首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   2003篇
  免费   83篇
  国内免费   6篇
电工技术   23篇
综合类   5篇
化学工业   514篇
金属工艺   29篇
机械仪表   39篇
建筑科学   120篇
矿业工程   33篇
能源动力   37篇
轻工业   154篇
水利工程   29篇
石油天然气   4篇
无线电   136篇
一般工业技术   310篇
冶金工业   148篇
原子能技术   5篇
自动化技术   506篇
  2023年   23篇
  2022年   43篇
  2021年   61篇
  2020年   28篇
  2019年   26篇
  2018年   59篇
  2017年   51篇
  2016年   79篇
  2015年   69篇
  2014年   80篇
  2013年   95篇
  2012年   110篇
  2011年   134篇
  2010年   78篇
  2009年   117篇
  2008年   103篇
  2007年   89篇
  2006年   99篇
  2005年   69篇
  2004年   63篇
  2003年   46篇
  2002年   53篇
  2001年   31篇
  2000年   28篇
  1999年   36篇
  1998年   34篇
  1997年   36篇
  1996年   37篇
  1995年   38篇
  1994年   30篇
  1993年   20篇
  1992年   15篇
  1991年   17篇
  1990年   13篇
  1989年   6篇
  1988年   8篇
  1987年   14篇
  1985年   13篇
  1984年   12篇
  1983年   12篇
  1982年   5篇
  1981年   9篇
  1980年   9篇
  1979年   7篇
  1978年   11篇
  1977年   6篇
  1976年   14篇
  1975年   9篇
  1973年   4篇
  1971年   6篇
排序方式: 共有2092条查询结果,搜索用时 15 毫秒
71.
This paper is motivated by the observation that existing security models for direct anonymous attestation (DAA) have problems to the extent that insecure protocols may be deemed secure when analysed under these models. This is particularly disturbing as DAA is one of the few complex cryptographic protocols resulting from recent theoretical advances actually deployed in real life. Moreover, standardization bodies are currently looking into designing the next generation of such protocols. Our first contribution is to identify issues in existing models for DAA and explain how these errors allow for proving security of insecure protocols. These issues are exhibited in all deployed and proposed DAA protocols (although they can often be easily fixed). Our second contribution is a new security model for a class of “pre-DAA scheme”, that is, DAA schemes where the computation on the user side takes place entirely on the trusted platform. Our model captures more accurately than any previous model the security properties demanded from DAA by the trusted computing group (TCG), the group that maintains the DAA standard. Extending the model from pre-DAA to full DAA is only a matter of refining the trust models on the parties involved. Finally, we present a generic construction of a DAA protocol from new building blocks tailored for anonymous attestation. Some of them are new variations on established ideas and may be of independent interest. We give instantiations for these building blocks that yield a DAA scheme more efficient than the one currently deployed, and as efficient as the one about to be standardized by the TCG which has no valid security proof.  相似文献   
72.
Managing community content in mobile communities is challenging, since informal groups may emerge spontaneously whenever opportunities exist. To deal with group dynamics, encounter based community support systems can be a solution. In encounter networks, peers exchange content whenever they physically meet, i.e., whenever peers are near to each other. To assure content availability within the community network, content needs to be replicated (cached) and continuously updated. A?well known drawback of this scheme is the fact that the resource usage can be quite high. In this paper we present new caching strategies based on sociological knowledge, aiming at improving the overall content quality. We derive mobility and connectivity aware cache policies and simulate their benefit for knowledge building with urban life simulations. Results show that context precision and recall can be greatly improved in comparison to traditional cache strategies applied in the majority of encounter networks.  相似文献   
73.
74.
Multimedia Tools and Applications - Ubiquitous and networked sensors impose a huge challenge for privacy protection which has become an emerging problem of modern society. Protecting the privacy of...  相似文献   
75.
76.
BioPACE     
While developing the specifications for electronically enabled Machine Readable Travel Documents, the ICAO paid significant attention to security aspects related to the digital information stored in this type of electronic document. This has resulted in Passive and Active Authentication, Basic Access Control and Extended Access Control. The goal of Basic Access Control (BAC) is preventing unauthorized access to the chip data stored on eMRTDs. The PACE protocol has been developed as a future-proof method to overcome the limitations of BAC and to replace BAC in the future. In this paper the BioPACE protocol is proposed as a supplement to the PACE protocol. Besides verifying if the document holder is indeed the rightful owner, the BioPACE protocol provides a higher convenience for the bearer of the document.  相似文献   
77.
78.
The electrochemical properties of single-crystalline p-type 3C-SiC films on p-Si substrate were investigated as an electrode in H2SO4 aqueous solutions in dark and under white light illumination. The photoelectrochemical (PEC) measurements indicates the p-type 3C-SiC film on p-Si substrate can generate a cathodic photocurrent as a photocathode, which corresponds to hydrogen production, and generate an anodic photocurrent as a photoanode, which corresponds to oxygen evolution. The surface chemical states of the films were investigated by XPS. In order to observe the surface chemical state changes after PEC test, the range of applied potential to the electrode was divided into three zones: −3.6 to 0 V, 0–1.5 V and 1.5–4 V vs. Ag/AgCl. After separated PEC tests in these three areas, XPS shows the surface of the SiC film in the range of −3.6 to 0 V and 0–1.5 V was stable without oxidation except the band bending occurred. But in the range of 1.5–4 V the film surface was oxidized due to anodic oxidation.  相似文献   
79.
80.
Tetraphenylphosphonium modified layered silicate epoxy nanocomposite (EP/TPPMMT) combined with low‐melting silicate glass, Ceepree (CP) is investigated by thermal analysis, flammability tests and cone calorimeter at different heat fluxes. Adding CP and TPPMMT does not change the pyrolysis apart from increasing inorganic residue. The total heat evolved (THE) is changed insignificantly, as neither relevant additional carbonaceous charring nor flame inhibition occurs. However, flame retardancy is clearly observed due to an inorganic‐carbonaceous surface protection layer. The peak heat released rate (PHRR) is reduced by around 32–42% when 5 wt% TPPMMT is added, and 51–63% when 10 wt% CP is added. PHRR reduction less than expected is observed when both additives are combined. The reduction is greater than that achieved by using TPPMMT but less than when only CP is used. The morphology of fire residue is investigated by scanning electron microscope on different length scales and turns out to be the key to understanding the efficiency of flame retardancy. The fire residue of EP/CP shows a layered structure, whereas separated columns limit the barrier properties for EP/5%TPPMMT on the micrometer scale. Columns dominating the fire residue structure of EP/5%TPPMMT/10%CP deteriorate the fire retardancy, whereas a more integral structure at the top of the residue causes the improvement over EP/5%TPPMMT. POLYM. ENG. SCI., 2012. © 2011 Society of Plastics Engineers  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号