首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1322篇
  免费   43篇
  国内免费   2篇
电工技术   20篇
综合类   2篇
化学工业   175篇
金属工艺   75篇
机械仪表   100篇
建筑科学   25篇
矿业工程   2篇
能源动力   69篇
轻工业   68篇
水利工程   19篇
石油天然气   7篇
无线电   176篇
一般工业技术   344篇
冶金工业   101篇
原子能技术   11篇
自动化技术   173篇
  2023年   17篇
  2022年   32篇
  2021年   35篇
  2020年   38篇
  2019年   48篇
  2018年   62篇
  2017年   37篇
  2016年   40篇
  2015年   35篇
  2014年   66篇
  2013年   95篇
  2012年   64篇
  2011年   67篇
  2010年   64篇
  2009年   64篇
  2008年   51篇
  2007年   51篇
  2006年   48篇
  2005年   37篇
  2004年   30篇
  2003年   45篇
  2002年   31篇
  2001年   17篇
  2000年   21篇
  1999年   22篇
  1998年   34篇
  1997年   10篇
  1996年   22篇
  1995年   23篇
  1994年   14篇
  1993年   22篇
  1992年   9篇
  1991年   13篇
  1990年   7篇
  1989年   8篇
  1988年   10篇
  1987年   11篇
  1986年   10篇
  1985年   13篇
  1984年   4篇
  1983年   6篇
  1981年   4篇
  1980年   6篇
  1977年   2篇
  1976年   3篇
  1972年   2篇
  1970年   3篇
  1962年   2篇
  1961年   2篇
  1959年   2篇
排序方式: 共有1367条查询结果,搜索用时 15 毫秒
1.
Wireless Personal Communications - In the present scenario, there is a boom in the demand of the users to achieve increased capacity, high data, low latency, and high-performance rates. 5G New...  相似文献   
2.
Security is becoming an everyday concern for a wide range of electronic systems that manipulate, communicate, and store sensitive data. An important and emerging category of such electronic systems are battery-powered mobile appliances, such as personal digital assistants (PDAs) and cell phones, which are severely constrained in the resources they possess, namely, processor, battery, and memory. This work focuses on one important constraint of such devices-battery life-and examines how it is impacted by the use of various security mechanisms. In this paper, we first present a comprehensive analysis of the energy requirements of a wide range of cryptographic algorithms that form the building blocks of security mechanisms such as security protocols. We then study the energy consumption requirements of the most popular transport-layer security protocol: Secure Sockets Layer (SSL). We investigate the impact of various parameters at the protocol level (such as cipher suites, authentication mechanisms, and transaction sizes, etc.) and the cryptographic algorithm level (cipher modes, strength) on the overall energy consumption for secure data transactions. To our knowledge, this is the first comprehensive analysis of the energy requirements of SSL. For our studies, we have developed a measurement-based experimental testbed that consists of an iPAQ PDA connected to a wireless local area network (LAN) and running Linux, a PC-based data acquisition system for real-time current measurement, the OpenSSL implementation of the SSL protocol, and parameterizable SSL client and server test programs. Based on our results, we also discuss various opportunities for realizing energy-efficient implementations of security protocols. We believe such investigations to be an important first step toward addressing the challenges of energy-efficient security for battery-constrained systems.  相似文献   
3.
Considers the applicability of algorithm based fault tolerance (ABET) to massively parallel scientific computation. Existing ABET schemes can provide effective fault tolerance at a low cost For computation on matrices of moderate size; however, the methods do not scale well to floating-point operations on large systems. This short note proposes the use of a partitioned linear encoding scheme to provide scalability. Matrix algorithms employing this scheme are presented and compared to current ABET schemes. It is shown that the partitioned scheme provides scalable linear codes with improved numerical properties with only a small increase in hardware and time overhead  相似文献   
4.
Vascular injuries may occur as complications of elbow dislocation and usually involve the brachial artery. A case report is presented in which only the radial artery was compromised as a result of the dislocation.  相似文献   
5.
6.
7.
Summary Algorithms for mutual exclusion that adapt to the current degree of contention are developed. Afilter and a leader election algorithm form the basic building blocks. The algorithms achieve system response times that are independent of the total number of processes and governed instead by the current degree of contention. The final algorithm achieves a constant amortized system response time. Manhoi Choy was born in 1967 in Hong Kong. He received his B.Sc. in Electrical and Electronic Engineerings from the University of Hong Kong in 1989, and his M.Sc. in Computer Science from the University of California at Santa Barbara in 1991. Currently, he is working on his Ph.D. in Computer Science at the University of California at Santa Barbara. His research interests are in the areas of parallel and distributed systems, and distributed algorithms. Ambuj K. Singh is an Assistant Professor in the Department of Computer Science at the University of California, Santa Barbara. He received a Ph.D. in Computer Science from the University of Texas at Austin in 1989, an M.S. in Computer Science from Iowa State University in 1984, and a B.Tech. from the Indian Institute of Technology at Kharagpur in 1982. His research interests are in the areas of adaptive resource allocation, concurrent program development, and distributed shared memory.A preliminary version of the paper appeared in the 12th Annual ACM Symposium on Principles of Distributed ComputingWork supported in part by NSF grants CCR-9008628 and CCR-9223094  相似文献   
8.
In this paper, we present a new economics-based power-aware protocol, called the distributed economic subcontracting protocol (DESP) that dynamically distributes task computation among mobile devices in an ad hoc wireless network. Mobile computation devices may be energy buyers, contractors, or subcontractors. Tasks are transferred between devices via distributed bargaining and transactions. When additional energy is required, buyers and contractors negotiate energy prices within their local markets. Contractors and subcontractors spend communication and computation energy to relay or execute buyers' tasks. Buyers pay the negotiated price for this energy. Decision-making algorithms are proposed for buyers, contractors, and subcontractors, each of which has a different optimization goal. We have built a wireless network simulator, called ESIM, to assist in the design and analysis of these algorithms. When the average communication energy required transferring a task is less than the average energy required to execute a task, our experimental results indicate that markets based on our protocol and decision-making algorithms fairly and effectively allocate energy resources among different tasks in both cooperative and competitive scenarios.  相似文献   
9.
10.
Nair  R.U. Jha  R.M. 《Electronics letters》2007,43(15):787-788
A novel A-sandwich hybrid variable thickness radome design, based on optimised power reflection, is presented. The radome performance parameters are evaluated accurately by a 3D ray-tracing procedure in conjunction with the aperture integration method. This design is demonstrated to be a better choice when multiple performance parameters need to be satisfied simultaneously.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号