全文获取类型
收费全文 | 1179篇 |
免费 | 198篇 |
国内免费 | 241篇 |
专业分类
电工技术 | 32篇 |
综合类 | 346篇 |
化学工业 | 20篇 |
金属工艺 | 1篇 |
机械仪表 | 21篇 |
建筑科学 | 81篇 |
矿业工程 | 10篇 |
能源动力 | 8篇 |
轻工业 | 17篇 |
水利工程 | 12篇 |
石油天然气 | 14篇 |
无线电 | 244篇 |
一般工业技术 | 60篇 |
冶金工业 | 24篇 |
自动化技术 | 728篇 |
出版年
2024年 | 3篇 |
2023年 | 13篇 |
2022年 | 31篇 |
2021年 | 31篇 |
2020年 | 44篇 |
2019年 | 39篇 |
2018年 | 27篇 |
2017年 | 38篇 |
2016年 | 47篇 |
2015年 | 51篇 |
2014年 | 111篇 |
2013年 | 103篇 |
2012年 | 146篇 |
2011年 | 162篇 |
2010年 | 150篇 |
2009年 | 111篇 |
2008年 | 110篇 |
2007年 | 100篇 |
2006年 | 98篇 |
2005年 | 47篇 |
2004年 | 52篇 |
2003年 | 40篇 |
2002年 | 19篇 |
2001年 | 15篇 |
2000年 | 8篇 |
1999年 | 7篇 |
1997年 | 2篇 |
1996年 | 1篇 |
1995年 | 3篇 |
1994年 | 2篇 |
1993年 | 3篇 |
1990年 | 1篇 |
1974年 | 1篇 |
1965年 | 1篇 |
1956年 | 1篇 |
排序方式: 共有1618条查询结果,搜索用时 15 毫秒
1.
范文跃 《信息安全与通信保密》2006,(8):66-68
在分析移动智能平台安全需求基础上,从逻辑原理、硬件组成、软件系统三个层面提出了移动智能平台的可信计算体系结构,之后提出了包含十种可信计算应用功能的全景图。 相似文献
2.
3.
4.
Panagiotis N. Zarros Myung J. Lee Tarek N. Saadawi 《Journal of Network and Systems Management》1994,2(4):361-382
In this paper, an algorithm to determine the set of packets generated continuously and periodically from different participants that are arriving at a node either for mixing at the master of a conference, or for simply playing back at a regular participant of a conference, is proposed. The essence of the algorithm is to estimate the expected packet arrival time (or reference time) for each participant. With the reference time at hand, the maximum jitter and the optimum waiting time for a mixer to wait packets from all participants can be determined. An enhancement to improve synchronization which deals with the estimation of the time offsets between the individual periods of the sources and the period of the receiver is also presented. The error of the proposed algorithm is enumerated by the Chernoff bound and demonstrated by simulation and is shown to be acceptable in practical application. The algorithm can also be employed when traffic sources operate with different periods. 相似文献
5.
XIAN He-qun FENG Deng-guo 《通讯和计算机》2007,4(3):44-51
Even with attractive computational advantages, mobile agent technology has not developed its full potential due to various security issues. This paper proposes a method called Private Key Consignment to solve the problem of how to protect the data carried by mobile agents. It exploits new functionalities and mechanism provided by the trusted computing technology, and adopts both public key and symmetric key cryptographic means for data and key protection. The most notable feature of this method is that it protects the private key of the agent by consigning it to a tamper proof hardware, thus, enabling convenient and secure use of the private key. It provides a new scheme of mobile agents' data protection. 相似文献
6.
Chih-Hung Wang Author Vitae Chih-Heng Yin Author Vitae Author Vitae 《Computers & Electrical Engineering》2006,32(5):364-375
The most efficient approach to a fair exchange is to use an off-line trusted third party (TTP for short) who gets involved only when a dispute between two parties occurs. However, exchanged secrets that are not protected properly may be exposed to the TTP when one of these two parties asks the TTP to mediate the dispute. The first work to protect exchanged secrets from TTP’s misuse was proposed by Franklin and Reiter in 1997. They provided an on-line semi-trusted third party instead of an off-line third party for a fair exchange. Their schemes forced the TTP to take part in the protocol for all the cases, and thus, deemed to be impractical.The present paper, introduces several models, including single and multiple TTPs, to focus the attention not only on security properties, but also on reliability functions. In the single TTP mode, our new scheme can protect the exchanged data through an efficient exchange protocol, whereas in the multiple TTP mode, we proposed an approach to balance the security level with the reliability of the system. 相似文献
7.
8.
In order to reduce logistic costs, the scheduling of logistic tasks and resources for fourth party logistics (4PL) is studied. Current scheduling models only consider costs and finish times of each logistic resource or task. Not generally considered are the joint cost and time between two adjacent activities for a resource to process and two sequential activities of a task for two different resources to process are ignored. Therefore, a multi-objective scheduling model aiming at minimizing total operation costs, finishing time and tardiness of all logistic tasks in a 4PL is proposed. Not only are the joint cost and time of logistic activities between two adjacent activities and two sequential activities included but the constraints of resource time windows and due date of tasks are also considered. An improved nondominated sorting genetic algorithm (NSGA-II) is presented to solve the model. The validity of the proposed model and algorithm are verified by a corresponding case study. 相似文献
9.
针对嵌入式平台功耗低、资源少等特点,设计了适用于嵌入式平台的可信芯片及嵌入式软件栈,构建了嵌入式可信计算平台。为使嵌入式可信计算平台能够有效地为嵌入式应用提供可信功能支持,论文设计并实现了嵌入式可信计算平台测评系统,从应用服务角度出发,保证嵌入式应用调用的可信功能的正确性。该测评系统支持多个平台的并行测试,并能根据不同需求定制测试方案,支持测试报表分析测试结果,且引起的平台额外开销较小。 相似文献
10.