首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   395篇
  免费   44篇
  国内免费   44篇
电工技术   7篇
综合类   26篇
化学工业   12篇
机械仪表   5篇
建筑科学   3篇
矿业工程   1篇
能源动力   2篇
轻工业   57篇
无线电   71篇
一般工业技术   8篇
冶金工业   1篇
原子能技术   3篇
自动化技术   287篇
  2024年   2篇
  2022年   1篇
  2021年   3篇
  2020年   1篇
  2019年   2篇
  2018年   2篇
  2017年   2篇
  2016年   5篇
  2015年   10篇
  2014年   18篇
  2013年   14篇
  2012年   23篇
  2011年   31篇
  2010年   24篇
  2009年   35篇
  2008年   49篇
  2007年   49篇
  2006年   43篇
  2005年   38篇
  2004年   29篇
  2003年   31篇
  2002年   16篇
  2001年   15篇
  2000年   17篇
  1999年   3篇
  1998年   3篇
  1997年   4篇
  1996年   3篇
  1994年   1篇
  1993年   2篇
  1991年   2篇
  1990年   2篇
  1988年   1篇
  1986年   1篇
  1985年   1篇
排序方式: 共有483条查询结果,搜索用时 15 毫秒
1.
Stateful session handoff for mobile WWW   总被引:1,自引:0,他引:1  
This paper proposes a web session handoff system that can hand over not only stateless but also stateful sessions between homogenous and heterogeneous user devices to enable uninterrupted and seamless web access. The proposed system adopts a proxy-based approach and an optional client-assisted scheme in order to track and hand over session information. In the proposed system, a session is registered at a User Agent Proxy (UAP) and then tracked by the UAP so that the session can be handed over from one device via the UAP to another device. In addition to session information tracked by a UAP, the UAP can hand over more comprehensive session information by using the client-assisted scheme. Compared with client-based approaches, our design has several advantages, such as less modification to user devices, practicability, and fault tolerance. We have implemented a UAP on a PC and client programs for both PC and PDA. The implementation can successfully hand over between PC and PDA a stateful session for online shopping applications.  相似文献   
2.
本文主要叙述了作者在十多年来香荚兰豆萃取物的生产研究和学习心得,在我国卷烟、食品、香料香精工业中对香荚兰豆萃取物的加工及应用日益增多的今天,具有一定的参考和借鉴作用。  相似文献   
3.
The novel distributed mobility management trend is a promising direction to cope with the increasing mobile data traffic and flatten network architectures. Most of the novel mobility approaches distribute the mobility anchors through the access level, as opposed to the centralized mobility anchoring model. Other recent approaches argue that mobility anchors closer to the content servers may be the solution to optimize the mobility performance. However, none of the mobility anchoring models is ideal for all scenarios, since it depends on the user, the session and the network. Hence, we propose an IP mobility approach driven by the context of the user, sessions and the network, where the mobility anchors for IP address allocation and for routing/forwarding are distributed through the network nodes, while the mobility context is managed by the mobile devices. Although each session is properly anchored in the establishment phase, the routing/forwarding is adapted over time, according to the user, the session and the network context: the proposed approach is able to signal different mobility anchors to optimize the routing path to new and ongoing sessions of the user. The outcome of the evaluation shows that the proposed approach overall reduces the data cost, the data delay, the tunneled packets and the tunnel length, when compared with other anchoring models.  相似文献   
4.
嵌入式Web应用技术运用越来越广泛,Session技术作为Web应用状态管理的重要手段在嵌入式Web应用中也得到广泛应用。阐述了嵌入式产品自身的特点,介绍了CGI和Session,说明了使用CGI来实现Session的必要性,提出了CGI实现Session的可行性,给出了Session实现的具体方法和核心代码。  相似文献   
5.
在网络编程技术发展迅速、手机应用程序越来越广泛的情况下,针对网络通信接口开发效率不高的问题,提出一种基于YII框架移动编程通信接口的设计方案,该方案利用session和JSON通信机制实现了农业互联网中手机端与服务器端的通信,并详细阐述其设计原理。通过将该方案应用于实际项目中,应用结果验证了方案的可用性,在降低编程难度的同时提高开发效率。  相似文献   
6.
B/S架构下,来自于浏览器的同步请求如果发生了会话超时,可以很容易的让页面跳转到超时页面,但现在的Web系统为了提高用户体验,大量使用了Ajax技术,请求变成了异步请求,使用原有的方法,页面无法去处理跳转。本文在JQuery和Ext框架下,提出一种处理异步请求会话超时的方法。  相似文献   
7.
校园网中存在多Web的应用系统,而每个Web应用服务器都有一个身份认证,给教师和学生在使用上带来很多不便.讲述了通过Session的分布式认证系统完成多平台单点登录的安全算法的实现过程.  相似文献   
8.
利用SIP事件通告机制这一扩展,提出了一种基于SIP的VoIP非语音信息扩展的应用方案,描述了该方案的设计原理,讨论了一些方案实现的技术要点.该设计方案结合了XML技术,结构清晰,故具有较强的扩展性.在VoIP系统中,该方案实现的扩展功能使用户了解当前其他用户的通信状态,避免了一些呼叫事故的发生.  相似文献   
9.
The DTN architecture is based around sender-initiated unicast communication that is insufficient or inconvenient to meet the needs of many applications. To address these limitations, we define a DTN session layer and associated extensions to the DTN bundle protocol that more naturally support receiver-driven applications and multicast communication. Within a session, we provide mechanisms allowing applications to convey ordering relationships between successive transmissions that can be used by the network to help ensure a distributed application’s delivery ordering expectations are met. We also extend the bundle protocol’s expiration procedures to support more efficient network utilization by allowing in-network deletion of obsolete messages. We present the design rationale and describe our implementation of these mechanisms and discuss their advantages in meeting the needs of several popular types of applications.  相似文献   
10.
Dimitris  Nikos  Costas   《Computers & Security》2009,28(7):578-591
Any application or service utilizing the Internet is exposed to both general Internet attacks and other specific ones. Most of the times the latter are exploiting a vulnerability or misconfiguration in the provided service and/or in the utilized protocol itself. Consequently, the employment of critical services, like Voice over IP (VoIP) services, over the Internet is vulnerable to such attacks and, on top of that, they offer a field for new attacks or variations of existing ones. Among the various threats–attacks that a service provider should consider are the flooding attacks, at the signaling level, which are very similar to those against TCP servers but have emerged at the application level of the Internet architecture. This paper examines flooding attacks against VoIP architectures that employ the Session Initiation Protocol (SIP) as their signaling protocol. The focus is on the design and implementation of the appropriate detection method. Specifically, a bloom filter based monitor is presented and a new metric, named session distance, is introduced in order to provide an effective protection scheme against flooding attacks. The proposed scheme is evaluated through experimental test bed architecture under different scenarios. The results of the evaluation demonstrate that the required time to detect such an attack is negligible and also that the number of false alarms is close to zero.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号