首页 | 官方网站   微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   214篇
  免费   6篇
工业技术   220篇
  2023年   1篇
  2022年   2篇
  2021年   7篇
  2020年   5篇
  2019年   1篇
  2018年   3篇
  2017年   4篇
  2016年   1篇
  2015年   4篇
  2014年   4篇
  2013年   10篇
  2012年   4篇
  2011年   5篇
  2010年   12篇
  2009年   11篇
  2008年   22篇
  2007年   11篇
  2006年   14篇
  2005年   10篇
  2004年   6篇
  2003年   6篇
  2002年   4篇
  2001年   4篇
  2000年   4篇
  1999年   5篇
  1998年   3篇
  1997年   5篇
  1996年   6篇
  1995年   4篇
  1994年   1篇
  1993年   2篇
  1992年   1篇
  1991年   2篇
  1990年   2篇
  1989年   2篇
  1988年   2篇
  1987年   4篇
  1986年   2篇
  1985年   2篇
  1984年   5篇
  1982年   1篇
  1981年   2篇
  1980年   2篇
  1978年   2篇
  1976年   4篇
  1975年   2篇
  1974年   1篇
  1973年   2篇
  1972年   1篇
排序方式: 共有220条查询结果,搜索用时 15 毫秒
51.
The aim of this paper is to demonstrate the feasibility of authenticated throughput-efficient routing in an unreliable and dynamically changing synchronous network in which the majority of malicious insiders try to destroy and alter messages or disrupt communication in any way. More specifically, in this paper we seek to answer the following question: Given a network in which the majority of nodes are controlled by a node-controlling adversary and whose topology is changing every round, is it possible to develop a protocol with polynomially bounded memory per processor (with respect to network size) that guarantees throughput-efficient and correct end-to-end communication? We answer the question affirmatively for extremely general corruption patterns: we only request that the topology of the network and the corruption pattern of the adversary leaves at least one path each round connecting the sender and receiver through honest nodes (though this path may change at every round). Out construction works in the public-key setting and enjoys optimal transfer rate and bounded memory per processor (that is polynomial in the network size and does not depend on the amount of traffic). We stress that our protocol assumes no knowledge of which nodes are corrupted nor which path is reliable at any round, and is also fully distributed with nodes making decisions locally, so that they need not know the topology of the network at any time. The optimality that we prove for our protocol is very strong. Given any routing protocol, we evaluate its efficiency (rate of message delivery) in the “worst case,” that is with respect to the worst possible graph and against the worst possible (polynomially bounded) adversarial strategy (subject to the above mentioned connectivity constraints). Using this metric, we show that there does not exist any protocol that can be asymptotically superior (in terms of throughput) to ours in this setting. We remark that the aim of our paper is to demonstrate via explicit example the feasibility of throughput-efficient authenticated adversarial routing. However, we stress that out protocol is not intended to provide a practical solution, as due to its complexity, no attempt thus far has been made to reduce constants and memory requirements. Our result is related to recent work of Barak et al. (Proc. of Advances in Cryptology—27th EUROCRYPT 2008, LNCS, vol. 4965, pp. 341–360, 2008) who studied fault localization in networks assuming a private-key trusted-setup setting. Our work, in contrast, assumes a public-key PKI setup and aims at not only fault localization, but also transmission optimality. Among other things, our work answers one of the open questions posed in the Barak et al. paper regarding fault localization on multiple paths. The use of a public-key setting to achieve strong error-correction results in networks was inspired by the work of Micali et al. (Proc. of 2nd Theory of Cryptography Conf., LNCS, vol. 3378, pp. 1–16, 2005) who showed that classical error correction against a polynomially bounded adversary can be achieved with surprisingly high precision. Our work is also related to an interactive coding theorem of Rajagopalan and Schulman (Proc. 26th ACM Symp. on Theory of Computing, pp. 790–799, 1994) who showed that in noisy-edge static-topology networks a constant overhead in communication can also be achieved (provided none of the processors are malicious), thus establishing an optimal-rate routing theorem for static-topology networks. Finally, our work is closely related and builds upon to the problem of End-To-End Communication in distributed networks, studied by Afek and Gafni (Proc. of the 7th ACM Symp. on Principles of Distributed Computing, pp. 131–148, 1988); Awebuch et al. (Proc. of the 30th IEEE Symp. on Foundations of Computer Science, FOCS, 1989); Afek et al. (Proc. of the 11th ACM Symp. on Principles of Distributed Computing, pp. 35–46, 1992); and Afek et al. (J. Algorithms 22:158–186, 1997), though none of these papers consider or ensure correctness in the setting of a node-controlling adversary that may corrupt the majority of the network.  相似文献   
52.
In order to evaluate the applicability of NMR to the analysis of explosives, the method was used to analyse explosives from actual cases. The results were then compared with results from other analytical methods, mainly TLC and GC/MS. For unexploded samples NMR was found to be a simple, fast and reliable method, often allowing the identification of mixtures without pre-separation. Some post-explosion samples were also successfully analysed by NMR. Although sensitivity problems still exist, NMR showed a surprisingly promising prospects for the difficult field of post-explosion analysis.  相似文献   
53.
Electrochemical deposition of ruthenium on n-type silicon from an ionic liquid is reported for the first time. The study was performed by dissolving ruthenium(III) chloride in a 1-butyl-3-methyl imidazolium hexafluorophosphate (BMIPF6) room-temperature ionic liquid (RTIL). Cyclic voltammetry (CV) studies demonstrate reduction and stripping peaks at −2.1 and 0.2 V vs. Pt quasi-reference, corresponding to the deposition and dissolution of ruthenium, respectively. Metallic Ru films of ∼100 nm thickness have been deposited and were analyzed using scanning electron microscopy (SEM) and X-ray photoelectron spectroscopy (XPS).  相似文献   
54.
In the study, the authors examined the effects of smoking deprivation, anticipation of smoking, and actual smoking on the craving to smoke. Flight attendants who were light to heavy smokers rated their craving to smoke at predetermined time points during a 2-way short flight (each leg 3–5.5 hr) and a 1-way long flight (8–13 hr). In both short and long flights, craving increased gradually and peaked as landing approached. Craving levels at the end of the 1st leg of the short flights were equal to those at the end of the long flight and were much higher than those at the parallel time point in the long flight. In the short flight, craving levels at the beginning of the 2nd leg dropped relative to the end of the 1st leg, both for participants who smoked during the intermission and for those who did not, though the drop was steeper for the former. The results provide additional evidence for the role of psychological factors in determining the craving to smoke in a naturalistic setting. (PsycINFO Database Record (c) 2010 APA, all rights reserved)  相似文献   
55.
We present a sufficient condition for asymptotic stability of a switched linear system in terms of the Lie algebra generated by the individual matrices. Namely, if this Lie algebra is solvable, then the switched system is exponentially stable for arbitrary switching. In fact, we show that any family of linear systems satisfying this condition possesses a quadratic common Lyapunov function. We also discuss the implications of this result for switched nonlinear systems.  相似文献   
56.
Idiopathic pulmonary fibrosis (IPF) is a devastating disease characterized by increased activation of fibroblasts/myofibroblasts. Previous reports have shown that IPF fibroblasts are resistant to apoptosis, but the mechanisms remain unclear. Since inhibition of the mitochondrial permeability transition pore (mPTP) has been implicated in the resistance to apoptosis, in this study, we analyzed the role of mitochondrial function and the mPTP on the apoptosis resistance of IPF fibroblasts under basal conditions and after mitomycin C-induced apoptosis. We measured the release of cytochrome c, mPTP opening, mitochondrial calcium release, oxygen consumption, mitochondrial membrane potential, ADP/ATP ratio, ATP concentration, and mitochondrial morphology. We found that IPF fibroblasts were resistant to mitomycin C-induced apoptosis and that calcium, a well-established activator of mPTP, is decreased as well as the release of pro-apoptotic proteins such as cytochrome c. Likewise, IPF fibroblasts showed decreased mitochondrial function, while mPTP was less sensitive to ionomycin-induced opening. Although IPF fibroblasts did not present changes in the mitochondrial membrane potential, we found a fragmented mitochondrial network with scarce, thinned, and disordered mitochondria with reduced ATP levels. Our findings demonstrate that IPF fibroblasts are resistant to mitomycin C-induced apoptosis and that altered mPTP opening contributes to this resistance. In addition, IPF fibroblasts show mitochondrial dysfunction evidenced by a decrease in respiratory parameters.  相似文献   
57.
Alkylating agents are simple and reactive molecules that are commonly used in many and diverse fields, such as organic synthesis, medicine, and agriculture. Some highly reactive alkylating species are also being used as blister chemical warfare agents. The detection and identification of alkylating agent is not a trivial issue because of their high reactivity and simple structure. Here, a novel polythiophene derivative that is capable of reacting with alkylating agents is reported, along with its application in direct electrical sensing of alkylators using an organic field‐effect transistor, OFET, device. Upon reacting with alkylators, the OFET containing the new polythiophene analogue as its channel becomes conductive, and the gate effect is lost; this is in marked contrast to the response of the OFET to “innocent” vapors, such as alcohols and acetone. By following the drain–source current under gate bias, one can easily follow the processes of absorption of the analyte to the polythiophene channel and their subsequent reaction.  相似文献   
58.
Reversible electroporation is the temporary permeabilization of the cell membrane through the formation of nano-scale pores that are transient defects in the membrane. These pores are caused by short electrical pulses, typically on the order of a few to several hundred microseconds that are delivered by electroporation electrodes inserted around the treated tissue. Reversible electroporation has become an important technique in molecular medicine. It is used to introduce macromolecules such as genes or anticancer drugs, to which the cell membrane is normally not permeable, into the cytosol. For optimal application of molecular medicine, it is important to be able to predict precisely the mass transfer in tissue during reversible electroporation. In this study, we introduce a first attempt at developing a macroscopic mathematical model for analyzing the mass transfer into cells during reversible electroporation of tissue. The model combines a macroscopic model of the electrical fields around electroporation electrodes with a new cells-scale model of electroporation-driven mass transfer and with a macroscopic mass transfer model in tissue. The model is illustrated for a situation typical to that in electrochemotherapy in which cancer is treated with reversible electroporation and a non cell membrane permeant drug such as bleomycin.  相似文献   
59.
This article focuses on the concept of empowerment and the ways in which the Internet is being utilized as an empowering tool. This analysis ranges from the personal to the global levels and the consequences of that empowerment are also discussed. We propose a four-level model that serves to explain what we term E-empowerment and the effects that can be observed at each of the four levels, ranging from (1) the personal; (2) the interpersonal; (3) group; and (4) citizenship. The potential for future development of E-empowerment is also discussed.  相似文献   
60.
We address the problem of segmenting an image sequence into rigidly moving 3D objects. An elegant solution to this problem in the case of orthographic projection is the multibody factorization approach in which the measurement matrix is factored into lower rank matrices. Despite progress in factorization algorithms, their performance is still far from satisfactory and in scenes with missing data and noise, most existing algorithms fail.In this paper we propose a method for incorporating 2D non-motion cues (such as spatial coherence) into multibody factorization. We show the similarity of the problem to constrained factor analysis and use the EM algorithm to find the segmentation. We show that adding these cues improves performance in real and synthetic sequences.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号