首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1914篇
  免费   469篇
  国内免费   398篇
电工技术   45篇
综合类   249篇
化学工业   9篇
金属工艺   5篇
机械仪表   16篇
建筑科学   11篇
矿业工程   6篇
能源动力   2篇
轻工业   18篇
水利工程   1篇
石油天然气   10篇
武器工业   3篇
无线电   411篇
一般工业技术   32篇
冶金工业   11篇
原子能技术   2篇
自动化技术   1950篇
  2024年   10篇
  2023年   26篇
  2022年   41篇
  2021年   40篇
  2020年   51篇
  2019年   58篇
  2018年   50篇
  2017年   67篇
  2016年   67篇
  2015年   91篇
  2014年   134篇
  2013年   139篇
  2012年   207篇
  2011年   195篇
  2010年   157篇
  2009年   174篇
  2008年   224篇
  2007年   224篇
  2006年   184篇
  2005年   145篇
  2004年   100篇
  2003年   109篇
  2002年   80篇
  2001年   56篇
  2000年   49篇
  1999年   38篇
  1998年   19篇
  1997年   11篇
  1996年   11篇
  1995年   3篇
  1994年   4篇
  1993年   7篇
  1992年   2篇
  1991年   1篇
  1990年   2篇
  1989年   2篇
  1988年   1篇
  1979年   1篇
  1978年   1篇
排序方式: 共有2781条查询结果,搜索用时 0 毫秒
1.
Performance enhancing proxies (PEPs) are widely used to improve the performance of TCP over high delay‐bandwidth product links and links with high error probability. In this paper we analyse the performance of using TCP connection splitting in combination with web caching via traces obtained from a commercial satellite system. We examine the resulting performance gain under different scenarios, including the effect of caching, congestion, random loss and file sizes. We show, via analysing our measurements, that the performance gain from using splitting is highly sensitive to random losses and the number of simultaneous connections, and that such sensitivity is alleviated by caching. On the other hand, the use of a splitting proxy enhances the value of web caching in that cache hits result in much more significant performance improvement over cache misses when TCP splitting is used. We also compare the performance of using different versions of HTTP in such a system. Copyright © 2003 John Wiley & Sons, Ltd.  相似文献   
2.
Redundant data transfers over the Web, can be mainly attributed to the repeated transfers of unchanged data. Web caches and Web proxies are some of the solutions that have been proposed, to deal with the issue of redundant data transfers. In this paper we focus on the efficient estimation and reduction of redundant data transfers over the Web. We first prove that a vast amount of redundant data is transferred in Web pages that are considered to carry fresh data. We show this by following an approach based on Web page fragmentation and manipulation. Web pages are broken down to fragments, based on specific criteria. We then deal with these fragments as independent constructors of the Web page and study their change patterns independently and in the context of the whole Web page. After the fragmentation process, we propose solutions for dealing with redundant data transfers. This paper has been based on our previous work on ‘Web Components’ but also on related work by other researchers. It utilises a proxy based, client/server architecture, and imposes changes to the algorithms executed on the Proxy server and on clients. We show that our proposed solution can considerably reduce the amount of redundant data transferred on the Web. Copyright © 2004 John Wiley & Sons, Ltd.  相似文献   
3.
A new dynamic buffer allocation strategy based on the notion of marginal gains is presented for the buffer cache that is used by the operating system to store frequently accessed disk blocks in main memory, and the performance of the proposed strategy is compared with those of previous allocation strategies. In the proposed strategy, marginal gain values are predicted by exploiting functions that approximate the expected number of buffer hits per unit time. Experimental results from both trace-driven simulation and an actual implementation in the FreeBSD operating system show that the proposed strategy accurately predicts the marginal gain values for various workloads resulting in significantly improved buffer hit ratios.  相似文献   
4.
In the last three years or so we at Enterprise Platforms Group at Intel Corporation have been applying formal methods to various problems that arose during the process of defining platform architectures for Intel's processor families. In this paper we give an overview of some of the problems we have worked on, the results we have obtained, and the lessons we have learned. The last topic is addressed mainly from the perspective of platform architects.  相似文献   
5.
The development of future mobile networks will be driven, in large part, by content and web based services. In this paper, we examine several performance, scalability and architectural challenges faced by future mobile web applications and how advanced mobile content delivery techniques can address these challenges. We review existing content delivery using a taxonomy that consists of three categories: network scaling, end system acceleration, and content and protocol optimization. While wireline content delivery focuses on network and server scalability, mobile content delivery will likely benefit most from optimizing radio link usage. We also present our ongoing work in this area, which extends the functionality of edge caching to the terminal, uses user interest correlation information to maintain low terminal power consumption and adds a new dimension to radio resource management. This revised version was published online in August 2006 with corrections to the Cover Date.  相似文献   
6.
Stateful session handoff for mobile WWW   总被引:1,自引:0,他引:1  
This paper proposes a web session handoff system that can hand over not only stateless but also stateful sessions between homogenous and heterogeneous user devices to enable uninterrupted and seamless web access. The proposed system adopts a proxy-based approach and an optional client-assisted scheme in order to track and hand over session information. In the proposed system, a session is registered at a User Agent Proxy (UAP) and then tracked by the UAP so that the session can be handed over from one device via the UAP to another device. In addition to session information tracked by a UAP, the UAP can hand over more comprehensive session information by using the client-assisted scheme. Compared with client-based approaches, our design has several advantages, such as less modification to user devices, practicability, and fault tolerance. We have implemented a UAP on a PC and client programs for both PC and PDA. The implementation can successfully hand over between PC and PDA a stateful session for online shopping applications.  相似文献   
7.
一个通用代理计费系统开发框架的设计与实现   总被引:4,自引:4,他引:0  
用户在不同的网络环境中选择不同的代理软件实现上网和用户管理,这些代理软件既有共性又各具特色,为减少开发不同代理计费软件的工作量,提高开发效率,加快开发周期,提出利用软件重用的思想,将代理软件的差异集中到少数几个类的实现上,设计并实现一个通用代理计费系统开发框架,基于此框架利用相对简单的步骤开发了基于SQUID的代理计费系统,验证了框架的实用性和可行性,达到了设计目标。  相似文献   
8.
Signcryption is a public key or asymmetric cryptographic method that provides simultaneously both message confidentiality and integrity at a lower computational and communication cost. This paper presents a (t, n) threshold proxy signcryption scheme in which no less than t proxy agents in the proxy group can produce the signcryption cryptogram. combines the functionality of threshold proxy signing and encryption. The proposed scheme combines the functionality of both threshold proxy signing and encryption, and provides fair protection for the sender and the proxy agents. This scheme is secure against attack of public key substitution. It also satisfies security properties such as confidentiality and authenticity.  相似文献   
9.
文章首先分析了张青坡等人中提出的多项式形式的E1Gamal签名体制的安全缺陷,然后基于有限域上多项式的性质,提出了有限域上多项式形式代理保护代理签名方案;新的签名方案中,利用多项式进行签名权利的委托,并由改进的有限域上的多项式形式的E1Gamal签名体制生成代理签名。新方案的安全性基于离散对数的难解性。  相似文献   
10.
A multiprocessor envirorLment may encounter many problems such as deadlock, load balancing and cache coherence. However, the latter is considered the most dangerous if not properly designed, the system works naturally but generates inaccurate results. This occurs if obsolete versions of a memory block are used. Users may not be aware of the presence of such problem. Two main approaches are known to maintain data consistency: namely, snoopy and directory-based protocols. Each approach has its advantages and limitations. This paper proposes a new technique that considers both previously mentioned approaches. The network architecture is slightly updated by adding an index table to each processor. The proposed protocol is expected to reduce the access time, decrease the number of accesses to main memory, maintain data consistency, and assure the usage of the most recent value of a shared variable.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号