首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   27370篇
  免费   3013篇
  国内免费   2717篇
电工技术   1825篇
技术理论   3篇
综合类   3420篇
化学工业   482篇
金属工艺   511篇
机械仪表   1420篇
建筑科学   1413篇
矿业工程   477篇
能源动力   201篇
轻工业   260篇
水利工程   405篇
石油天然气   335篇
武器工业   178篇
无线电   7296篇
一般工业技术   1443篇
冶金工业   609篇
原子能技术   34篇
自动化技术   12788篇
  2024年   107篇
  2023年   334篇
  2022年   596篇
  2021年   720篇
  2020年   931篇
  2019年   636篇
  2018年   702篇
  2017年   810篇
  2016年   917篇
  2015年   1122篇
  2014年   2006篇
  2013年   1948篇
  2012年   2152篇
  2011年   2155篇
  2010年   1774篇
  2009年   1838篇
  2008年   2061篇
  2007年   2265篇
  2006年   1879篇
  2005年   1801篇
  2004年   1488篇
  2003年   1238篇
  2002年   926篇
  2001年   772篇
  2000年   529篇
  1999年   339篇
  1998年   242篇
  1997年   196篇
  1996年   165篇
  1995年   143篇
  1994年   102篇
  1993年   45篇
  1992年   32篇
  1991年   20篇
  1990年   20篇
  1989年   15篇
  1988年   12篇
  1987年   7篇
  1986年   7篇
  1985年   6篇
  1984年   4篇
  1982年   4篇
  1981年   6篇
  1980年   6篇
  1979年   2篇
  1973年   3篇
  1958年   2篇
  1957年   2篇
  1956年   2篇
  1955年   2篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
141.
Verifiable Distributed Oblivious Transfer and Mobile Agent Security   总被引:1,自引:0,他引:1  
The mobile agent is a fundamental building block of the mobile computing paradigm. In mobile agent security, oblivious transfer (OT) from a trusted party can be used to protect the agent’s privacy and the hosts’ privacy. In this paper, we introduce a new cryptographic primitive called Verifiable Distributed Oblivious Transfer (VDOT), which allows us to replace a single trusted party with a group of threshold trusted servers. The design of VDOT uses a novel technique called consistency verification of encrypted secret shares. VDOT protects the privacy of both the sender and the receiver against malicious attacks of the servers. We also show the design of a system to apply VDOT to protect the privacy of mobile agents. Our design partitions an agent into the general portion and the security-sensitive portion. We also implement the key components of our system. As far as we know, this is the first effort to implement a system that protects the privacy of mobile agents. Our preliminary evaluation shows that protecting mobile agents not only is possible, but also can be implemented efficiently. This work was supported in part by the DoD University Research Initiative (URI) program administered by the Office of Naval Research under grant N00014-01-1-0795. Sheng Zhong was supported by ONR grant N00014-01-1-0795 and NSF grants ANI-0207399 and CCR-TC-0208972. Yang Richard Yang was supported in part by NSF grant ANI-0207399. A preliminary version of this paper was presented at the DialM-POMC Joint Workshop on Foundations of Mobile Computing in 2003. Sheng Zhong received his Ph.D. in computer science from Yale University in the year of 2004. He holds an assistant professor position at SUNY Buffalo and is currently on leave for postdoctoral research at the Center for Discrete Mathematics and Theoretical Computer Science (DIMACS). His research interests, on the practical side, are security and incentives in data mining, databases, and wireless networks. On the theoretical side, he is interested in cryptography and game theory. Yang Richard Yang is an Assistant Professor of Computer Science at Yale University. His research interests include computer networks, mobile computing, wireless networking, sensor networks, and network security. He leads the LAboratory of Networked Systems (LANS) at Yale. His recent awards include a Schlumberger Fellowship and a CAREER Award from the National Science Foundation. He received his B.E. degree from Tsinghua University (1993), and his M.S. and Ph.D. degrees from the University of Texas at Austin (1998 and 2001).  相似文献   
142.
In a mobile ad hoc network, difficulties exist in supporting address autoconfiguration and naming resolution due to the lack of centralized servers. This letter presents a novel approach, called name‐based autoconfiguration (NBA), which uses host names to determine IP addresses and provides address autoconfiguration and name resolution as a single protocol.  相似文献   
143.
Ross.  AH Gilh.  KS 《电信科学》1996,12(3):6-17
本文主要讨论数字移动通信中扩频码分多址技术,阐明了CDMA体制的优越之外,分析了CDMA的关键技术,全面介绍了CDMA系统设计的基本原则和IS-95-A空中接口标准的含义。  相似文献   
144.
The broadband integrated services digital networks (B-ISDN) based on asynchronous transfer mode (ATM) technology can support a wide range of applications such as voice, video, still images, and data. Compression techniques increase the effective bandwidth utilization, but the bursty and asynchronous nature of the traffic can still lead to congestion in the network, and degradation of image quality and quality of service (QOS). Some of the features to provide better coding schemes for ATM networks are layered coding, resynchronization, buffering, interleaved schemes, constrained bit rate due to buffers, encapsulation with the RTP or AAL1 for clock recovery, lapped transforms, motion compensation, and optimal bit allocation for coders based on wavelet transforms. We review various techniques forimage and video coding such as transforms, motion compensation, vector quantization, and subband coding. We outline the impact of the cell loss ratio (CLR), delay and cell delay variation (CDV) on video coding: blocking effects, loss of frame synchronization, motion vectors, and vector quantization codewords. The open problems include tuning coding parameters to the available QOS provided by the network.  相似文献   
145.
近年来,随着ATM主干网络的建设和发展,研究ATM对现有通信业务的支持方式和适配技术是目前ATM技术研究的热点之一。话音ATM交换在降低话音通信成本和简化网络操作环境等方面提供了大量的技术手段,并且支持在单一网络环境中的多种综合业务传输。ATM论坛制定了电路仿真系列建议,话音ATM交换的技术已经基本成熟。文章通过对话音ATM交换在实现和优化方面的技术进行分析,并提出一种基于NativeModeATM的话音通信方式。  相似文献   
146.
147.
介绍了863智能机器人型号之一-以核工业为应用背景的“勇士号”遥控移动式机器人的作业内容及其主要功能指标,分析了该型号的总体设计思想,同时概括总结了其操作性能,移动性能及计算机系统等方面的技术特点。  相似文献   
148.
在对比分析了传统辅助水刹车与气控盘式辅助刹车的特性后,重点对气控盘式辅助刹车进行了数学分析,得到了该辅助刹车的制动扭矩取决于施加的气体压力,与钻具质量无关,冷却液的流量应同钻柱质量保持正比关系,可精确控制下钻速度并易于实现自动送钻功能。得出了气控盘式辅助刹车更适用于车载钻机的结论。  相似文献   
149.
A Practical Cross-Layer Mechanism For Fairness in 802.11 Networks   总被引:2,自引:0,他引:2  
Many companies, organizations and communities are providing wireless hotspots that provide networking access using 802.11b wireless networks. Since wireless networks are more sensitive to variations in bandwidth and environmental interference than wired networks, most networks support a number of transmission rates that have different error and bandwidth properties. Access points can communicate with multiple clients running at different rates, but this leads to unfair bandwidth allocation. If an access point communicates with a mix of clients using both 1 Mb/s and 11 Mb/s transmission rates, the faster clients are effectively throttled to 1 Mb/s as well. This happens because the 802.11 MAC protocol approximate “station fairness”, with each station given an equal chance to access the media. We provide a solution to provide “rate proportional fairness”, where the 11 Mb/s stations receive more bandwidth than the 1 Mb/s stations. Unlike previous solutions to this problem, our mechanism is easy to implement, works with common operating systems and requires no change to the MAC protocol or the stations. Joseph Dunn received an M.S. in computer science from the University of Colorado at Boulder in 2003, and B. S. in coputer science and mathematics from the University of Arizona in 2001. His research interests are in the general area of computer systems, primarily focusing on security and scalability in distributed systems. He is currently working on his Ph.D. in computer science from the University of Colorado at Boulder. Michael Neufeld received a Ph.D. in Computer Science from the University of Colorado at Boulder in December of 2004, having previously received an M.S. in Computer Science from the University of Colorado at Boulder in 2000 and an A.B. in Computer Science from Princeton University in 1993. His research interests are in the general area of computer system, specifically concentrating on wireless networking, software defind/cognitive radio, and streerable antennas. He is currently a postdoc in the Computer Science department at the University of Calorado at Boulder pursuing research related to software defined radio and new MAC protocols for steerable phase array antennas. Anmol Sheth is a Ph.D. student in Computer Science at the University of Colorado at Boulder. He received his B.S. in Computer Science from the University of Pune, India in 2001. He has been co-leading the development of the MANTIS operating system. He has co-authored three papers include MAC layer protocol design, energy-efficient wireless communication, and adapting communications to mobility. Dirk Grunwald received his Ph.D. from the University of Illinois in 1989 and joined the University of Colorado the same year. His work addresses research and teaching in the broad area of “computer systems”, which includes computer architecture, operating systems, networks, and storage systems. His interests also include issues in pervasive computing, novel computing models, and enjoying the mountains. He is currently an Associate Professor in the Department of Computer Science and in Electrical and Computer Engineering and is also the Director of the Colorado Center for Information Storage. John Bennett is a Professor of Computer Science with a joint appointment in Electrical and Computer Engineering at the University of Colorado at Boulder. He also serves as Associate Dean for Education in the College of Engineering and Applied Science. He joined the CU-Boulder faculty in 2000, after serving on the faculty of Rice University for 11 years. While at Rice, Bennett pioneered a course in engineering design for both engineering and non-engineering students that has been emulated at several universities and high schools. In addition to other teaching awards, Bennett received the Keck Foundation National Award for Engineering Teaching Excellence for his work on this course. Bennett received his Ph.D. in 1988 from the University of Washington. Prior to completing his doctoral studies, he was a U.S. Naval Officer for several years and founded and served as President of Pacific Mountain Research, Inc., where he supervised the design and development of a number of commercial computing systems. Bennett's primary research interests are broadly focused in the area of distributed systems, and more narrowly in distributed information management and distributed robotic macrosensors.  相似文献   
150.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号