首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   304篇
  免费   5篇
电工技术   1篇
化学工业   52篇
金属工艺   2篇
机械仪表   3篇
建筑科学   16篇
能源动力   8篇
轻工业   12篇
石油天然气   2篇
无线电   54篇
一般工业技术   80篇
冶金工业   37篇
原子能技术   1篇
自动化技术   41篇
  2024年   4篇
  2023年   2篇
  2022年   4篇
  2021年   5篇
  2020年   8篇
  2019年   7篇
  2018年   7篇
  2017年   9篇
  2016年   10篇
  2015年   9篇
  2014年   6篇
  2013年   13篇
  2012年   17篇
  2011年   12篇
  2010年   11篇
  2009年   13篇
  2008年   13篇
  2007年   11篇
  2006年   11篇
  2005年   10篇
  2004年   13篇
  2003年   5篇
  2002年   7篇
  2001年   4篇
  2000年   3篇
  1998年   11篇
  1997年   9篇
  1996年   5篇
  1995年   4篇
  1993年   7篇
  1992年   4篇
  1990年   6篇
  1989年   3篇
  1987年   2篇
  1984年   2篇
  1983年   5篇
  1982年   6篇
  1981年   3篇
  1980年   2篇
  1979年   1篇
  1978年   1篇
  1976年   1篇
  1975年   2篇
  1974年   3篇
  1973年   2篇
  1972年   5篇
  1971年   1篇
  1970年   4篇
  1969年   2篇
  1965年   1篇
排序方式: 共有309条查询结果,搜索用时 0 毫秒
1.
It has recently been shown that authenticated Byzantine agreement, in which more than a third of the parties are corrupted, cannot be securely realized under concurrent or parallel (stateless) composition. This result puts into question any usage of authenticated Byzantine agreement in a setting where many executions take place. In particular, this is true for the whole body of work of secure multi-party protocols in the case that a third or more of the parties are corrupted. This is because these protocols strongly rely on the extensive use of a broadcast channel, which is in turn realized using authenticated Byzantine agreement. We remark that it was accepted folklore that the use of a broadcast channel (or authenticated Byzantine agreement) is actually essential for achieving meaningful secure multi-party computation whenever a third or more of the parties are corrupted. In this paper we show that this folklore is false. We present a mild relaxation of the definition of secure computation allowing abort. Our new definition captures all the central security issues of secure computation, including privacy, correctness and independence of inputs. However, the novelty of the definition is in decoupling the issue of agreement from these issues. We then show that this relaxation suffices for achieving secure computation in a point-to-point network. That is, we show that secure multi-party computation for this definition can be achieved for any number of corrupted parties and without a broadcast channel (or trusted pre-processing phase as required for running authenticated Byzantine agreement). Furthermore, this is achieved by just replacing the broadcast channel in known protocols with a very simple and efficient echo-broadcast protocol. An important corollary of our result is the ability to obtain multi-party protocols that remain secure under composition, without assuming a broadcast channel.  相似文献   
2.
In the setting of secure two-party computation, two parties wish to securely compute a joint function of their private inputs, while revealing only the output. One of the primary techniques for achieving efficient secure two-party computation is that of Yao’s garbled circuits (FOCS 1986). In the semi-honest model, where just one garbled circuit is constructed and evaluated, Yao’s protocol has proven itself to be very efficient. However, a malicious adversary who constructs the garbled circuit may construct a garbling of a different circuit computing a different function, and this cannot be detected (due to the garbling). In order to solve this problem, many circuits are sent and some of them are opened to check that they are correct while the others are evaluated. This methodology, called cut-and-choose, introduces significant overhead, both in computation and in communication, and is mainly due to the number of circuits that must be used in order to prevent cheating. In this paper, we present a cut-and-choose protocol for secure computation based on garbled circuits, with security in the presence of malicious adversaries, that vastly improves on all previous protocols of this type. Concretely, for a cheating probability of at most \(2^{-40}\), the best previous works send between 125 and 128 circuits. In contrast, in our protocol 40 circuits alone suffice (with some additional overhead). Asymptotically, we achieve a cheating probability of \(2^{-s}\) where \(s\) is the number of garbled circuits, in contrast to the previous best of \(2^{-0.32s}\). We achieve this by introducing a new cut-and-choose methodology with the property that in order to cheat, all of the evaluated circuits must be incorrect, and not just the majority as in previous works. The security of our protocol relies on the decisional Diffie–Hellman assumption.  相似文献   
3.
4.
Film thickness in horizontal annular flow in small diameter pipes (8-12 mm) was measured as a function of circumferential position. In addition a simple analytical model for the prediction of the film thickness at the top and bottom of the pipe is proposed.  相似文献   
5.
The rate of absorption from a multicomponent gaseous mixture into a flowing stream in the presence of instantaneous surface reaction is investigated. This is effected by using the generalized Fick's Law for multicomponent diffusion and also by applying the approximate approach based on the assumption that the concentrations of the reactive species are small. Constant properties are assumed for the mixture which are taken at a reference state. As an example, the absorption of C02-H2S and C02-H2 from air are considered. The results show that when the binary diffusion coefficients of the species in the inert gas are greatly different, the error introduced in calculations based on the “Low Concentration” approach is quite appreciable.  相似文献   
6.
A computational tool, based on the source-model technique (SMT), for analysis of electromagnetic wave scattering by surface grooves and slits is presented. The idea is to use a superposition of the solution of the unperturbed problem and local corrections in the groove/slit region (the grooves and slits are treated as perturbations). In this manner, the solution is obtained in a much faster way than solving the original problem. The proposed solution is applied to problems of grooves and slits in otherwise planar or periodic surfaces. Grooves and slits of various shapes, both smooth ones as well as ones with edges, empty or filled with dielectric material, are considered. The obtained results are verified against previously published data.  相似文献   
7.
Freeman R  Liu X  Willner I 《Nano letters》2011,11(10):4456-4461
Quantum dots (QDs) functionalized with a black-hole quencher are used as optical tracer for the detection of DNA using exonuclease as a biocatalyst. The binding of the target DNA or of a target/open hairpin complex to the functionalized QDs leads to the exonuclease-stimulated recycling of the target DNA or the target/hairpin complex. This results in the triggering of the luminescence of the QDs that provides a readout signal for the amplified sensing process. By using different-sized QDs, the multiplexed detection of DNAs is demonstrated.  相似文献   
8.
9.
    
Layered assemblies of photosystem I, PSI, and/or photosystem II, PSII, on ITO electrodes are constructed using a layer‐by‐layer deposition process, where poly N,N′‐dibenzyl‐4,4′‐bipyridinium (poly‐benzyl viologen, PBV2+) is used as an inter‐protein “glue”. While the layered assembly of PSI generates an anodic photocurrent only in the presence of a sacrificial electron donor system, such as dichlorophenol indophenol (DCPIP)/ascorbate, the PSII‐modified electrode leads, upon irradiation, to the formation of an anodic photocurrent (while evolving oxygen), in the absence of any sacrificial component. The photocurrent is generated by transferring the electrons from the PSII units to the PBV2+ redox polymer. The charge‐separated species allow, then, the injection of the electrons to the electrode, with the concomitant evolution of O2. A layered assembly, consisting of a PSI layer attached to a layer of PSII by the redox polymer PBV2+, leads to an anodic photocurrent that is 2‐fold higher, as compared to the anodic photocurrent generated by a PSII‐modified electrode. This observation is attributed to an enhanced charge separation in the two‐photosystem assembly. By the further nano‐engineering of the two photosystems on the electrode using two different redox polymers, vectorial electron transfer to the electrode is demonstrated, resulting in a ca. 6‐fold enhancement in the photocurrent. The reversed bi‐layer assembly, consisting of a PSII layer linked to a layer of PSI by the PBV2+ redox polymer, yields, upon irradiation, an inefficient cathodic current. This observation is attributed to a mixture of photoinduced electron transfer reactions of opposing effects on the photocurrent directions in the two‐photosystem assembly.  相似文献   
10.
This work presents a study about the efficiency of destruction of industrial waste, used in the co-incineration in rotary kilns of the cement industry, considering the principle of the chemistry equilibrium and the kinetic of the reactions. As an example, it has analysed the burn of one hazardous waste which has in its composition toluene, xylene and dicloroethane. The temperatures of the transformation and the time of the reaction to the formation of sub-products which will originate CO2, H2O and HCl, are evaluated. Thus, the formation of the pollutants in the kiln is preliminary estimated and the different forms to control the emissions is also discussed.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号