全文获取类型
收费全文 | 246篇 |
免费 | 2篇 |
专业分类
化学工业 | 31篇 |
机械仪表 | 2篇 |
建筑科学 | 2篇 |
能源动力 | 1篇 |
轻工业 | 8篇 |
无线电 | 41篇 |
一般工业技术 | 38篇 |
冶金工业 | 48篇 |
自动化技术 | 77篇 |
出版年
2024年 | 2篇 |
2023年 | 3篇 |
2022年 | 9篇 |
2021年 | 6篇 |
2020年 | 6篇 |
2019年 | 2篇 |
2018年 | 4篇 |
2017年 | 4篇 |
2016年 | 3篇 |
2015年 | 5篇 |
2014年 | 7篇 |
2013年 | 12篇 |
2012年 | 3篇 |
2011年 | 6篇 |
2010年 | 9篇 |
2009年 | 7篇 |
2008年 | 12篇 |
2007年 | 9篇 |
2006年 | 6篇 |
2005年 | 14篇 |
2004年 | 8篇 |
2003年 | 9篇 |
2002年 | 7篇 |
2001年 | 1篇 |
2000年 | 6篇 |
1999年 | 9篇 |
1998年 | 16篇 |
1997年 | 9篇 |
1996年 | 6篇 |
1995年 | 5篇 |
1994年 | 7篇 |
1993年 | 4篇 |
1992年 | 1篇 |
1991年 | 4篇 |
1990年 | 3篇 |
1987年 | 1篇 |
1986年 | 1篇 |
1985年 | 1篇 |
1984年 | 4篇 |
1983年 | 5篇 |
1982年 | 1篇 |
1981年 | 2篇 |
1978年 | 1篇 |
1977年 | 1篇 |
1976年 | 1篇 |
1975年 | 3篇 |
1974年 | 1篇 |
1973年 | 1篇 |
1972年 | 1篇 |
排序方式: 共有248条查询结果,搜索用时 0 毫秒
1.
We show how to construct pseudo-random permutations that satisfy a certain cycle restriction, for example that the permutation
be cyclic (consisting of one cycle containing all the elements) or an involution (a self-inverse permutation) with no fixed
points. The construction can be based on any (unrestricted) pseudo-random permutation. The resulting permutations are defined
succinctly and their evaluation at a given point is efficient. Furthermore, they enjoy a fast forward property, i.e. it is possible to iterate them at a very small cost.
Received 10 August 2000 and revised 30 September 2000 Online publication 9 April 2001 相似文献
2.
For a plane wave incident on a resistive plate, the first two terms in the low frequency expansion of the far field are determined. Since the magnetic dipole is not excited if the resistivity is nonzero, the leading term is simply the electric dipole contribution, and is identical to that for a perfectly conducting plate. The resistivity appears explicitly in the next term which can be expressed in terms of potentials. Some implications of the results are discussed, and the method is illustrated in the case of a circular disk. 相似文献
3.
A Secure Function Evaluation (SFE) of a two-variable function f(·,·) is a protocol that allows two parties with inputs x and
y to evaluate f(x,y) in a manner where neither party learns "more than is necessary". A rich body of work deals with the
study of completeness for secure two-party computation. A function f is complete for SFE if a protocol for securely evaluating
f allows the secure evaluation of all (efficiently computable) functions. The questions investigated are which functions are
complete for SFE, which functions have SFE protocols unconditionally and whether there are functions that are neither complete
nor have efficient SFE protocols. The previous study of these questions was mainly conducted from an information theoretic
point of view and provided strong answers in the form of combinatorial properties. However, we show that there are major differences
between the information theoretic and computational settings. In particular, we show functions that are considered as having
SFE unconditionally by the combinatorial criteria but are actually complete in the computational setting. We initiate the
fully computational study of these fundamental questions. Somewhat surprisingly, we manage to provide an almost full characterization
of the complete functions in this model as well. More precisely, we present a computational criterion (called computational
row non-transitivity) for a function f to be complete for the asymmetric
case. Furthermore, we show a matching criterion called computational row transitivity for f to have a simple SFE (based on
no additional assumptions). This criterion is close to the negation of the computational row non-transitivity and thus we
essentially characterize all "nice" functions as either complete or having SFE unconditionally. 相似文献
4.
This paper considers the design of handoff rerouting algorithms for reducing the overall session cost in personal communication systems (PCS). Most modern communication systems that are used as an infrastructure for PCS networks are based on connection-based technologies. In these systems, the session cost is composed of two components. The setup cost represents the cost associated with the handoff operations, and the hold cost determines the expense related to the use of network resources held by the connection. This work introduces for the first time, rerouting algorithms for general graphs which are cost effective in terms of their worst-case analysis. The algorithms are analyzed using a competitive analysis approach, and it is proved that the competitive ratio of the proposed algorithms is a small constant of which the precise value depends on the ratio between the setup costs and the hold costs of the links. We also prove a lower bound of 2 on the competitive ratio of any online algorithm, which means that the proposed algorithms are close in terms of worst case behavior to the best possible rerouting algorithm. In addition, experimental results also show that the proposed algorithms indeed balance between the session setup cost and the hold cost, yielding overall lower cost when compared to other algorithms described in the literature. 相似文献
5.
Thermotropic liquid crystal polymers are a new class of polymeric materials that consist of rigid backbone molecules and thus, even in the quiescent condition, take extended chain conformation to form optically anisotropic melts. A systematic investigation was carried out on how this type of material responds to two basic flow fields: shear and elongation. Rheological properties of the polymer in these flow fields have also been measured. It was found that a high level of molecular orientation was readily obtained by elongational flow but not with shear flow. Specifically, extraordinarily high orientation was obtained when the melt was subjected to small elongational strains, whiel shear strain or shear rate had little effect. A possible mechanism to explain these behaviors is illustrated based on the existing observations or theories of rodlike molecules. This finding was used to interpret the orientation distribution in the extruded and injection-molded articles. 相似文献
6.
A criterion to predict crack onset at a sharp notch in homogeneous brittle materials has been presented in a previous paper of one of the authors. It is reviewed and improved herein. It fulfils both the energy and the strength criteria and takes an Irwin-like form involving the generalized intensity factor of the singularity governing the elastic behaviour in the vicinity of a notch tip. The prediction agrees fairly well with the experiments although it slightly underestimates the experimental measures. A cause of this discrepancy can be that a small notch tip radius blunts the sharp corner. It is analysed in this paper by means of matched asymptotics involving 2 small parameters: a micro-crack increment length and the notch tip radius. A correction is brought to the initial prediction and a better agreement is obtained with experiments on PMMA notched specimens. Experiments performed on a stiffer material (Alumina/Zirconia) show that it is less sensitive to small notch tip radii. A remaining small discrepancy between experiments and predictions can be due to some non linear behaviour of the materials near the notch tip. In addition, without new developments, the method allows to determine the stress intensity factor at the tip of a short crack emanating from a sharp or a rounded v-notch. 相似文献
7.
Cell Identification Codes for Tracking Mobile Users 总被引:2,自引:0,他引:2
The minimization of the wireless cost of tracking mobile users is a crucial issue in wireless networks. Some of the previous strategies addressing this issue leave an open gap, by requiring the use of information that is not generally available to the user (for example, the distance traveled by the user). For this reason, both the implementation of some of these strategies and the performance comparison to existing strategies is not clear. In this work we propose to close this gap by the use of Cell Identification Codes (CIC) for tracking mobile users. Each cell periodically broadcasts a short message which identifies the cell and its orientation relatively to other cells in the network. This information is used by the users to efficiently update their location. We propose several cell identification encoding schemes, which are used to implement different tracking strategies, and analyze the amount of information required by each tracking strategy. One of our major results is that there is no need to transmit a code which is unique for each cell. For example, a 3 bits CIC is sufficient to implement a distance-based tracking strategy in a two-dimensional system. In addition, we propose a combination of timer and movement tracking strategy, based on either a one-bit or a two-bit CIC, depending on system topology and user mobility. An important property of our framework is that the overall performance cost, and hence its comparison to existing methods, is evaluated for each tracking strategy. The CIC-based strategies are shown to outperform the geographic-based method currently used in existing networks, and the timer-based method, over a wide range of parameters. Moreover, this superiority increases as the number of users per cell increases. 相似文献
8.
Muhammad Khatib Orr Zohar Walaa Saliba Simcha Srebnik Hossam Haick 《Advanced functional materials》2020,30(22)
Integrating self‐healing capabilities into soft electronic devices increases their durability and long‐term reliability. Although some advances have been made, the use of self‐healing electronics in wet and/or (under)water environments has proven to be quite challenging, and has not yet been fully realized. Herein, a new highly water insensitive self‐healing elastomer with high stretchability and mechanical strength that can reach 1100% and ≈6.5 MPa, respectively, is reported. The elastomer exhibits a high (>80%) self‐healing efficiency (after ≈ 24 h) in high humidity and/or different (under)water conditions without the assistance of an external physical and/or chemical triggers. Soft electronic devices made from this elastomer are shown to be highly robust and able to recover their electrical properties after damages in both ambient and aqueous conditions. Moreover, once operated in extreme wet or underwater conditions (e.g., salty sea water), the self‐healing capability leads to the elimination of significant electrical leakage that would be caused by structural damages. This highly efficient self‐healing elastomer can help extend the use of soft electronics outside of the laboratory and allow a wide variety of wet and submarine applications. 相似文献
9.
Alternating systems are models of computer programs whose behavior is governed by the actions of multiple agents with, potentially, different goals. Examples include control systems, resource schedulers, security protocols, auctions and election mechanisms. Proving properties about such systems has emerged as an important new area of study in formal verification, with the development of logical frameworks such as the alternating temporal logic ATL*. Techniques for model checking ATL* over finite-state systems have been well studied, but many important systems are infinite-state and thus their verification requires, either explicitly or implicitly, some form of deductive reasoning. This paper presents a theoretical framework for the analysis of alternating infinite-state systems. It describes models of computation, of various degrees of generality, and alternating-time logics such as ATL* and its variations. It then develops a proof system that allows to prove arbitrary ATL* properties over these infinite-state models. The proof system is shown to be complete relative to validities in the weakest possible assertion language. The paper then derives auxiliary proof rules and verification diagrams techniques and applies them to security protocols, deriving a new formal proof of fairness of a multi-party contract signing protocol where the model of the protocol and of the properties contains both game-theoretic and infinite-state (parameterized) aspects. 相似文献
10.
Danah Zohar 《Minds and Machines》1995,5(4):597-607
There have been suggestions that the unity of consciousness may be related to the kind of holism depicted only in quantum physics. This argument will be clarified and strengthened. It requires the brain to contain a quantum system with the right properties — a Bose-Einstein condensate. It probably does contain one such system, as both theory and experiment have indicated. In fact, we cannot pay full attention to a quantum whole and its parts simultaneously, though we may oscillate between the two. In a quantum theory of consciousness, emergent meanings arise as an inevitable consequence of Heisenberg's Uncertainty Principle. 相似文献