首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   134篇
  免费   4篇
电工技术   3篇
化学工业   33篇
机械仪表   2篇
建筑科学   2篇
能源动力   1篇
轻工业   14篇
水利工程   2篇
无线电   23篇
一般工业技术   12篇
冶金工业   8篇
自动化技术   38篇
  2023年   2篇
  2022年   7篇
  2021年   2篇
  2020年   2篇
  2019年   3篇
  2018年   2篇
  2017年   1篇
  2016年   7篇
  2015年   3篇
  2014年   3篇
  2013年   11篇
  2012年   9篇
  2011年   5篇
  2010年   5篇
  2009年   12篇
  2008年   9篇
  2007年   15篇
  2006年   6篇
  2005年   1篇
  2004年   5篇
  2003年   2篇
  2001年   2篇
  2000年   3篇
  1999年   3篇
  1998年   2篇
  1996年   3篇
  1995年   4篇
  1993年   3篇
  1991年   1篇
  1988年   1篇
  1982年   1篇
  1981年   1篇
  1979年   1篇
  1923年   1篇
排序方式: 共有138条查询结果,搜索用时 546 毫秒
11.
Cooperative defensive systems communicate and cooperate in their response to worm attacks, but determine the presence of a worm attack solely on local information. Distributed worm detection and immunization systems track suspicious behavior at multiple cooperating nodes to determine whether a worm attack is in progress. Earlier work has shown that cooperative systems can respond quickly to day-zero worms, while distributed detection systems allow detectors to be more conservative (i.e., paranoid) about potential attacks because they manage false alarms efficiently. In this paper we present our investigation into the complex tradeoffs in such systems between communication costs, computation overhead, accuracy of the local tests, estimation of viral virulence, and the fraction of the network infected before the attack crests. We evaluate the effectiveness of different system configurations in various simulations. Our experiments show that distributed algorithms are better able to balance effectiveness against worms and viruses with reduced cost in computation and communication when faced with false alarms. Furthermore, cooperative, distributed systems seem more robust against malicious participants in the immunization system than earlier cooperative but non-distributed approaches.  相似文献   
12.
The present work reports on the investigation of the effects of chemical poisoning of CexZr1?xO2 solids by phosphorous (P) on the kinetics of oxygen storage and release (OSR) of the thus derived P-contaminated solids, as a function of CexZr1?xO2 solid composition (x = 0.3, 0.5 and 0.7) for the first time. Phosphorous deposition on the surface of CexZr1?xO2 particles followed by calcination in air at 850 °C forms nano-crystals of CePO4, which lead to a drastic decrease in the population of surface and subsurface reactive and mobile oxygen species due to the formation of P–O–Ce bonding. The concentration (μmol/g) of exchangeable 16O in the solid with 18O from the gas phase was found to increase, and the degree of reduction in the Oxygen Storage Capacity (OSC) to decrease with increasing Ce content in the CexZr1?xO2 solid after P-poisoning. The increase in the Ce content of CexZr1?xO2 makes its OSR properties more resistant against P-poisoning due to the increasing number of poison-free Ce atoms, which are able to participate in the Ce3+ ? Ce4+ redox cycle.  相似文献   
13.
14.
The expansion of durability of deactivated “three-way” catalysts (TWCs) used in gasoline-driven cars by applying efficient, economically viable and environmentally friendly methods for the in␣situ regeneration of their performance to acceptable levels was investigated. New experimental results on the use of a weak oxalic acid washing solution as a means of an efficient regeneration method of a severely aged (83,000 km mileage) commercial TWC are presented. Oxalic acid is shown to be the most efficient extracting agent of phosphorus, a severe poison of TWCs, among acetic acid, citric acid, NTA and EDTA investigated. X-ray diffraction studies provided strong evidence that washing of the aged TWC results in the removal of CePO4, AlPO4 and (Mg,Ca,Zn)3(PO4)2 type phosphates leading to a significant increase of BET area and pore volume, as well as of CO and NO conversions (catalytic activity tests). The latter is strongly related with the increase in the number of active catalytic sites, as illustrated by in␣situ DRIFTS studies, after opening closed pores and uncovering additional catalyst surface.  相似文献   
15.
The author describes past research and future directions on instruction set randomization (ISR), a general technique for protecting against code-injection attacks. Such attacks are commonly encountered in a variety of application domains, remotely targeting program binaries, Web application and database backends, and Web browsers. Collectively, they represent the vast majority of reported attacks in bug- and incident-tracking repositories for the past decade, with no sign of abatement. ISR provides for a separation of code from data by randomizing the execution environment of legitimate code, which has to be suitably transformed using a key shared with the execution environment. This article describes the motivation behind ISR, the high-level concept, its use in two different application domains (binary code injection and SQL injection attacks), the author's findings and experiences (including several limitations, both of the technique and of prototypes), and future directions for improvements and application of ISR. Although he tries to provide broad coverage of the topic, the primary focus is on the research conducted at the Network Security Laboratory at Columbia.  相似文献   
16.
In future wireless networks multimedia applications are expected to finally dominate the overall traffic volume. Shared channels are more suitable for the transmission of this type of traffic, as they are able to periodically adjust their transmission rate. In this paper, we introduce a cross-layer framework for WCDMA based networks which aims to make the packet scheduling procedure more efficient. In addition to that, we further propose a traffic scheduling scheme which serves the connections not only according to their delay sensitivity, but also according to the predicted state of their wireless channel. The efficiency of the proposed scheme, in terms of average packet delay and channel utilization is verified via simulations.  相似文献   
17.
A challenge in network management and control is the ability to account for multi-domain requirements in the network planning process. Especially in Connection Oriented Networks where multi-domain path finding is a critical issue, networks need to be designed in such a manner as to restrict the possibility of erroneous inter-domain path selection. In this paper we propose per-domain topology design considerations that would leverage accurate disjoint path computations in a multi-domain environment, covering requirements of end-to-end path resiliency. In multi-domain environments state information between domains is heavily aggregated, hiding internal topology details dictated by scalability concerns, but also by restrictive domain administration policies for privacy, and security. Disjoint path finding is strongly affected by the aggregation techniques, since they do not provide information on path overlap. To handle this issue we introduce a metric, the Overlap Factor (OF), that quantifies path overlap in domains. The OF can be passed as an additional parameter of the inter-domain information exchange model to evaluate disjoint end-to-end paths. Alternatively, if domains were appropriately designed, this additional parameter might not be needed in evaluating resilient pairs of inter-domain paths. We based our recommended topology design algorithm on exploiting locally known OF values within the context of Genetic Algorithms. Extensive simulations confirm that domains designed using our proposed algorithm, result into accurate multi-domain disjoint path identification, with a high success ratio compared to networks that are designed without inter-domain considerations.  相似文献   
18.
Smart dust is envisaged as swarms of miniature communication/sensor devices useful for remote monitoring in space exploration. With diameters and densities comparable to sand particles the behaviour of passive dust will be identical to the movement of airborne sand. Here we examine algorithms for the adaptive shape change of smart dust modes that permits a change in drag coefficient depending on whether or not the random motion is in a favourable direction. Monte Carlo simulations are reported for swarms of smart dust devices transporting in the wind-dominated environment of the Martian landscape. It is concluded that relatively simple shape changing algorithms, activated through an electro-active polymer sheath, will permit self-organised transport over large distances.  相似文献   
19.
Supporting quality of service (QoS) over the Internet is a very important issue and many mechanisms have already been devised or are under way towards achieving this goal. One of the most important approaches is the so‐called Differentiated Services (DiffServ) architecture, which provides a scalable mechanism for QoS support in a TCP/IP network. The main concept underlying DiffServ is the aggregation of traffic flows at an ingress (or egress) point of a network and the marking of the IP packets of each traffic flow according to several classification criteria. Diffserv is classified under two taxonomies: the absolute and the relative. In absolute DiffServ architecture, an admission control scheme is utilized to provide QoS as absolute bounds of specific QoS parameters. The relative DiffServ model offers also QoS guarantees per class but in reference to the guarantees given to the other classes defined. In this paper, relative proportional delay differentiation is achieved based on class‐based queueing (CBQ) scheduler. Specifically, the service rates allocated to the classes of a CBQ scheduler are frequently adjusted in order to obtain relative delay spacing among them. The model presented can also be exploited in order to meet absolute delay constraints in conjunction with relative delay differentiation provision. Simulation experiments verify that our model can attain relative as well as absolute delay differentiation provided that the preconditions posed are satisfied. Copyright © 2004 John Wiley & Sons, Ltd.  相似文献   
20.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号