全文获取类型
收费全文 | 235篇 |
免费 | 8篇 |
专业分类
化学工业 | 72篇 |
金属工艺 | 1篇 |
机械仪表 | 3篇 |
建筑科学 | 2篇 |
轻工业 | 2篇 |
无线电 | 26篇 |
一般工业技术 | 54篇 |
冶金工业 | 15篇 |
原子能技术 | 12篇 |
自动化技术 | 56篇 |
出版年
2024年 | 1篇 |
2023年 | 1篇 |
2022年 | 3篇 |
2021年 | 7篇 |
2020年 | 8篇 |
2019年 | 5篇 |
2018年 | 12篇 |
2017年 | 5篇 |
2016年 | 7篇 |
2015年 | 6篇 |
2014年 | 10篇 |
2013年 | 9篇 |
2012年 | 7篇 |
2011年 | 12篇 |
2010年 | 12篇 |
2009年 | 7篇 |
2008年 | 10篇 |
2007年 | 10篇 |
2006年 | 10篇 |
2005年 | 13篇 |
2004年 | 7篇 |
2003年 | 3篇 |
2002年 | 8篇 |
2001年 | 3篇 |
2000年 | 3篇 |
1999年 | 7篇 |
1998年 | 3篇 |
1997年 | 4篇 |
1996年 | 3篇 |
1995年 | 3篇 |
1994年 | 1篇 |
1993年 | 4篇 |
1991年 | 3篇 |
1990年 | 4篇 |
1988年 | 2篇 |
1987年 | 5篇 |
1986年 | 5篇 |
1985年 | 2篇 |
1984年 | 8篇 |
1983年 | 2篇 |
1982年 | 2篇 |
1979年 | 2篇 |
1978年 | 1篇 |
1977年 | 1篇 |
1976年 | 1篇 |
1972年 | 1篇 |
排序方式: 共有243条查询结果,搜索用时 15 毫秒
61.
The slide attack, presented by Biryukov and Wagner, has already become a classical tool in cryptanalysis of block ciphers. While it was used to mount practical attacks on a few cryptosystems, its practical applicability is limited, as typically, its time complexity is lower bounded by \(2^n\) (where n is the block size). There are only a few known scenarios in which the slide attack performs better than the \(2^n\) bound. In this paper, we concentrate on efficient slide attacks, whose time complexity is less than \(2^n\). We present a number of new attacks that apply in scenarios in which previously known slide attacks are either inapplicable, or require at least \(2^n\) operations. In particular, we present the first known slide attack on a Feistel construction with a 3-round self-similarity, and an attack with practical time complexity of \(2^{40}\) on a 128-bit key variant of the GOST block cipher with unknown S-boxes. The best previously known attack on the same variant, with known S-boxes (by Courtois), has time complexity of \(2^{91}\). 相似文献
62.
Wireless Networks - The privacy-preserving data release is an increasingly important problem in today’s computing. As the end devices collect more and more data, reducing the amount of... 相似文献
63.
64.
The language FCP(:,?) is the outcome of attempts to integrate the best of several flat concurrent logic programming languages, including Flat GHC, FCP (↓, |) and Flat Concurrent Prolog, in a single consistent framework. FCP(:) is a subset of FCP(:, ?), which is a variant of FPP(↓, |) and employs concepts of the concurrent constraint framework of cc(↓, |). FCP(:, ?) is a language which is strong enough to accommodate all useful concurrent logic programming techniques, including those which rely on atomic test unification and read-only variables, yet incorporates the weaker languages mentioned as subsets. This allows the programmer to remain within a simple subset of the language such as Flat GHC when the full power of atomic unification or read-only variables is not needed. 相似文献
65.
We present an algorithm for real-time, robust, vision-based active tracking and pursuit. The algorithm was designed to overcome problems arising from active vision-based pursuit, such as target occlusion. Our method employs two layers to deal with occlusions of different lengths. The first layer is for short- or medium-term occlusions: those where a known method—such as mean shift combined with a Kalman filter—fails. For this layer we designed the hybrid filter for active pursuit (HAP). HAP utilizes a Kalman filter modified to respond to two different modes of action: one in which the target is positively identified and one in which the target identification is uncertain. For long-term occlusions we use the second layer. This layer is a decision algorithm that follows a learning procedure and is based on game theory-related reinforcement (Cesa-Bianchi and Lugosi, Prediction Learning and Games, 2006). The learning process is based on trial and error and is designed to perform adequately with a small number of samples. The algorithm produces a data structure that can be shared among agents or sent to a central control of a multi-agent system. The learning process is designed so that agents perform tasks according to their skills: an efficient agent will pursue targets while an inefficient agent will search for entering targets. These capacities make this system well suited for embedding in a multi-agent control system. 相似文献
66.
We had recently demonstrated that the diphenylalanine peptide, the core recognition motif of the Alzheimer's ß-amyloid polypeptide, self-assembles into a novel class of peptide nanotubes. The formation of well-ordered supramolecular structures at the nanoscale by such a simple peptide was consistent with our suggestion that aromatic interactions may provide order and directionality needed for the formation of fibrillar peptide structures. Yet, we could not rule out a contribution of the charged amine and carboxyl moieties at the termini of the short peptide. In order to explore the potential role of electrostatic interaction in the assembly process we have studied a modified non-charged peptide analogue, Ac-Phe–Phe-NH2, in which the N-terminal amine was acetylated and the C-terminal carboxyl was amidated. Scanning and transmission electron microscopy analyses demonstrated that this peptide analogue self-assembles into highly-ordered tubular structures, as observed with the NH2-Phe–Phe-COOH. Also, infrared spectroscopy revealed an amide I absorbance pattern that is very similar to that of the non-modified peptide. Furthermore, an amidated NH2-Phe–Phe-NH2 peptide, which has a net positive charge, also self-assembled into ordered tubular structures. On the other hand, the amine-modified analogues Boc-Phe–Phe-COOH, Z-Phe–Phe-COOH, and Fmoc-Phe–Phe-COOH peptides formed amyloid-like structures that had a significantly smaller diameter. Taken together, the current study further supports our hypothesis regarding the role of aromatic interactions in the self-assembly of amyloid fibrils and amyloid-associated nanostructures that can be modulated by simple chemical modifications. 相似文献
67.
68.
A variety of pattern formation phenomena in catalytic surface reactions can be attributed to the dynamics of interfaces, or fronts, separating distinct uniform states. The states may represent surface coverages by different adsorbates or in the case of forced oscillations, different phases of oscillation. The dynamics of fronts are strongly affected by front instabilities and by diffusion anisotropy. We identify two new pattern formation mechanisms associated with different front behaviors in orthogonal directions: an ordering process by which stationary labyrinths in an isotropic system evolve into ordered stationary stripes, and confinement of isotropic spatiotemporal chaos to one space dimension, a state we term stratified chaos. 相似文献
69.
70.