首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   932篇
  免费   255篇
  国内免费   188篇
电工技术   24篇
综合类   166篇
化学工业   5篇
金属工艺   1篇
机械仪表   9篇
建筑科学   7篇
矿业工程   4篇
轻工业   9篇
石油天然气   9篇
武器工业   2篇
无线电   224篇
一般工业技术   12篇
冶金工业   4篇
自动化技术   899篇
  2024年   4篇
  2023年   11篇
  2022年   15篇
  2021年   16篇
  2020年   16篇
  2019年   20篇
  2018年   21篇
  2017年   25篇
  2016年   30篇
  2015年   34篇
  2014年   47篇
  2013年   57篇
  2012年   104篇
  2011年   112篇
  2010年   85篇
  2009年   101篇
  2008年   105篇
  2007年   128篇
  2006年   111篇
  2005年   85篇
  2004年   55篇
  2003年   60篇
  2002年   46篇
  2001年   29篇
  2000年   30篇
  1999年   15篇
  1998年   6篇
  1997年   3篇
  1996年   4篇
排序方式: 共有1375条查询结果,搜索用时 15 毫秒
1.
基于SIP的宽带实时多媒体通信研究与实现   总被引:3,自引:0,他引:3  
介绍了会晤创建协议(SIP),提出了基于SIP的应用系统——SRMCS,针对该实时多媒体通信系统,分析了其音频模块的实现和背景噪音的处理、视频模块的实现和视频的流畅播放,并就实时多媒体通信系统的关键问题——视、音频同步给出了可行的解决方案,最后还探讨了本系统中信令流和媒体流的传输方式。  相似文献   
2.
Performance enhancing proxies (PEPs) are widely used to improve the performance of TCP over high delay‐bandwidth product links and links with high error probability. In this paper we analyse the performance of using TCP connection splitting in combination with web caching via traces obtained from a commercial satellite system. We examine the resulting performance gain under different scenarios, including the effect of caching, congestion, random loss and file sizes. We show, via analysing our measurements, that the performance gain from using splitting is highly sensitive to random losses and the number of simultaneous connections, and that such sensitivity is alleviated by caching. On the other hand, the use of a splitting proxy enhances the value of web caching in that cache hits result in much more significant performance improvement over cache misses when TCP splitting is used. We also compare the performance of using different versions of HTTP in such a system. Copyright © 2003 John Wiley & Sons, Ltd.  相似文献   
3.
Redundant data transfers over the Web, can be mainly attributed to the repeated transfers of unchanged data. Web caches and Web proxies are some of the solutions that have been proposed, to deal with the issue of redundant data transfers. In this paper we focus on the efficient estimation and reduction of redundant data transfers over the Web. We first prove that a vast amount of redundant data is transferred in Web pages that are considered to carry fresh data. We show this by following an approach based on Web page fragmentation and manipulation. Web pages are broken down to fragments, based on specific criteria. We then deal with these fragments as independent constructors of the Web page and study their change patterns independently and in the context of the whole Web page. After the fragmentation process, we propose solutions for dealing with redundant data transfers. This paper has been based on our previous work on ‘Web Components’ but also on related work by other researchers. It utilises a proxy based, client/server architecture, and imposes changes to the algorithms executed on the Proxy server and on clients. We show that our proposed solution can considerably reduce the amount of redundant data transferred on the Web. Copyright © 2004 John Wiley & Sons, Ltd.  相似文献   
4.
The development of future mobile networks will be driven, in large part, by content and web based services. In this paper, we examine several performance, scalability and architectural challenges faced by future mobile web applications and how advanced mobile content delivery techniques can address these challenges. We review existing content delivery using a taxonomy that consists of three categories: network scaling, end system acceleration, and content and protocol optimization. While wireline content delivery focuses on network and server scalability, mobile content delivery will likely benefit most from optimizing radio link usage. We also present our ongoing work in this area, which extends the functionality of edge caching to the terminal, uses user interest correlation information to maintain low terminal power consumption and adds a new dimension to radio resource management. This revised version was published online in August 2006 with corrections to the Cover Date.  相似文献   
5.
Stateful session handoff for mobile WWW   总被引:1,自引:0,他引:1  
This paper proposes a web session handoff system that can hand over not only stateless but also stateful sessions between homogenous and heterogeneous user devices to enable uninterrupted and seamless web access. The proposed system adopts a proxy-based approach and an optional client-assisted scheme in order to track and hand over session information. In the proposed system, a session is registered at a User Agent Proxy (UAP) and then tracked by the UAP so that the session can be handed over from one device via the UAP to another device. In addition to session information tracked by a UAP, the UAP can hand over more comprehensive session information by using the client-assisted scheme. Compared with client-based approaches, our design has several advantages, such as less modification to user devices, practicability, and fault tolerance. We have implemented a UAP on a PC and client programs for both PC and PDA. The implementation can successfully hand over between PC and PDA a stateful session for online shopping applications.  相似文献   
6.
一个通用代理计费系统开发框架的设计与实现   总被引:4,自引:4,他引:0  
用户在不同的网络环境中选择不同的代理软件实现上网和用户管理,这些代理软件既有共性又各具特色,为减少开发不同代理计费软件的工作量,提高开发效率,加快开发周期,提出利用软件重用的思想,将代理软件的差异集中到少数几个类的实现上,设计并实现一个通用代理计费系统开发框架,基于此框架利用相对简单的步骤开发了基于SQUID的代理计费系统,验证了框架的实用性和可行性,达到了设计目标。  相似文献   
7.
Signcryption is a public key or asymmetric cryptographic method that provides simultaneously both message confidentiality and integrity at a lower computational and communication cost. This paper presents a (t, n) threshold proxy signcryption scheme in which no less than t proxy agents in the proxy group can produce the signcryption cryptogram. combines the functionality of threshold proxy signing and encryption. The proposed scheme combines the functionality of both threshold proxy signing and encryption, and provides fair protection for the sender and the proxy agents. This scheme is secure against attack of public key substitution. It also satisfies security properties such as confidentiality and authenticity.  相似文献   
8.
由于无证书公钥密码体制是一种新型公钥密码体制,它既克服了密钥托管问题,又不需要使用公钥证书,而在标准模型下所构造的方案与在随机语言模型下所构造的方案相比,具有更高的可证安全性,因此,该文在标准模型下,提出了一个无证书代理环签名方案。与现有的代理环签名方案相比,它具有更高的执行效率和可证安全性,能够归约于CDH(computational diffie-Hellman)问题假定。分析结果表明:它既能有效抵制来自密钥生成中心和授权人的伪造攻击,又能满足代理环签名的其他安全性需求;并且,该方案具有更高的执行效率,只需要两次对运算。  相似文献   
9.
文章首先分析了张青坡等人中提出的多项式形式的E1Gamal签名体制的安全缺陷,然后基于有限域上多项式的性质,提出了有限域上多项式形式代理保护代理签名方案;新的签名方案中,利用多项式进行签名权利的委托,并由改进的有限域上的多项式形式的E1Gamal签名体制生成代理签名。新方案的安全性基于离散对数的难解性。  相似文献   
10.
基于身份的指定验证者代理签名方案*   总被引:2,自引:2,他引:0  
在代理签名中,原始签名人能将其数字签名权力委托给代理签名人;在指定验证者签名方案中,只有事先指定的验证者才能验证签名的有效性.综合上述两种方案的优点,利用Weil对的双线性映射,构造了一个基于身份的指定验证者代理签名方案,并对其安全性进行简要的分析.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号