首页 | 官方网站   微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   934篇
  免费   61篇
  国内免费   1篇
工业技术   996篇
  2024年   2篇
  2023年   11篇
  2022年   8篇
  2021年   61篇
  2020年   28篇
  2019年   23篇
  2018年   32篇
  2017年   23篇
  2016年   53篇
  2015年   32篇
  2014年   50篇
  2013年   74篇
  2012年   61篇
  2011年   81篇
  2010年   41篇
  2009年   51篇
  2008年   30篇
  2007年   45篇
  2006年   38篇
  2005年   28篇
  2004年   24篇
  2003年   20篇
  2002年   21篇
  2001年   15篇
  2000年   15篇
  1999年   7篇
  1998年   21篇
  1997年   8篇
  1996年   10篇
  1995年   7篇
  1994年   12篇
  1993年   7篇
  1992年   4篇
  1991年   3篇
  1990年   2篇
  1989年   4篇
  1988年   2篇
  1987年   4篇
  1985年   3篇
  1984年   4篇
  1983年   2篇
  1982年   4篇
  1981年   2篇
  1980年   4篇
  1979年   2篇
  1978年   5篇
  1977年   3篇
  1976年   2篇
  1965年   1篇
  1954年   1篇
排序方式: 共有996条查询结果,搜索用时 219 毫秒
21.
The progress of three-dimensional 3D technologies, together with the wide diffusion of both Internet and broadband technologies, is paving the way to emerging live streaming services which have been conceived for delivering 3D video contents in real-time fashion to end users. Nowadays, the only available tools supporting stereoscopic 3D video services cannot be freely downloaded and require the adoption of owner stereoscopic players. Motivated by the lack of an effective solution, we developed a freeware and open source 3D live streaming framework, namely 3DStreaming. It provides stereoscopic 3D live streaming services over the Internet. In particular, it realizes a complete server implementation, offering the support for any transmission protocol and encoding scheme, as well as the full compatibility with any network architecture (i.e., LAN, MAN, Internet, and so on). At the same time, it allows users to use the preferable stereoscopic player and to render the video through any technique available for the chosen player. The overall performances of the proposed tool have been presented by testing its behavior in several network configurations (i.e., by varying network topology, coding technique, 3D representation format, and average encoding rate). All the measured metrics, which include the number of RTP segments that are transmitted and received, the frame loss ratio, and the PSNR, fully demonstrate the right behavior of the implemented tool in all the considered scenarios. We believe that, thanks to its high flexibility, this tool can be exploited by researchers working on stereoscopic-3D related issues to design, test, and evaluate novel and innovative algorithms, protocols, and network architectures.  相似文献   
22.
Malware is one of the main threats to the Internet security in general, and to commercial transactions in particular. However, given the high level of sophistication reached by malware (e.g. usage of encrypted payload and obfuscation techniques), malware detection tools and techniques still call for effective and efficient solutions. In this paper, we address a specific, dreadful, and widely diffused financial malware: Zeus.The contributions of this paper are manifold: first, we propose a technique to break the encrypted malware communications, extracting the keystream used to encrypt such communications; second, we provide a generalization of the proposed keystream extraction technique. Further, we propose Cronus, an IDS that specifically targets Zeus malware. The implementation of Cronus has been experimentally tested on a production network, and its high quality performance and effectiveness are discussed. Finally, we highlight some principles underlying malware—and Zeus in particular—that could pave the way for further investigation in this field.  相似文献   
23.
This paper presents semantic models, mechanisms and a service to locate mobile entities in Smart and Intelligent Environments. The key feature of the service is the semantic integration of different positioning systems that not only enables the environment to handle transparently such physical positioning systems, but also to reason on location information coming from different systems and to combine it to obtain higher context information. Indeed, the service relies on the use of ontologies and rules to define a uniform, unambiguous and well-defined model for the location information, independently of the particular positioning system. Moreover, the location service performs logic and reasoning mechanisms to provide both physical and semantic locations of mobile objects and to infer the finest granularity in the case when a mobile object is located by more than one positioning system. Finally, we present an application of the proposed approach to the case of a Smart Hospital.  相似文献   
24.
The diffusion coefficient \(D_{{{\text{O}}_{2} }}\), the porosity and the pore structure of mortars produced with a Portland cement and a range of blended cements containing limestone powder, microsilica, portlandite or slag were measured in the non-carbonated and the carbonated state. Additionally, the setup for measuring O2 diffusion was adapted to measure also the CO2 diffusion of the carbonated mortars. The diffusion coefficient \(D_{{{\text{O}}_{2} }}\) and the total porosity were increased in the mortars containing microsilica and slag, while they were decreased in the other mortars due to carbonation. Invariably, the pore structure became coarser in all samples. The relationship between diffusion coefficients \(D_{{{\text{O}}_{2} }}\) and \(D_{{{\text{CO}}_{2} }}\) in the carbonated mortars was always linear, with \(D_{{{\text{O}}_{2} }}\) systematically higher by factor of 1.37. As this factor broadly agrees with what was found in the scant literature about CO2 diffusion, it could be used for estimating \(D_{{{\text{CO}}_{2} }}\) of carbonated mortar and concrete based on measurements of O2 diffusion.  相似文献   
25.
26.
27.
28.
29.
Silver-based products have been proven to be effective in retarding and preventing bacterial growth since ancient times. In the field of restorative dentistry, the use of silver ions/nanoparticles has been explored to counteract bacterial infections, as silver can destroy bacterial cell walls by reacting with membrane proteins. However, it is also cytotoxic towards eukaryotic cells, which are capable of internalizing nanoparticles. In this work, we investigated the biological effects of Chitlac-nAg, a colloidal system based on a modified chitosan (Chitlac), administered for 24–48?h to a co-culture of primary human gingival fibroblasts and Streptococcus mitis in the presence of saliva, developed to mimic the microenvironment of the oral cavity. We sought to determine its efficiency to combat oral hygiene-related diseases without affecting eukaryotic cells. Cytotoxicity, reactive oxygen species production, apoptosis induction, nanoparticles uptake, and lysosome and autophagosome metabolism were evaluated. In vitro results show that Chitlac-nAg does not exert cytotoxic effects on human gingival fibroblasts, which seem to survive through a homoeostasis mechanism involving autophagy. That suggests that the novel biomaterial Chitlac-nAg could be a promising tool in the field of dentistry.  相似文献   
30.
There has been a big challenge in structured peer-to-peer overlay network research area. Generally, a structured overlay network involves nodes evenly or based on their resource availabilities, and gathers nodes?? resources to achieve some bigger tasks. The challenge here is to gather resources based on nodes?? interests, and only interested nodes are involved in a certain task. Toward this challenge, we propose a new scheme to a peer-to-peer publish/subscribe network. Publish/subscribe represents a new paradigm for distributed content delivery. It provides an alternative to address-based communication due to its ability to decouple communication between the source and the destination. We propose a Bloom filter based mapping scheme to map IDs to nodes?? interests in addition to new interest proximity metric to forward events and to build nodes?? routing tables. We also propose a new approach called ??shared interest approach?? for network discovery. To evaluate the algorithms proposed in this work, we conducted simulations in both static and dynamic settings, and found a low false positive rate. We also discuss about a well-known application called Twitter, and show how our scheme would work in a real environment.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号