全文获取类型
收费全文 | 1351篇 |
免费 | 196篇 |
国内免费 | 171篇 |
专业分类
电工技术 | 161篇 |
综合类 | 165篇 |
化学工业 | 12篇 |
金属工艺 | 4篇 |
机械仪表 | 78篇 |
建筑科学 | 50篇 |
矿业工程 | 10篇 |
能源动力 | 30篇 |
轻工业 | 4篇 |
水利工程 | 35篇 |
石油天然气 | 6篇 |
武器工业 | 7篇 |
无线电 | 161篇 |
一般工业技术 | 72篇 |
冶金工业 | 66篇 |
自动化技术 | 857篇 |
出版年
2024年 | 17篇 |
2023年 | 28篇 |
2022年 | 32篇 |
2021年 | 34篇 |
2020年 | 41篇 |
2019年 | 28篇 |
2018年 | 36篇 |
2017年 | 30篇 |
2016年 | 54篇 |
2015年 | 53篇 |
2014年 | 81篇 |
2013年 | 86篇 |
2012年 | 106篇 |
2011年 | 123篇 |
2010年 | 98篇 |
2009年 | 145篇 |
2008年 | 121篇 |
2007年 | 135篇 |
2006年 | 93篇 |
2005年 | 96篇 |
2004年 | 69篇 |
2003年 | 52篇 |
2002年 | 54篇 |
2001年 | 31篇 |
2000年 | 17篇 |
1999年 | 12篇 |
1998年 | 12篇 |
1996年 | 7篇 |
1995年 | 7篇 |
1994年 | 2篇 |
1993年 | 4篇 |
1992年 | 3篇 |
1991年 | 4篇 |
1990年 | 1篇 |
1989年 | 2篇 |
1982年 | 1篇 |
1978年 | 1篇 |
1977年 | 1篇 |
1959年 | 1篇 |
排序方式: 共有1718条查询结果,搜索用时 15 毫秒
21.
In commercial networks, user nodes operating on batteries are assumed to be selfish to consume their resources (i.e., bandwidth and power) solely maximizing their own benefits (e.g., the received signal-to-noise ratios (SNRs) and datarates). In this paper, a cooperative game theoretical framework is proposed to jointly perform the bandwidth and power allocation for selfish cooperative relay networks. To ensure a fair and efficient resource sharing between two selfish user nodes, we assume that either node can act as a source as well as a potential relay for each other and either node is willing to seek cooperative relaying only if the datarate achieved through cooperation is not lower than that achieved through noncooperation (i.e., direct transmission) by consuming the same amount of bandwidth and power resource. Define the cooperative strategy of a node as the number of bandwidth and power that it is willing to contribute for relaying purpose. The two node joint bandwidth and power allocation (JBPA) problem can then be formulated as a cooperative game. Since the Nash bargaining solution (NBS) to the JBPA game (JBPAG) is computationally difficult to obtain, we divide it into two subgames, i.e., the bandwidth allocation game (BAG) and the power allocation game (PAG). We prove that both the subgames have unique NBS. And then the suboptimal NBS to the JBPAG can be achieved by solving the BAG and PAG sequentially. Simulation results show that the proposed cooperative game scheme is efficient in that the performance loss of the NBS result to that of the maximal overall data-rate scheme is small while the maximal-rate scheme is unfair. The simulation results also show that the NBS result is fair in that both nodes could experience better performance than they work independently and the degree of cooperation of a node only depends on how much contribution its partner can make to improve its own performance. 相似文献
22.
WSNs (wireless sensor networks) consist of thousands of tiny nodes having the capability of sensing, computation, and wireless communications. Unfortunately these devices are limited energy devices, that is means we must save energy as much as possible, to increase network life time as long as possible. In this paper we introduce NEER--normalized energy efficient routing protocol that increases network life time through switching between AODV protocol that depends on request-reply routing, and MRPC that depends on residual battery in routing. 相似文献
23.
In this paper, we propose a distributed agent model that applies belief-desire-intention (BDI) reasoning and negotiation for addressing the linear assignment problem (LAP) collaboratively. In resource allocation, LAP is viewed as seeking a concurrent allocation of one different resource for every task to optimize a linear sum objective function. The proposed model provides a basic agent-based foundation needed for efficient resource allocation in a distributed environment. A distributed agent algorithm that has been developed based on the BDI negotiation model is examined both analytically and experimentally. To improve performance in terms of average negotiation speed and solution quality, two initialization heuristics and two different reasoning control strategies are applied, with the latter yielding different variants of the basic algorithm. Extensive simulations suggest that all the heuristic-algorithm combinations can produce a near optimal solution soon enough in some specific sense. The significance and applicability of the research work are also discussed. 相似文献
24.
25.
程庆华 《数字社区&智能家居》2009,5(5):3466-3467
知识本体具有知识共享,再利用和规则推理的能力,基于知识本体构建协商Agent模型,使协商Agent与特定的协商语言.协商协议和协商议题分离,解决异构Agent之间协商问题。 相似文献
26.
Multi-Agent协商是目前研究的一个热点,而从底层开发出一个Multi-Agent协商系统是非常复杂和困难的。该文在研究JADE仿真平台技术的基础上,对基于JADE仿真平台的Multi-Agent协商进行了设计与实现,为研究Multi-Agent协商有着重要的意义。 相似文献
27.
广域网环境下,基于SNMP的远程集中管理可对中、大规模VPN网络实现高效安全的管理.为解决网管系统在拓扑发现方面存在的缺陷,提出了采用设备代理主动注册的解决办法.基于SNMPv3安全特性的分析,引入了公钥认证的机制,详细介绍了密钥协商的具体流程,较好地解决了网络管理协议在身份认证及加密传输方面的不足.针对基于无连接传输服务的SNMP数据传输无法保证其可靠性和实时性的不足,给出了基于XML的集中配置实现策略,实验结果表明了该策略的可行性和有效性. 相似文献
28.
服务质量QoS管理是满足分布式环境中端到端QoS需求的关键,而中间件是一种分布式系统中的主要交互平台.首先对中间件和QoS的相关概念进行介绍,在分析传统QoS管理模型的基础上,提出一种基于消息中间件(MOM)的QoS管理模型,重点分析多维QoS在该模型中的应用,最后结合一个实例说明多维QoS在实际系统中的应用. 相似文献
29.
30.
Jiangtao Li Ninghui Li XiaoFeng Wang Ting Yu 《International Journal of Information Security》2009,8(2):89-101
Trust management is an approach to scalable and flexible access control in decentralized systems. In trust management, a server
often needs to evaluate a chain of credentials submitted by a client; this requires the server to perform multiple expensive
digital signature verifications. In this paper, we study low-bandwidth Denial-of-Service (DoS) attacks that exploit the existence
of trust management systems to deplete server resources. Although the threat of DoS attacks has been studied for some application-level
protocols such as authentication protocols, we show that it is especially destructive for trust management systems. Exploiting
the delegation feature in trust management languages, an attacker can forge a long credential chain to force a server to consume
a large amount of computing resource. Using game theory as an analytic tool, we demonstrate that unprotected trust management
servers will easily fall prey to a witty attacker who moves smartly. We report our empirical study of existing trust management
systems, which manifests the gravity of this threat. We also propose a defense technique using credential caching, and show
that it is effective in the presence of intelligent attackers.
A preliminary version of this paper was presented at the Second IEEE International Conference on Security and Privacy in Communication
Networks, Baltimore, MD, USA, August 2006. 相似文献