全文获取类型
收费全文 | 800篇 |
免费 | 31篇 |
专业分类
电工技术 | 13篇 |
化学工业 | 183篇 |
金属工艺 | 13篇 |
机械仪表 | 15篇 |
建筑科学 | 22篇 |
能源动力 | 30篇 |
轻工业 | 41篇 |
水利工程 | 3篇 |
石油天然气 | 2篇 |
无线电 | 145篇 |
一般工业技术 | 140篇 |
冶金工业 | 91篇 |
原子能技术 | 4篇 |
自动化技术 | 129篇 |
出版年
2024年 | 2篇 |
2023年 | 10篇 |
2022年 | 20篇 |
2021年 | 29篇 |
2020年 | 14篇 |
2019年 | 14篇 |
2018年 | 18篇 |
2017年 | 14篇 |
2016年 | 29篇 |
2015年 | 26篇 |
2014年 | 43篇 |
2013年 | 54篇 |
2012年 | 32篇 |
2011年 | 55篇 |
2010年 | 35篇 |
2009年 | 33篇 |
2008年 | 43篇 |
2007年 | 40篇 |
2006年 | 42篇 |
2005年 | 25篇 |
2004年 | 33篇 |
2003年 | 28篇 |
2002年 | 14篇 |
2001年 | 11篇 |
2000年 | 7篇 |
1999年 | 13篇 |
1998年 | 19篇 |
1997年 | 21篇 |
1996年 | 9篇 |
1995年 | 8篇 |
1994年 | 5篇 |
1993年 | 10篇 |
1992年 | 4篇 |
1991年 | 4篇 |
1990年 | 8篇 |
1989年 | 2篇 |
1988年 | 6篇 |
1987年 | 3篇 |
1986年 | 4篇 |
1985年 | 4篇 |
1984年 | 2篇 |
1983年 | 2篇 |
1982年 | 3篇 |
1980年 | 4篇 |
1979年 | 2篇 |
1977年 | 3篇 |
1976年 | 14篇 |
1975年 | 3篇 |
1972年 | 2篇 |
1968年 | 1篇 |
排序方式: 共有831条查询结果,搜索用时 0 毫秒
1.
Self-organized public-key management for mobile ad hoc networks 总被引:6,自引:0,他引:6
In contrast with conventional networks, mobile ad hoc networks usually do not provide online access to trusted authorities or to centralized servers, and they exhibit frequent partitioning due to link and node failures and to node mobility. For these reasons, traditional security solutions that require online trusted authorities or certificate repositories are not well-suited for securing ad hoc networks. We propose a fully self-organized public-key management system that allows users to generate their public-private key pairs, to issue certificates, and to perform authentication regardless of the network partitions and without any centralized services. Furthermore, our approach does not require any trusted authority, not even in the system initialization phase. 相似文献
2.
In self-organizing ad hoc networks, all the networking functions rely on the contribution of the participants. As a basic example, nodes have to forward packets for each other in order to enable multihop communication. In recent years, incentive mechanisms have been proposed to give nodes incentive to cooperate, especially in packet forwarding. However, the need for these mechanisms was not formally justified. In this paper, we address the problem of whether cooperation can exist without incentive mechanisms. We propose a model,based on game theory and graph theory to investigate equilibrium conditions of packet forwarding strategies. We prove theorems about the equilibrium conditions for both cooperative and noncooperative strategies. We perform simulations to estimate the probability that the conditions for a cooperative equilibrium hold in randomly generated network scenarios.. As the problem is involved, we deliberately restrict ourselves to a static configuration. We conclude that in static ad hoc networks where the relationships between the nodes are likely to be stab le-cooperation needs to be encouraged. 相似文献
3.
In this work we present the discrete models for dynamic fracture of structures built of brittle materials. The models construction is based on Voronoi cell representation of the heterogeneous structure, with the beam lattice network used to model the cohesive and compressive forces between the neighboring cells. Each lattice component is a geometrically exact shear deformable beam which can describe large rigid body motion and the most salient fracture mechanisms. The latter can be represented through the corresponding form of the beam constitutive equations, which are derived either at microscale with random distribution of material properties or at a mesoscale with average deterministic values. The proposed models are also placed within the framework of dynamics, where special attention is paid to constructing the lattice network mass matrix as well as the corresponding time-stepping schemes. Numerical simulations of compression and bending tests is given to illustrate the models performance. 相似文献
4.
Arnaud C. Feron P. Boustimi M. Grosso P. Bosc D. Guignard P. 《Electronics letters》2003,39(17):1249-1250
Numerical results on polymer surrounded by an air micro-ring coupled to waveguides are presented. The FDTD method predicts a filter width of 1.4 nm and an extraction efficiency of almost 80% for a gap of 0.15 /spl mu/m. 相似文献
5.
6.
Kargl F. Papadimitratos P. Buttyan L. Müter M. Schoch E. Wiedersheim B. Ta-Vinh Thong Calandriello G. Held A. Kung A. Hubaux J.-P. 《Communications Magazine, IEEE》2008,46(11):110-118
Vehicular communication systems are on the verge of practical deployment. Nonetheless, their security and privacy protection is one of the problems that have been addressed only recently. In order to show the feasibility of secure VC, certain implementations are required. In [1] we discuss the design of a VC security system that has emerged as a result of the European SeVe- Com project. In this second article we discuss various issues related to the implementation and deployment aspects of secure VC systems. Moreover, we provide an outlook on open security research issues that will arise as VC systems develop from today?s simple prototypes to fullfledged systems. 相似文献
7.
Node cooperation in hybrid ad hoc networks 总被引:2,自引:0,他引:2
Ben Salem N. Buttyan L. Hubaux J.-P. Jakobsson M. 《Mobile Computing, IEEE Transactions on》2006,5(4):365-376
A hybrid ad hoc network is a structure-based network that is extended using multihop communications. Indeed, in this kind of network, the existence of a communication link between the mobile station and the base station is not required: A mobile station that has no direct connection with a base station can use other mobile stations as relays. Compared with conventional (single-hop) structure-based networks, this new generation can lead to a better use of the available spectrum and to a reduction of infrastructure costs. However, these benefits would vanish if the mobile nodes did not properly cooperate and forward packets for other nodes. In this paper, we propose a charging and rewarding scheme to encourage the most fundamental operation, namely packet forwarding. We use "MAC layering" to reduce the space overhead in the packets and a stream cipher encryption mechanism to provide "implicit. authentication" of the nodes involved in the communication. We analyze the robustness of our protocols against rational and malicious attacks. We show that-using our solution-collaboration is rational for selfish nodes. We also show that our protocols thwart rational attacks and detect malicious attacks. 相似文献
8.
Patrick Heymans Quentin Boucher Andreas Classen Arnaud Bourdoux Laurent Demonceau 《International Journal on Software Tools for Technology Transfer (STTT)》2012,14(5):553-566
Software product line engineering seeks to systematise reuse when developing families of similar software systems so as to minimise development time, cost and defects. To realise variability at the code level, product line methods classically advocate usage of inheritance, components, frameworks, aspects or generative techniques. However, these might require unaffordable paradigm shifts for developers if the software was not thought at the outset as a product line. Furthermore, these techniques can be conflicting with a company’s coding practices or external regulations. These concerns were the motivation for the industry–university collaboration described in this paper in which we developed a minimally intrusive coding technique based on tags. The approach was complemented with traceability from code to feature diagrams which were exploited for automated configuration. It is supported by a toolchain and is now in use in the partner company for the development of flight-grade satellite communication software libraries. 相似文献
9.
Sara Cavaliere-Jaricot Arnaud Etcheberry Michel Herlem Henri Perez 《Electrochimica acta》2007,52(6):2285-2293
Platinum nanoparticles (n-Pt), over-grafted with 2-thiophenecarbonyl chloride are assembled on gold electrodes, by the Langmuir Blodgett (LB) technique using behenic acid (BHA) as promoting agent. These layers are electrochemically active without any preliminary activation. The [Fe(CN)6]3−/4− redox couple was used as electrochemical probe. This paper reports on the influence of the number of deposited LB layers, and the n-Pt density on the electrochemical response. n-Pt density was modified by the change of the “BHA/n-Pt” ratio. Cyclic voltammograms of “[Fe(CN)6]3−/4−” were observed whatever the coating conditions. As soon as the first layer was deposited the electrochemical response was associated to the n-Pt coverage, its response slightly increased up to a steady state for five or seven layers. As expected, the increase of the Pt density favored the increase of the current density. XPS analysis performed before and after electrochemical cycling showed that 4-mercaptoaniline capped platinum nanoparticles, and their over grafting were chemically and electrochemically stable. Analysis of influence of the number or the n-Pt density of the layers showed that the electrochemically active part of LB electrodes was provided by the last layer plus a part of the underlying one. 相似文献
10.
Arnaud Hubaux Patrick Heymans Pierre-Yves Schobbens Dirk Deridder Ebrahim Khalil Abbasi 《Software and Systems Modeling》2013,12(3):641-663
Feature diagrams have become commonplace in software product line engineering as a means to document variability early in the life cycle. Over the years, their application has also been extended to assist stakeholders in the configuration of software products. However, existing feature-based configuration techniques offer little support for tailoring configuration views to the profiles of the various stakeholders. In this paper, we propose a lightweight, yet formal and flexible, mechanism to leverage multidimensional separation of concerns in feature-based configuration. We propose a technique to specify concerns in feature diagrams and to generate automatically concern-specific configuration views. Three alternative visualisations are proposed. Our contributions are motivated and illustrated through excerpts from a real web-based meeting management application which was also used for a preliminary evaluation. We also report on the progress made in the development of a tool supporting multi-view feature-based configuration. 相似文献