全文获取类型
收费全文 | 304篇 |
免费 | 5篇 |
专业分类
电工技术 | 1篇 |
化学工业 | 52篇 |
金属工艺 | 2篇 |
机械仪表 | 3篇 |
建筑科学 | 16篇 |
能源动力 | 8篇 |
轻工业 | 12篇 |
石油天然气 | 2篇 |
无线电 | 54篇 |
一般工业技术 | 80篇 |
冶金工业 | 37篇 |
原子能技术 | 1篇 |
自动化技术 | 41篇 |
出版年
2024年 | 4篇 |
2023年 | 2篇 |
2022年 | 4篇 |
2021年 | 5篇 |
2020年 | 8篇 |
2019年 | 7篇 |
2018年 | 7篇 |
2017年 | 9篇 |
2016年 | 10篇 |
2015年 | 9篇 |
2014年 | 6篇 |
2013年 | 13篇 |
2012年 | 17篇 |
2011年 | 12篇 |
2010年 | 11篇 |
2009年 | 13篇 |
2008年 | 13篇 |
2007年 | 11篇 |
2006年 | 11篇 |
2005年 | 10篇 |
2004年 | 13篇 |
2003年 | 5篇 |
2002年 | 7篇 |
2001年 | 4篇 |
2000年 | 3篇 |
1998年 | 11篇 |
1997年 | 9篇 |
1996年 | 5篇 |
1995年 | 4篇 |
1993年 | 7篇 |
1992年 | 4篇 |
1990年 | 6篇 |
1989年 | 3篇 |
1987年 | 2篇 |
1984年 | 2篇 |
1983年 | 5篇 |
1982年 | 6篇 |
1981年 | 3篇 |
1980年 | 2篇 |
1979年 | 1篇 |
1978年 | 1篇 |
1976年 | 1篇 |
1975年 | 2篇 |
1974年 | 3篇 |
1973年 | 2篇 |
1972年 | 5篇 |
1971年 | 1篇 |
1970年 | 4篇 |
1969年 | 2篇 |
1965年 | 1篇 |
排序方式: 共有309条查询结果,搜索用时 0 毫秒
1.
It has recently been shown that authenticated Byzantine agreement,
in which more than a third of the parties are corrupted, cannot be
securely realized under concurrent or parallel (stateless)
composition. This result puts into question any usage of
authenticated Byzantine agreement in a setting where many
executions take place. In particular, this is true for the whole
body of work of secure multi-party protocols in the case that a
third or more of the parties are corrupted. This is because these
protocols strongly rely on the extensive use of a broadcast
channel, which is in turn realized using authenticated Byzantine
agreement. We remark that it was accepted folklore that the use of
a broadcast channel (or authenticated Byzantine agreement) is
actually essential for achieving meaningful secure multi-party
computation whenever a third or more of the parties are corrupted.
In this paper we show that this folklore is false. We present a
mild relaxation of the definition of secure computation allowing
abort. Our new definition captures all the central security issues
of secure computation, including privacy, correctness and
independence of inputs. However, the novelty of the definition is
in decoupling the issue of agreement from these issues. We
then show that this relaxation suffices for achieving secure
computation in a point-to-point network. That is, we show that
secure multi-party computation for this definition can be achieved
for any number of corrupted parties and without a
broadcast channel (or trusted pre-processing phase as required for
running authenticated Byzantine agreement). Furthermore, this is
achieved by just replacing the broadcast channel in known
protocols with a very simple and efficient echo-broadcast
protocol. An important corollary of our result is the ability to
obtain multi-party protocols that remain secure under composition,
without assuming a broadcast channel. 相似文献
2.
Yehuda Lindell 《Journal of Cryptology》2016,29(2):456-490
In the setting of secure two-party computation, two parties wish to securely compute a joint function of their private inputs, while revealing only the output. One of the primary techniques for achieving efficient secure two-party computation is that of Yao’s garbled circuits (FOCS 1986). In the semi-honest model, where just one garbled circuit is constructed and evaluated, Yao’s protocol has proven itself to be very efficient. However, a malicious adversary who constructs the garbled circuit may construct a garbling of a different circuit computing a different function, and this cannot be detected (due to the garbling). In order to solve this problem, many circuits are sent and some of them are opened to check that they are correct while the others are evaluated. This methodology, called cut-and-choose, introduces significant overhead, both in computation and in communication, and is mainly due to the number of circuits that must be used in order to prevent cheating. In this paper, we present a cut-and-choose protocol for secure computation based on garbled circuits, with security in the presence of malicious adversaries, that vastly improves on all previous protocols of this type. Concretely, for a cheating probability of at most \(2^{-40}\), the best previous works send between 125 and 128 circuits. In contrast, in our protocol 40 circuits alone suffice (with some additional overhead). Asymptotically, we achieve a cheating probability of \(2^{-s}\) where \(s\) is the number of garbled circuits, in contrast to the previous best of \(2^{-0.32s}\). We achieve this by introducing a new cut-and-choose methodology with the property that in order to cheat, all of the evaluated circuits must be incorrect, and not just the majority as in previous works. The security of our protocol relies on the decisional Diffie–Hellman assumption. 相似文献
3.
4.
Film thickness in horizontal annular flow in small diameter pipes (8-12 mm) was measured as a function of circumferential position. In addition a simple analytical model for the prediction of the film thickness at the top and bottom of the pipe is proposed. 相似文献
5.
The rate of absorption from a multicomponent gaseous mixture into a flowing stream in the presence of instantaneous surface reaction is investigated. This is effected by using the generalized Fick's Law for multicomponent diffusion and also by applying the approximate approach based on the assumption that the concentrations of the reactive species are small. Constant properties are assumed for the mixture which are taken at a reference state. As an example, the absorption of C02-H2S and C02-H2 from air are considered. The results show that when the binary diffusion coefficients of the species in the inert gas are greatly different, the error introduced in calculations based on the “Low Concentration” approach is quite appreciable. 相似文献
6.
Trotskovsky K Leviatan Y 《Journal of the Optical Society of America. A, Optics, image science, and vision》2011,28(4):502-510
A computational tool, based on the source-model technique (SMT), for analysis of electromagnetic wave scattering by surface grooves and slits is presented. The idea is to use a superposition of the solution of the unperturbed problem and local corrections in the groove/slit region (the grooves and slits are treated as perturbations). In this manner, the solution is obtained in a much faster way than solving the original problem. The proposed solution is applied to problems of grooves and slits in otherwise planar or periodic surfaces. Grooves and slits of various shapes, both smooth ones as well as ones with edges, empty or filled with dielectric material, are considered. The obtained results are verified against previously published data. 相似文献
7.
Quantum dots (QDs) functionalized with a black-hole quencher are used as optical tracer for the detection of DNA using exonuclease as a biocatalyst. The binding of the target DNA or of a target/open hairpin complex to the functionalized QDs leads to the exonuclease-stimulated recycling of the target DNA or the target/hairpin complex. This results in the triggering of the luminescence of the QDs that provides a readout signal for the amplified sensing process. By using different-sized QDs, the multiplexed detection of DNAs is demonstrated. 相似文献
8.
9.
Omer Yehezkeli Ran Tel‐Vered Dorit Michaeli Rachel Nechushtai Itamar Willner 《Small (Weinheim an der Bergstrasse, Germany)》2013,9(17):2970-2978
Layered assemblies of photosystem I, PSI, and/or photosystem II, PSII, on ITO electrodes are constructed using a layer‐by‐layer deposition process, where poly N,N′‐dibenzyl‐4,4′‐bipyridinium (poly‐benzyl viologen, PBV2+) is used as an inter‐protein “glue”. While the layered assembly of PSI generates an anodic photocurrent only in the presence of a sacrificial electron donor system, such as dichlorophenol indophenol (DCPIP)/ascorbate, the PSII‐modified electrode leads, upon irradiation, to the formation of an anodic photocurrent (while evolving oxygen), in the absence of any sacrificial component. The photocurrent is generated by transferring the electrons from the PSII units to the PBV2+ redox polymer. The charge‐separated species allow, then, the injection of the electrons to the electrode, with the concomitant evolution of O2. A layered assembly, consisting of a PSI layer attached to a layer of PSII by the redox polymer PBV2+, leads to an anodic photocurrent that is 2‐fold higher, as compared to the anodic photocurrent generated by a PSII‐modified electrode. This observation is attributed to an enhanced charge separation in the two‐photosystem assembly. By the further nano‐engineering of the two photosystems on the electrode using two different redox polymers, vectorial electron transfer to the electrode is demonstrated, resulting in a ca. 6‐fold enhancement in the photocurrent. The reversed bi‐layer assembly, consisting of a PSII layer linked to a layer of PSI by the PBV2+ redox polymer, yields, upon irradiation, an inefficient cathodic current. This observation is attributed to a mixture of photoinduced electron transfer reactions of opposing effects on the photocurrent directions in the two‐photosystem assembly. 相似文献
10.
Andra Paula Ottoboni Itamar de Souza Gensio JosMenon Rogrio Josda Silva 《Energy Conversion and Management》1998,39(16-18)
This work presents a study about the efficiency of destruction of industrial waste, used in the co-incineration in rotary kilns of the cement industry, considering the principle of the chemistry equilibrium and the kinetic of the reactions. As an example, it has analysed the burn of one hazardous waste which has in its composition toluene, xylene and dicloroethane. The temperatures of the transformation and the time of the reaction to the formation of sub-products which will originate CO2, H2O and HCl, are evaluated. Thus, the formation of the pollutants in the kiln is preliminary estimated and the different forms to control the emissions is also discussed. 相似文献