首页 | 官方网站   微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   548篇
  免费   43篇
工业技术   591篇
  2024年   1篇
  2023年   7篇
  2022年   5篇
  2021年   9篇
  2020年   16篇
  2019年   10篇
  2018年   16篇
  2017年   17篇
  2016年   20篇
  2015年   23篇
  2014年   38篇
  2013年   27篇
  2012年   35篇
  2011年   31篇
  2010年   31篇
  2009年   39篇
  2008年   32篇
  2007年   28篇
  2006年   23篇
  2005年   23篇
  2004年   16篇
  2003年   15篇
  2002年   18篇
  2001年   13篇
  2000年   8篇
  1999年   11篇
  1998年   13篇
  1997年   10篇
  1996年   7篇
  1995年   2篇
  1994年   6篇
  1993年   6篇
  1992年   4篇
  1991年   4篇
  1989年   3篇
  1988年   2篇
  1987年   2篇
  1986年   2篇
  1985年   2篇
  1984年   4篇
  1983年   2篇
  1982年   2篇
  1981年   1篇
  1980年   2篇
  1977年   1篇
  1976年   3篇
  1974年   1篇
排序方式: 共有591条查询结果,搜索用时 15 毫秒
11.
Dimitris  Nikos  Costas   《Computers & Security》2009,28(7):578-591
Any application or service utilizing the Internet is exposed to both general Internet attacks and other specific ones. Most of the times the latter are exploiting a vulnerability or misconfiguration in the provided service and/or in the utilized protocol itself. Consequently, the employment of critical services, like Voice over IP (VoIP) services, over the Internet is vulnerable to such attacks and, on top of that, they offer a field for new attacks or variations of existing ones. Among the various threats–attacks that a service provider should consider are the flooding attacks, at the signaling level, which are very similar to those against TCP servers but have emerged at the application level of the Internet architecture. This paper examines flooding attacks against VoIP architectures that employ the Session Initiation Protocol (SIP) as their signaling protocol. The focus is on the design and implementation of the appropriate detection method. Specifically, a bloom filter based monitor is presented and a new metric, named session distance, is introduced in order to provide an effective protection scheme against flooding attacks. The proposed scheme is evaluated through experimental test bed architecture under different scenarios. The results of the evaluation demonstrate that the required time to detect such an attack is negligible and also that the number of false alarms is close to zero.  相似文献   
12.
This paper presents a new practical bit-vector algorithm for solving the well-known Longest Common Subsequence (LCS) problem. Given two strings of length m and n, nm, we present an algorithm which determines the length p of an LCS in O(nm/w) time and O(m/w) space, where w is the number of bits in a machine word. This algorithm can be thought of as column-wise “parallelization” of the classical dynamic programming approach. Our algorithm is very efficient in practice, where computing the length of an LCS of two strings can be done in linear time and constant (additional/working) space by assuming that mw.  相似文献   
13.
The present study investigates experimentally the behavior of concrete confined with fiber reinforced polymers (FRP) in the form of jackets which are applied according to a number of nonconventional techniques. First, the effectiveness of various jacketing configurations combined with anchors as a measure of increasing the strength and deformability of L-shaped columns is investigated. It is concluded that easy to install and low-cost anchors made of resin impregnated fibers properly placed at the reentrant corner of L-shaped columns enable excellent mobilization of confining stresses supplied by the FRP jackets. Next, a number of alternative confinement methods are investigated on concrete cylinders, aimed at quantifying the effectiveness of (1) unbonded jacketing, (2) spirally applied strips attached only at their ends, and (3) jacketing directly on concrete with mortar plastering. Although the study may be regarded as preliminary, it provides useful experimental support to a number of techniques which have the potential to open new horizons in the field of externally applied FRP for enhancing concrete confinement.  相似文献   
14.
15.
We consider the problem of computing all subtree repeats in a given labeled ordered tree. We first transform the tree to a string representing its postfix notation, and then present an algorithm based on the bottom-up technique to solve it. The proposed algorithm consists of two phases: the preprocessing phase and the phase where all subtree repeats are computed. The linear time and space complexity of the proposed algorithm are important parts of its quality.  相似文献   
16.
Bulletin of Engineering Geology and the Environment - This present paper presents an adopted methodology for Micro Tunnel Boring Machine (TBM) selection, based on the results of a...  相似文献   
17.
The aim of this study was to investigate the effect of freeze‐drying, hot air‐drying and vacuum‐drying at 70, 90 and 110 °C, on dried lemon pomace polyphenols and antioxidant capacity. The total phenolic content and antioxidant capacity were higher in lemon pomace dried by hot air or under vacuum than those dried by freeze‐drying and increased as the temperature increased. The highest total flavonoid content was recorded in the pomace dried under vacuum at 70 and 90 °C. Lemon pomace dried by freeze‐drying had the highest neohesperidin content, whereas pomace dried under vacuum at 70 °C had the highest rutin and p‐coumaric acid content. The highest gallic acid content was recorded in the pomace dried by hot air at 110 °C. The results of this study indicate that drying technique should be carefully selected according to the bioactive compounds aimed to be extracted.  相似文献   
18.
Avoiding the catastrophic failure of a large structure demands the material’s microstructure be designed in such as a way as to render any crack present innocuous thereby raising the integrity of that structure. Structural integrity of a composite material embraces contributions from: materials science and engineering; processing science; design and fabrication technology. It combines a number of interacting factors: the criticality of the application; the accessibility for and ability to inspect vital parts and components; the intended use including load spectrum and time; the consequences of impact, fatigue, temperature and hostile environment; the nature of inherent flaws; the constituent properties of the material system utilized; and it takes into account human factors.  相似文献   
19.
20.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号