全文获取类型
收费全文 | 153篇 |
免费 | 6篇 |
国内免费 | 3篇 |
学科分类
工业技术 | 162篇 |
出版年
2023年 | 1篇 |
2020年 | 7篇 |
2019年 | 2篇 |
2018年 | 2篇 |
2017年 | 4篇 |
2016年 | 5篇 |
2015年 | 5篇 |
2014年 | 3篇 |
2013年 | 7篇 |
2012年 | 11篇 |
2011年 | 11篇 |
2010年 | 10篇 |
2009年 | 7篇 |
2008年 | 10篇 |
2007年 | 16篇 |
2006年 | 5篇 |
2005年 | 1篇 |
2004年 | 9篇 |
2003年 | 2篇 |
2002年 | 4篇 |
2001年 | 6篇 |
2000年 | 1篇 |
1999年 | 2篇 |
1997年 | 2篇 |
1996年 | 1篇 |
1995年 | 2篇 |
1994年 | 3篇 |
1993年 | 2篇 |
1992年 | 3篇 |
1991年 | 1篇 |
1990年 | 3篇 |
1989年 | 2篇 |
1987年 | 3篇 |
1986年 | 1篇 |
1985年 | 2篇 |
1983年 | 1篇 |
1982年 | 1篇 |
1974年 | 1篇 |
1973年 | 2篇 |
1970年 | 1篇 |
排序方式: 共有162条查询结果,搜索用时 46 毫秒
91.
Yi-Qing Wang Alain Trouvé Yali Amit Boaz Nadler 《Journal of Mathematical Imaging and Vision》2017,59(3):373-393
Detecting edges in noisy images is a fundamental task in image processing. Motivated, in part, by various real-time applications that involve large and noisy images, in this paper we consider the problem of detecting long curved edges under extreme computational constraints, that allow processing of only a fraction of all image pixels. We present a sublinear algorithm for this task, which runs in two stages: (1) a multiscale scheme to detect curved edges inside a few image strips; and (2) a tracking procedure to estimate their extent beyond these strips. We theoretically analyze the runtime and detection performance of our algorithm and empirically illustrate its competitive results on both simulated and real images. 相似文献
92.
93.
The calcium ion response of a quartz nanopipette was enhanced by immobilization of calmodulin to the nanopore surface. Binding to the analyte is rapidly reversible in neutral buffer and requires no change in media or conditions to regenerate the receptor. The signal remained reproducible over numerous measurements. The modified nanopipette was used to measure binding affinity to calcium ions, with a K(d) of 6.3 ± 0.8 × 10(-5) M. This affinity is in good agreement with reported values of the solution-state protein. The behavior of such reversible nanopore-based sensors can be used to study proteins in a confined environment and may lead to new devices for continuous monitoring. 相似文献
94.
Simulated reconstruction of a three-dimensional (3D) object in 360° from cylindrical hologram is proposed. The simulation is done using a fast calculation method, where wave propagation in spectral domain and in cylindrical coordinates is used to generate the cylindrical hologram of a 3D object. The same procedure is followed to reconstruct the object back. The reconstructions resembled the original object and could be seen from all 360°. The whole simulation process is done using open-source software. 相似文献
95.
96.
Boaz Barak Ran Canetti Yehuda Lindell Rafael Pass Tal Rabin 《Journal of Cryptology》2011,24(4):720-760
Research on secure multiparty computation has mainly concentrated on the case where the parties can authenticate each other
and the communication between them. This work addresses the question of what security can be guaranteed when authentication
is not available. We consider a completely unauthenticated setting, where all messages sent by the parties may be tampered with and modified by the adversary without the uncorrupted parties being able
to detect this fact. In this model, it is not possible to achieve the same level of security as in the authenticated-channel
setting. Nevertheless, we show that meaningful security guarantees can be provided: Essentially, all the adversary can do is to partition the network into disjoint sets, where in each set the
computation is secure in of itself, and also independent of the computation in the other sets. In this setting we provide, for the first time, nontrivial security guarantees in a
model with no setup assumptions whatsoever. We also obtain similar results while guaranteeing universal composability, in some variants of the common reference string
model. Finally, our protocols can be used to provide conceptually simple and unified solutions to a number of problems that
were studied separately in the past, including password-based authenticated key exchange and nonmalleable commitments. As an application of our results, we study the question of constructing secure protocols in partially authenticated networks,
where some of the links are authenticated, and some are not (as is the case in most networks today). 相似文献
97.
Boaz J. Super Author Vitae 《Pattern recognition》2007,40(10):2818-2825
This paper presents a direct method for finding corresponding pairs of parts between two shapes. Statistical knowledge about a large number of parts from many different objects is used to find a part correspondence between two previously unseen input shapes. No class membership information is required. The knowledge-based approach is shown to produce significantly better results than a classical metric distance approach. The potential role of part correspondence as a complement to geometric and structural comparisons is discussed. 相似文献
98.
Wireless Networks - Acquiring real time sensory data using remote swarms of tiny sensors depends on efficient wireless networking. Often, battery longevity of the sensors is a critical design... 相似文献
99.
Potassium p-nitrophenolate dihydrate, a potential semiorganic nonlinear optical material, has been synthesized and grown by slow evaporation technique at room temperature. Single crystal X-ray analysis presents an unprecedented bonding between ions in the crystal with acentric structure. In the new structural investigation, p-nitrophenolate instead of producing bond between phenolic O− and K+, it seems to put nitro group in bonding with the metal ion. Optical absorption shows excellent transmission in the entire visible and near-infrared region. Room temperature photocurrent, transport properties are carried out in order to enhance the application for second harmonic generation and opto-electronic devices. Dielectric constant is found to be independent at higher frequencies. The crystal possesses prominent positive photoconduction in the presence of photoactive centers formed with trap energy level. The nonlinear optical activity is confirmed by Kurtz powder test. 相似文献
100.
Peer review of research proposals and articles is an essential element in R&D processes worldwide. In most cases, each reviewer evaluates a small subset of the candidate proposals. The review board is then faced with the challenge of creating an overall “consensus” ranking on the basis of many partial rankings. In this paper we propose a branch-and-bound model to support the construction of an aggregate ranking from the partial rankings provided by the reviewers. In a recent paper we proposed ways to allocate proposals to reviewers so as to achieve the maximum possible overlap among the subsets of proposals allocated to different reviewers. Here, we develop a special branch-and-bound algorithm that utilizes the overlap generated through our earlier methods to enable discrimination in ranking the competing proposals. The effectiveness and efficiency of the algorithm is demonstrated with small numerical examples and tested through an extensive simulation experiment. 相似文献