首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   237篇
  免费   3篇
电工技术   5篇
化学工业   38篇
金属工艺   10篇
机械仪表   5篇
建筑科学   11篇
能源动力   3篇
轻工业   11篇
水利工程   2篇
无线电   74篇
一般工业技术   24篇
冶金工业   27篇
原子能技术   1篇
自动化技术   29篇
  2024年   1篇
  2022年   1篇
  2021年   3篇
  2019年   2篇
  2018年   8篇
  2017年   6篇
  2016年   1篇
  2015年   7篇
  2014年   5篇
  2013年   15篇
  2012年   9篇
  2011年   10篇
  2010年   13篇
  2009年   12篇
  2008年   10篇
  2007年   8篇
  2006年   13篇
  2005年   7篇
  2004年   2篇
  2003年   8篇
  2002年   5篇
  2001年   9篇
  2000年   7篇
  1999年   4篇
  1998年   8篇
  1997年   6篇
  1996年   5篇
  1995年   9篇
  1994年   7篇
  1993年   8篇
  1992年   4篇
  1991年   1篇
  1990年   2篇
  1989年   5篇
  1988年   2篇
  1987年   3篇
  1986年   1篇
  1985年   1篇
  1984年   3篇
  1981年   1篇
  1980年   2篇
  1977年   3篇
  1976年   2篇
  1974年   1篇
排序方式: 共有240条查询结果,搜索用时 250 毫秒
1.
The transformation is defined to leave a given bi-isotropic medium invariant, whence it is self-dual in this transformation. It is shown that duality transformations always exist in pairs, labeled as left-hand and right-hand transformations. Self-dual fields are seen to be generalizations of the wave fields E± applied in the analysis of reciprocal chiral media. It is demonstrated that plane wave propagation and reflection problems in bi-isotropic media can be solved easily in terms of self-dual field decompositions. Nonreciprocity is seen to give rise to effects like polarization rotation in reflection, which cannot be interpreted in terms of reciprocal chiral media  相似文献   
2.
It has recently been shown that authenticated Byzantine agreement, in which more than a third of the parties are corrupted, cannot be securely realized under concurrent or parallel (stateless) composition. This result puts into question any usage of authenticated Byzantine agreement in a setting where many executions take place. In particular, this is true for the whole body of work of secure multi-party protocols in the case that a third or more of the parties are corrupted. This is because these protocols strongly rely on the extensive use of a broadcast channel, which is in turn realized using authenticated Byzantine agreement. We remark that it was accepted folklore that the use of a broadcast channel (or authenticated Byzantine agreement) is actually essential for achieving meaningful secure multi-party computation whenever a third or more of the parties are corrupted. In this paper we show that this folklore is false. We present a mild relaxation of the definition of secure computation allowing abort. Our new definition captures all the central security issues of secure computation, including privacy, correctness and independence of inputs. However, the novelty of the definition is in decoupling the issue of agreement from these issues. We then show that this relaxation suffices for achieving secure computation in a point-to-point network. That is, we show that secure multi-party computation for this definition can be achieved for any number of corrupted parties and without a broadcast channel (or trusted pre-processing phase as required for running authenticated Byzantine agreement). Furthermore, this is achieved by just replacing the broadcast channel in known protocols with a very simple and efficient echo-broadcast protocol. An important corollary of our result is the ability to obtain multi-party protocols that remain secure under composition, without assuming a broadcast channel.  相似文献   
3.
4.
The uniaxial bianisotropic medium is a generalisation of the bi-isotropic and chiral media which recently have been subject to intensive research. Such a medium results, for example, when microscopic helices with parallel axes are positioned in a host dielectric in random locations. Plane wave propagation in such a medium is studied and a simple solution for the dispersion equation is found. Numerical examples for the wave number surfaces of the medium are given.<>  相似文献   
5.
Privacy Preserving Data Mining   总被引:4,自引:0,他引:4  
  相似文献   
6.
An image solution for the canonical electrostatic problem of a point charge in an anisotropic half-space bounded by another anisotropic half-space is presented. The image source is obtained in operator form by using Fourier-transformed Maxwell equations and transmission line theory. After applying Heaviside operator calculus the image operator can be interpreted as a combination of a point charge and a sector of planar charge. The new theory is shown to coincide with the previously known image solutions of less general anisotropic media. In addition to being applicable to any physically feasible anisotropic medium of electrostatics, the method can be used for steady-current conductivity problems via a duality transformation.  相似文献   
7.
Existing competence systems are based on a rationalistic view of competence. While these competence systems might work in job-based organizations, we argue that in more dynamic settings, such as in knowledge-based organizations, the interest-informed actions that capture the emergent competencies of tomorrow require different types of information technology support. The main objective of this paper is to elaborate on the possibilities and implications of using interest-activated technology as a design rationale for competence systems. This paper is based on an action case study of an implemented interest-activated Intranet recommender system prototype at Volvo Information Technology AB in Gothenburg, Sweden. On the basis of how organizational members used this prototype to find information they were interested in, our research team was able to inquire into how personal interest, embodied in information-seeking activities, could be a means for identifying competence. Building on the relation between personal interest and competence, we discuss competence systems design and spell out explicit implications for managerial practice in knowledge-based organizations.  相似文献   
8.
Electromagnetic wave propagation close to a material discontinuity is simulated by using summation by part operators of second, fourth and sixth order accuracy. The interface conditions at the discontinuity are imposed by the simultaneous approximation term procedure. Stability is shown and the order of accuracy is verified numerically.  相似文献   
9.
There is a long tradition in design of discussing materials and the craft of making artefacts. “Smart” and interactive materials affected what constitutes a material. Interaction design is a design activity that creates the appearance and behaviour of information technology, challenged by the illusiveness of interactive materials. With the increased design space of ubiquitous devices, designers can no longer rely on a design process based on known interaction idioms, especially for innovative highly interactive designs. This impedes the design process, because non-interactive materials, by which designers create sketches, storyboards, and mock-up prototypes, do not provide the essential talkbacks needed to make reliable assessments of the design characteristics. Without a well-defined design, the engineering process of artefacts has unclear ends, which are not encompassed in the rational epistemology of engineering. To value the experiential qualities of these artefacts, the prototypes need to be interactive and crafted in code. This paper investigates the materiality of information technology, specifically programming language code from which interactive artefacts are made. A study of users of programming languages investigates how they describe programming language code as a material. If you have a material, it is reasonable, because of the tradition in the material and craft fields, to say you have a craft. Thus, considering code a design material allows the metaphor of craft to be used for the activity of programming.  相似文献   
10.
We study approximate hedging strategies for a contingent claim consisting of a strip of independent hourly power options. The payoff of the contingent claim is a sum of the contributing hourly payoffs. As there is no forward market for specific hours, the fundamental problem is to find a reasonable hedge using exchange-traded forward contracts, e.g. average-based monthly contracts. The main result is a simple dynamic hedging strategy that reduces a significant part of the variance. The idea is to decompose the contingent claim into mathematically tractable components and to use empirical estimations to derive hedging deltas. Two benefits of the method are that the technique easily extends to more complex power derivatives and that only a few parameters need to be estimated. The hedging strategy based on the decomposition technique is compared with dynamic delta hedging strategies based on local minimum variance hedging, using a correlated traded asset.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号