全文获取类型
收费全文 | 27370篇 |
免费 | 3013篇 |
国内免费 | 2717篇 |
专业分类
电工技术 | 1825篇 |
技术理论 | 3篇 |
综合类 | 3420篇 |
化学工业 | 482篇 |
金属工艺 | 511篇 |
机械仪表 | 1420篇 |
建筑科学 | 1413篇 |
矿业工程 | 477篇 |
能源动力 | 201篇 |
轻工业 | 260篇 |
水利工程 | 405篇 |
石油天然气 | 335篇 |
武器工业 | 178篇 |
无线电 | 7296篇 |
一般工业技术 | 1443篇 |
冶金工业 | 609篇 |
原子能技术 | 34篇 |
自动化技术 | 12788篇 |
出版年
2024年 | 107篇 |
2023年 | 334篇 |
2022年 | 596篇 |
2021年 | 720篇 |
2020年 | 931篇 |
2019年 | 636篇 |
2018年 | 702篇 |
2017年 | 810篇 |
2016年 | 917篇 |
2015年 | 1122篇 |
2014年 | 2006篇 |
2013年 | 1948篇 |
2012年 | 2152篇 |
2011年 | 2155篇 |
2010年 | 1774篇 |
2009年 | 1838篇 |
2008年 | 2061篇 |
2007年 | 2265篇 |
2006年 | 1879篇 |
2005年 | 1801篇 |
2004年 | 1488篇 |
2003年 | 1238篇 |
2002年 | 926篇 |
2001年 | 772篇 |
2000年 | 529篇 |
1999年 | 339篇 |
1998年 | 242篇 |
1997年 | 196篇 |
1996年 | 165篇 |
1995年 | 143篇 |
1994年 | 102篇 |
1993年 | 45篇 |
1992年 | 32篇 |
1991年 | 20篇 |
1990年 | 20篇 |
1989年 | 15篇 |
1988年 | 12篇 |
1987年 | 7篇 |
1986年 | 7篇 |
1985年 | 6篇 |
1984年 | 4篇 |
1982年 | 4篇 |
1981年 | 6篇 |
1980年 | 6篇 |
1979年 | 2篇 |
1973年 | 3篇 |
1958年 | 2篇 |
1957年 | 2篇 |
1956年 | 2篇 |
1955年 | 2篇 |
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
141.
The mobile agent is a fundamental building block of the mobile computing paradigm. In mobile agent security, oblivious transfer
(OT) from a trusted party can be used to protect the agent’s privacy and the hosts’ privacy. In this paper, we introduce a
new cryptographic primitive called Verifiable Distributed Oblivious Transfer (VDOT), which allows us to replace a single trusted party with a group of threshold trusted servers. The design of VDOT uses a novel
technique called consistency verification of encrypted secret shares. VDOT protects the privacy of both the sender and the receiver against malicious attacks of the servers. We also show the
design of a system to apply VDOT to protect the privacy of mobile agents. Our design partitions an agent into the general
portion and the security-sensitive portion. We also implement the key components of our system. As far as we know, this is
the first effort to implement a system that protects the privacy of mobile agents. Our preliminary evaluation shows that protecting
mobile agents not only is possible, but also can be implemented efficiently.
This work was supported in part by the DoD University Research Initiative (URI) program administered by the Office of Naval
Research under grant N00014-01-1-0795. Sheng Zhong was supported by ONR grant N00014-01-1-0795 and NSF grants ANI-0207399
and CCR-TC-0208972. Yang Richard Yang was supported in part by NSF grant ANI-0207399. A preliminary version of this paper
was presented at the DialM-POMC Joint Workshop on Foundations of Mobile Computing in 2003.
Sheng Zhong received his Ph.D. in computer science from Yale University in the year of 2004. He holds an assistant professor position
at SUNY Buffalo and is currently on leave for postdoctoral research at the Center for Discrete Mathematics and Theoretical
Computer Science (DIMACS). His research interests, on the practical side, are security and incentives in data mining, databases,
and wireless networks. On the theoretical side, he is interested in cryptography and game theory.
Yang Richard Yang is an Assistant Professor of Computer Science at Yale University. His research interests include computer networks, mobile
computing, wireless networking, sensor networks, and network security. He leads the LAboratory of Networked Systems (LANS)
at Yale. His recent awards include a Schlumberger Fellowship and a CAREER Award from the National Science Foundation. He received
his B.E. degree from Tsinghua University (1993), and his M.S. and Ph.D. degrees from the University of Texas at Austin (1998
and 2001). 相似文献
142.
In a mobile ad hoc network, difficulties exist in supporting address autoconfiguration and naming resolution due to the lack of centralized servers. This letter presents a novel approach, called name‐based autoconfiguration (NBA), which uses host names to determine IP addresses and provides address autoconfiguration and name resolution as a single protocol. 相似文献
143.
144.
The broadband integrated services digital networks (B-ISDN) based on asynchronous transfer mode (ATM) technology can support
a wide range of applications such as voice, video, still images, and data. Compression techniques increase the effective bandwidth
utilization, but the bursty and asynchronous nature of the traffic can still lead to congestion in the network, and degradation
of image quality and quality of service (QOS). Some of the features to provide better coding schemes for ATM networks are
layered coding, resynchronization, buffering, interleaved schemes, constrained bit rate due to buffers, encapsulation with
the RTP or AAL1 for clock recovery, lapped transforms, motion compensation, and optimal bit allocation for coders based on
wavelet transforms. We review various techniques forimage and video coding such as transforms, motion compensation, vector
quantization, and subband coding. We outline the impact of the cell loss ratio (CLR), delay and cell delay variation (CDV)
on video coding: blocking effects, loss of frame synchronization, motion vectors, and vector quantization codewords. The open
problems include tuning coding parameters to the available QOS provided by the network. 相似文献
145.
146.
147.
介绍了863智能机器人型号之一-以核工业为应用背景的“勇士号”遥控移动式机器人的作业内容及其主要功能指标,分析了该型号的总体设计思想,同时概括总结了其操作性能,移动性能及计算机系统等方面的技术特点。 相似文献
148.
在对比分析了传统辅助水刹车与气控盘式辅助刹车的特性后,重点对气控盘式辅助刹车进行了数学分析,得到了该辅助刹车的制动扭矩取决于施加的气体压力,与钻具质量无关,冷却液的流量应同钻柱质量保持正比关系,可精确控制下钻速度并易于实现自动送钻功能。得出了气控盘式辅助刹车更适用于车载钻机的结论。 相似文献
149.
Joseph Dunn Michael Neufeld Anmol Sheth Dirk Grunwald John Bennett 《Mobile Networks and Applications》2006,11(1):37-45
Many companies, organizations and communities are providing wireless hotspots that provide networking access using 802.11b wireless networks. Since wireless networks are more sensitive to variations
in bandwidth and environmental interference than wired networks, most networks support a number of transmission rates that
have different error and bandwidth properties. Access points can communicate with multiple clients running at different rates,
but this leads to unfair bandwidth allocation. If an access point communicates with a mix of clients using both 1 Mb/s and
11 Mb/s transmission rates, the faster clients are effectively throttled to 1 Mb/s as well. This happens because the 802.11
MAC protocol approximate “station fairness”, with each station given an equal chance to access the media. We provide a solution
to provide “rate proportional fairness”, where the 11 Mb/s stations receive more bandwidth than the 1 Mb/s stations. Unlike
previous solutions to this problem, our mechanism is easy to implement, works with common operating systems and requires no
change to the MAC protocol or the stations.
Joseph Dunn received an M.S. in computer science from the University of Colorado at Boulder in 2003, and B. S. in coputer science and
mathematics from the University of Arizona in 2001. His research interests are in the general area of computer systems, primarily
focusing on security and scalability in distributed systems. He is currently working on his Ph.D. in computer science from
the University of Colorado at Boulder.
Michael Neufeld received a Ph.D. in Computer Science from the University of Colorado at Boulder in December of 2004, having previously received
an M.S. in Computer Science from the University of Colorado at Boulder in 2000 and an A.B. in Computer Science from Princeton
University in 1993. His research interests are in the general area of computer system, specifically concentrating on wireless
networking, software defind/cognitive radio, and streerable antennas. He is currently a postdoc in the Computer Science department
at the University of Calorado at Boulder pursuing research related to software defined radio and new MAC protocols for steerable
phase array antennas.
Anmol Sheth is a Ph.D. student in Computer Science at the University of Colorado at Boulder. He received his B.S. in Computer Science
from the University of Pune, India in 2001. He has been co-leading the development of the MANTIS operating system. He has
co-authored three papers include MAC layer protocol design, energy-efficient wireless communication, and adapting communications
to mobility.
Dirk Grunwald received his Ph.D. from the University of Illinois in 1989 and joined the University of Colorado the same year. His work
addresses research and teaching in the broad area of “computer systems”, which includes computer architecture, operating systems,
networks, and storage systems. His interests also include issues in pervasive computing, novel computing models, and enjoying
the mountains. He is currently an Associate Professor in the Department of Computer Science and in Electrical and Computer
Engineering and is also the Director of the Colorado Center for Information Storage.
John Bennett is a Professor of Computer Science with a joint appointment in Electrical and Computer Engineering at the University of Colorado
at Boulder. He also serves as Associate Dean for Education in the College of Engineering and Applied Science. He joined the
CU-Boulder faculty in 2000, after serving on the faculty of Rice University for 11 years. While at Rice, Bennett pioneered
a course in engineering design for both engineering and non-engineering students that has been emulated at several universities
and high schools. In addition to other teaching awards, Bennett received the Keck Foundation National Award for Engineering
Teaching Excellence for his work on this course. Bennett received his Ph.D. in 1988 from the University of Washington. Prior
to completing his doctoral studies, he was a U.S. Naval Officer for several years and founded and served as President of Pacific
Mountain Research, Inc., where he supervised the design and development of a number of commercial computing systems. Bennett's
primary research interests are broadly focused in the area of distributed systems, and more narrowly in distributed information
management and distributed robotic macrosensors. 相似文献
150.