首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1332篇
  免费   91篇
  国内免费   63篇
电工技术   47篇
综合类   76篇
化学工业   14篇
金属工艺   2篇
机械仪表   21篇
建筑科学   5篇
能源动力   9篇
轻工业   13篇
水利工程   4篇
石油天然气   4篇
武器工业   7篇
无线电   387篇
一般工业技术   28篇
冶金工业   17篇
原子能技术   1篇
自动化技术   851篇
  2024年   1篇
  2023年   6篇
  2022年   14篇
  2021年   22篇
  2020年   12篇
  2019年   15篇
  2018年   10篇
  2017年   28篇
  2016年   16篇
  2015年   31篇
  2014年   56篇
  2013年   72篇
  2012年   62篇
  2011年   84篇
  2010年   50篇
  2009年   65篇
  2008年   107篇
  2007年   97篇
  2006年   124篇
  2005年   97篇
  2004年   70篇
  2003年   78篇
  2002年   59篇
  2001年   47篇
  2000年   35篇
  1999年   30篇
  1998年   34篇
  1997年   19篇
  1996年   27篇
  1995年   16篇
  1994年   8篇
  1993年   11篇
  1992年   8篇
  1991年   9篇
  1990年   5篇
  1989年   4篇
  1988年   7篇
  1987年   4篇
  1986年   4篇
  1985年   6篇
  1984年   14篇
  1983年   12篇
  1982年   9篇
  1964年   1篇
排序方式: 共有1486条查询结果,搜索用时 0 毫秒
31.
In this paper, we propose a verifiable (tn)-threshold multi-secret sharing scheme, based on one-dimensional cellular automata where the number of secrets is not restricted by n or t. We show that our scheme can be used to solve an open problem proposed recently in Alvarez et al. (2008) [G. Alvarez, L. Hernández Encinas, A. Martín del Rey, A multisecret sharing scheme for color images based on cellular automata, Information Sciences 178 (2008) 4382-4395].  相似文献   
32.
Recent advances in the development of optical technologies suggest the possible emergence of broadcast-based optical interconnects within cache-coherent distributed shared memory (DSM) multiprocessor architectures. It is well known that the cache-coherence protocol is a critical issue in designing such architectures because it directly affects memory latencies. In this paper, we evaluate via simulation the performance of three directory-based cache-coherence protocols; strict request-response, intervention forwarding and reply forwarding on the Simultaneous Optical Multiprocessor Exchange Bus (SOME-Bus), which is a low-latency and high-bandwidth broadcast-based fiber-optic interconnection network supporting DSM. The simulated system contains 64 nodes, each of which has a processor, a cache controller, a directory controller and an output channel. Simulations have been conducted for each protocol to measure average processor utilization, average network latency and average number of packets transferred over the network for varying values of the important DSM parameters such as the ratio of the mean channel service time to mean thread run time (T/R), probability of a cache block being in modified state {P(M)}, the fraction of write misses {P(W)} and home node contention rate. The results reveal that for all cases, except for low values of P(M), intervention forwarding gives the worst performance (lowest processor utilization and highest latency). The performance of strict request-response and reply forwarding is comparable for several values of the DSM parameters and contention rate. For a contention rate of 0%, the increase of P(M) makes reply forwarding perform better than strict request-response. The performance of all protocols decreases with the increase of P(W) and contention rate. However, the performance of strict request-response is the least affected among other protocols due to the negative impact of the increase of P(W) and contention rate. Therefore, for the full contention case (i.e. contention rate of 100%); for low values of P(M), or for mid values of P(M) and high values of P(W), strict request-response performs better than reply forwarding. These results are significant in the sense that they provide an insight to multiprocessor architecture designers for comparing the performance of different directory-based cache-coherence protocols on a broadcast-based interconnection network for different values of the DSM parameters and varying rates of contention.  相似文献   
33.
为增强数据的机密性,在对存储读写流程优化的基础上提出一种内核级加密文件系统(KCFS),该内核级加密文件系统能克服加密应用程序的使用不便利性和用户级加密文件系统的低效性,在内核级文件系统层提供加/解密功能,从而保护存储系统中的数据。对比测试结果表明,KCFS比用户级加密文件系统CFS具有更好的读写性能。  相似文献   
34.
无线传感器网络MAC协议的研究与分析   总被引:1,自引:0,他引:1       下载免费PDF全文
丁睿  南建国 《计算机工程》2009,35(19):105-107
针对不同的传感器网络应用,研究人员从不同方面提出多个无线传感器网络介质访问控制(MAC)协议,其中包括S-MAC,PMAC,DEANA,EMACs,Z—MAC以及AIMRP等协议。通过分析各类MAC典型协议特点,归纳其设计原则和分类方法,比较各协议间的性能差异,结果证明无线传感器网络MAC协议呈现多样性的特点,设计MAC协议需要兼顾能量效能和网络性能2个方面。给出MAC协议的设计策略。  相似文献   
35.
SAE J1939协议是重型车辆广泛采用的一种车载网络规范,它详细定义了大量的参数,通过对车上协议数据报文的分析就可以获取车辆重要电控单元的各项状态信息.针对整车厂车辆下线检测的需求,在J1939协议应用层的功能基础上,经过需求分析并使用PowerDesigner建模工具对J1939的参数数据库进行建模,建立具体数据库管理系统的物理数据库,并在此基础上利用CodeSmith代码生成工具以及.Nettiers模板来生成该数据库应用系统中数据访问层的.NET代码框架,实现车辆下线检测系统中对J1939协议参数的支持,最终完成设计.  相似文献   
36.
Wireless sensor networks (WSNs) are a kind of communication networks having independent sensor nodes that form multi-hop ad hoc network to transfer data. In the past few years, various transport control protocols in wireless sensor networks (WSNs) have been developed and proposed in the literature. In this paper, we have analyzed pump slowly, fetch quickly (PSFQ) protocol and presented an improved transport layer protocol for wireless sensor networks. The improved protocol has been analyzed based on various factors such as average latency and average error tolerance and it is found that the proposed protocol is better than PSFQ in terms of these factors.  相似文献   
37.
This paper presents a distributed architecture for the provision of seamless and responsive mobile multimedia services. This architecture allows its user applications to use concurrently all the wireless network interface cards (NICs) a mobile terminal is equipped with. In particular, as mobile multimedia services are usually implemented using the UDP protocol, our architecture enables the transmission of each UDP datagram through the “most suitable” (e.g. most responsive, least loaded) NIC among those available at the time a datagram is transmitted. We term this operating mode of our architecture Always Best Packet Switching (ABPS). ABPS enables the use of policies for load balancing and recovery purposes. In essence, the architecture we propose consists of the following two principal components: (i) a fixed proxy server, which acts as a relay for the mobile node and enables communications from/to this node regardless of possible firewalls and NAT systems, and (ii) a proxy client running in the mobile node responsible for maintaining a multi-path tunnel, constructed out of all the node's NICs, with the above mentioned fixed proxy server. We show how the architecture supports multimedia applications based on the SIP and RTP/RTCP protocols, and avoids the typical delays introduced by the two way message/response handshake of the SIP signaling protocol. Experimental results originated from the implementation of a VoIP application on top of the architecture we propose show the effectiveness of our approach.  相似文献   
38.
In this paper, we propose a novel Route Maintenance scheme for IEEE 802.11 wireless mesh networks. Despite lack of mobility and energy constraints, reactive routing protocols such as AODV and DSR suffer from frequent route breakages in 802.11 based infrastructure wireless mesh networks. In these networks, if any intermediate node fails to successfully transmit a packet to the next hop node after a certain number of retransmissions, the link layer reports a transmission problem to the network layer. Reactive routing protocols systematically consider this as a link breakage (and therefore a route breakage). Transmission failures can be caused by a number of factors e.g. interference or noise and can be transient in nature. Frequent route breakages result in significant performance degradation. The proposed mechanism considers multiple factors to differentiate between links with transient transmission problems from those links which have permanent transmission problems and takes a coherent decision on link breakage. The proposed mechanism is implemented in AODV for single-radio single-channel mesh network and an extension is incorporated in multi-radio multi-channel scenarios. Simulation results show substantial performance improvement compared to classical AODV and local route repair schemes.  相似文献   
39.
The scope of this paper is to review and evaluate all constant round Group Key Agreement (GKA) protocols proposed so far in the literature. We have gathered all GKA protocols that require 1,2,3,4 and 5 rounds and examined their efficiency. In particular, we calculated each protocol’s computation and communication complexity and using proper assessments we compared their total energy cost. The evaluation of all protocols, interesting on its own, can also serve as a reference point for future works and contribute to the establishment of new, more efficient constant round protocols.  相似文献   
40.
Developing self-stabilizing solutions is considered to be more challenging and complicated than developing classical solutions, where a proper initialization of the variables can be assumed. Hence, to ease the task of the developers, some automatic techniques have been proposed to design self-stabilizing algorithms. In this paper, we propose an automatic transformer for algorithms in an extended population protocol model. Population protocols is a model that was introduced recently for networks with a large number of resource-limited mobile agents. We use a variant of this model. First, we assume agents having characteristics (e.g., moving speed, communication radius) affecting their intercommunication “speed”, which is reflected by their cover times. Second, we assume the existence of a special agent with an unbounded memory, the base station. The automatic transformer takes as an input an algorithm solving a static problem (and meeting some additional rather natural requirements) and outputs a self-stabilizing algorithm for the same problem. The transformer is built using a re-execution approach (the technique consisting of executing an algorithm repeatedly in order to obtain its self-stabilizing version). We show that in the model we use, a transformer based on such an approach is impossible without the assumption of an unbounded memory agent.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号