全文获取类型
收费全文 | 260篇 |
免费 | 5篇 |
专业分类
电工技术 | 3篇 |
化学工业 | 18篇 |
金属工艺 | 1篇 |
机械仪表 | 2篇 |
建筑科学 | 14篇 |
能源动力 | 5篇 |
轻工业 | 5篇 |
水利工程 | 1篇 |
无线电 | 20篇 |
一般工业技术 | 59篇 |
冶金工业 | 21篇 |
自动化技术 | 116篇 |
出版年
2023年 | 1篇 |
2022年 | 2篇 |
2021年 | 7篇 |
2020年 | 6篇 |
2019年 | 2篇 |
2018年 | 7篇 |
2017年 | 8篇 |
2016年 | 7篇 |
2015年 | 2篇 |
2014年 | 5篇 |
2013年 | 14篇 |
2012年 | 14篇 |
2011年 | 13篇 |
2010年 | 17篇 |
2009年 | 10篇 |
2008年 | 23篇 |
2007年 | 14篇 |
2006年 | 21篇 |
2005年 | 3篇 |
2004年 | 6篇 |
2003年 | 8篇 |
2002年 | 6篇 |
2001年 | 3篇 |
2000年 | 5篇 |
1999年 | 2篇 |
1998年 | 3篇 |
1997年 | 4篇 |
1996年 | 6篇 |
1995年 | 3篇 |
1994年 | 5篇 |
1993年 | 7篇 |
1992年 | 1篇 |
1991年 | 6篇 |
1990年 | 3篇 |
1988年 | 1篇 |
1987年 | 2篇 |
1986年 | 3篇 |
1984年 | 2篇 |
1983年 | 2篇 |
1982年 | 2篇 |
1981年 | 3篇 |
1980年 | 1篇 |
1979年 | 1篇 |
1976年 | 1篇 |
1974年 | 1篇 |
1973年 | 1篇 |
1970年 | 1篇 |
排序方式: 共有265条查询结果,搜索用时 78 毫秒
1.
Oded Goldreich 《Distributed Computing》2003,16(2-3):177-199
We survey the paradigms, approaches and techniques used to conceptualize, define and provide solutions to natural cryptographic problems. We start by presenting some of the central tools (e.g., computational difficulty, pseudorandomness, and zero-knowledge proofs), and next turn to the treatment of encryption and signature schemes. We conclude with an extensive treatment of secure cryptographic protocols both when executed in a stand-alone manner and when many sessions of various protocols are concurrently executed and controlled by an adversary. The survey is intended for researchers in distributed computing, and assumes no prior familiarity with cryptography.Received: June 2001, Accepted: July 2002, 相似文献
2.
3.
We say that a distribution over {0,1}n is (ε,k)-wise independent if its restriction to every k coordinates results in a distribution that is ε-close to the uniform distribution. A natural question regarding (ε,k)-wise independent distributions is how close they are to some k-wise independent distribution. We show that there exist (ε,k)-wise independent distributions whose statistical distance is at least nO(k)·ε from any k-wise independent distribution. In addition, we show that for any (ε,k)-wise independent distribution there exists some k-wise independent distribution, whose statistical distance is nO(k)·ε. 相似文献
4.
5.
We address concerns about the sustainability of the open source content model by examining the effect of external appropriation, whereby the product of open source contributors’ efforts is monetized by a party that did not contribute to the project, on intended effort withdrawal (reduction in contribution level). We examine both the personality of contributors and their contextual motivations to contribute, using a scenario-based survey of Wikipedia contributors. The findings suggest that perceived justice of the open source license terms, and intrinsic motivations are both negatively related with effort withdrawal intentions. Moreover, we find that the effect of the fairness personality trait on effort withdrawal is stronger for individuals who are low in perceived justice and weaker for individuals high in justice. The findings of factors predicting effort withdrawal contribute to the open source literature, which tends to focus on contribution and motivations, but not on what impacts changes in individual contribution levels. 相似文献
6.
There is major interest within the bio-engineering community in developing accurate and non-invasive means for visualizing, modeling and analyzing bone micro-structures. Bones are composed of hierarchical bio-composite materials characterized by complex multi-scale structural geometry. The process of reconstructing a volumetric bone model is usually based upon CT/MRI scanned images. Meshes generated by current commercial CAD systems cannot be used for further modeling or analysis. Moreover, recently develop... 相似文献
7.
We consider the following basic search path problem: a customer residing at a node of a network needs to obtain service from one of the facilities; facility locations are known and fixed. Facilities may become inoperational with certain probability; the state of the facility only becomes known when the facility is visited. Customer travel stops when the first operational facility is found. The objective is to minimize the expected total travel distance. 相似文献
8.
Given a k-uniform hypergraph, the Maximum k -Set Packing problem is to find the maximum disjoint set of edges. We prove that this problem cannot be efficiently approximated to within
a factor of
unless P = NP. This improves the previous hardness of approximation factor of
by Trevisan. This result extends to the problem of k-Dimensional-Matching. 相似文献
9.
The debuggers of Ref. 11) and most of their derivatives are of themeta-interpreter type. The computation of the debugger tracks the computation of the program to be diagnosed at the level of procedure call. This is adequate if the intuitive understanding of the programmer is in terms of procedure calls; as is indeed the case in Prolog. InLDL however, while the semantics of the language are described in a bottom-up, fixpoint model of computation,8) theactual execution of a program is a complex sequence of low-level procedure calls determined (and optimized) by the compiler. Consequently, a trace of these procedure calls is of little use to the programmer. Further, one cannot “execute” anLDL program as if it was a Prolog program; the program may simply not terminate in its Prolog reading and severalLDL constructs have no obvious Prolog counterparts. We identify the origin of a fault in theLDL program by a top-down, query/subquery approach. The basic debugger, implemented in Prolog, is a shell program between the programmer and theLDL program: it poses queries and uses the results to drive the interaction with the user. It closely resembles the one presented in Ref. 11). The core of a more sophisticated debugger is presented as well. Several concepts are introduced in order to quantify debugging abilities. One is that of agenerated interpretation, in which the structureless intended interpretation of Ref. 11) is augmented with causality. Another is the (idealized) concept of areliable oracle. We show that given an incorrect program and a reliable oracle which uses a generated interpretation, a cause for the fault will be found in finitely many steps. This result carries over to the more sophisticated debugger. 相似文献
10.
The Oslo A and B agreements of September 1993 and September 1995 were the beginning of a process aimed at a peaceful resolution of the Arab-Israeli conflict. The Israeli-Jordanian Treaty of 1994 addresses issues of water sharing between the two parties. In 1995, Israel and the Palestinians signed an Agreement on Water and Sewage as part of their Interim Agreement. In February 1996, Israel, Jordan, and the Palestinians agreed to a “Declaration of Principles for Joint Development of Water Resources.” The purpose of this paper is to compare the components of the two Agreements with an “ideal” institution for management of shared water resources. The “ideal” institution was formulated by 23 water experts who were interviewed on this issue. The main finding is that in most respects, expert opinions did not differ significantly from the Israeli-Jordanian Treaty of Peace and the Israeli-Palestinian Interim Agreement. 相似文献