全文获取类型
收费全文 | 3193篇 |
免费 | 531篇 |
国内免费 | 585篇 |
专业分类
电工技术 | 176篇 |
综合类 | 325篇 |
化学工业 | 50篇 |
金属工艺 | 57篇 |
机械仪表 | 477篇 |
建筑科学 | 178篇 |
矿业工程 | 52篇 |
能源动力 | 21篇 |
轻工业 | 85篇 |
水利工程 | 37篇 |
石油天然气 | 13篇 |
武器工业 | 36篇 |
无线电 | 284篇 |
一般工业技术 | 270篇 |
冶金工业 | 54篇 |
原子能技术 | 2篇 |
自动化技术 | 2192篇 |
出版年
2024年 | 47篇 |
2023年 | 101篇 |
2022年 | 160篇 |
2021年 | 213篇 |
2020年 | 205篇 |
2019年 | 174篇 |
2018年 | 155篇 |
2017年 | 168篇 |
2016年 | 182篇 |
2015年 | 207篇 |
2014年 | 259篇 |
2013年 | 282篇 |
2012年 | 246篇 |
2011年 | 261篇 |
2010年 | 227篇 |
2009年 | 200篇 |
2008年 | 183篇 |
2007年 | 234篇 |
2006年 | 159篇 |
2005年 | 168篇 |
2004年 | 125篇 |
2003年 | 114篇 |
2002年 | 75篇 |
2001年 | 45篇 |
2000年 | 29篇 |
1999年 | 16篇 |
1998年 | 9篇 |
1997年 | 13篇 |
1996年 | 11篇 |
1995年 | 9篇 |
1994年 | 7篇 |
1993年 | 4篇 |
1992年 | 5篇 |
1991年 | 1篇 |
1990年 | 4篇 |
1989年 | 3篇 |
1988年 | 2篇 |
1987年 | 1篇 |
1986年 | 2篇 |
1985年 | 1篇 |
1980年 | 1篇 |
1955年 | 1篇 |
排序方式: 共有4309条查询结果,搜索用时 15 毫秒
31.
Tirthankar?GhoshEmail author Niki?Pissinou Kami?Sam?Makki 《Mobile Networks and Applications》2005,10(6):985-995
Designing a trusted and secure routing solution in an untrustworthy scenario is always a challenging problem. Lack of physical
security and low trust levels among nodes in an ad hoc network demands a secure end-to-end route free of any malicious entity.
This is particularly challenging when malicious nodes collude with one another to disrupt the network operation. In this paper
we have designed a secure routing solution to find an end-to-end route free of malicious nodes with collaborative effort from
the neighbors. We have also extended the solution to secure the network against colluding malicious nodes, which, to the best
of our knowledge, is the first such solution proposed. We have also proposed a framework for computing and distributing trusts
that can be used with out trusted routing protocol. Our proposed framework is unique and different from the other schemes
in that it tries to analyze the psychology of the attacker and quantifies the behavior in the computational model. Extensive
simulation has been carried out to evaluate the design of our protocol.
Partially funded by Department of Defense Award No. H98230-04-C-0460, Department of Transportation Project No. FL-26-7102-00
and National Science Foundation Grant Nos. ANI-0123950 and CCR-0196557.
Tirthankar Ghosh is a PhD candidate in the Telecommunications and Information Technology Institute at Florida International University. His
area of research is routing security and trust computation in wireless ad hoc and sensor networks. He received his Bachelor
of Electrical Engineering from Jadavpur University, India and Masters in Computer Engineering from Florida International University.
Dr. Niki Pissinou received her Ph.D. in Computer Science from the University of Southern California, her M.S. in Computer Science from the
University of California at Riverside, and her B.S.I.S.E. in Industrial and Systems Engineering from The Ohio State University.
She is currently a tenured professor and the director of the Telecommunication & Information Technology Institute at FIU.
Previously Dr. Pissinou was a tenured faculty at the Center for Advanced Computer Studies at the University of Louisiana at
Lafayette where she was also the director of the Telecommunication & Information & Technology Laboratory partially funded
by NASA, and the co-director of the NOMAD: A Wireless and Nomadic Laboratory partially funded by NSF, and the Advanced Network
Laboratory. Dr. Pissinou is active in the fields computer networks, information technology and distributed systems.
Dr. Kami (Sam) Makki has earned his Ph.D. in Computer Science from the University of Queensland in Brisbane Australia, his Masters degree in Computer
Science and Engineering from the University of New South Wales in Sydney Australia, and his Bachelor and Masters Degrees in
Civil Engineering from the University of Tehran Iran. Before joining the department of Electrical Engineering and Computer
Science at the University of Toledo he has held a number of academic positions and research appointments at the Queensland
University of Technology in Brisbane, Royal Melbourne Institution of Technology in Melbourne and at The University of Queensland
in Brisbane Australia. He is an active researcher in the fields of distributed systems, databases, mobile and wireless communications,
and has more than 30 publications in peerreviewed journals and international proceedings. He has served as a chair and technical
program committee member and reviewer for a number of IEEE and ACM sponsored technical conferences and has received a number
of achievement awards. 相似文献
32.
针对雷达研制过程中结构系统涉及到的刚强度、散热、流场模拟、模态、振动特性、疲劳寿命等仿真问题及其现状,提出了应用协同仿真技术来进行现有的仿真工具软件、数据、流程和人员整合,搭建一套协同的虚拟产品开发环境,并阐述了该协同仿真环境的内涵和详细功能需求.结合目前的技术水平,指出了该协同仿真环境应具备的基本功能,提出了可行的实施思路,给出了某典型产品的协同仿真流程,最后提出了通过协同仿真环境对仿真模型进行成熟度管理办法,实现仿真经验积累. 相似文献
33.
随着数字化、网络化和三维技术的发展,雷达的结构设计从传统的CAD/CAE向全三维数字化协同设计和仿真的方向发展。本文对舰栽雷达结构数字化样机的建设进行了探索。通过协同研发平台实现了雷达研制过程中过程、工具、数据、知识的一体化管理,提高了雷达结构设计效率和质量。 相似文献
34.
本文以我校电子信息工程专业本科人才培养为例,建立了以电子信息工程专业为基础的协同式多模式应用型本科人才培养体系。我们针对多种培养模式,积极探索并实践了课程体系改革,初步形成了适应区域经济社会发展的协同式人才培养新模式。 相似文献
35.
36.
The existing collaborative recommendation algorithms have lower robustness against shilling attacks.With this problem in mind,in this paper we propose a robust collaborative recommendation algorithm based on k-distance and Tukey M-estimator.Firstly,we propose a k-distancebased method to compute user suspicion degree(USD).The reliable neighbor model can be constructed through incorporating the user suspicion degree into user neighbor model.The influence of attack profiles on the recommendation results is reduced through adjusting similarities among users.Then,Tukey M-estimator is introduced to construct robust matrix factorization model,which can realize the robust estimation of user feature matrix and item feature matrix and reduce the influence of attack profiles on item feature matrix.Finally,a robust collaborative recommendation algorithm is devised by combining the reliable neighbor model and robust matrix factorization model.Experimental results show that the proposed algorithm outperforms the existing methods in terms of both recommendation accuracy and robustness. 相似文献
37.
基于Web的异地协同开发的质量控制系统.可以使参与产品研发的各种人员通过平台完成软件开发中质量管理工作.本文通过对异地协作开发的质量管理的分析,提出一种基于Web的协同设计平台的框架结构,并利用ASP.NET的WEB数据库访问技术可开发一个功能齐全、性能稳定的质量控制系统。 相似文献
38.
39.
40.