首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   317篇
  免费   11篇
  国内免费   14篇
综合类   9篇
化学工业   1篇
机械仪表   3篇
建筑科学   12篇
矿业工程   1篇
石油天然气   2篇
无线电   138篇
一般工业技术   3篇
自动化技术   173篇
  2022年   2篇
  2021年   3篇
  2020年   6篇
  2019年   2篇
  2018年   5篇
  2017年   8篇
  2016年   9篇
  2015年   10篇
  2014年   21篇
  2013年   21篇
  2012年   18篇
  2011年   25篇
  2010年   19篇
  2009年   19篇
  2008年   28篇
  2007年   22篇
  2006年   17篇
  2005年   16篇
  2004年   16篇
  2003年   15篇
  2002年   7篇
  2001年   7篇
  2000年   5篇
  1999年   8篇
  1998年   1篇
  1997年   3篇
  1996年   3篇
  1995年   5篇
  1994年   3篇
  1993年   4篇
  1992年   4篇
  1990年   3篇
  1989年   1篇
  1988年   3篇
  1986年   1篇
  1985年   1篇
  1981年   1篇
排序方式: 共有342条查询结果,搜索用时 656 毫秒
1.
提出在县市级广电宽带数据网络的建设过程中,要着眼业务发展,突出高扩展性,构建基于标准、扩展灵活的主干网,实现网络建设的可持续性发展,并结合实际,从核心设备、端口、中继带宽、网络业务4个方面对扩展能力进行了阐述.  相似文献   
2.
WCDMA的MBMS技术   总被引:2,自引:0,他引:2  
主要介绍了基于WCDMA的MBMS技术,给出了其网络架构和技术难点,并对其应用给无线网络带来的影响作了一定深度的探讨。  相似文献   
3.
就电视现场直播中如何保障安全播出、各路信号同步以及保证信号质量等问题进行探讨.同时就常用于直播信号传输的微波传输系统的多种不同使用场合及使用方法作一介绍.  相似文献   
4.
It has recently been shown that authenticated Byzantine agreement, in which more than a third of the parties are corrupted, cannot be securely realized under concurrent or parallel (stateless) composition. This result puts into question any usage of authenticated Byzantine agreement in a setting where many executions take place. In particular, this is true for the whole body of work of secure multi-party protocols in the case that a third or more of the parties are corrupted. This is because these protocols strongly rely on the extensive use of a broadcast channel, which is in turn realized using authenticated Byzantine agreement. We remark that it was accepted folklore that the use of a broadcast channel (or authenticated Byzantine agreement) is actually essential for achieving meaningful secure multi-party computation whenever a third or more of the parties are corrupted. In this paper we show that this folklore is false. We present a mild relaxation of the definition of secure computation allowing abort. Our new definition captures all the central security issues of secure computation, including privacy, correctness and independence of inputs. However, the novelty of the definition is in decoupling the issue of agreement from these issues. We then show that this relaxation suffices for achieving secure computation in a point-to-point network. That is, we show that secure multi-party computation for this definition can be achieved for any number of corrupted parties and without a broadcast channel (or trusted pre-processing phase as required for running authenticated Byzantine agreement). Furthermore, this is achieved by just replacing the broadcast channel in known protocols with a very simple and efficient echo-broadcast protocol. An important corollary of our result is the ability to obtain multi-party protocols that remain secure under composition, without assuming a broadcast channel.  相似文献   
5.
The mobile ad hoc network (MANET) has recently been recognized as an attractive network architecture for wireless communication. Reliable broadcast is an important operation in MANET (e.g., giving orders, searching routes, and notifying important signals). However, using a naive flooding to achieve reliable broadcasting may be very costly, causing a lot of contention, collision, and congestion, to which we refer as the broadcast storm problem. This paper proposes an efficient reliable broadcasting protocol by taking care of the potential broadcast storm problem that could occur in the medium-access level. Existing protocols are either unreliable, or reliable but based on a too costly approach. Our protocol differs from existing protocols by adopting a low-cost broadcast, which does not guarantee reliability, as a basic operation. The reliability is ensured by additional acknowledgement and handshaking. Simulation results do justify the efficiency of the proposed protocol.  相似文献   
6.
Collision of suspended entities with surrounding molecules in a fluid environment leads to random movements of these entities, known as Brownian motion. Suppression of this motion in a Brownian ensemble has recently become essential for facilitating emerging applications in biology and in micro and nano scale self-assembled systems. How optimally this suppression can be performed remains an open question of great interest to both the natural science and the control engineering communities. In this paper, we address this question theoretically by introducing a novel “Broadcast Stochastic Receding Horizon Control” strategy for trapping an ensemble of non-interacting Brownian particles. The strategy designs a control input, independent of the number of particles, using measurements from a single particle as the only available feedback information and broadcasts it to all particles in the ensemble. We show the existence of a minimum region in which all particles can be driven and trapped indefinitely using the proposed control action. Under specific conditions, we guarantee the trapping of all particles in this region with probability 1. Finally, we demonstrate the efficacy of our control design in a simulation environment by trapping 100 Brownian particles in one, two and three dimensional homogeneous medium.  相似文献   
7.
在交换网络环境中,物理环路可以提高网络的冗余,但容易产生双向的广播环,甚至形成广播风暴,使交换机瘫痪;通过生成树协议生成根网桥,根端口,指定端口和阻塞端口,在逻辑上断开该网段,形成一个无环网络,使网络中无法产生广播环和广播风暴;当其它链路出现故障时,阻塞的端口自动恢复,逻辑断开的线路又被连通,继续传输数据。  相似文献   
8.
阐述网络电台的发展现状及前景。结合校园广播电台的实际,在分析校园网络电台功能结构的基础上,提出校园网络电台的设计方案。利用PHP和MySQL搭建网络电台,详细介绍声音的采集、模拟信号的编码和广播的实现过程,进而对校园网络电台的搭建进行总结。  相似文献   
9.
Edmonds  Pruhs 《Algorithmica》2008,36(3):315-330
Abstract. We investigate server scheduling policies to minimize average user perceived latency in pull-based client-server systems (systems where multiple clients request data from a server) where the server answers requests on a multicast/ broadcast channel. We first show that there is no O(1) -competitive algorithm for this problem. We then give a method to convert any nonclairvoyant unicast scheduling algorithm A to nonclairvoyant multicast scheduling algorithm B . We show that if A works well, when jobs can have parallel and sequential phases, then B works well if it is given twice the resources. More formally, if A is an s -speed c -approximation unicast algorithm, then its counterpart algorithm B is a 2s -speed c -approximation multicast algorithm. It is already known [5] that Equi-partition, which devotes an equal amount of processing power to each job, is a (2 + ε) -speed O(1 + 1/ε) -approximation algorithm for unicast scheduling of such jobs. Hence, it follows that the algorithm {BEQUI}, which broadcasts all requested files at a rate proportional to the number of outstanding requests for that file, is a (4 + ε) -speed O(1 + 1/ε) -approximation algorithm. We give another algorithm BEQUI-EDF and show that BEQUI-EDF is also a (4 + ε) -speed O(1 + 1/ε) -approximation algorithm. However, BEQUI-EDF has the advantage that the maximum number of preemptions is linear in the number of requests, and the advantage that no preemptions occur if the data items have unit size.  相似文献   
10.
The Atomic Broadcast algorithm described in this paper can deliver messages in two communication steps, even if multiple processes broadcast at the same time. It tags all broadcast messages with the local real time, and delivers all messages in the order of these timestamps. Both positive and negative statements are used: “m broadcast at time 51” vs. “no messages broadcast between times 31 and 51”. To prevent crashed processes from blocking the system, the -elected leader broadcasts negative statements on behalf of the processes it suspects () to have crashed. A new cheap Generic Broadcast algorithm is used to ensure consistency between conflicting statements. It requires only a majority of correct processes (n > 2f) and, in failure-free runs, delivers all non-conflicting messages in two steps. The main algorithm satisfies several new lower bounds, which are proved in this paper.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号