全文获取类型
收费全文 | 2171篇 |
免费 | 250篇 |
国内免费 | 319篇 |
专业分类
电工技术 | 67篇 |
技术理论 | 1篇 |
综合类 | 137篇 |
化学工业 | 16篇 |
金属工艺 | 7篇 |
机械仪表 | 102篇 |
建筑科学 | 40篇 |
矿业工程 | 7篇 |
能源动力 | 36篇 |
轻工业 | 6篇 |
水利工程 | 3篇 |
石油天然气 | 3篇 |
武器工业 | 3篇 |
无线电 | 513篇 |
一般工业技术 | 23篇 |
冶金工业 | 6篇 |
原子能技术 | 4篇 |
自动化技术 | 1766篇 |
出版年
2024年 | 3篇 |
2023年 | 4篇 |
2022年 | 11篇 |
2021年 | 14篇 |
2020年 | 15篇 |
2019年 | 9篇 |
2018年 | 18篇 |
2017年 | 18篇 |
2016年 | 25篇 |
2015年 | 48篇 |
2014年 | 94篇 |
2013年 | 110篇 |
2012年 | 144篇 |
2011年 | 183篇 |
2010年 | 169篇 |
2009年 | 146篇 |
2008年 | 188篇 |
2007年 | 235篇 |
2006年 | 210篇 |
2005年 | 233篇 |
2004年 | 182篇 |
2003年 | 171篇 |
2002年 | 147篇 |
2001年 | 91篇 |
2000年 | 79篇 |
1999年 | 32篇 |
1998年 | 32篇 |
1997年 | 26篇 |
1996年 | 28篇 |
1995年 | 18篇 |
1994年 | 13篇 |
1993年 | 15篇 |
1992年 | 10篇 |
1991年 | 4篇 |
1990年 | 5篇 |
1988年 | 4篇 |
1987年 | 1篇 |
1986年 | 3篇 |
1984年 | 1篇 |
1981年 | 1篇 |
排序方式: 共有2740条查询结果,搜索用时 15 毫秒
71.
在国产自主可控平台加速推广的当下,为实现文件在测控数据传输网不同软硬件平台之间的可靠、快速传输,本文根据相关技术规范,基于文件交换协议(File Exchange Protocol,简称FXP协议),设计并实现功能完备、运行稳定的可靠文件传输软件。软件具备模块化、可移植、基于TCP协议满足用户可靠性需求、基于UDP协议满足用户传输效率需求、兼容不同软硬件平台等的功能特点,并具备满足安全编程需求的软件特性,立足核心代码设计、验证,对软件功能和稳定运行两个方面做了进一步的改良和提升,以满足跨不同软硬件平台稳定运行、恶劣网络环境中可靠传输、畅通网络环境中尽力快速传输的新要求。 相似文献
72.
Orphan detection in distributed systems is a well-researched field for which many solutions exist. These solutions exploit well defined parent-child relationships given in distributed systems. But they are not applicable in mobile agent systems, since no similar natural relationship between agents exist. Thus new protocols have to be developed. In this paper one such protocol for controlling mobile mobile agents and for orphan detection is presented. The shadow approach presented in this paper uses the idea of a placeholder (shadow) which is assigned by the agent system to each new agent. This defines an artificial relationship between agents and shadow. The shadow records the location of all dependent agents. Removing the root shadow implies that all dependent agents are declared orphan and are eventually be terminated. We introduce agent proxies that create a path from shadow to every agent. In an extension of the basic protocol we additionally allow the shadow to be mobile.The shadow approach can be used for termination of groups of agents even if the exact location of each single agent is not known. 相似文献
73.
Transmission Control Protocol (TCP) provides mechanisms for reliable data communications. Although it works well in wired networks, it fails to offer satisfactory performance in lossy and wireless environments. And in the multi-hop wireless infrastructure, packet delivery suffers high cumulative loss rate if traveling over multiple wireless hops. The Selective acknowledgment (SACK) is one header option that might be used to combat segment corruptions in air channels. In this paper, an alternative set of flow control mechanisms is proposed to handle high packet loss rate in a wireless medium. Using a measurement-based mechanism, sustainable segment delivery is achievable through a novel size-reduction method. Multiple segment retransmission mechanisms are introduced to reduce successive timeout events. One single byte loss is sufficient to waste all other bytes in a file received at a destination. That is, a good TCP flow control mechanism should provide a high successful file transmission completion rate, and this is set as our design goal. Through thorough simulations, our proposed multi-segment retransmission designs perform with higher successful file transfer rate and fewer timeout events than NewReno and SACK under a wide range of packet loss probabilities. 相似文献
74.
75.
Key agreement (KA) allows two or more users to negotiate a secret session key among them over an open network. Authenticated key agreement (AKA) is a KA protocol enhanced to prevent active attacks. AKA can be achieved using a public-key infrastructure (PKI) or identity-based cryptography. However, the former suffers from a heavy certificate management burden while the latter is subject to the so-called key escrow problem. Recently, certificateless cryptography was introduced to mitigate these limitations. In this paper, we first propose a security model for AKA protocols using certificateless cryptography. Following this model, we then propose a simulatable certificateless two-party AKA protocol. Security is proven under the standard computational Diffie-Hellman (CDH) and bilinear Diffie-Hellman (BDH) assumptions. Our protocol is efficient and practical, because it requires only one pairing operation and five multiplications by each party. 相似文献
76.
77.
78.
79.
80.