全文获取类型
收费全文 | 265篇 |
免费 | 5篇 |
国内免费 | 1篇 |
专业分类
电工技术 | 3篇 |
化学工业 | 22篇 |
金属工艺 | 1篇 |
机械仪表 | 2篇 |
建筑科学 | 10篇 |
能源动力 | 4篇 |
轻工业 | 4篇 |
石油天然气 | 1篇 |
无线电 | 25篇 |
一般工业技术 | 61篇 |
冶金工业 | 29篇 |
自动化技术 | 109篇 |
出版年
2023年 | 1篇 |
2022年 | 2篇 |
2021年 | 6篇 |
2020年 | 8篇 |
2019年 | 3篇 |
2018年 | 6篇 |
2017年 | 3篇 |
2016年 | 6篇 |
2015年 | 2篇 |
2014年 | 5篇 |
2013年 | 9篇 |
2012年 | 14篇 |
2011年 | 13篇 |
2010年 | 16篇 |
2009年 | 9篇 |
2008年 | 20篇 |
2007年 | 15篇 |
2006年 | 19篇 |
2005年 | 4篇 |
2004年 | 6篇 |
2003年 | 9篇 |
2002年 | 6篇 |
2001年 | 3篇 |
2000年 | 6篇 |
1999年 | 4篇 |
1998年 | 9篇 |
1997年 | 4篇 |
1996年 | 3篇 |
1995年 | 9篇 |
1994年 | 6篇 |
1993年 | 7篇 |
1992年 | 2篇 |
1991年 | 7篇 |
1990年 | 3篇 |
1988年 | 1篇 |
1987年 | 4篇 |
1986年 | 4篇 |
1984年 | 2篇 |
1983年 | 1篇 |
1982年 | 2篇 |
1981年 | 4篇 |
1980年 | 2篇 |
1979年 | 1篇 |
1976年 | 2篇 |
1974年 | 1篇 |
1973年 | 1篇 |
1972年 | 1篇 |
排序方式: 共有271条查询结果,搜索用时 31 毫秒
1.
Oded Goldreich 《Distributed Computing》2003,16(2-3):177-199
We survey the paradigms, approaches and techniques used to conceptualize, define and provide solutions to natural cryptographic problems. We start by presenting some of the central tools (e.g., computational difficulty, pseudorandomness, and zero-knowledge proofs), and next turn to the treatment of encryption and signature schemes. We conclude with an extensive treatment of secure cryptographic protocols both when executed in a stand-alone manner and when many sessions of various protocols are concurrently executed and controlled by an adversary. The survey is intended for researchers in distributed computing, and assumes no prior familiarity with cryptography.Received: June 2001, Accepted: July 2002, 相似文献
2.
We say that a distribution over {0,1}n is (ε,k)-wise independent if its restriction to every k coordinates results in a distribution that is ε-close to the uniform distribution. A natural question regarding (ε,k)-wise independent distributions is how close they are to some k-wise independent distribution. We show that there exist (ε,k)-wise independent distributions whose statistical distance is at least nO(k)·ε from any k-wise independent distribution. In addition, we show that for any (ε,k)-wise independent distribution there exists some k-wise independent distribution, whose statistical distance is nO(k)·ε. 相似文献
3.
Texture mapping is a frequently exploited technique in computer graphics aimed at the emulation of high-resolution details in surfaces. In this paper we present a distance-ratios preservation method for bivariate raster texture mapping to free-form surfaces in an arbitrarily precise manner. The proposed method reduces the original general problem of computing the inverse of a three-dimensional parametric surface mapping into a problem of two-dimensional image warping. Several examples that demonstrate the proposed approach are also provided. 相似文献
4.
5.
We address concerns about the sustainability of the open source content model by examining the effect of external appropriation, whereby the product of open source contributors’ efforts is monetized by a party that did not contribute to the project, on intended effort withdrawal (reduction in contribution level). We examine both the personality of contributors and their contextual motivations to contribute, using a scenario-based survey of Wikipedia contributors. The findings suggest that perceived justice of the open source license terms, and intrinsic motivations are both negatively related with effort withdrawal intentions. Moreover, we find that the effect of the fairness personality trait on effort withdrawal is stronger for individuals who are low in perceived justice and weaker for individuals high in justice. The findings of factors predicting effort withdrawal contribute to the open source literature, which tends to focus on contribution and motivations, but not on what impacts changes in individual contribution levels. 相似文献
6.
There is major interest within the bio-engineering community in developing accurate and non-invasive means for visualizing, modeling and analyzing bone micro-structures. Bones are composed of hierarchical bio-composite materials characterized by complex multi-scale structural geometry. The process of reconstructing a volumetric bone model is usually based upon CT/MRI scanned images. Meshes generated by current commercial CAD systems cannot be used for further modeling or analysis. Moreover, recently develop... 相似文献
7.
We consider the following basic search path problem: a customer residing at a node of a network needs to obtain service from one of the facilities; facility locations are known and fixed. Facilities may become inoperational with certain probability; the state of the facility only becomes known when the facility is visited. Customer travel stops when the first operational facility is found. The objective is to minimize the expected total travel distance. 相似文献
8.
Given a k-uniform hypergraph, the Maximum k -Set Packing problem is to find the maximum disjoint set of edges. We prove that this problem cannot be efficiently approximated to within
a factor of
unless P = NP. This improves the previous hardness of approximation factor of
by Trevisan. This result extends to the problem of k-Dimensional-Matching. 相似文献
9.
The debuggers of Ref. 11) and most of their derivatives are of themeta-interpreter type. The computation of the debugger tracks the computation of the program to be diagnosed at the level of procedure call. This is adequate if the intuitive understanding of the programmer is in terms of procedure calls; as is indeed the case in Prolog. InLDL however, while the semantics of the language are described in a bottom-up, fixpoint model of computation,8) theactual execution of a program is a complex sequence of low-level procedure calls determined (and optimized) by the compiler. Consequently, a trace of these procedure calls is of little use to the programmer. Further, one cannot “execute” anLDL program as if it was a Prolog program; the program may simply not terminate in its Prolog reading and severalLDL constructs have no obvious Prolog counterparts. We identify the origin of a fault in theLDL program by a top-down, query/subquery approach. The basic debugger, implemented in Prolog, is a shell program between the programmer and theLDL program: it poses queries and uses the results to drive the interaction with the user. It closely resembles the one presented in Ref. 11). The core of a more sophisticated debugger is presented as well. Several concepts are introduced in order to quantify debugging abilities. One is that of agenerated interpretation, in which the structureless intended interpretation of Ref. 11) is augmented with causality. Another is the (idealized) concept of areliable oracle. We show that given an incorrect program and a reliable oracle which uses a generated interpretation, a cause for the fault will be found in finitely many steps. This result carries over to the more sophisticated debugger. 相似文献
10.
Oshrat Levy-Ontman Merav Fisher Yoram Shotland Yacob Weinstein Yoram Tekoah Shoshana Malis Arad 《International journal of molecular sciences》2014,15(2):2305-2326
N-glycosylation is one of the most important post-translational modifications that influence protein polymorphism, including protein structures and their functions. Although this important biological process has been extensively studied in mammals, only limited knowledge exists regarding glycosylation in algae. The current research is focused on the red microalga Porphyridium sp., which is a potentially valuable source for various applications, such as skin therapy, food, and pharmaceuticals. The enzymes involved in the biosynthesis and processing of N-glycans remain undefined in this species, and the mechanism(s) of their genetic regulation is completely unknown. In this study, we describe our pioneering attempt to understand the endoplasmic reticulum N-Glycosylation pathway in Porphyridium sp., using a bioinformatic approach. Homology searches, based on sequence similarities with genes encoding proteins involved in the ER N-glycosylation pathway (including their conserved parts) were conducted using the TBLASTN function on the algae DNA scaffold contigs database. This approach led to the identification of 24 encoded-genes implicated with the ER N-glycosylation pathway in Porphyridium sp. Homologs were found for almost all known N-glycosylation protein sequences in the ER pathway of Porphyridium sp.; thus, suggesting that the ER-pathway is conserved; as it is in other organisms (animals, plants, yeasts, etc.). 相似文献