首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   246篇
  免费   2篇
化学工业   31篇
机械仪表   2篇
建筑科学   2篇
能源动力   1篇
轻工业   8篇
无线电   41篇
一般工业技术   38篇
冶金工业   48篇
自动化技术   77篇
  2024年   2篇
  2023年   3篇
  2022年   9篇
  2021年   6篇
  2020年   6篇
  2019年   2篇
  2018年   4篇
  2017年   4篇
  2016年   3篇
  2015年   5篇
  2014年   7篇
  2013年   12篇
  2012年   3篇
  2011年   6篇
  2010年   9篇
  2009年   7篇
  2008年   12篇
  2007年   9篇
  2006年   6篇
  2005年   14篇
  2004年   8篇
  2003年   9篇
  2002年   7篇
  2001年   1篇
  2000年   6篇
  1999年   9篇
  1998年   16篇
  1997年   9篇
  1996年   6篇
  1995年   5篇
  1994年   7篇
  1993年   4篇
  1992年   1篇
  1991年   4篇
  1990年   3篇
  1987年   1篇
  1986年   1篇
  1985年   1篇
  1984年   4篇
  1983年   5篇
  1982年   1篇
  1981年   2篇
  1978年   1篇
  1977年   1篇
  1976年   1篇
  1975年   3篇
  1974年   1篇
  1973年   1篇
  1972年   1篇
排序方式: 共有248条查询结果,搜索用时 0 毫秒
1.
We show how to construct pseudo-random permutations that satisfy a certain cycle restriction, for example that the permutation be cyclic (consisting of one cycle containing all the elements) or an involution (a self-inverse permutation) with no fixed points. The construction can be based on any (unrestricted) pseudo-random permutation. The resulting permutations are defined succinctly and their evaluation at a given point is efficient. Furthermore, they enjoy a fast forward property, i.e. it is possible to iterate them at a very small cost. Received 10 August 2000 and revised 30 September 2000 Online publication 9 April 2001  相似文献   
2.
For a plane wave incident on a resistive plate, the first two terms in the low frequency expansion of the far field are determined. Since the magnetic dipole is not excited if the resistivity is nonzero, the leading term is simply the electric dipole contribution, and is identical to that for a perfectly conducting plate. The resistivity appears explicitly in the next term which can be expressed in terms of potentials. Some implications of the results are discussed, and the method is illustrated in the case of a circular disk.  相似文献   
3.
A Secure Function Evaluation (SFE) of a two-variable function f(·,·) is a protocol that allows two parties with inputs x and y to evaluate f(x,y) in a manner where neither party learns "more than is necessary". A rich body of work deals with the study of completeness for secure two-party computation. A function f is complete for SFE if a protocol for securely evaluating f allows the secure evaluation of all (efficiently computable) functions. The questions investigated are which functions are complete for SFE, which functions have SFE protocols unconditionally and whether there are functions that are neither complete nor have efficient SFE protocols. The previous study of these questions was mainly conducted from an information theoretic point of view and provided strong answers in the form of combinatorial properties. However, we show that there are major differences between the information theoretic and computational settings. In particular, we show functions that are considered as having SFE unconditionally by the combinatorial criteria but are actually complete in the computational setting. We initiate the fully computational study of these fundamental questions. Somewhat surprisingly, we manage to provide an almost full characterization of the complete functions in this model as well. More precisely, we present a computational criterion (called computational row non-transitivity) for a function f to be complete for the asymmetric case. Furthermore, we show a matching criterion called computational row transitivity for f to have a simple SFE (based on no additional assumptions). This criterion is close to the negation of the computational row non-transitivity and thus we essentially characterize all "nice" functions as either complete or having SFE unconditionally.  相似文献   
4.
This paper considers the design of handoff rerouting algorithms for reducing the overall session cost in personal communication systems (PCS). Most modern communication systems that are used as an infrastructure for PCS networks are based on connection-based technologies. In these systems, the session cost is composed of two components. The setup cost represents the cost associated with the handoff operations, and the hold cost determines the expense related to the use of network resources held by the connection. This work introduces for the first time, rerouting algorithms for general graphs which are cost effective in terms of their worst-case analysis. The algorithms are analyzed using a competitive analysis approach, and it is proved that the competitive ratio of the proposed algorithms is a small constant of which the precise value depends on the ratio between the setup costs and the hold costs of the links. We also prove a lower bound of 2 on the competitive ratio of any online algorithm, which means that the proposed algorithms are close in terms of worst case behavior to the best possible rerouting algorithm. In addition, experimental results also show that the proposed algorithms indeed balance between the session setup cost and the hold cost, yielding overall lower cost when compared to other algorithms described in the literature.  相似文献   
5.
Thermotropic liquid crystal polymers are a new class of polymeric materials that consist of rigid backbone molecules and thus, even in the quiescent condition, take extended chain conformation to form optically anisotropic melts. A systematic investigation was carried out on how this type of material responds to two basic flow fields: shear and elongation. Rheological properties of the polymer in these flow fields have also been measured. It was found that a high level of molecular orientation was readily obtained by elongational flow but not with shear flow. Specifically, extraordinarily high orientation was obtained when the melt was subjected to small elongational strains, whiel shear strain or shear rate had little effect. A possible mechanism to explain these behaviors is illustrated based on the existing observations or theories of rodlike molecules. This finding was used to interpret the orientation distribution in the extruded and injection-molded articles.  相似文献   
6.
  总被引:1,自引:0,他引:1  
A criterion to predict crack onset at a sharp notch in homogeneous brittle materials has been presented in a previous paper of one of the authors. It is reviewed and improved herein. It fulfils both the energy and the strength criteria and takes an Irwin-like form involving the generalized intensity factor of the singularity governing the elastic behaviour in the vicinity of a notch tip. The prediction agrees fairly well with the experiments although it slightly underestimates the experimental measures. A cause of this discrepancy can be that a small notch tip radius blunts the sharp corner. It is analysed in this paper by means of matched asymptotics involving 2 small parameters: a micro-crack increment length and the notch tip radius. A correction is brought to the initial prediction and a better agreement is obtained with experiments on PMMA notched specimens. Experiments performed on a stiffer material (Alumina/Zirconia) show that it is less sensitive to small notch tip radii. A remaining small discrepancy between experiments and predictions can be due to some non linear behaviour of the materials near the notch tip. In addition, without new developments, the method allows to determine the stress intensity factor at the tip of a short crack emanating from a sharp or a rounded v-notch.  相似文献   
7.
Cell Identification Codes for Tracking Mobile Users   总被引:2,自引:0,他引:2  
Naor  Zohar  Levy  Hanoch  Zwick  Uri 《Wireless Networks》2002,8(1):73-84
The minimization of the wireless cost of tracking mobile users is a crucial issue in wireless networks. Some of the previous strategies addressing this issue leave an open gap, by requiring the use of information that is not generally available to the user (for example, the distance traveled by the user). For this reason, both the implementation of some of these strategies and the performance comparison to existing strategies is not clear. In this work we propose to close this gap by the use of Cell Identification Codes (CIC) for tracking mobile users. Each cell periodically broadcasts a short message which identifies the cell and its orientation relatively to other cells in the network. This information is used by the users to efficiently update their location. We propose several cell identification encoding schemes, which are used to implement different tracking strategies, and analyze the amount of information required by each tracking strategy. One of our major results is that there is no need to transmit a code which is unique for each cell. For example, a 3 bits CIC is sufficient to implement a distance-based tracking strategy in a two-dimensional system. In addition, we propose a combination of timer and movement tracking strategy, based on either a one-bit or a two-bit CIC, depending on system topology and user mobility. An important property of our framework is that the overall performance cost, and hence its comparison to existing methods, is evaluated for each tracking strategy. The CIC-based strategies are shown to outperform the geographic-based method currently used in existing networks, and the timer-based method, over a wide range of parameters. Moreover, this superiority increases as the number of users per cell increases.  相似文献   
8.
    
Integrating self‐healing capabilities into soft electronic devices increases their durability and long‐term reliability. Although some advances have been made, the use of self‐healing electronics in wet and/or (under)water environments has proven to be quite challenging, and has not yet been fully realized. Herein, a new highly water insensitive self‐healing elastomer with high stretchability and mechanical strength that can reach 1100% and ≈6.5 MPa, respectively, is reported. The elastomer exhibits a high (>80%) self‐healing efficiency (after ≈ 24 h) in high humidity and/or different (under)water conditions without the assistance of an external physical and/or chemical triggers. Soft electronic devices made from this elastomer are shown to be highly robust and able to recover their electrical properties after damages in both ambient and aqueous conditions. Moreover, once operated in extreme wet or underwater conditions (e.g., salty sea water), the self‐healing capability leads to the elimination of significant electrical leakage that would be caused by structural damages. This highly efficient self‐healing elastomer can help extend the use of soft electronics outside of the laboratory and allow a wide variety of wet and submarine applications.  相似文献   
9.
Alternating systems are models of computer programs whose behavior is governed by the actions of multiple agents with, potentially, different goals. Examples include control systems, resource schedulers, security protocols, auctions and election mechanisms. Proving properties about such systems has emerged as an important new area of study in formal verification, with the development of logical frameworks such as the alternating temporal logic ATL*. Techniques for model checking ATL* over finite-state systems have been well studied, but many important systems are infinite-state and thus their verification requires, either explicitly or implicitly, some form of deductive reasoning. This paper presents a theoretical framework for the analysis of alternating infinite-state systems. It describes models of computation, of various degrees of generality, and alternating-time logics such as ATL* and its variations. It then develops a proof system that allows to prove arbitrary ATL* properties over these infinite-state models. The proof system is shown to be complete relative to validities in the weakest possible assertion language. The paper then derives auxiliary proof rules and verification diagrams techniques and applies them to security protocols, deriving a new formal proof of fairness of a multi-party contract signing protocol where the model of the protocol and of the properties contains both game-theoretic and infinite-state (parameterized) aspects.  相似文献   
10.
There have been suggestions that the unity of consciousness may be related to the kind of holism depicted only in quantum physics. This argument will be clarified and strengthened. It requires the brain to contain a quantum system with the right properties — a Bose-Einstein condensate. It probably does contain one such system, as both theory and experiment have indicated. In fact, we cannot pay full attention to a quantum whole and its parts simultaneously, though we may oscillate between the two. In a quantum theory of consciousness, emergent meanings arise as an inevitable consequence of Heisenberg's Uncertainty Principle.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号