全文获取类型
收费全文 | 214篇 |
免费 | 6篇 |
学科分类
工业技术 | 220篇 |
出版年
2023年 | 1篇 |
2022年 | 2篇 |
2021年 | 7篇 |
2020年 | 5篇 |
2019年 | 1篇 |
2018年 | 3篇 |
2017年 | 4篇 |
2016年 | 1篇 |
2015年 | 4篇 |
2014年 | 4篇 |
2013年 | 10篇 |
2012年 | 4篇 |
2011年 | 5篇 |
2010年 | 12篇 |
2009年 | 11篇 |
2008年 | 22篇 |
2007年 | 11篇 |
2006年 | 14篇 |
2005年 | 10篇 |
2004年 | 6篇 |
2003年 | 6篇 |
2002年 | 4篇 |
2001年 | 4篇 |
2000年 | 4篇 |
1999年 | 5篇 |
1998年 | 3篇 |
1997年 | 5篇 |
1996年 | 6篇 |
1995年 | 4篇 |
1994年 | 1篇 |
1993年 | 2篇 |
1992年 | 1篇 |
1991年 | 2篇 |
1990年 | 2篇 |
1989年 | 2篇 |
1988年 | 2篇 |
1987年 | 4篇 |
1986年 | 2篇 |
1985年 | 2篇 |
1984年 | 5篇 |
1982年 | 1篇 |
1981年 | 2篇 |
1980年 | 2篇 |
1978年 | 2篇 |
1976年 | 4篇 |
1975年 | 2篇 |
1974年 | 1篇 |
1973年 | 2篇 |
1972年 | 1篇 |
排序方式: 共有220条查询结果,搜索用时 15 毫秒
51.
The aim of this paper is to demonstrate the feasibility of authenticated throughput-efficient routing in an unreliable and dynamically changing synchronous network in which the majority of malicious insiders try to destroy and alter messages or disrupt communication in any way. More specifically, in this paper we seek to answer the following question: Given a network in which the majority of nodes are controlled by a node-controlling adversary and whose topology is changing every round, is it possible to develop a protocol with polynomially bounded memory per processor (with respect to network size) that guarantees throughput-efficient and correct end-to-end communication? We answer the question affirmatively for extremely general corruption patterns: we only request that the topology of the network and the corruption pattern of the adversary leaves at least one path each round connecting the sender and receiver through honest nodes (though this path may change at every round). Out construction works in the public-key setting and enjoys optimal transfer rate and bounded memory per processor (that is polynomial in the network size and does not depend on the amount of traffic). We stress that our protocol assumes no knowledge of which nodes are corrupted nor which path is reliable at any round, and is also fully distributed with nodes making decisions locally, so that they need not know the topology of the network at any time. The optimality that we prove for our protocol is very strong. Given any routing protocol, we evaluate its efficiency (rate of message delivery) in the “worst case,” that is with respect to the worst possible graph and against the worst possible (polynomially bounded) adversarial strategy (subject to the above mentioned connectivity constraints). Using this metric, we show that there does not exist any protocol that can be asymptotically superior (in terms of throughput) to ours in this setting. We remark that the aim of our paper is to demonstrate via explicit example the feasibility of throughput-efficient authenticated adversarial routing. However, we stress that out protocol is not intended to provide a practical solution, as due to its complexity, no attempt thus far has been made to reduce constants and memory requirements. Our result is related to recent work of Barak et al. (Proc. of Advances in Cryptology—27th EUROCRYPT 2008, LNCS, vol. 4965, pp. 341–360, 2008) who studied fault localization in networks assuming a private-key trusted-setup setting. Our work, in contrast, assumes a public-key PKI setup and aims at not only fault localization, but also transmission optimality. Among other things, our work answers one of the open questions posed in the Barak et al. paper regarding fault localization on multiple paths. The use of a public-key setting to achieve strong error-correction results in networks was inspired by the work of Micali et al. (Proc. of 2nd Theory of Cryptography Conf., LNCS, vol. 3378, pp. 1–16, 2005) who showed that classical error correction against a polynomially bounded adversary can be achieved with surprisingly high precision. Our work is also related to an interactive coding theorem of Rajagopalan and Schulman (Proc. 26th ACM Symp. on Theory of Computing, pp. 790–799, 1994) who showed that in noisy-edge static-topology networks a constant overhead in communication can also be achieved (provided none of the processors are malicious), thus establishing an optimal-rate routing theorem for static-topology networks. Finally, our work is closely related and builds upon to the problem of End-To-End Communication in distributed networks, studied by Afek and Gafni (Proc. of the 7th ACM Symp. on Principles of Distributed Computing, pp. 131–148, 1988); Awebuch et al. (Proc. of the 30th IEEE Symp. on Foundations of Computer Science, FOCS, 1989); Afek et al. (Proc. of the 11th ACM Symp. on Principles of Distributed Computing, pp. 35–46, 1992); and Afek et al. (J. Algorithms 22:158–186, 1997), though none of these papers consider or ensure correctness in the setting of a node-controlling adversary that may corrupt the majority of the network. 相似文献
52.
Yair Margalit Sara Abramovich-Bar Yair Bamberger Shionto Levy Shmuel Zitrin 《Journal of Energetic Materials》2013,31(1-4):363-376
In order to evaluate the applicability of NMR to the analysis of explosives, the method was used to analyse explosives from actual cases. The results were then compared with results from other analytical methods, mainly TLC and GC/MS. For unexploded samples NMR was found to be a simple, fast and reliable method, often allowing the identification of mixtures without pre-separation. Some post-explosion samples were also successfully analysed by NMR. Although sensitivity problems still exist, NMR showed a surprisingly promising prospects for the difficult field of post-explosion analysis. 相似文献
53.
Electrochemical deposition of ruthenium on n-type silicon from an ionic liquid is reported for the first time. The study was performed by dissolving ruthenium(III) chloride in a 1-butyl-3-methyl imidazolium hexafluorophosphate (BMIPF6) room-temperature ionic liquid (RTIL). Cyclic voltammetry (CV) studies demonstrate reduction and stripping peaks at −2.1 and 0.2 V vs. Pt quasi-reference, corresponding to the deposition and dissolution of ruthenium, respectively. Metallic Ru films of ∼100 nm thickness have been deposited and were analyzed using scanning electron microscopy (SEM) and X-ray photoelectron spectroscopy (XPS). 相似文献
54.
Dar Reuven; Rosen-Korakin Nurit; Shapira Oren; Gottlieb Yair; Frenk Hanan 《Canadian Metallurgical Quarterly》2010,119(1):248
In the study, the authors examined the effects of smoking deprivation, anticipation of smoking, and actual smoking on the craving to smoke. Flight attendants who were light to heavy smokers rated their craving to smoke at predetermined time points during a 2-way short flight (each leg 3–5.5 hr) and a 1-way long flight (8–13 hr). In both short and long flights, craving increased gradually and peaked as landing approached. Craving levels at the end of the 1st leg of the short flights were equal to those at the end of the long flight and were much higher than those at the parallel time point in the long flight. In the short flight, craving levels at the beginning of the 2nd leg dropped relative to the end of the 1st leg, both for participants who smoked during the intermission and for those who did not, though the drop was steeper for the former. The results provide additional evidence for the role of psychological factors in determining the craving to smoke in a naturalistic setting. (PsycINFO Database Record (c) 2010 APA, all rights reserved) 相似文献
55.
We present a sufficient condition for asymptotic stability of a switched linear system in terms of the Lie algebra generated by the individual matrices. Namely, if this Lie algebra is solvable, then the switched system is exponentially stable for arbitrary switching. In fact, we show that any family of linear systems satisfying this condition possesses a quadratic common Lyapunov function. We also discuss the implications of this result for switched nonlinear systems. 相似文献
56.
Erika Rubí Luis-García Carina Becerril Alfonso Salgado-Aguayo Omar Emiliano Aparicio-Trejo Yair Romero Edgar Flores-Soto Criselda Mendoza-Milla Martha Montao Victoria Chagoya Jos Pedraza-Chaverri Mohammed El Hafidi Marisol Orozco-Ibarra Annie Pardo Moiss Selman 《International journal of molecular sciences》2021,22(15)
Idiopathic pulmonary fibrosis (IPF) is a devastating disease characterized by increased activation of fibroblasts/myofibroblasts. Previous reports have shown that IPF fibroblasts are resistant to apoptosis, but the mechanisms remain unclear. Since inhibition of the mitochondrial permeability transition pore (mPTP) has been implicated in the resistance to apoptosis, in this study, we analyzed the role of mitochondrial function and the mPTP on the apoptosis resistance of IPF fibroblasts under basal conditions and after mitomycin C-induced apoptosis. We measured the release of cytochrome c, mPTP opening, mitochondrial calcium release, oxygen consumption, mitochondrial membrane potential, ADP/ATP ratio, ATP concentration, and mitochondrial morphology. We found that IPF fibroblasts were resistant to mitomycin C-induced apoptosis and that calcium, a well-established activator of mPTP, is decreased as well as the release of pro-apoptotic proteins such as cytochrome c. Likewise, IPF fibroblasts showed decreased mitochondrial function, while mPTP was less sensitive to ionomycin-induced opening. Although IPF fibroblasts did not present changes in the mitochondrial membrane potential, we found a fragmented mitochondrial network with scarce, thinned, and disordered mitochondria with reduced ATP levels. Our findings demonstrate that IPF fibroblasts are resistant to mitomycin C-induced apoptosis and that altered mPTP opening contributes to this resistance. In addition, IPF fibroblasts show mitochondrial dysfunction evidenced by a decrease in respiratory parameters. 相似文献
57.
Yair Gannot Carmit Hertzog‐Ronen Nir Tessler Yoav Eichen 《Advanced functional materials》2010,20(1):105-110
Alkylating agents are simple and reactive molecules that are commonly used in many and diverse fields, such as organic synthesis, medicine, and agriculture. Some highly reactive alkylating species are also being used as blister chemical warfare agents. The detection and identification of alkylating agent is not a trivial issue because of their high reactivity and simple structure. Here, a novel polythiophene derivative that is capable of reacting with alkylating agents is reported, along with its application in direct electrical sensing of alkylators using an organic field‐effect transistor, OFET, device. Upon reacting with alkylators, the OFET containing the new polythiophene analogue as its channel becomes conductive, and the gate effect is lost; this is in marked contrast to the response of the OFET to “innocent” vapors, such as alcohols and acetone. By following the drain–source current under gate bias, one can easily follow the processes of absorption of the analyte to the polythiophene channel and their subsequent reaction. 相似文献
58.
Yair Granot Boris Rubinsky 《International Journal of Heat and Mass Transfer》2008,51(23-24):5610-5616
Reversible electroporation is the temporary permeabilization of the cell membrane through the formation of nano-scale pores that are transient defects in the membrane. These pores are caused by short electrical pulses, typically on the order of a few to several hundred microseconds that are delivered by electroporation electrodes inserted around the treated tissue. Reversible electroporation has become an important technique in molecular medicine. It is used to introduce macromolecules such as genes or anticancer drugs, to which the cell membrane is normally not permeable, into the cytosol. For optimal application of molecular medicine, it is important to be able to predict precisely the mass transfer in tissue during reversible electroporation. In this study, we introduce a first attempt at developing a macroscopic mathematical model for analyzing the mass transfer into cells during reversible electroporation of tissue. The model combines a macroscopic model of the electrical fields around electroporation electrodes with a new cells-scale model of electroporation-driven mass transfer and with a macroscopic mass transfer model in tissue. The model is illustrated for a situation typical to that in electrochemotherapy in which cancer is treated with reversible electroporation and a non cell membrane permeant drug such as bleomycin. 相似文献
59.
This article focuses on the concept of empowerment and the ways in which the Internet is being utilized as an empowering tool. This analysis ranges from the personal to the global levels and the consequences of that empowerment are also discussed. We propose a four-level model that serves to explain what we term E-empowerment and the effects that can be observed at each of the four levels, ranging from (1) the personal; (2) the interpersonal; (3) group; and (4) citizenship. The potential for future development of E-empowerment is also discussed. 相似文献
60.
We address the problem of segmenting an image sequence into rigidly moving 3D objects. An elegant solution to this problem in the case of orthographic projection is the multibody factorization approach in which the measurement matrix is factored into lower rank matrices. Despite progress in factorization algorithms, their performance is still far from satisfactory and in scenes with missing data and noise, most existing algorithms fail.In this paper we propose a method for incorporating 2D non-motion cues (such as spatial coherence) into multibody factorization. We show the similarity of the problem to constrained factor analysis and use the EM algorithm to find the segmentation. We show that adding these cues improves performance in real and synthetic sequences. 相似文献