首页 | 官方网站   微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   6610篇
  免费   1088篇
  国内免费   801篇
工业技术   8499篇
  2024年   16篇
  2023年   73篇
  2022年   186篇
  2021年   208篇
  2020年   239篇
  2019年   159篇
  2018年   160篇
  2017年   194篇
  2016年   274篇
  2015年   310篇
  2014年   471篇
  2013年   454篇
  2012年   543篇
  2011年   690篇
  2010年   546篇
  2009年   538篇
  2008年   606篇
  2007年   660篇
  2006年   514篇
  2005年   449篇
  2004年   353篇
  2003年   263篇
  2002年   183篇
  2001年   130篇
  2000年   78篇
  1999年   47篇
  1998年   30篇
  1997年   27篇
  1996年   19篇
  1995年   6篇
  1994年   13篇
  1993年   11篇
  1992年   2篇
  1991年   8篇
  1990年   3篇
  1989年   4篇
  1988年   3篇
  1986年   3篇
  1985年   5篇
  1982年   1篇
  1981年   3篇
  1979年   2篇
  1978年   3篇
  1977年   1篇
  1976年   7篇
  1974年   1篇
  1973年   1篇
  1972年   1篇
  1959年   1篇
排序方式: 共有8499条查询结果,搜索用时 15 毫秒
21.
We present some new lower bounds on the optimal information rate and on the optimal average information rate of secret sharing schemes with homogeneous access structure. These bounds are found by using some covering constructions and a new parameter, the k-degree of a participant, that is introduced in this paper. Our bounds improve the previous ones in almost all cases.  相似文献   
22.
基于多智能体的数控机床资源共享技术研究   总被引:8,自引:1,他引:7  
以数控铣床为对象,应用多智能体技术,以解决传统的资源共享所面lI缶的透明度低和效率低下的问题。首先,在分析功能模型的基础上,提出并实现了资源共享的四层网络拓扑结构;其次,构造了面向设备资源共享功能的智能体信息流模型,以实现四层结构之间的交互;其三,定义了智能体状态函数,并以此为依据,建立了智能体协商机制。所开发的原型系统表明,以上成果有效地提高了数控机床资源共享的透明度和效率。  相似文献   
23.
新颖的基于小波变换的数字水印方案   总被引:3,自引:1,他引:2  
随着计算机网络技术与多媒体技术的快速发展,数字产品的版权保护已经成为信息技术领域中最重要的问题之一,提出了一种新颖的基于离散小波变换的数字水印方案,该方案利用改进的Pacthwork算法,将水印嵌入到LL子带中,水印信号在解码过程中无需使用原始图像可快速地重嵌入,该算法利用BCH码来降低误码率,应用所提出的算法,把一个32个字符的水印嵌入到图像中,实现结果表明水印是不可察觉的,经过JPEG有损压缩,低通与中值滤波等图像处理操作后仍是鲁棒的。  相似文献   
24.
一种用于版权保护的音频数字水印算法   总被引:2,自引:0,他引:2  
研究了一种基于小波变换的音频数字水印算法,水印为一幅二值图像,仿真实验表明该算法具有较强的稳健性,可用于数字音产品的版权保护。  相似文献   
25.
This paper introduces an efficient approach to protect the ownership by hiding an iris data into digital image for an authentication purpose. It is based on the theory of wavelets. The idea is to secretly embed biometric data (iris print) in the content of the image identifying the owner. The system is based on an empirical analysis of biometric and watermarking technologies, and it is split into several processes. The first process is based on iris image analysis, which aids the generation of the iris code (watermark); the second and the third processes deal with embedding and detecting a watermark; and the last process deals with the authentication. A new metric that measures the objective quality of the image based on the detected watermark bit is introduced, which does not require the original unmarked image for watermark detection. Simulation results show the effectiveness and efficiency of the proposed approach. The text was submitted by the author in English.  相似文献   
26.
一种新的图像水印方案   总被引:1,自引:0,他引:1  
郭磊  郭宝龙 《通信学报》2004,25(5):20-27
目标区域是图像中视觉上最重要的部分。针对现有的水印算法很少考虑图像中确定的目标区域这一问题,提出了一种基于目标区域的水印方案(WIOR)。方案首先利用小波变换分析图像的目标特征,并依据图像的小波高频系数特征对其进行聚类,获得水印的嵌入域,在此嵌入域中,选择小波系数并对其进行量化调制来嵌入二值扩谱水印;同时,通过只在图像的局部区域内嵌入较少的水印信息来改善水印的隐蔽性。实验结果表明,该方案对于一类具有突出目标特征的图像具有较好的效果。嵌入的水印主要优势在于真正把水印嵌入图像的视觉重要部分,从而能有效地抵御剪切攻击,而且可以实现盲检测。  相似文献   
27.
The paper presents a model for the collaboration among independent freight forwarding entities. In the modern highly competitive transportation branch freight forwarders reduce their fulfillment costs by exploiting different execution modes (self-fulfillment and subcontraction). For self-fulfillment they use their own vehicles to execute the requests and for subcontracting they forward the orders to external freight carriers. Further enhancement of competitiveness can be achieved if the freight forwarders cooperate in coalitions in order to balance their request portfolios. Participation in such a coalition gains additional profit for the entire coalition and for each participant, therefore reinforcing the market position of the partners. The integrated operational transport problem as well as existing collaboration approaches are introduced. The presented model for collaboration is based on theoretical foundations in the field of combinatorial auctions and operational research game theory. It is applicable for coalitions of freight forwarders, especially for the collaboration of Profit Centres within large freight forwarding companies. The proposed theoretical approach and the presented collaboration model are suitable for a coalition of freight forwarding companies with nearly similar potential on the market.  相似文献   
28.
29.
迭加与量化水印嵌入方案的比较及量化参数优化   总被引:3,自引:0,他引:3  
分别研究了迭加法和量化法的隐蔽性和稳健性,并且提出了量化调制水印方案中的参数优化方法。对两类方法的分析比较表明,迭加法适用于在高频分量嵌入水印,而量化法适用于在低频分量嵌入水印。并以实验验证了这一结论。  相似文献   
30.
Verifiable Distributed Oblivious Transfer and Mobile Agent Security   总被引:1,自引:0,他引:1  
The mobile agent is a fundamental building block of the mobile computing paradigm. In mobile agent security, oblivious transfer (OT) from a trusted party can be used to protect the agent’s privacy and the hosts’ privacy. In this paper, we introduce a new cryptographic primitive called Verifiable Distributed Oblivious Transfer (VDOT), which allows us to replace a single trusted party with a group of threshold trusted servers. The design of VDOT uses a novel technique called consistency verification of encrypted secret shares. VDOT protects the privacy of both the sender and the receiver against malicious attacks of the servers. We also show the design of a system to apply VDOT to protect the privacy of mobile agents. Our design partitions an agent into the general portion and the security-sensitive portion. We also implement the key components of our system. As far as we know, this is the first effort to implement a system that protects the privacy of mobile agents. Our preliminary evaluation shows that protecting mobile agents not only is possible, but also can be implemented efficiently. This work was supported in part by the DoD University Research Initiative (URI) program administered by the Office of Naval Research under grant N00014-01-1-0795. Sheng Zhong was supported by ONR grant N00014-01-1-0795 and NSF grants ANI-0207399 and CCR-TC-0208972. Yang Richard Yang was supported in part by NSF grant ANI-0207399. A preliminary version of this paper was presented at the DialM-POMC Joint Workshop on Foundations of Mobile Computing in 2003. Sheng Zhong received his Ph.D. in computer science from Yale University in the year of 2004. He holds an assistant professor position at SUNY Buffalo and is currently on leave for postdoctoral research at the Center for Discrete Mathematics and Theoretical Computer Science (DIMACS). His research interests, on the practical side, are security and incentives in data mining, databases, and wireless networks. On the theoretical side, he is interested in cryptography and game theory. Yang Richard Yang is an Assistant Professor of Computer Science at Yale University. His research interests include computer networks, mobile computing, wireless networking, sensor networks, and network security. He leads the LAboratory of Networked Systems (LANS) at Yale. His recent awards include a Schlumberger Fellowship and a CAREER Award from the National Science Foundation. He received his B.E. degree from Tsinghua University (1993), and his M.S. and Ph.D. degrees from the University of Texas at Austin (1998 and 2001).  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号