全文获取类型
收费全文 | 1423篇 |
免费 | 99篇 |
国内免费 | 106篇 |
专业分类
电工技术 | 39篇 |
综合类 | 107篇 |
化学工业 | 18篇 |
金属工艺 | 9篇 |
机械仪表 | 23篇 |
建筑科学 | 32篇 |
矿业工程 | 8篇 |
能源动力 | 2篇 |
轻工业 | 8篇 |
水利工程 | 2篇 |
石油天然气 | 6篇 |
武器工业 | 5篇 |
无线电 | 683篇 |
一般工业技术 | 24篇 |
冶金工业 | 4篇 |
自动化技术 | 658篇 |
出版年
2024年 | 3篇 |
2023年 | 7篇 |
2022年 | 9篇 |
2021年 | 27篇 |
2020年 | 47篇 |
2019年 | 13篇 |
2018年 | 19篇 |
2017年 | 49篇 |
2016年 | 43篇 |
2015年 | 53篇 |
2014年 | 109篇 |
2013年 | 108篇 |
2012年 | 131篇 |
2011年 | 136篇 |
2010年 | 108篇 |
2009年 | 114篇 |
2008年 | 101篇 |
2007年 | 112篇 |
2006年 | 97篇 |
2005年 | 69篇 |
2004年 | 62篇 |
2003年 | 60篇 |
2002年 | 43篇 |
2001年 | 27篇 |
2000年 | 19篇 |
1999年 | 12篇 |
1998年 | 3篇 |
1997年 | 8篇 |
1996年 | 2篇 |
1995年 | 10篇 |
1994年 | 8篇 |
1992年 | 3篇 |
1991年 | 4篇 |
1990年 | 3篇 |
1988年 | 1篇 |
1985年 | 1篇 |
1984年 | 2篇 |
1983年 | 1篇 |
1981年 | 1篇 |
1980年 | 1篇 |
1977年 | 2篇 |
排序方式: 共有1628条查询结果,搜索用时 15 毫秒
31.
When implementing multivalued consensus using binary consensus, previous algorithms assume the availability of uniform reliable broadcast, which is not implementable in systems with fair-lossy links. In this paper, we show that with binary consensus we can implement uniform reliable broadcast directly in systems with fair-lossy links, and thus the separate assumption of the availability of uniform reliable broadcast is not necessary. We further prove that, when binary consensus instances are available only as black boxes, any implementation of uniform reliable broadcast in the fair-lossy link model requires the invocation of an infinite number of binary consensus instances even if no process ever broadcasts any messages, and this is true even when multivalued consensus is used. 相似文献
32.
Navid Aghdaie Author Vitae Yuval Tamir Author Vitae 《Journal of Systems and Software》2009,82(1):131-143
The Web is increasingly used for critical applications and services. We present a client-transparent mechanism, called CoRAL, that provides high reliability and availability for Web service. CoRAL provides fault tolerance even for requests being processed at the time of server failure. The scheme does not require deterministic servers and can thus handle dynamic content. CoRAL actively replicates the TCP connection state while maintaining logs of HTTP requests and replies. In the event of a primary server failure, active client connections fail over to a spare, where their processing continues seamlessly. We describe key aspects of the design and implementation as well as several performance optimizations. Measurements of system overhead, failover performance, and preliminary validation using fault injection are presented. 相似文献
33.
Michael?DeBoleEmail author Ramakrishnan?Krishnan Varsha?Balakrishnan Wenping?Wang Hong?Luo Yu?Wang Yuan?Xie Yu?Cao N.?Vijaykrishnan 《International journal of parallel programming》2009,37(4):417-431
Degradation of device parameters over the lifetime of a system is emerging as a significant threat to system reliability.
Among the aging mechanisms, wearout resulting from Negative Bias Temperature Instability (NBTI) is of particular concern in
deep submicron technology generations. While there has been significant effort at the device and circuit level to model and
characterize the impact of NBTI, the analysis of NBTI’s impact at the architectural level is still at its infancy. To facilitate
architectural level aging analysis, a tool capable of evaluating NBTI vulnerabilities early in the design cycle has been developed
that evaluates timing degradation due to NBTI. The tool includes workload-based temperature and performance degradation analysis
across a variety of technologies and operating conditions, revealing a complex interplay between factors influencing NBTI
timing degradation. 相似文献
34.
35.
36.
Identity based broadcast encryption allows a centralized transmitter to send encrypted messages to a set of identities S, so that only the users with identity in S can decrypt these ciphertexts using their respective private key. Recently [Information Processing Letters 109 (2009)], an identity-based broadcast encryption scheme was proposed (Ren and Gu, 2009) [1], and it was claimed to be fully chosen-ciphertext secure without random oracles. However, by giving a concrete attack, we indicate that this scheme is even not chosen-plaintext secure. 相似文献
37.
数据广播是无线环境中一种独特的数据发布方式。首先系统地归纳了周期广播、on-demand广播和混合广播3种广播方式的理论分析模型及其特点,然后针对单信道和多信道对各种广播方式的调度算法进行了分类、比较,并突出了理论模型对调度算法研究的指导价值。最后指出今后的研究方向。 相似文献
38.
组播错误控制技术 总被引:1,自引:0,他引:1
1.引言传统的点点通信(unicast)和广播通信(broadcast)是两种主要的通信方式,但随着Internet的日益普及、带宽的不断提高,利用IP组播技术在Internet上建立了虚拟的multicast backbone(Mbone),其上的点到多点通信的应用和各种工具也相继产生。人们可方便地在Mbone上举行远程视频会议,股票实时行情的分发,参与远程教育等。但可靠的组播协议的研究相对传统的点点协议而言,在错误控制、路由、流量控制、可伸缩性都具有其独有的特点,其复杂度也大得多。就错误控制和流量控制而言,传统的点点通信只涉及收发双 相似文献
39.
In the area of membrane computing, time-freeness has been defined as the ability for a timed membrane system to produce always
the same result, independently of the execution times associated to the rules. In this paper, we use a similar idea in the
framework of spiking neural P systems, a model inspired by the structure and the functioning of neural cells. In particular,
we introduce stochastic spiking neural P systems where the time of firing for an enabled spiking rule is probabilistically
chosen and we investigate when, and how, these probabilities can influence the ability of the systems to simulate, in a reliable
way, universal machines, such as register machines. 相似文献
40.