全文获取类型
收费全文 | 134篇 |
免费 | 4篇 |
专业分类
电工技术 | 3篇 |
化学工业 | 33篇 |
机械仪表 | 2篇 |
建筑科学 | 2篇 |
能源动力 | 1篇 |
轻工业 | 14篇 |
水利工程 | 2篇 |
无线电 | 23篇 |
一般工业技术 | 12篇 |
冶金工业 | 8篇 |
自动化技术 | 38篇 |
出版年
2023年 | 2篇 |
2022年 | 7篇 |
2021年 | 2篇 |
2020年 | 2篇 |
2019年 | 3篇 |
2018年 | 2篇 |
2017年 | 1篇 |
2016年 | 7篇 |
2015年 | 3篇 |
2014年 | 3篇 |
2013年 | 11篇 |
2012年 | 9篇 |
2011年 | 5篇 |
2010年 | 5篇 |
2009年 | 12篇 |
2008年 | 9篇 |
2007年 | 15篇 |
2006年 | 6篇 |
2005年 | 1篇 |
2004年 | 5篇 |
2003年 | 2篇 |
2001年 | 2篇 |
2000年 | 3篇 |
1999年 | 3篇 |
1998年 | 2篇 |
1996年 | 3篇 |
1995年 | 4篇 |
1993年 | 3篇 |
1991年 | 1篇 |
1988年 | 1篇 |
1982年 | 1篇 |
1981年 | 1篇 |
1979年 | 1篇 |
1923年 | 1篇 |
排序方式: 共有138条查询结果,搜索用时 0 毫秒
131.
Trust management framework for intelligent agent negotiations in ubiquitous computing environments 总被引:1,自引:0,他引:1
Malamati Louta Angelos Michalas Ioannis Anagnostoupoulos Dimitrios Vergados 《Telecommunication Systems》2009,41(2):141-157
In dynamic ubiquitous computing environments, system entities may be classified into two main categories that are, in principle,
in conflict. These are the Service Resource Requestors (SRRs) wishing to use services and/or exploit resources offered by
the other system entities and the Service Resource Providers (SRPs) that offer the services/resources requested. Seeking for
the maximisation of their welfare, while achieving their own goals and aims, entities may misbehave (intentionally or unintentionally),
thus, leading to a significant deterioration of system’s performance. In this study, a reputation mechanism is proposed which
helps estimating SRPs trustworthiness and predicting their future behaviour, taking into account their past performance in
consistently satisfying SRRs’ expectations. Thereafter, under the assumption that a number of SRPs may handle the SRRs requests,
the SRRs may decide on the most appropriate SRP for the service/resource requested on the basis of a weighted combination
of the evaluation of the quality of their offer (performance related factor) and of their reputation rating (reliability related
factor). The proposed trust management framework is distributed, considers both first-hand information (acquired from the
SRR’s direct past experiences with the SRPs) and second-hand information (disseminated from other SRRs’ past experiences with
the SRPs), while it exhibits a robust behaviour against inaccurate reputation ratings. The designed mechanisms have been empirically
evaluated simulating interactions among self-interested agents, exhibiting improved performance with respect to random SRP
selection. 相似文献
132.
133.
Results of fluorescence quenching and electrical conductivity measurements in water-in-oil microemulsions were analyzed in terms of fractal models. It was found that for SDS/water/pentanol/alkane microemulsions there exists a connection between the fractal nature of the reaction domain and the magnitude of electrical conductivity. Conductivity values increase as the domain becomes less fractal. 相似文献
134.
Vouldis AT Kechribaris CN Maniatis TA Nikita KS Uzunoglu NK 《Journal of the Optical Society of America. A, Optics, image science, and vision》2005,22(7):1251-1262
The three dimensional (3-D) extension of the two well-known diffraction tomography algorithms, namely, direct Fourier interpolation (DFI) and filtered backpropagation (FBP), are presented and the problem of the data needed for a full 3-D reconstruction is investigated. These algorithms can be used efficiently to solve the inverse scattering problem for weak scatterers in the frequency domain under the first-order Born and Rytov approximations. Previous attempts of 3-D reconstruction with plane-wave illumination have used data obtained with the incident direction restricted at the xy plane. However, we show that this restriction results in the omission of the contribution of certain spatial frequencies near the omegaz axis for the final reconstruction. The effect of this omission is studied by comparing the results of reconstruction with and without data obtained from other incident directions that fill the spatial frequency domain. We conclude that the use of data obtained for incident direction in only the xy plane is sufficient to achieve a satisfactory quality of reconstruction for a class of objects presenting smooth variation along the z axis, while abrupt variations along the z axis cannot be imaged. This result should be taken into account in the process of designing the acquisition geometry of a tomography scanner. 相似文献
135.
The purpose of this article is to estimate the demand and supply relationships of the US petroleum market. By measuring the elasticities and cross-elasticities of demand, the relative responsiveness of changes in prices and income and the possibility of substitution of alternative energy resources for petroleum are determined. The demand for refined products is also estimated. Finally, through projection of the demand for, and the domestic supply and imports of crude petroleum under alternative assumptions, a measure of the magnitude of physical reserves and capital requirements is obtained for policies of self-sufficiency and free trade. 相似文献
136.
Georgios Kambourakis Denise-Penelope N. Kontoni Angelos Rouskas Stefanos Gritzalis 《Computers & Education》2007
While public key cryptography is continuously evolving and its installed base is growing significantly, recent research works examine its potential use in e-learning or m-learning environments. Public key infrastructure (PKI) and attribute certificates (ACs) can provide the appropriate framework to effectively support authentication and authorization services, offering mutual trust to both learners and service providers. Considering PKI requirements for online distance learning networks, this paper discusses the potential application of ACs in a proposed trust model. Typical e-learning trust interactions between e-learners and providers are presented, demonstrating that robust security mechanisms and effective trust control can be obtained and implemented. The application of ACs to support m-learning is also presented and evaluated through an experimental test-bed setup, using the general packet radio service network. The results showed that AC issuing is attainable in service times while simultaneously can deliver flexible and scalable solutions to both learners and e-learning providers. 相似文献
137.
Angelos A. Anastassi 《Neural computing & applications》2014,25(1):229-236
A methodology that can generate the optimal coefficients of a numerical method with the use of an artificial neural network is presented in this work. The network can be designed to produce a finite difference algorithm that solves a specific system of ordinary differential equations numerically. The case we are examining here concerns an explicit two-stage Runge–Kutta method for the numerical solution of the two-body problem. Following the implementation of the network, the latter is trained to obtain the optimal values for the coefficients of the Runge–Kutta method. The comparison of the new method to others that are well known in the literature proves its efficiency and demonstrates the capability of the network to provide efficient algorithms for specific problems. 相似文献
138.
Stelios Sidiroglou Angelos D. Keromytis 《International Journal of Information Security》2006,5(2):77-91
We examine the problem of containing buffer overflow attacks in a safe and efficient manner. Briefly, we automatically augment source code to dynamically catch stack and heap-based buffer overflow and underflow
attacks, and recover from them by allowing the program to continue execution. Our hypothesis is that we can treat each code
function as a transaction that can be aborted when an attack is detected, without affecting the application's ability to correctly
execute. Our approach allows us to enable selectively or disable components of this defensive mechanism in response to external
events, allowing for a direct tradeoff between security and performance. We combine our defensive mechanism with a honeypot-like
configuration to detect previously unknown attacks, automatically adapt an application's defensive posture at a negligible
performance cost, and help determine worm signatures. Our scheme provides low impact on application performance, the ability
to respond to attacks without human intervention, the capacity to handle previously unknown vulnerabilities, and the preservation
of service availability. We implement a stand-alone tool, DYBOC, which we use to instrument a number of vulnerable applications.
Our performance benchmarks indicate a slow-down of 20% for Apache in full-protection mode, and 1.2% with selective protection.
We provide preliminary evidence toward the validity of our transactional hypothesis via two experiments: first, by applying
our scheme to 17 vulnerable applications, successfully fixing 14 of them; second, by examining the behavior of Apache when
each of 154 potentially vulnerable routines are made to fail, resulting in correct behavior in 139 cases (90%), with similar
results for sshd (89%) and Bind (88%). 相似文献