全文获取类型
收费全文 | 782篇 |
免费 | 69篇 |
国内免费 | 62篇 |
专业分类
电工技术 | 21篇 |
综合类 | 104篇 |
化学工业 | 7篇 |
金属工艺 | 2篇 |
机械仪表 | 17篇 |
建筑科学 | 22篇 |
矿业工程 | 9篇 |
能源动力 | 2篇 |
轻工业 | 7篇 |
水利工程 | 4篇 |
石油天然气 | 2篇 |
无线电 | 109篇 |
一般工业技术 | 14篇 |
冶金工业 | 272篇 |
原子能技术 | 2篇 |
自动化技术 | 319篇 |
出版年
2023年 | 6篇 |
2022年 | 6篇 |
2021年 | 6篇 |
2020年 | 10篇 |
2019年 | 15篇 |
2018年 | 8篇 |
2017年 | 14篇 |
2016年 | 22篇 |
2015年 | 18篇 |
2014年 | 20篇 |
2013年 | 25篇 |
2012年 | 51篇 |
2011年 | 70篇 |
2010年 | 78篇 |
2009年 | 58篇 |
2008年 | 91篇 |
2007年 | 82篇 |
2006年 | 61篇 |
2005年 | 64篇 |
2004年 | 58篇 |
2003年 | 37篇 |
2002年 | 37篇 |
2001年 | 20篇 |
2000年 | 2篇 |
1999年 | 3篇 |
1997年 | 4篇 |
1996年 | 4篇 |
1995年 | 2篇 |
1994年 | 2篇 |
1988年 | 1篇 |
1987年 | 1篇 |
1986年 | 1篇 |
1985年 | 1篇 |
1984年 | 1篇 |
1983年 | 5篇 |
1982年 | 2篇 |
1981年 | 1篇 |
1979年 | 1篇 |
1970年 | 1篇 |
1968年 | 1篇 |
1965年 | 4篇 |
1964年 | 2篇 |
1963年 | 3篇 |
1962年 | 3篇 |
1961年 | 1篇 |
1959年 | 1篇 |
1957年 | 2篇 |
1956年 | 1篇 |
1955年 | 1篇 |
1954年 | 1篇 |
排序方式: 共有913条查询结果,搜索用时 21 毫秒
11.
对等网络(P2P)成为近年来的研究热点,如何进行高效准确的资源搜索是实现对等网络应用的关键问题。本文在分析Gnutella网络的基本泛洪算法存在问题的基础之上,介绍了现有的资源搜索改进方法,包括优化网络拓扑结构方法、改进转发机制方法、基于路由信息方法和基于缓存的方法。 相似文献
12.
Jinsuk Baek Paul S. Fisher Minho Jo Hsiao‐Hwa Chen 《International Journal of Communication Systems》2012,25(5):553-570
A new video transport protocol for multicast agents in wireless mesh networks (WMNs) is proposed in this paper. The proposed protocol enables a significant reduction in the transmission overhead, while providing reliable communication for its use in multicast applications. This proposed reliable protocol provides a practical approach for an overlay peer‐to‐peer multicast facility supported within the application layer. This obviates the need to give upgraded routers capable of handling multicast broadcasting or modify the existing protocol stack. The protocol tolerates partial losses in multimedia transmissions, while supporting control of the delay sensitivity of such transmissions in WMNs. The key issue in this protocol is the ability to detect packet loss, anticipate retransmission requests, and use the anticipated retransmission requests to transmit the lost packets prior to requests from other receiving agents. The proposed protocol allows for the receiver to determine if retransmission of lost packets is required, ensuring the greatest flexibility needed for a reliable multicast protocol. Copyright © 2009 John Wiley & Sons, Ltd. 相似文献
13.
Constandinos X. Mavromoustakis Helen D. Karatza 《International Journal of Communication Systems》2010,23(2):167-186
Wireless infrastructureless networks demand high resource availability with respect to the progressively decreasing energy consumption. A variety of new applications with different service requirements demand fairness to the service provision and classification, and reliability in an end‐to‐end manner. High‐priority packets are delivered within a hard time delay bound whereas improper power management in wireless networks can substantially degrade the throughput and increase the overall energy consumed. In this work a new scheme is being proposed and evaluated in real time using a state‐based layered oriented architecture for energy conservation (EC). The proposed scheme uses the node's self‐tuning scheme, where each node is assigned with a dissimilar sleep and wake time, based on traffic that is destined for each node. This approach is based on stream's characteristics with respect to different caching behavioral and storage‐capacity characteristics, and considers a model concerning the layered connectivity characteristics for enabling the EC mechanism. EC characteristics are modeled and through the designed tiered architecture the estimated metrics of the scheme can be bounded and tuned into certain regulated values. The real‐time evaluation results were extracted by using dynamically moving and statically located sensor nodes. A performance comparison is done with respect to different data traffic priority classifications following a real‐time asymmetrical transmission channel. Results have shown the scheme's efficiency in conserving energy while the topology configuration changes with time. Copyright © 2009 John Wiley & Sons, Ltd. 相似文献
14.
15.
16.
Nahid Amirazodi Ali Mohammad Saghiri Mohammad Reza Meybodi 《International Journal of Communication Systems》2021,34(1):e4661
Cognitive peer‐to‐peer networks are obtained from a combination of cognitive networking concepts and peer‐to‐peer networks. These networks are able to improve their performance while operating under dynamic and unknown environments. A cognitive peer‐to‐peer network tries to learn an appropriate configuration for itself considering the unknown physical properties of peers. Cognitive mobile peer‐to‐peer networks refer to cognitive peer‐to‐peer networks which are built over mobile ad hoc networks. In these networks, heterogeneity of the mobility of peers and resource limitation in wireless networks create challenges for network management algorithms. Because of the dynamicity of these networks, the management algorithms should be designated in self‐adaptive manner. In one type of these networks, some peers, called super‐peers, undertake to perform network managerial tasks. The mobility of peers leads to connection failure among peers and reselection of new super‐peers. Therefore, the selection of super‐peers, due to their influential role, requires an algorithm that considers the peers' mobility. Up to now, no self‐adaptive algorithm has been designated for super‐peer selection considering the mobility of peers in a self‐adaptive manner. This paper proposes M‐SSBLA, a self‐adaptive algorithm for super‐peer selection considering the mobility of peers based on learning automata. The proposed algorithm is obtained from cooperation between a learning automata‐based cognitive engine and MIS. MIS is a well‐known super‐peer selection algorithm in mobile peer‐to‐peer networks. We compared the proposed algorithm with recently reported algorithms, especially for a network with high mobility. Simulation results show that the proposed algorithm can cover maximum ordinary‐peer with a few super‐peer and improve robustness against super‐peer failures while decreasing maintenance overhead. 相似文献
17.
一种基于P2P的流媒体终端流量管理算法建模分析 总被引:2,自引:0,他引:2
基于P2P网络的流媒体技术可以向大规模用户群提供高质量、可交互的流媒体服务。本文以流媒体终端的功能模块为基础,探讨了一种P2P网络流媒体终端的分层结构模型,并着重对其中流管理模块中的节点自适应调整(peer adaptation)算法进行了建模分析,通过仿真对设计的模型算法及策略进行了对比验证,表明了同时采用所有策略的方式流量管理效果最好。 相似文献
18.
P2P电子商务环境下的动态安全信任管理模型 总被引:1,自引:0,他引:1
针对P2P电子商务中的信任评估问题,提出一种基于信任云的动态安全信任管理模型(TCDSTM).TCDSTM利用云理论来刻画信任及信任等级,然后给出具有抗攻击能力的全局信任度融合算法、节点的类型识别和拓扑重构机制.理论分析和仿真实验一致表明,TCDSTM小仅可以抵御共谋、振荡等恶意攻击,而且大大提高了交易成功率.此外,该模型具有较低的通信丌销. 相似文献
19.
提出一种基于双目标规划的P2P直播模型,综合考虑节点的动态性与异构性,并在实际系统中引入一种有效可行的QF(QoSFirst)节点选择算法,预先探测底层网络,根据节点的数据到达率和ISP拓扑划分选择节点。经实验证明,相比于同类算法,该算法能极大提高系统的平均流服务质量,减少网络负载。 相似文献
20.
Chi‐Jen Wu De‐Kai Liu Ren‐Hung Hwang 《International Journal of Communication Systems》2007,20(1):83-102
This work describes a novel location‐aware, self‐organizing, fault‐tolerant peer‐to‐peer (P2P) overlay network, referred to as Laptop. Network locality‐aware considerations are a very important metric for designing a P2P overlay network. Several network proximity schemes have been proposed to enhance the routing efficiency of existing DHT‐based overlay networks. However, these schemes have some drawbacks such as high overlay network and routing table maintenance overhead, or not being completely self‐organizing. As a result, they may result in poor scalability as the number of nodes in the system grows. Laptop constructs a location‐aware overlay network without pre‐determined landmarks and adopts a routing cache scheme to avoid maintaining the routing table periodically. In addition, Laptop significantly reduces the overlay maintenance overhead by making each node maintain only the connectivity between parent and itself. Mathematical analysis and simulations are conducted to evaluate the efficiency, scalability, and robustness of Laptop. Our mathematical analysis shows that the routing path length is bounded by logd N, and the joining and leaving overhead is bounded by d logd N, where N is the number of nodes in the system, and d is the maximum degree of each node on the overlay tree. Our simulation results show that the average latency stretch is 1.6 and the average routing path length is only about three in 10 000 Laptop nodes, and the maximum degree of a node is bounded by 32. Copyright © 2006 John Wiley & Sons, Ltd. 相似文献