首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   90篇
  免费   0篇
化学工业   5篇
轻工业   2篇
无线电   34篇
一般工业技术   4篇
冶金工业   6篇
自动化技术   39篇
  2022年   1篇
  2021年   1篇
  2020年   1篇
  2018年   2篇
  2017年   4篇
  2016年   2篇
  2015年   3篇
  2014年   3篇
  2013年   7篇
  2011年   1篇
  2010年   3篇
  2009年   3篇
  2008年   5篇
  2007年   3篇
  2006年   3篇
  2005年   4篇
  2004年   3篇
  2003年   4篇
  2002年   3篇
  2000年   2篇
  1999年   3篇
  1998年   6篇
  1997年   2篇
  1996年   4篇
  1994年   3篇
  1993年   3篇
  1992年   1篇
  1991年   4篇
  1990年   2篇
  1984年   2篇
  1983年   1篇
  1972年   1篇
排序方式: 共有90条查询结果,搜索用时 0 毫秒
31.
An efficient Media Access Control (MAC) protocol for wireless Internet access is developed in this study. The proposed access protocol exploits the fact that very often the Internet access messages, such as HTTP download requests, are based on short packets. In addition, whenever the user is able to access to multiple overlapping base stations (e.g., in WiMAX access networks, or in 3GPP cellular networks), the proposed protocol enables the user to select the least loaded base station. Consequently, the user gets a better quality of service, while load balancing is achieved by preferring links that are less loaded over congested links. The key idea is to adjust the access probability to the load on the local link, and to use a different access protocol for short messages. Delay insensitive and long messages are transmitted using a Request To Send (RTS) and Clear To Send (CTS) mechanism, in a similar way to IEEE 802.11, over hops that are able to support this protocol type, while short and delay-sensitive messages are transmitted using another method, that offers a reduced call delivery delay, as well as better channel utilization. Whenever the message length drops below a certain threshold (evaluated in this study), the overhead of transmitting an RTS and CTS messages becomes too large. The analysis in this study shows that this threshold is load-dependent. Whenever the message length drops below this load-dependent threshold, this study proposes to use a protocol which is more efficient for short messages transmissions, such as HTTP download requests, Short Message Service (SMS) messages, and signaling messages. The proposed MAC protocol is especially suitable for 3G and beyond cellular networks. Whenever there are number of channels that can be possibly used to deliver a message, it enables to select the least loaded channel among several channels.  相似文献   
32.
This paper deals with approximating feedback sets in directed graphs. We consider two related problems: the weighted feedback vertex set (FVS) problem, and the weighted feedback edge set (FES) problem. In the {FVS} (resp. FES) problem, one is given a directed graph with weights (each of which is at least one) on the vertices (resp. edges), and is asked to find a subset of vertices (resp. edges) with minimum total weight that intersects every directed cycle in the graph. These problems are among the classical NP-hard problems and have many applications. We also consider a generalization of these problems: subset-fvs and subset-fes, in which the feedback set has to intersect only a subset of the directed cycles in the graph. This subset consists of all the cycles that go through a distinguished input subset of vertices and edges, denoted by X . This generalization is also NP-hard even when |X|=2 . We present approximation algorithms for the subset-fvs and subset-fes problems. The first algorithm we present achieves an approximation factor of O(log 2 |X|) . The second algorithm achieves an approximation factor of O(min{log τ * log log τ * , log n log log n)} , where τ * is the value of the optimum fractional solution of the problem at hand, and n is the number of vertices in the graph. We also define a multicut problem in a special type of directed networks which we call circular networks, and show that the subset-fes and subset-fvs problems are equivalent to this multicut problem. Another contribution of our paper is a combinatorial algorithm that computes a (1+ɛ) approximation to the fractional optimal feedback vertex set. Computing the approximate solution is much simpler and more efficient than general linear programming methods. All of our algorithms use this approximate solution. Received May 31, 1995; revised June 11, 1996, and October 9, 1996.  相似文献   
33.
Max-flow in planar graphs has always been studied with the assumption that there are capacities only on the edges. Here we consider a more general version of the problem when the vertices as well as edges have capacity constraints. In the context of general graphs considering only edge capacities is not restrictive, since the vertex-capacity problem can be reduced to the edge-capacity problem. However, in the case of planar graphs this reduction does not maintainplanarity and cannot be used. We study different versions of the planar flow problem (all of which have been extensively investigated in the context of edge capacities).A preliminary version of this paper appeared in theProceedings of the First Integer Programming and Combinatorial Optimization Conference, Waterloo, Canada, May 1990, pp. 367–383. Samir Khuller is currently supported by NSF Grant CCR-8906949. Part of this research was done while he was visiting the IBM Thomas J. Watson Research Center and was supported by an IBM Graduate Fellowship at Cornell University. Joseph Naor's work was supported by Contract ONR N00014-88-K-0166 while he was a post-doctoral fellow in the Department of Computer Science at Stanford University.  相似文献   
34.
Applications of pyramid data structure to image compression and image filtering are described. The compression scheme fits visual perception models, and filtering is computationally faster than filtering in the frequency domain. Image normalization is also possible.  相似文献   
35.
36.
37.
38.
    
Transition metal oxides are complex electronic systems that exhibit a multitude of collective phenomena. Two archetypal examples are VO2 and NdNiO3, which undergo a metal–insulator phase transition (MIT), the origin of which is still under debate. Here this study reports the discovery of a memory effect in both systems, manifested through an increase of resistance at a specific temperature, which is set by reversing the temperature ramp from heating to cooling during the MIT. The characteristics of this ramp‐reversal memory effect do not coincide with any previously reported history or memory effects in manganites, electron‐glass or magnetic systems. From a broad range of experimental features, supported by theoretical modelling, it is found that the main ingredients for the effect to arise are the spatial phase separation of metallic and insulating regions during the MIT and the coupling of lattice strain to the local transition temperature of the phase transition. We conclude that the emergent memory effect originates from phase boundaries at the reversal temperature leaving “scars” in the underlying lattice structure, giving rise to a local increase in the transition temperature. The universality and robustness of the effect shed new light on the MIT in complex oxides.  相似文献   
39.
    
The key participants in G-protein-coupled receptor (GPCR) signaling are the mitogen-activated protein kinase (MAPK) signaling cascades. The mechanisms involved in the activation of the above cascades by GPCRs are not fully elucidated. The prototypical GPCR is the receptor for gonadotropin-releasing hormone (GnRHR), which serves as a key regulator of the reproductive system. Here, we expressed GnRHR in COS7 cells and found that GnRHR transmits its signals to MAPKs mainly via Gαi and the EGF receptor, without the involvement of Hb-EGF or PKCs. The main pathway that leads to JNK activation downstream of the EGF receptor involves a sequential activation of c-Src and PI3K. ERK activation by GnRHR is mediated by the EGF receptor, which activates Ras either directly or via c-Src. Beside the main pathway, the dissociated Gβγ and β-arrestin may initiate additional (albeit minor) pathways that lead to MAPK activation in the transfected COS7 cells. The pathways detected are significantly different from those in other GnRHR-bearing cells, indicating that GnRH can utilize various signaling mechanisms for MAPK activation. The unique pathway elucidated here, in which c-Src and PI3K are sequentially activated downstream of the EGF receptor, may serve as a prototype of signaling mechanisms by GnRHR and additional GPCRs in various cell types.  相似文献   
40.
Service providers rely on the management systems housed in their Network Operations Centers (NOCs) to remotely operate, monitor and provision their data networks. Lately there has been a tremendous increase in management traffic due to the growing complexity and size of the data networks and the services provisioned on them. Traffic engineering for management flows is essential for the smooth functioning of these networks to avoid congestion, which can result in loss of critical data such as billing records, network alarms, etc. As is the case with most intra-domain routing protocols, the management flows in many of these networks are routed on shortest paths connecting the NOC with the service provider’s POPs (points of presence). This collection of paths thus forms a “confluent” tree rooted at the gateway router connected to the NOC. The links close to the gateway router may form a bottleneck in this tree resulting in congestion. Typically this congestion is alleviated by adding layer two tunnels (virtual links) that offload the traffic from some links of this tree by routing it directly to the gateway router. The traffic engineering problem is then to minimize the number of virtual links needed for alleviating congestion. In this paper we formulate a traffic engineering problem motivated by the above mentioned applications. We show that the general versions of this problem are hard to solve. However, for some simpler cases in which the underlying network is a tree, we design efficient algorithms. In particular, we design fully polynomial-time approximate schemes (FPTAS) for different variants of this problem on trees. We use these algorithms as the basis for designing efficient heuristics for alleviating congestion in general (non-tree) service provider network topologies.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号