首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   21786篇
  免费   1366篇
  国内免费   858篇
电工技术   333篇
技术理论   1篇
综合类   1572篇
化学工业   7447篇
金属工艺   531篇
机械仪表   332篇
建筑科学   1647篇
矿业工程   662篇
能源动力   176篇
轻工业   3223篇
水利工程   156篇
石油天然气   2389篇
武器工业   136篇
无线电   589篇
一般工业技术   1310篇
冶金工业   610篇
原子能技术   168篇
自动化技术   2728篇
  2024年   59篇
  2023年   134篇
  2022年   348篇
  2021年   371篇
  2020年   376篇
  2019年   289篇
  2018年   310篇
  2017年   482篇
  2016年   541篇
  2015年   565篇
  2014年   975篇
  2013年   962篇
  2012年   1366篇
  2011年   1453篇
  2010年   1020篇
  2009年   1143篇
  2008年   1039篇
  2007年   1614篇
  2006年   1587篇
  2005年   1567篇
  2004年   1325篇
  2003年   1230篇
  2002年   1046篇
  2001年   929篇
  2000年   727篇
  1999年   625篇
  1998年   478篇
  1997年   322篇
  1996年   257篇
  1995年   247篇
  1994年   181篇
  1993年   124篇
  1992年   93篇
  1991年   65篇
  1990年   55篇
  1989年   46篇
  1988年   16篇
  1987年   18篇
  1986年   9篇
  1985年   2篇
  1984年   3篇
  1983年   2篇
  1982年   1篇
  1981年   2篇
  1980年   2篇
  1979年   1篇
  1977年   1篇
  1976年   1篇
  1957年   1篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
211.
分析了移动代理技术具有的智能、平台无关、分布灵活、低数据流量和多代理合作等特点,探讨了移动代理技术应用于入侵检测系统中的优势.在系统设计中利用了移动代理的自主性和移动性弥补了入侵检测系统的缺陷、考虑到移动代理的安全性,提出了一个相关的安全性系统模型、  相似文献   
212.
随着网络和移动智能体技术的不断发展,如何在网络资源中找到自己需要的服务成为一个热门话题。描述以一种移动的多智能体系统,并且在进行系统底层通信、智能体在网络环境移动、智能体与服务器之间通信应用CORBA。服务器接受任务,派遣服务请求智能体在网络环境中寻找能为自己提供服务的服务器,完成向服务器预订服务任务。给出系统接受任务后派遣请求智能体的工作流程及服务器接受智能体访问的流程。  相似文献   
213.
The multi mobile agent collaboration planning model was constructed based on the mobile agent load balancing and total network energy consumption index.In order to prolong the network lifetime,the network node dormancy mechanism based on WSN network coverage was put forward,using fewer worked nodes to meet the requirements of network coverage.According to the multi mobile agent collaborative planning technical features,the multi-objective discrete social spider optimization algorithm (MDSSO) with Pareto optimal solutions was designed.The interpolation learning and exchange variations particle updating strategy was redefined,and the optimal set size was adjusted dynamically,which helps to improve the accuracy of MDSSO.Simulation results show that the proposed algorithm can quickly give the WSN multi mobile agent path planning scheme,and compared with other schemes,the network total energy consumption has reduced by 15%,and the network lifetime has increased by 23%.  相似文献   
214.
We propose in this paper a Hybrid Software‐Defined Networking‐based Geographical Routing Protocol (HSDN‐GRA) with a clustering approach. It takes into account three different criteria to select the best relay to send data: (1) the contact duration between vehicles, (2) the available load of each vehicle, (3) and the log of encountered communication errors embedded in each cluster head. The multi‐criteria strategy allows the selection of the most reliable vehicles by avoiding communication problems and ensuring connection availability. Once the hybrid control plane has found out the next eligible neighbor, the data plane will be in charge of dividing and sending data. To validate our approach, HSDN‐GRA has been modeled and implemented in JADE, a multi‐agent platform, to be compared to other multi‐agent based protocols. Simulation results show that HSDN‐GRA achieves good performance with respect to the average routing overhead, the packet drop rate, and the throughput.  相似文献   
215.
The recognition and inactivation of specific pathogenic bacteria remain an enormous scientific challenge and an important therapeutic goal. Therefore, materials that can selectively target and kill specific pathogenic bacteria, without harming beneficial strains are highly desirable. Here, a material platform is reported that exploits bacteria as a template to synthesize polymers with aggregation‐induced emission (AIE) characteristic by copper‐catalyzed atom transfer radical polymerization for self‐selective killing of the bacteria that templates them with no antimicrobial resistance. The bacteria‐templated polymers show very weak fluorescence in aqueous media, however, the fluorescence is turned on upon recognition of the bacteria used as the template to synthesize the polymer even at a low concentration of 600 ng mL?1. Moreover, the incorporated AIE fluorogens (AIEgens) can act as an efficient photosensitizer for reactive oxygen species (ROS) generation after bacteria surface binding, which endows the templated polymers with the capability for selective bacterial killing. The bacterium‐templated synthesis is generally applicable to a wide range of bacteria, including clinically isolated multidrug‐resistant bacterial strains. It is envisioned that the bacterium‐templated method provides a new strategy for bacteria‐specific diagnostic and therapeutic applications.  相似文献   
216.
ESB环境中基于代理的可信服务模型   总被引:1,自引:0,他引:1  
针对ESB环境下安全隐患的特定需求,提出了基于代理的可信服务模型.模型在ESB的节点上部署一个可信服务模型的代理,采用位运算计算服务的信任度,整合最可信的服务运行流程.在符合ESB规范以及不影响性能的前提下,可以提高系统运行的稳定性和安全性.在SynchroESB平台上的应用,证明该模型的可行性、正确性和健壮性.  相似文献   
217.
The popularity of grid services has widened their application to numerous domains and increased the utilization of computational resources. In order to create more incentives for the resources owners to lease their resources and prevent users from wasting the resources, the introduction of a market-oriented grid is inevitable. However, the issues for the negotiation between service provider and consumer over the supply and demand of resources can be complex, with highly interdependent issues. In this research, a simulated automated negotiation mechanism including a co-evolutionary mechanism and a modified game theory approach is proposed, to assist them in reaching an agreement over the conflicting issues. In the proposed architecture, the co-evolution process is able to reduce the multiple dimensional search space into a two-dimension search space and identify the appropriate negotiation strategies for the negotiating agents to form a payoff matrix which can be used for the game theory related stage of their interaction. The multiple stage negotiation process is introduced to improve the negotiation result. In this paper, an application which requires a large amount of computational resources to process the data generated from mobile devises is used to demonstrate that the proposed system is able to resolve the conflicts and obtain a valid solution.  相似文献   
218.
Verifiable Distributed Oblivious Transfer and Mobile Agent Security   总被引:1,自引:0,他引:1  
The mobile agent is a fundamental building block of the mobile computing paradigm. In mobile agent security, oblivious transfer (OT) from a trusted party can be used to protect the agent’s privacy and the hosts’ privacy. In this paper, we introduce a new cryptographic primitive called Verifiable Distributed Oblivious Transfer (VDOT), which allows us to replace a single trusted party with a group of threshold trusted servers. The design of VDOT uses a novel technique called consistency verification of encrypted secret shares. VDOT protects the privacy of both the sender and the receiver against malicious attacks of the servers. We also show the design of a system to apply VDOT to protect the privacy of mobile agents. Our design partitions an agent into the general portion and the security-sensitive portion. We also implement the key components of our system. As far as we know, this is the first effort to implement a system that protects the privacy of mobile agents. Our preliminary evaluation shows that protecting mobile agents not only is possible, but also can be implemented efficiently. This work was supported in part by the DoD University Research Initiative (URI) program administered by the Office of Naval Research under grant N00014-01-1-0795. Sheng Zhong was supported by ONR grant N00014-01-1-0795 and NSF grants ANI-0207399 and CCR-TC-0208972. Yang Richard Yang was supported in part by NSF grant ANI-0207399. A preliminary version of this paper was presented at the DialM-POMC Joint Workshop on Foundations of Mobile Computing in 2003. Sheng Zhong received his Ph.D. in computer science from Yale University in the year of 2004. He holds an assistant professor position at SUNY Buffalo and is currently on leave for postdoctoral research at the Center for Discrete Mathematics and Theoretical Computer Science (DIMACS). His research interests, on the practical side, are security and incentives in data mining, databases, and wireless networks. On the theoretical side, he is interested in cryptography and game theory. Yang Richard Yang is an Assistant Professor of Computer Science at Yale University. His research interests include computer networks, mobile computing, wireless networking, sensor networks, and network security. He leads the LAboratory of Networked Systems (LANS) at Yale. His recent awards include a Schlumberger Fellowship and a CAREER Award from the National Science Foundation. He received his B.E. degree from Tsinghua University (1993), and his M.S. and Ph.D. degrees from the University of Texas at Austin (1998 and 2001).  相似文献   
219.
基于移动代理和信任机制的网格作业管理   总被引:1,自引:1,他引:1  
介绍了网络计算环境下的作业管理,引入了移动代理技术和信任机制,并进行了深入分析,对所用到的关键技术进行了详细的解释,说明了基于移动代理和信任机制的网格作业管理运行步骤.  相似文献   
220.
丈章给出一种基于移动组的全序可靠多播协议-MGTOM(Mobile-group-based Totally Ordered Reliable Multicast)协议,借助于逻辑令牌环来实现.MGTOM协议实现了移动组多播的原子性和全序性,原子性用于保证多播消息能够最终传递到移动组内的所有移动Agent,全序性则保证任意一对多播消息都按照相同顺序被所有组内移动Agent传递.在多播算法中,为了保证原子性,所有收到多播消息的组成员必须回复,然后持有令牌的组成员作为Sequencer,对多播消息进行排序.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号