全文获取类型
收费全文 | 932篇 |
免费 | 255篇 |
国内免费 | 188篇 |
专业分类
电工技术 | 24篇 |
综合类 | 166篇 |
化学工业 | 5篇 |
金属工艺 | 1篇 |
机械仪表 | 9篇 |
建筑科学 | 7篇 |
矿业工程 | 4篇 |
轻工业 | 9篇 |
石油天然气 | 9篇 |
武器工业 | 2篇 |
无线电 | 224篇 |
一般工业技术 | 12篇 |
冶金工业 | 4篇 |
自动化技术 | 899篇 |
出版年
2024年 | 4篇 |
2023年 | 11篇 |
2022年 | 15篇 |
2021年 | 16篇 |
2020年 | 16篇 |
2019年 | 20篇 |
2018年 | 21篇 |
2017年 | 25篇 |
2016年 | 30篇 |
2015年 | 34篇 |
2014年 | 47篇 |
2013年 | 57篇 |
2012年 | 104篇 |
2011年 | 112篇 |
2010年 | 85篇 |
2009年 | 101篇 |
2008年 | 105篇 |
2007年 | 128篇 |
2006年 | 111篇 |
2005年 | 85篇 |
2004年 | 55篇 |
2003年 | 60篇 |
2002年 | 46篇 |
2001年 | 29篇 |
2000年 | 30篇 |
1999年 | 15篇 |
1998年 | 6篇 |
1997年 | 3篇 |
1996年 | 4篇 |
排序方式: 共有1375条查询结果,搜索用时 15 毫秒
1.
2.
Navid Ehsan Mingyan Liu Roderick J. Ragland 《International Journal of Communication Systems》2003,16(6):513-534
Performance enhancing proxies (PEPs) are widely used to improve the performance of TCP over high delay‐bandwidth product links and links with high error probability. In this paper we analyse the performance of using TCP connection splitting in combination with web caching via traces obtained from a commercial satellite system. We examine the resulting performance gain under different scenarios, including the effect of caching, congestion, random loss and file sizes. We show, via analysing our measurements, that the performance gain from using splitting is highly sensitive to random losses and the number of simultaneous connections, and that such sensitivity is alleviated by caching. On the other hand, the use of a splitting proxy enhances the value of web caching in that cache hits result in much more significant performance improvement over cache misses when TCP splitting is used. We also compare the performance of using different versions of HTTP in such a system. Copyright © 2003 John Wiley & Sons, Ltd. 相似文献
3.
Christos Bouras Agisilaos Konidaris 《International Journal of Communication Systems》2005,18(2):119-142
Redundant data transfers over the Web, can be mainly attributed to the repeated transfers of unchanged data. Web caches and Web proxies are some of the solutions that have been proposed, to deal with the issue of redundant data transfers. In this paper we focus on the efficient estimation and reduction of redundant data transfers over the Web. We first prove that a vast amount of redundant data is transferred in Web pages that are considered to carry fresh data. We show this by following an approach based on Web page fragmentation and manipulation. Web pages are broken down to fragments, based on specific criteria. We then deal with these fragments as independent constructors of the Web page and study their change patterns independently and in the context of the whole Web page. After the fragmentation process, we propose solutions for dealing with redundant data transfers. This paper has been based on our previous work on ‘Web Components’ but also on related work by other researchers. It utilises a proxy based, client/server architecture, and imposes changes to the algorithms executed on the Proxy server and on clients. We show that our proposed solution can considerably reduce the amount of redundant data transferred on the Web. Copyright © 2004 John Wiley & Sons, Ltd. 相似文献
4.
The development of future mobile networks will be driven, in large part, by content and web based services. In this paper,
we examine several performance, scalability and architectural challenges faced by future mobile web applications and how advanced
mobile content delivery techniques can address these challenges. We review existing content delivery using a taxonomy that
consists of three categories: network scaling, end system acceleration, and content and protocol optimization. While wireline
content delivery focuses on network and server scalability, mobile content delivery will likely benefit most from optimizing
radio link usage. We also present our ongoing work in this area, which extends the functionality of edge caching to the terminal,
uses user interest correlation information to maintain low terminal power consumption and adds a new dimension to radio resource
management.
This revised version was published online in August 2006 with corrections to the Cover Date. 相似文献
5.
Stateful session handoff for mobile WWW 总被引:1,自引:0,他引:1
This paper proposes a web session handoff system that can hand over not only stateless but also stateful sessions between homogenous and heterogeneous user devices to enable uninterrupted and seamless web access. The proposed system adopts a proxy-based approach and an optional client-assisted scheme in order to track and hand over session information. In the proposed system, a session is registered at a User Agent Proxy (UAP) and then tracked by the UAP so that the session can be handed over from one device via the UAP to another device. In addition to session information tracked by a UAP, the UAP can hand over more comprehensive session information by using the client-assisted scheme. Compared with client-based approaches, our design has several advantages, such as less modification to user devices, practicability, and fault tolerance. We have implemented a UAP on a PC and client programs for both PC and PDA. The implementation can successfully hand over between PC and PDA a stateful session for online shopping applications. 相似文献
6.
一个通用代理计费系统开发框架的设计与实现 总被引:4,自引:4,他引:0
用户在不同的网络环境中选择不同的代理软件实现上网和用户管理,这些代理软件既有共性又各具特色,为减少开发不同代理计费软件的工作量,提高开发效率,加快开发周期,提出利用软件重用的思想,将代理软件的差异集中到少数几个类的实现上,设计并实现一个通用代理计费系统开发框架,基于此框架利用相对简单的步骤开发了基于SQUID的代理计费系统,验证了框架的实用性和可行性,达到了设计目标。 相似文献
7.
TAN Zuo-wen 《通讯和计算机》2007,4(5):40-46
Signcryption is a public key or asymmetric cryptographic method that provides simultaneously both message confidentiality and integrity at a lower computational and communication cost. This paper presents a (t, n) threshold proxy signcryption scheme in which no less than t proxy agents in the proxy group can produce the signcryption cryptogram. combines the functionality of threshold proxy signing and encryption. The proposed scheme combines the functionality of both threshold proxy signing and encryption, and provides fair protection for the sender and the proxy agents. This scheme is secure against attack of public key substitution. It also satisfies security properties such as confidentiality and authenticity. 相似文献
8.
由于无证书公钥密码体制是一种新型公钥密码体制,它既克服了密钥托管问题,又不需要使用公钥证书,而在标准模型下所构造的方案与在随机语言模型下所构造的方案相比,具有更高的可证安全性,因此,该文在标准模型下,提出了一个无证书代理环签名方案。与现有的代理环签名方案相比,它具有更高的执行效率和可证安全性,能够归约于CDH(computational diffie-Hellman)问题假定。分析结果表明:它既能有效抵制来自密钥生成中心和授权人的伪造攻击,又能满足代理环签名的其他安全性需求;并且,该方案具有更高的执行效率,只需要两次对运算。 相似文献
9.
文章首先分析了张青坡等人中提出的多项式形式的E1Gamal签名体制的安全缺陷,然后基于有限域上多项式的性质,提出了有限域上多项式形式代理保护代理签名方案;新的签名方案中,利用多项式进行签名权利的委托,并由改进的有限域上的多项式形式的E1Gamal签名体制生成代理签名。新方案的安全性基于离散对数的难解性。 相似文献
10.