全文获取类型
收费全文 | 4394篇 |
免费 | 543篇 |
国内免费 | 395篇 |
学科分类
工业技术 | 5332篇 |
出版年
2024年 | 36篇 |
2023年 | 122篇 |
2022年 | 252篇 |
2021年 | 274篇 |
2020年 | 268篇 |
2019年 | 174篇 |
2018年 | 160篇 |
2017年 | 165篇 |
2016年 | 193篇 |
2015年 | 175篇 |
2014年 | 261篇 |
2013年 | 255篇 |
2012年 | 229篇 |
2011年 | 348篇 |
2010年 | 232篇 |
2009年 | 255篇 |
2008年 | 223篇 |
2007年 | 228篇 |
2006年 | 230篇 |
2005年 | 166篇 |
2004年 | 150篇 |
2003年 | 135篇 |
2002年 | 125篇 |
2001年 | 94篇 |
2000年 | 71篇 |
1999年 | 67篇 |
1998年 | 62篇 |
1997年 | 64篇 |
1996年 | 45篇 |
1995年 | 44篇 |
1994年 | 37篇 |
1993年 | 29篇 |
1992年 | 23篇 |
1991年 | 33篇 |
1990年 | 17篇 |
1989年 | 21篇 |
1988年 | 13篇 |
1987年 | 4篇 |
1986年 | 15篇 |
1985年 | 7篇 |
1984年 | 9篇 |
1983年 | 6篇 |
1982年 | 3篇 |
1980年 | 3篇 |
1977年 | 1篇 |
1976年 | 2篇 |
1975年 | 1篇 |
1973年 | 1篇 |
1972年 | 1篇 |
1959年 | 1篇 |
排序方式: 共有5332条查询结果,搜索用时 0 毫秒
81.
82.
83.
签密是一种将加密和数字签名技术结合在一起的思想,它比采用先签名后加密的方法具有更高的效率.基于双线性对技术,提出了一种新的基于身份的门限签密方案.它利用决策双线性Diffie-Hellman(DBDH)问题的困难性在随机预言模型下给出了方案的语义安全性证明,并利用计算Diffie-Hellman(CDH)问题的困难性证明了方案的不可伪造性,同时指出方案具有较高的效率. 相似文献
84.
Cops and Robbers is a pursuit and evasion game played on graphs that has received much attention. We consider an extension of Cops and Robbers, distance k Cops and Robbers, where the cops win if at least one of them is of distance at most k from the robber in G. The cop number of a graph G is the minimum number of cops needed to capture the robber in G. The distance k analogue of the cop number, written ck(G), equals the minimum number of cops needed to win at a given distance k. We study the parameter ck from algorithmic, structural, and probabilistic perspectives. We supply a classification result for graphs with bounded ck(G) values and develop an O(n2s+3) algorithm for determining if ck(G)≤s for s fixed. We prove that if s is not fixed, then computing ck(G) is NP-hard. Upper and lower bounds are found for ck(G) in terms of the order of G. We prove that
85.
An efficient secure proxy verifiably encrypted signature scheme 总被引:1,自引:0,他引:1
Jianhong Zhang Chenglian Liu Yixian Yang 《Journal of Network and Computer Applications》2010,33(1):29-34
Verifiably encrypted signature is an important cryptographic primitive, it can convince a verifier that a given ciphertext is an encryption of signature on a given message. It is often used as a building block to construct an optimistic fair exchange. In this paper, we propose a new concept: a proxy verifiably encrypted signature scheme, by combining proxy signature with a verifiably encrypted signature. And we formalize security model of proxy verifiably encrypted signature. After a detail construction is given, we show that the proposed scheme is provably secure in the random oracle model. The security of the scheme is related to the computational Diffie–Hellman problem. 相似文献
86.
This paper presents results on a new hybrid optimization method which combines the best features of four traditional optimization methods together with an intelligent adjustment algorithm to speed convergence on unconstrained and constrained optimization problems. It is believed that this is the first time that such a broad array of methods has been employed to facilitate synergistic enhancement of convergence. Particle swarm optimization is based on swarm intelligence inspired by the social behavior and movement dynamics of bird flocking, fish schooling, and swarming theory. This method has been applied for structural damage identification, neural network training, and reactive power optimization. It is also believed that this is the first time an intelligent parameter adjustment algorithm has been applied to maximize the effectiveness of individual component algorithms within the hybrid method. A comprehensive sensitivity analysis of the traditional optimization methods within the hybrid group is used to demonstrate how the relationship among the design variables in a given problem can be used to adjust algorithm parameters. The new method is benchmarked using 11 classical test functions and the results show that the new method outperforms eight of the most recently published search methodologies. 相似文献
87.
Dieter Mitsche 《Theoretical computer science》2011,412(29):3589-3597
Higher order Delaunay triangulations are a generalization of the Delaunay triangulation that provides a class of well-shaped triangulations, over which extra criteria can be optimized. A triangulation is order-k Delaunay if the circumcircle of each triangle of the triangulation contains at most k points. In this paper we study lower and upper bounds on the number of higher order Delaunay triangulations, as well as their expected number for randomly distributed points. We show that arbitrarily large point sets can have a single higher order Delaunay triangulation, even for large orders, whereas for first order Delaunay triangulations, the maximum number is 2n−3. Next we show that uniformly distributed points have an expected number of at least 2ρ1n(1+o(1)) first order Delaunay triangulations, where ρ1 is an analytically defined constant (ρ1≈0.525785), and for k>1, the expected number of order-k Delaunay triangulations (which are not order-i for any i<k) is at least 2ρkn(1+o(1)), where ρk can be calculated numerically. 相似文献
88.
This paper deals with the study of linear random population models and with a random logistic model (where parameters are random variables). Assuming appropriate conditions, the stochastic processes solutions are obtained under closed form using mean square calculus. Expectation and variance expressions for the stochastic processes solutions are given and illustrative examples are included. 相似文献
89.
The satisfiability problem is a basic core NP-complete problem. In recent years, a lot of heuristic algorithms have been developed to solve this problem, and many experiments have evaluated and compared the performance of different heuristic algorithms. However, rigorous theoretical analysis and comparison are rare. This paper analyzes and compares the expected runtime of three basic heuristic algorithms: RandomWalk, (1+1) EA, and hybrid algorithm. The runtime analysis of these heuristic algorithms on two 2-SAT instances shows that the expected runtime of these heuristic algorithms can be exponential time or polynomial time. Furthermore, these heuristic algorithms have their own advantages and disadvantages in solving different SAT instances. It also demonstrates that the expected runtime upper bound of RandomWalk on arbitrary k-SAT (k?3) is O(n(k−1)), and presents a k-SAT instance that has Θ(n(k−1)) expected runtime bound. 相似文献
90.
Yong Gao 《Artificial Intelligence》2009,173(14):1343-1366
Data reduction is a key technique in the study of fixed parameter algorithms. In the AI literature, pruning techniques based on simple and efficient-to-implement reduction rules also play a crucial role in the success of many industrial-strength solvers. Understanding the effectiveness and the applicability of data reduction as a technique for designing heuristics for intractable problems has been one of the main motivations in studying the phase transition of randomly-generated instances of NP-complete problems.In this paper, we take the initiative to study the power of data reductions in the context of random instances of a generic intractable parameterized problem, the weighted d-CNF satisfiability problem. We propose a non-trivial random model for the problem and study the probabilistic behavior of the random instances from the model. We design an algorithm based on data reduction and other algorithmic techniques and prove that the algorithm solves the random instances with high probability and in fixed-parameter polynomial time O(dknm) where n is the number of variables, m is the number of clauses, and k is the fixed parameter. We establish the exact threshold of the phase transition of the solution probability and show that in some region of the problem space, unsatisfiable random instances of the problem have parametric resolution proof of fixed-parameter polynomial size. Also discussed is a more general random model and the generalization of the results to the model. 相似文献