全文获取类型
收费全文 | 770篇 |
免费 | 79篇 |
国内免费 | 77篇 |
专业分类
电工技术 | 11篇 |
综合类 | 51篇 |
化学工业 | 10篇 |
金属工艺 | 2篇 |
机械仪表 | 7篇 |
建筑科学 | 12篇 |
矿业工程 | 2篇 |
轻工业 | 3篇 |
水利工程 | 1篇 |
石油天然气 | 2篇 |
无线电 | 286篇 |
一般工业技术 | 17篇 |
冶金工业 | 41篇 |
原子能技术 | 1篇 |
自动化技术 | 480篇 |
出版年
2024年 | 4篇 |
2023年 | 15篇 |
2022年 | 19篇 |
2021年 | 26篇 |
2020年 | 33篇 |
2019年 | 18篇 |
2018年 | 18篇 |
2017年 | 23篇 |
2016年 | 31篇 |
2015年 | 27篇 |
2014年 | 47篇 |
2013年 | 55篇 |
2012年 | 65篇 |
2011年 | 56篇 |
2010年 | 46篇 |
2009年 | 53篇 |
2008年 | 60篇 |
2007年 | 52篇 |
2006年 | 30篇 |
2005年 | 41篇 |
2004年 | 43篇 |
2003年 | 38篇 |
2002年 | 24篇 |
2001年 | 18篇 |
2000年 | 13篇 |
1999年 | 14篇 |
1998年 | 3篇 |
1997年 | 3篇 |
1996年 | 4篇 |
1995年 | 8篇 |
1994年 | 6篇 |
1993年 | 6篇 |
1992年 | 5篇 |
1990年 | 4篇 |
1989年 | 1篇 |
1988年 | 3篇 |
1987年 | 1篇 |
1986年 | 1篇 |
1985年 | 1篇 |
1984年 | 4篇 |
1981年 | 1篇 |
1976年 | 1篇 |
1968年 | 1篇 |
1965年 | 1篇 |
1961年 | 1篇 |
1960年 | 1篇 |
1955年 | 1篇 |
排序方式: 共有926条查询结果,搜索用时 15 毫秒
1.
Aishwarya
Srivastava Siddhant Aggarwal Amy Apon Edward Duffy Ken Kennedy Andre Luckow Brandon Posey Marcin Ziolkowski 《Software》2020,50(6):868-898
We investigate the challenges of building an end-to-end cloud pipeline for real-time intelligent visual inspection system for use in automotive manufacturing. Current methods of visual detection in automotive assembly are highly labor intensive, and thus prone to errors. An automated process is sought that can operate within the real-time constraints of the assembly line and can reduce errors. Components of the cloud pipeline include capture of a large set of high-definition images from a camera setup at the assembly location, transfer and storage of the images as needed, execution of object detection, and notification to a human operator when a fault is detected. The end-to-end execution must complete within a fixed time frame before the next car arrives in the assembly line. In this article, we report the design, development, and experimental evaluation of the tradeoffs of performance, accuracy, and scalability for a cloud system. 相似文献
2.
提出在县市级广电宽带数据网络的建设过程中,要着眼业务发展,突出高扩展性,构建基于标准、扩展灵活的主干网,实现网络建设的可持续性发展,并结合实际,从核心设备、端口、中继带宽、网络业务4个方面对扩展能力进行了阐述. 相似文献
3.
4.
WCDMA的MBMS技术 总被引:2,自引:0,他引:2
主要介绍了基于WCDMA的MBMS技术,给出了其网络架构和技术难点,并对其应用给无线网络带来的影响作了一定深度的探讨。 相似文献
5.
就电视现场直播中如何保障安全播出、各路信号同步以及保证信号质量等问题进行探讨.同时就常用于直播信号传输的微波传输系统的多种不同使用场合及使用方法作一介绍. 相似文献
6.
The development of future mobile networks will be driven, in large part, by content and web based services. In this paper,
we examine several performance, scalability and architectural challenges faced by future mobile web applications and how advanced
mobile content delivery techniques can address these challenges. We review existing content delivery using a taxonomy that
consists of three categories: network scaling, end system acceleration, and content and protocol optimization. While wireline
content delivery focuses on network and server scalability, mobile content delivery will likely benefit most from optimizing
radio link usage. We also present our ongoing work in this area, which extends the functionality of edge caching to the terminal,
uses user interest correlation information to maintain low terminal power consumption and adds a new dimension to radio resource
management.
This revised version was published online in August 2006 with corrections to the Cover Date. 相似文献
7.
It has recently been shown that authenticated Byzantine agreement,
in which more than a third of the parties are corrupted, cannot be
securely realized under concurrent or parallel (stateless)
composition. This result puts into question any usage of
authenticated Byzantine agreement in a setting where many
executions take place. In particular, this is true for the whole
body of work of secure multi-party protocols in the case that a
third or more of the parties are corrupted. This is because these
protocols strongly rely on the extensive use of a broadcast
channel, which is in turn realized using authenticated Byzantine
agreement. We remark that it was accepted folklore that the use of
a broadcast channel (or authenticated Byzantine agreement) is
actually essential for achieving meaningful secure multi-party
computation whenever a third or more of the parties are corrupted.
In this paper we show that this folklore is false. We present a
mild relaxation of the definition of secure computation allowing
abort. Our new definition captures all the central security issues
of secure computation, including privacy, correctness and
independence of inputs. However, the novelty of the definition is
in decoupling the issue of agreement from these issues. We
then show that this relaxation suffices for achieving secure
computation in a point-to-point network. That is, we show that
secure multi-party computation for this definition can be achieved
for any number of corrupted parties and without a
broadcast channel (or trusted pre-processing phase as required for
running authenticated Byzantine agreement). Furthermore, this is
achieved by just replacing the broadcast channel in known
protocols with a very simple and efficient echo-broadcast
protocol. An important corollary of our result is the ability to
obtain multi-party protocols that remain secure under composition,
without assuming a broadcast channel. 相似文献
8.
The mobile ad hoc network (MANET) has recently been recognized as an attractive network architecture for wireless communication. Reliable broadcast is an important operation in MANET (e.g., giving orders, searching routes, and notifying important signals). However, using a naive flooding to achieve reliable broadcasting may be very costly, causing a lot of contention, collision, and congestion, to which we refer as the broadcast storm problem. This paper proposes an efficient reliable broadcasting protocol by taking care of the potential broadcast storm problem that could occur in the medium-access level. Existing protocols are either unreliable, or reliable but based on a too costly approach. Our protocol differs from existing protocols by adopting a low-cost broadcast, which does not guarantee reliability, as a basic operation. The reliability is ensured by additional acknowledgement and handshaking. Simulation results do justify the efficiency of the proposed protocol. 相似文献
9.
A. Chin 《Algorithmica》1994,12(2-3):170-181
Consider the problem of efficiently simulating the shared-memory parallel random access machine (PRAM) model on massively parallel architectures with physically distributed memory. To prevent network congestion and memory bank contention, it may be advantageous to hash the shared memory address space. The decision on whether or not to use hashing depends on (1) the communication latency in the network and (2) the locality of memory accesses in the algorithm.We relate this decision directly to algorithmic issues by studying the complexity of hashing in the Block PRAM model of Aggarwal, Chandra, and Snir, a shared-memory model of parallel computation which accounts for communication locality. For this model, we exhibit a universal family of hash functions having optimal locality. The complexity of applying these hash functions to the shared address space of the Block PRAM (i.e., by permuting data elements) is asymptotically equivalent to the complexity of performing a square matrix transpose, and this result is best possible for all pairwise independent universal hash families. These complexity bounds provide theoretical evidence that hashing and randomized routing need not destroy communication locality, addressing an open question of Valiant.This work was started when the author was a student at Oxford University, supported by a National Science Foundation Graduate Fellowship and a Rhodes Scholarship. Any opinions, findings, conclusions, or recommendations expressed in this publication are those of the author and do not necessarily reflect the views of the National Science Foundation or the Rhodes Trust. 相似文献
10.
DKNNS:面向延迟敏感型应用的可扩展精确分布式K近邻搜索算法研究 总被引:1,自引:0,他引:1
为了降低用户访问延迟,延迟敏感型网络应用需要选择合适的邻近服务节点响应用户访问请求.分布式K近邻搜索通过可扩展的选择距任意用户节点邻近的K个服务节点,可以有效满足网络应用延迟优化的目的.已有工作在精确度以及可扩展性等方面存在不足.针对可扩展精确的K近邻搜索问题,文中提出了分布式K近邻搜索方法DKNNS(distributed K nearest neighbor search).DKNNS将大量的服务节点组织为邻近性感知的多级环,通过最远节点搜索机制选择优化的K近邻搜索初始化节点,然后基于回退方式快速的在目标节点邻近区域发现K个近邻.基于理论分析,模拟测试以及真实环境下的部署实验发现,在不同规模的节点集合下,DKNNS算法能够确定近似最优的K个服务节点.且DKNNS的查询延迟,查询开销均显著低于Meridian算法.最后,DKNNS的返回结果相对于Meridian具有较高的稳定性. 相似文献