全文获取类型
收费全文 | 2245篇 |
免费 | 289篇 |
国内免费 | 330篇 |
专业分类
电工技术 | 38篇 |
技术理论 | 1篇 |
综合类 | 207篇 |
化学工业 | 10篇 |
金属工艺 | 2篇 |
机械仪表 | 10篇 |
建筑科学 | 13篇 |
矿业工程 | 11篇 |
能源动力 | 4篇 |
轻工业 | 12篇 |
水利工程 | 2篇 |
石油天然气 | 3篇 |
武器工业 | 11篇 |
无线电 | 1116篇 |
一般工业技术 | 26篇 |
冶金工业 | 12篇 |
原子能技术 | 1篇 |
自动化技术 | 1385篇 |
出版年
2024年 | 8篇 |
2023年 | 22篇 |
2022年 | 16篇 |
2021年 | 17篇 |
2020年 | 23篇 |
2019年 | 27篇 |
2018年 | 36篇 |
2017年 | 52篇 |
2016年 | 50篇 |
2015年 | 76篇 |
2014年 | 107篇 |
2013年 | 118篇 |
2012年 | 155篇 |
2011年 | 202篇 |
2010年 | 231篇 |
2009年 | 224篇 |
2008年 | 281篇 |
2007年 | 335篇 |
2006年 | 266篇 |
2005年 | 253篇 |
2004年 | 157篇 |
2003年 | 83篇 |
2002年 | 69篇 |
2001年 | 35篇 |
2000年 | 4篇 |
1999年 | 6篇 |
1998年 | 1篇 |
1997年 | 1篇 |
1996年 | 2篇 |
1995年 | 1篇 |
1993年 | 2篇 |
1990年 | 1篇 |
1967年 | 1篇 |
1965年 | 2篇 |
排序方式: 共有2864条查询结果,搜索用时 31 毫秒
1.
Christian Stephan Bernd 《AEUE-International Journal of Electronics and Communications》2006,60(1):20-24
Security for ad hoc network environments has received a lot of attention as of today. Previous work has mainly been focussing on secure routing, fairness issues, and malicious node detection. However, the issue of introducing and conserving trust relationships has received considerably less attention. In this article, we present a scalable method for the use of public key certificates and their revocation in mobile ad hoc networks (MANETs). With the LKN-ad hoc security framework (LKN-ASF) a certificate management protocol has been introduced, bringing PKI technology to MANETs. In addition a performance analysis of two different revocation approaches for MANETs will be presented. 相似文献
2.
This paper addresses the problem of power control in a multihop wireless network supporting multicast traffic. We face the problem of forwarding packet traffic to multicast group members while meeting constraints on the signal-to-interference-plus-noise ratio (SINR) at the intended receivers. First, we present a distributed algorithm which, given the set of multicast senders and their corresponding receivers, provides an optimal solution when it exists, which minimizes the total transmit power. When no optimal solution can be found for the given set of multicast senders and receivers, we introduce a distributed, joint scheduling and power control algorithm which eliminates the weak connections and tries to maximize the number of successful multicast transmissions. The algorithm allows the other senders to solve the power control problem and minimize the total transmit power. We show that our distributed algorithm converges to the optimal solution when it exists, and performs close to centralized, heuristic algorithms that have been proposed to address the joint scheduling and power control problem. 相似文献
3.
In recent years, constructing a virtual backbone by nodes in a connected dominating set (CDS) has been proposed to improve the performance of ad hoc wireless networks. In general, a dominating set satisfies that every vertex in the graph is either in the set or adjacent to a vertex in the set. A CDS is a dominating set that also induces a connected sub‐graph. However, finding the minimum connected dominating set (MCDS) is a well‐known NP‐hard problem in graph theory. Approximation algorithms for MCDS have been proposed in the literature. Most of these algorithms suffer from a poor approximation ratio, and from high time complexity and message complexity. In this paper, we present a new distributed approximation algorithm that constructs a MCDS for wireless ad hoc networks based on a maximal independent set (MIS). Our algorithm, which is fully localized, has a constant approximation ratio, and O(n) time and O(n) message complexity. In this algorithm, each node only requires the knowledge of its one‐hop neighbours and there is only one shortest path connecting two dominators that are at most three hops away. We not only give theoretical performance analysis for our algorithm, but also conduct extensive simulation to compare our algorithm with other algorithms in the literature. Simulation results and theoretical analysis show that our algorithm has better efficiency and performance than others. Copyright © 2005 John Wiley & Sons, Ltd. 相似文献
4.
基于多信道预约可冲突避免的多址接入协议 总被引:3,自引:0,他引:3
本文为多跳分布多无线网络提出了一套灵活而有效的自适应获取冲突避免(AACA)的多址接入协议。在该协议中,各节点竞争公共信道,利用RTS/CTS对话形式来预约各业务信道,成功预约后的分组传输不会受到其他节点的干扰。它使用任意确定数目信道,以异步方式工作,并且使得各节点利用半双工无线电台就可以灵活、简便地实现资源预约。分析和比较结果说明,所提出的多信道预约协议可以有效地解决隐藏终端、暴露终端以及侵入终端的问题。 相似文献
5.
Performance analysis of IEEE 802.11 ad hoc networks in the presence of exposed terminals 总被引:1,自引:0,他引:1
The paper evaluates the performance effects of exposed terminals in IEEE 802.11 ad hoc networks in finite load conditions. It derives analytical models for the estimation of channel utilization and media access delay for IEEE 802.11 ad hoc networks in finite load conditions with and without exposed terminals. The simulation results show that the analytical estimated channel utilization and media access delay metrics are fairly accurate. 相似文献
6.
Huayi Wu Xiaohua Jia Yanxiang He Chuanhe Huang 《International Journal of Communication Systems》2005,18(9):803-816
This paper investigates the issues of QoS routing in CDMA/TDMA ad hoc networks. Since the available bandwidth is very limited in ad hoc networks, a QoS request between two nodes will be blocked if there does not exist a path that can meet the QoS requirements, even though there is enough free bandwidth in the whole system. In this paper, we propose a new scheme of using multiple paths between two nodes as the route for a QoS call. The aggregate bandwidth of the multiple paths can meet the bandwidth requirement of the call and the delays of these paths are within the required bound of the call. We also propose three strategies by which to choose a set of paths as the route, namely, shortest path first (SPF), largest bandwidth first (LBF), and largest hop‐bandwidth first (LHBF). Extensive simulations have been conducted to evaluate the performance of the three strategies in comparison with a traditional single path routing algorithm. The simulation results show that the proposed multiple paths routing scheme significantly reduces the system blocking rates in various network environments, especially when the network load is heavy. Copyright © 2005 John Wiley & Sons, Ltd. 相似文献
7.
8.
9.
10.
Liljana Gavrilovska 《Wireless Personal Communications》2006,37(3-4):271-290
Wireless ad hoc networks are temporary formed, infrastructureless networks. Due to the unstable channel conditions and network connectivity, their characteristics impose serious challenges in front of network designers. The layering approach to network design does not fit the ad hoc environment well. Therefore, various cross-layering approaches, where protocol layers actively interact, exchange inherent layer information and fine tune their parameters according to the network status are becoming increasingly popular. This paper presents an in-depth analysis of the latest cross-layering approaches for wireless ad hoc networks supported by several examples. A special emphasis is put on the link and network layer related cross-layer designs. Several link adaptation and efficient service discovery schemes are elaborated through analytical and simulation studies. Their performance shows the potentials of the cross-layering for boosting system characteristics in wireless ad hoc networks.
Liljana Gavrilovska currently holds a position of full professor at Faculty of Electrical Engineering, University “St. Cyril and Metodij” – Skopje, Macedonia. She is chief of Telecommunications Laboratory and teaches undergraduate courses in telecommunication networks, data transmission and switching and traffic theory, and graduate courses in wireless, mobile and personal networks, teletraffic engineering and planning, and broadband multiservices networks. In 2000 she joined the Center for PersonKommunikation, Aalborg University, Denmark, as a visiting professor and during 2001--2002 she held a position of associate research professor at the same university. Currently she holds a part-time position of associated research professor with Center for Teleinfrastructur (CTIF). Prof. Gavrilovska was involved in several EU (ACTS ASAP, IST PACWOMAN, MAGNET, TEMPUS) and national/international projects. She published numerous conference and journal papers and participated in several workshops. At the moment she is working on the book “Ad Hoc Networking Towards Seamless Communications” together with prof. R. Prasad. Her research interests include wireless and personal area networks, ad hoc networking, networking protocols, traffic analysis, QoS, and optimization techniques. She is a senior member of IEEE and serves as a Chair of Macedonian Communication Chapter. 相似文献