首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   316篇
  免费   27篇
  国内免费   13篇
综合类   9篇
化学工业   1篇
机械仪表   3篇
建筑科学   12篇
矿业工程   1篇
石油天然气   2篇
无线电   150篇
一般工业技术   3篇
自动化技术   175篇
  2025年   2篇
  2024年   2篇
  2022年   3篇
  2021年   5篇
  2020年   6篇
  2019年   3篇
  2018年   6篇
  2017年   8篇
  2016年   10篇
  2015年   11篇
  2014年   21篇
  2013年   21篇
  2012年   19篇
  2011年   26篇
  2010年   19篇
  2009年   19篇
  2008年   28篇
  2007年   22篇
  2006年   17篇
  2005年   16篇
  2004年   16篇
  2003年   15篇
  2002年   7篇
  2001年   7篇
  2000年   5篇
  1999年   8篇
  1998年   1篇
  1997年   3篇
  1996年   4篇
  1995年   5篇
  1994年   3篇
  1993年   4篇
  1992年   4篇
  1990年   3篇
  1989年   1篇
  1988年   3篇
  1986年   1篇
  1985年   1篇
  1981年   1篇
排序方式: 共有356条查询结果,搜索用时 0 毫秒
1.
It has recently been shown that authenticated Byzantine agreement, in which more than a third of the parties are corrupted, cannot be securely realized under concurrent or parallel (stateless) composition. This result puts into question any usage of authenticated Byzantine agreement in a setting where many executions take place. In particular, this is true for the whole body of work of secure multi-party protocols in the case that a third or more of the parties are corrupted. This is because these protocols strongly rely on the extensive use of a broadcast channel, which is in turn realized using authenticated Byzantine agreement. We remark that it was accepted folklore that the use of a broadcast channel (or authenticated Byzantine agreement) is actually essential for achieving meaningful secure multi-party computation whenever a third or more of the parties are corrupted. In this paper we show that this folklore is false. We present a mild relaxation of the definition of secure computation allowing abort. Our new definition captures all the central security issues of secure computation, including privacy, correctness and independence of inputs. However, the novelty of the definition is in decoupling the issue of agreement from these issues. We then show that this relaxation suffices for achieving secure computation in a point-to-point network. That is, we show that secure multi-party computation for this definition can be achieved for any number of corrupted parties and without a broadcast channel (or trusted pre-processing phase as required for running authenticated Byzantine agreement). Furthermore, this is achieved by just replacing the broadcast channel in known protocols with a very simple and efficient echo-broadcast protocol. An important corollary of our result is the ability to obtain multi-party protocols that remain secure under composition, without assuming a broadcast channel.  相似文献   
2.
The “fractional tree” algorithm for broadcasting and reduction is introduced. Its communication pattern interpolates between two well known patterns—sequential pipeline and pipelined binary tree. The speedup over the best of these simple methods can approach two for large systems and messages of intermediate size. For networks which are not very densely connected the new algorithm seems to be the best known method for the important case that each processor has only a single (possibly bidirectional) channel into the communication network.  相似文献   
3.
张留宛 《电子世界》2012,(18):57-58
通过分析校园智能公共广播系统的功能及构成,指出了常州工程职业技术学院智能公共广播系统改造升级的必要性,提出了一个以原有设备和线路为基础的改造升级的方案。  相似文献   
4.
针对频率广播机制在短波组网中的弊端,比较了多种解决方案,提出了一种基于频率分时复用和反向动态唤醒的短波台站频率广播策略,为短波组网项目提供一种短波频率广播机制的实现方案。  相似文献   
5.
The cdma2000 1xEV-DO mobile communication system provides broadcast and multicast services(BCMCS) to meet an increasing demand for multimedia data services.Single frequency network(SFN) is recognized as an effective way to improve the spectral efficiency of the BCMCS system.To improve the coverage and the data rate of the BCMCS users,an interference cancellation algorithm based on macro diversity is introduced in this paper.The performance of BCMCS in CDMA2000 EV-DO networks under the condition of SFN is evaluated.The simulation results show a significant improvement in bit error ratio(BER) while quantitatively validating the efficiency of our approach.  相似文献   
6.
杨保泉 《电讯技术》1990,30(1):65-77
本文较全面地分析了调频发射机各部分的原理、电路、测量、安装、使用及维修技术,既有理论分析,更注重电路实践。文中还收集了不同电路方案,有关国家标准,故障分析,判断及排除经验。  相似文献   
7.
For a complete network of n processors within which communication lines are private, we show how to achieve concurrently many Byzantine Agreements within constant expected time both on synchronous and asynchronous networks. As an immediate consequence, this provides a solution to the Interactive Consistency problem. Our algorithms tolerate up to (n-1)/3 faulty processors in both the synchronous and asynchronous cases and are therefore resilient-optimal. In terms of time complexity, our results improve a time bound of (for n concurrent agreements) which is immediately implied by the constant expected time Byzantine Agreement of Feldman and Micali (synchronous systems) and of Canetti and Rabin (asynchronous systems). In terms of resiliency, our results improve the resiliency bound of the constant time, -resilient algorithm of Ben-Or. An immediate application of our protocols is a constant expected time simulation of simultaneous broadcast channels over a network with private lines.Received: April 2001, Accepted: September 2002, Michael Ben-Or: Research supported by Israel Academy of Sciences and by United States - Israel Binational Science Foundation grant BSF-87-00082  相似文献   
8.
一种改进的监视Cache协议算法   总被引:2,自引:0,他引:2  
本文探讨SMP体系结构的多处理环境下,几种常见Cache一致性问题的解决方案,讨论和对比了各自的特色,在此基础上进行一步分析了基中的不足,并提出我们的方案--改进的监视Cache协议算法。  相似文献   
9.
By splitting a large broadcast message into segments and broadcasting the segments in a pipelined fashion, pipelined broadcast can achieve high performance in many systems. In this paper, we investigate techniques for efficient pipelined broadcast on clusters connected by multiple Ethernet switches. Specifically, we develop algorithms for computing various contention-free broadcast trees that are suitable for pipelined broadcast on Ethernet switched clusters, extend the parametrized LogP model for predicting appropriate segment sizes for pipelined broadcast, show that the segment sizes computed based on the model yield high performance, and evaluate various pipelined broadcast schemes through experimentation on Ethernet switched clusters with various topologies. The results demonstrate that our techniques are practical and efficient for contemporary fast Ethernet and Giga-bit Ethernet clusters.  相似文献   
10.
我国广播电视网络经营与产业化发展思考   总被引:1,自引:0,他引:1  
张鑫 《中国有线电视》2009,(12):1239-1242
分析国内广播电视信息网络发展的现状及存在的问题,有针对性地提出经营和产业发展战略:实现全国网络互联,完善产业组织结构,调整和理顺广电运营结构,客观地分析把握住现实业务和挖掘市场潜在需求,多渠道吸引投资资金,建立广泛的战略合作伙伴关系,才能促使中国广播电视网络的高速产业化发展。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号