differs from the proposed pathways in bacteria and other fungi, particularly in the transformation of DDE to DDD. On the other hand, DBP was not detected as a metabolic product of DDT degradation in FeSO(4)-deficient cultures of G. trabeum, whereas DDE and DDD were detected, indicating the involvement of an iron-dependent reaction. Only DBP was detected from DDT, DDE and DDD degradation via a chemical Fenton reaction under conditions similar to those in G. trabeum cultures. These compounds may be directly transformed to DBP via a Fenton reaction. 相似文献