全文获取类型
收费全文 | 344篇 |
免费 | 15篇 |
国内免费 | 6篇 |
专业分类
电工技术 | 59篇 |
综合类 | 48篇 |
化学工业 | 2篇 |
金属工艺 | 2篇 |
机械仪表 | 3篇 |
建筑科学 | 7篇 |
矿业工程 | 2篇 |
能源动力 | 1篇 |
无线电 | 141篇 |
一般工业技术 | 10篇 |
冶金工业 | 8篇 |
自动化技术 | 82篇 |
出版年
2023年 | 1篇 |
2022年 | 1篇 |
2020年 | 1篇 |
2019年 | 2篇 |
2018年 | 1篇 |
2017年 | 3篇 |
2016年 | 2篇 |
2015年 | 3篇 |
2014年 | 13篇 |
2013年 | 26篇 |
2012年 | 18篇 |
2011年 | 17篇 |
2010年 | 20篇 |
2009年 | 21篇 |
2008年 | 15篇 |
2007年 | 12篇 |
2006年 | 14篇 |
2005年 | 16篇 |
2004年 | 14篇 |
2003年 | 28篇 |
2002年 | 27篇 |
2001年 | 23篇 |
2000年 | 13篇 |
1999年 | 20篇 |
1998年 | 10篇 |
1997年 | 8篇 |
1996年 | 10篇 |
1995年 | 7篇 |
1994年 | 4篇 |
1993年 | 2篇 |
1991年 | 2篇 |
1989年 | 1篇 |
1988年 | 1篇 |
1987年 | 2篇 |
1985年 | 2篇 |
1984年 | 2篇 |
1983年 | 1篇 |
1982年 | 1篇 |
1955年 | 1篇 |
排序方式: 共有365条查询结果,搜索用时 234 毫秒
81.
82.
Enzo Fortunato Mario Marchese Maurizio Mongelli Annamaria Raviola 《International Journal of Communication Systems》2004,17(10):935-962
The aim of this paper is to show the effect of the presence of specific management functions within a network that offers quality of service (QoS). The objective is not privileging a particular technology but to highlight the importance to know which control functions a solution may use, which performance limits the functions have and what can be a realistic user expectation. The paper focuses on the meaning of QoS and on the applications requiring quality, then describes QoS solutions including transport technologies, QoS‐oriented technologies, parameters and management functions. In more detail, the effect on QoS provision of the following issues is investigated and discussed concerning the possibility (or not) to aggregate and differentiate traffic, the implementation of call admission control and of traffic filtering to limit flows to their committed rates. Again, the conclusions should not be considered a merit mark about technology, but only an investigation about: what users and customers should expect by the technologies using specific control functions evidencing that the real limitations are not imposed by a specific technology, whose features may be changed and extended, but by the application of control functions that can guarantee requirements' matching. Copyright © 2004 John Wiley & Sons, Ltd. 相似文献
83.
The paper describes metaproject analysis, a new scenario method. It is a systemic methodological aid for decision making in midterm and long-term strategic planning. It uses advanced techniques of modelling and simulating stochastic project-planning networks. This methodological approach describes the evolution from present to future (towards the achievement of a preestablished goal, for example the market introduction of a new public service or system) as a multiagent and cooperative virtual project plan (metaproject). Such a metaproject must be formally translated into a metaproject network (scenario), assembling the significant activities of all the agents involved, which are supposedly cooperating. An example case study related to telecommunications and a home-banking service is presented. 相似文献
84.
85.
孟逢逢 《上海电力学院学报》2013,29(3):230-233
在分析电力线通信技术的基础上,指出了电力线通信用于信息家电联网所具有的明显优势.提出了基于电力线通信技术构建信息家电网络平台的设想,给出了网络系统结构模型,并详尽阐述了网内接口协议. 相似文献
86.
当车载自组网(Vehicular ad-hoc network,VANET)网络节点访问Internet获取服务时,传统的无线接入点因其覆盖范围有限和地理位置的局限性限制了VANET与Internet的无缝互连。基于OPNET仿真平台,本文扩展了传统的移动自组网网关,新网关支持与通用移动通信系统(Universal mobile telecommunications system,UMTS)核心网建立连接,形成混杂网络,使VANET网络中节点可以通过UMTS网络访问Internet,依托UMTS网络覆盖范围的优势,弥补VANET网络的不足。 相似文献
87.
Gideon Creech 《Information Security Journal: A Global Perspective》2017,26(3):105-120
Preventing software exploitation is an incredibly important goal for cyber security professionals, and huge amounts of time, effort, and money are devoted to this cause worldwide. A key stage of the exploitation process is gaining control of the execution flow of a target process so as to redirect it to the attacker’s illicit shellcode; most of the exploit mitigations currently in use are targeted at increasing the difficulty of this act. This article presents a new method for preventing control flow hijacking that provides a more robust defensive posture than existing options and is achieved by dereferencing function and return pointers to evaluate their contents rather than the extant approach of evaluating the pointers themselves. 相似文献
88.
张秦 《长沙通信职业技术学院学报》2009,8(2):16-20
文章对湖南省各地州市2006年的邮电业务发展情况进行综合评价,建立了评价指标体系,用因子分析法对原始数据进行数学处理。根据不同因子代表的业务类别对各市州进行排名,分析各市州在不同业务类别上的发展水平及发展优势,并针对这些特点就如何进一步提高湖南省邮电业务提出一点建议。 相似文献
89.
90.
Paula Carroll Seán McGarraghy 《International Transactions in Operational Research》2013,20(1):119-139
This paper describes the ring spur assignment problem (RSAP), a new problem arising in the design of next generation networks. The RSAP complements the sonet ring assignment problem (SRAP). We describe the RSAP, positioning it in relation to problems previously addressed in the literature. We decompose the problem into two IP problems and describe a branch‐and‐cut decomposition heuristic algorithm suitable for solving problem instances in a reasonable time. We present promising computational results. 相似文献