全文获取类型
收费全文 | 97篇 |
免费 | 4篇 |
国内免费 | 2篇 |
专业分类
电工技术 | 4篇 |
综合类 | 1篇 |
化学工业 | 8篇 |
金属工艺 | 1篇 |
机械仪表 | 5篇 |
建筑科学 | 8篇 |
矿业工程 | 2篇 |
能源动力 | 3篇 |
轻工业 | 1篇 |
水利工程 | 1篇 |
石油天然气 | 1篇 |
无线电 | 15篇 |
一般工业技术 | 13篇 |
冶金工业 | 1篇 |
自动化技术 | 39篇 |
出版年
2024年 | 1篇 |
2023年 | 11篇 |
2022年 | 6篇 |
2021年 | 4篇 |
2020年 | 8篇 |
2019年 | 2篇 |
2018年 | 3篇 |
2017年 | 8篇 |
2016年 | 3篇 |
2015年 | 3篇 |
2014年 | 4篇 |
2013年 | 1篇 |
2012年 | 3篇 |
2011年 | 6篇 |
2010年 | 5篇 |
2009年 | 3篇 |
2007年 | 4篇 |
2006年 | 4篇 |
2005年 | 2篇 |
2004年 | 2篇 |
2003年 | 3篇 |
2002年 | 2篇 |
2001年 | 1篇 |
2000年 | 3篇 |
1999年 | 1篇 |
1997年 | 2篇 |
1995年 | 1篇 |
1994年 | 2篇 |
1993年 | 1篇 |
1992年 | 1篇 |
1991年 | 1篇 |
1990年 | 2篇 |
排序方式: 共有103条查询结果,搜索用时 859 毫秒
101.
102.
Fog computing is a promising computing paradigm that brings computing resources close to end users at the edge of the network. Hence, it handles large-scale, geographically distributed, and latency-sensitive services. However, there are several security challenges that must be addressed due to the unreliable nature of this architecture. One can cite the verification of data integrity among the most critical issues in the context of fog computing. In fact, since data is often stored dynamically in a fully distributed manner, traditional solutions based on a centralized third-party auditor for integrity verification become unsuitable for such highly dynamic and distributed contexts. Indeed, the constant transfer of data to and from the central auditor results in high network latency and potential bottlenecks.Therefore, in this paper, we propose a new efficient public verification protocol that ensures the integrity of the data in fog computing architecture. Our solution protects data integrity and authenticity using the short integer solution problem (SIS) and identity-based signatures. Moreover, in order to legitimately modify the data, our protocol allows to distributively identify the data owners and to delegate their signatures to other entities in the architecture. Furthermore, it enables effective data integrity verification even when data is separately shared across several servers. This verification can be performed by any legitimate end user connected to the architecture, and without relying on any trusted third party. Finally, we prove that our protocol is highly efficient and outperforms existing solutions, as demonstrated by our extensive simulations and thorough security analysis that confirmed its security. 相似文献
103.
Antoine Picon 《Architectural Design》2010,80(3):94-99
In the concluding article of the main section of this issue, Antoine Picon evokes the earlier meaning of territory for administrators, architects and engineers, as lands that were integrated into nations or colonies by the early modern European countries. Picon traces how 18th- and 19th-century perceptions of territory with an emphasis on administrative separation fed into an attitude of both distance and sensitivity to landscape, as exemplified by the Romantic movement in painting and literature; a heritage that continued into the 20th century in architecture with its emphasis on rationalisation. Copyright © 2010 John Wiley & Sons, Ltd. 相似文献