全文获取类型
收费全文 | 184篇 |
免费 | 4篇 |
专业分类
化学工业 | 33篇 |
机械仪表 | 1篇 |
建筑科学 | 15篇 |
能源动力 | 7篇 |
轻工业 | 9篇 |
石油天然气 | 2篇 |
无线电 | 34篇 |
一般工业技术 | 24篇 |
冶金工业 | 25篇 |
原子能技术 | 1篇 |
自动化技术 | 37篇 |
出版年
2022年 | 2篇 |
2021年 | 3篇 |
2020年 | 2篇 |
2019年 | 2篇 |
2018年 | 4篇 |
2017年 | 4篇 |
2016年 | 6篇 |
2015年 | 3篇 |
2014年 | 2篇 |
2013年 | 10篇 |
2012年 | 8篇 |
2011年 | 8篇 |
2010年 | 7篇 |
2009年 | 7篇 |
2008年 | 6篇 |
2007年 | 7篇 |
2006年 | 6篇 |
2005年 | 5篇 |
2004年 | 9篇 |
2003年 | 3篇 |
2002年 | 5篇 |
2001年 | 5篇 |
2000年 | 1篇 |
1998年 | 11篇 |
1997年 | 9篇 |
1996年 | 2篇 |
1995年 | 3篇 |
1994年 | 2篇 |
1993年 | 3篇 |
1992年 | 1篇 |
1990年 | 1篇 |
1989年 | 2篇 |
1985年 | 1篇 |
1984年 | 2篇 |
1983年 | 5篇 |
1982年 | 6篇 |
1981年 | 1篇 |
1980年 | 1篇 |
1979年 | 1篇 |
1978年 | 1篇 |
1976年 | 1篇 |
1975年 | 2篇 |
1974年 | 3篇 |
1973年 | 2篇 |
1972年 | 5篇 |
1971年 | 1篇 |
1970年 | 4篇 |
1969年 | 2篇 |
1965年 | 1篇 |
排序方式: 共有188条查询结果,搜索用时 31 毫秒
131.
Yehuda T. Radday 《Language Resources and Evaluation》1970,5(2):65-73
In the eighth century B.C.E. there lived in Jerusalem a prophet of royal descent whose name was Isaiah ben Amoż. His oracles,
mostly in poetry, are concerned with the contemporary political scene dominated by the Assyrians, with the fate of the Jewish
people in history in general, with the mutual relationship between God and Man, and with the ultimate fate of Mankind in the
fullness of time. For Jews, these oracles are perhaps second in importance only to the Pentateuch. For Christians, they are
of greatest relevance because no other book influenced Jesus to the same extent. And for humanity they are so much the expression
of an idealistic Weltanschauungthat they are quoted wherever educators and statesmen try to imbue their audiences with the vision of, and the hope for, a
better world. They are collected in sixty-six chapters, constituting the first and longest book of the “Latter Prophets.”
The project was funded by the Technion and by the Israel Academy of Sciences and Humanities, Jerusalem. 相似文献
132.
This paper reviews the state-of-the-art of inspection techniques and technologies towards condition assessment of water distribution and transmission mains. Pipe condition assessment is the determination of its current condition, including structural health, impact on water quality, and hydraulic capacity. The collection and analysis of relevant data and information is the first and a paramount step to detect and monitor critical indicators to prevent or mitigate catastrophic failures. The technologies include conventional non-destructive inspection and advanced sensor techniques for condition monitoring. This paper focuses on the inspection techniques and technologies for structural deterioration of water pipes. Technologies like smart pipe, augmented reality, and intelligent robots are also briefly discussed and summarized. 相似文献
133.
We present session-key generation protocols in a model where the legitimate parties share only a human-memorizable password, and there is no additional set-up assumption in the network. Our protocol is proven secure
under the assumption that enhanced trapdoor permutations exist. The security guarantee holds with respect to probabilistic
polynomial-time adversaries that control the communication channel (between the parties), and may omit, insert, and modify
messages at their choice. Loosely speaking, the effect of such an adversary that attacks an execution of our protocol is comparable
with an attack in which an adversary is only allowed to make a constant number of queries of the form "is w the password of
Party A." We stress that the result holds also in case the passwords are selected at random from a small dictionary so that
it is feasible (for the adversary) to scan the entire directory. We note that prior to our result, it was not known whether
or not such protocols were attainable without the use of random oracles or additional set-up assumptions. 相似文献
134.
Christian Pérez-Jiménez Georges Jan Guigay Bjorn Karlsson Jonas Eliasson Andrej Horvat Yehuda Sinai Jean-Marc Franssen 《Fire Technology》2009,45(3):323-340
The phenomenon of backdraft is closely linked to the formation of a flammable region due to the mixing process between the unburned gases accumulated in the compartment and the fresh air entering the compartment through a recently created opening. The flow of incoming fresh air is called the gravity current. Gravity current prior to backdraft has already been studied, Fleischmann (1993, Backdraft phenomena, NIST-GCR-94-646. University of California, Berkeley) and Fleischmann (1999, Numerical and experimental gravity currents related to backdrafts, Fire Safety Journal); Weng et al. (2002, Exp Fluids 33:398–404), but all simulations and experiments found in the current literature are systematically based on a perfectly regular volume, usually parallelipedic in shape, without any piece of furniture or equipment in the compartment. Yet, various obstacles are normally found in real compartments and the question is whether they affect the gravity current velocity and the level of mixing between fresh and vitiated gases. In the work reported here, gravity current prior to backdraft in compartment with obstacles is investigated by means of three-dimensional CFD numerical simulations. These simulations use as a reference case the backdraft experiment test carried out by Gojkovic (2000, Initial Backdraft. Department of Fire Safety Engineering, Lunds Tekniska Högskola Universitet, Report 3121). The Froude number, the transit time and the ignition time are obtained from the computations and compared to the tests in order to validate the model. 相似文献
135.
Yehuda Lindell 《Journal of Cryptology》2009,22(3):395-428
Concurrent general composition relates to a setting where a secure protocol is run in a network concurrently with other, arbitrary protocols. Clearly, security
in such a setting is what is desired, or even needed, in modern computer networks where many different protocols are executed
concurrently. Canetti (FOCS 2001) introduced the notion of universal composability and showed that security under this definition is sufficient for achieving concurrent general composition. However, it is
not known whether or not the opposite direction also holds.
Our main result is a proof that security under concurrent general composition, when interpreted in the natural way under the
simulation paradigm, is equivalent to a variant of universal composability, where the only difference relates to the order
of quantifiers in the definition. (In newer versions of universal composability, these variants are equivalent.) An important
corollary of this theorem is that existing impossibility results for universal composability (for all its variants) are inherent
for definitions that imply security under concurrent general composition, as formulated here. In particular, there are large
classes of two-party functionalities for which it is impossible to obtain protocols (in the plain model) that remain secure under concurrent general composition. We stress that the impossibility
results obtained are not “black-box,” and apply even to non-black-box simulation.
Our main result also demonstrates that the definition of universal composability is somewhat “minimal” in that the composition
guarantee provided by universal composability implies the definition itself. This indicates that the security definition of
universal composability is not overly restrictive.
An extended abstract of this work appeared in the 44th FOCS, 2003.
Yehuda Lindell: Most of this work was carried out while the author was at the IBM T.J. Watson Research Center. 相似文献
136.
137.
Yehuda Lindell 《Journal of Cryptology》2008,21(2):200-249
In the setting of concurrent self composition, a single protocol is executed many times concurrently in a network. In this
paper, we prove lower bounds and impossibility results for secure protocols in this setting. First and foremost, we prove
that there exist large classes of functionalities that cannot be securely computed under concurrent self composition, by any protocol. We also prove a communication complexity lower bound on protocols that securely compute a large class of functionalities in this setting. Specifically, we show that
any protocol that computes a functionality from this class and remains secure for m concurrent executions, must have bandwidth of at least m bits. The above results are unconditional and hold for any type of simulation (i.e., even for non-black-box simulation).
In addition, we prove a severe lower bound on protocols that are proven secure using black-box simulation. Specifically, we
show that any protocol that computes the blind signature or oblivious transfer functionalities and remains secure for m concurrent executions, where security is proven via black-box simulation, must have at least m rounds of communication. Our results hold for the plain model, where no trusted setup phase is assumed. While proving our
impossibility results, we also show that for many functionalities, security under concurrent self composition (where a single secure protocol is run many times) is actually equivalent to the seemingly more stringent requirement
of security under concurrent general composition (where a secure protocol is run concurrently with other arbitrary protocols). This observation has significance
beyond the impossibility results that are derived by it for concurrent self composition.
This paper combines results that appeared in extended abstracts in Lindell (35th STOC, pp. 683–692, 2003; 1st Theory of Cryptography
Conference (TOC), LNCS, vol. 2951, pp. 203–222, 2004). 相似文献
138.
139.
Ben-Yishay Yehuda; Diller Leonard; Gerstman Louis; Gordon Wayne 《Canadian Metallurgical Quarterly》1970,75(3):248
To study the relationships between competence and ability to profit from cues, the effects of premorbid education on current test performances, and whether the ability to profit from cues is uniform across tasks in brain-damaged persons, 62 left hemiplegics were tested consecutively on the WAIS Block Design (BD) and Similarities (SIM) tests, under standard and specially designed cuing conditions. Results indicate that the ability to profit from cues is a linear function of competence levels in both tasks. In BD, premorbid education was unrelated to either competence or cues gain. In SIM, education correlated with current competence but not with cues. No relationship was found between ability to gain from cues across tasks. Some significant clinical and theoretical implications from the data are discussed. (37 ref.) (PsycINFO Database Record (c) 2010 APA, all rights reserved) 相似文献
140.
Ludwig A Leviatan Y 《Journal of the Optical Society of America. A, Optics, image science, and vision》2004,21(7):1334-1343
A novel method derived from the source-model technique is presented to solve the problem of scattering of an electromagnetic plane wave by a two-dimensional photonic crystal slab that contains an arbitrary defect (perturbation). In this method, the electromagnetic fields in the perturbed problem are expressed in terms of the field due to the periodic currents obtained from a solution of the corresponding unperturbed problem plus the field due to yet-to-be-determined correction current sources placed in the vicinity of the perturbation. Appropriate error measures are suggested, and a few representative structures are presented and analyzed to demonstrate the versatility of the proposed method and to provide physical insight into waveguiding and defect coupling mechanisms typical of finite-thickness photonic crystal slabs. 相似文献