全文获取类型
收费全文 | 1957篇 |
免费 | 221篇 |
国内免费 | 309篇 |
学科分类
工业技术 | 2487篇 |
出版年
2023年 | 4篇 |
2022年 | 9篇 |
2021年 | 12篇 |
2020年 | 11篇 |
2019年 | 8篇 |
2018年 | 17篇 |
2017年 | 13篇 |
2016年 | 17篇 |
2015年 | 35篇 |
2014年 | 79篇 |
2013年 | 97篇 |
2012年 | 129篇 |
2011年 | 171篇 |
2010年 | 156篇 |
2009年 | 127篇 |
2008年 | 177篇 |
2007年 | 217篇 |
2006年 | 193篇 |
2005年 | 222篇 |
2004年 | 164篇 |
2003年 | 160篇 |
2002年 | 145篇 |
2001年 | 85篇 |
2000年 | 74篇 |
1999年 | 29篇 |
1998年 | 30篇 |
1997年 | 25篇 |
1996年 | 25篇 |
1995年 | 16篇 |
1994年 | 10篇 |
1993年 | 10篇 |
1992年 | 6篇 |
1991年 | 2篇 |
1990年 | 3篇 |
1988年 | 4篇 |
1987年 | 1篇 |
1986年 | 3篇 |
1981年 | 1篇 |
排序方式: 共有2487条查询结果,搜索用时 31 毫秒
71.
Micromobility protocols such as Cellular IP, Hawaii and Hierarchical Mobile IP are developed to solve problems of high handoff
latency and control overhead, which occur when Mobile IP is used in combination with frequent handoffs. Up to now, tree access
network topologies are considered to evaluate the protocol performance. However, for reasons of robustness against link failures
and load balancing, extra uplinks and mesh links in the topology are desired. This article makes a classification of several
topology types and gives a model that points out to which extent the topology influences the protocol performance in terms
of handoff latency and handoff packet loss. Simulations confirm the results calculated by the model. Performance metrics such
as load balancing, end-to-end delay and robustness against link failures are also evaluated. The study points to several shortcomings
of the existing micromobility protocols for different topology types. Several aspects of the studied handoff schemes, their
advantages and drawbacks are identified.
L. Peters is a Research Assistant of the Fund for Scientific Research – Flanders (F.W.O.-V., Belgium)
Liesbeth Peters was born in Temse, Belgium, in 1978. She received her Master of Science degree in Electrotechnical Engineering from Ghent
University, Gent, Belgium in 2001. Since August 2001, she has been working as a doctoral researcher with the Department of
Information Technology (INTEC) of the Faculty of Applied Sciences, Ghent University, where she joined the Broadband Communications
Networks Group. Since October 2002, she works there as a research assistant of the Fund for Scientific Research—Flanders (F.W.O.-V.,
Belgium). Her current research interests are in broadband wireless communication and the support of IP mobility in wired cum
wireless networks.
Ingrid Moerman was born in Gent, Belgium, in 1965. She received the degree in Electro-technical Engineering and the Ph.D degree from the
Ghent University, Gent, Belgium in 1987 and 1992, respectively. Since 1987, she has been with the Interuniversity Micro-Electronics
Centre (IMEC) at the Department of Information Technology (INTEC) of the Ghent University, where she conducted research in
the field of optoelectronics. In 1997, she became a permanent member of the Research Staff at IMEC. Since 2000 she is part-time
professor at the Ghent University. Since 2001 she has switched her research domain to broadband communication networks. She
is currently involved in the research and education on broadband mobile & wireless communication networks and on multimedia
over IP. Her main research interests related to mobile & wireless communication networks are: adaptive QoS routing in wireless
ad hoc networks, personal networks, body area networks, wireless access to vehicles (high bandwidth & driving speed), protocol
boosting on wireless links, design of fixed access/metro part, traffic engineering and QoS support in the wireless access
network. Ingrid Moerman is author or co-author of more than 300 publications in the field of optoelectronics and communication
networks.
Bart Dhoedt received a degree in Engineering from the Ghent University in 1990. In September 1990, he joined the Department of Information
Technology of the Faculty of Applied Sciences, University of Ghent. His research, addressing the use of micro-optics to realize
parallel free space optical interconnects, resulted in a PhD degree in 1995. After a 2 year post-doc in opto-electronics,
he became professor at the Faculty of Applied Sciences, Department of Information Technology. Since then, he is responsible
for several courses on algorithms, programming and software development. His research interests are software engineering and
mobile & wireless communications. Bart Dhoedt is author or co-author of more than 100 papers published in international journals
or in the proceedings of international conferences. His current research addresses software technologies for communication
networks, peer-to-peer networks, mobile networks and active networks.
Piet Demeester finished his PhD thesis at the Department of Information Technology (INTEC) at the Ghent University in 1988. At the same
department he became group leader of the activities on Metal Organic Vapour Phase Epitaxial growth for optoelectronic components.
In 1992 he started a new research group on Broadband Communication Networks. The research in this field resulted in already
more than 300 publications. In this research domain he was and is a member of several programme committees of international
conferences, such as: ICCCN, the International Conference on Telecommunication Systems, OFC, ICC, and ECOC. He was Chairman
of DRCN’98. In 2001 he was chairman of the Technical Programme Committee ECOC’01. He was Guest Editor of three special issues
of the IEEE Communications Magazine. He is also a member of the Editorial Board of the Journals “Optical Networks Magazine”
and “Photonic Network Communications”. He was a member of several national and international PhD thesis commissions. Piet
Demeester is a member of IEEE (Senior Member), ACM and KVIV. His current research interests include: multilayer networks,
Quality of Service (QoS) in IP-networks, mobile networks, access networks, grid computing, distributed software, network and
service management and applications (supported by FWO-Vlaanderen, the BOF of the Ghent University, the IWT and the European
Commission). Piet Demeester is currently full-time professor at the Ghent University, where he is teaching courses in Communication
Networks. He has also been teaching in different international courses. 相似文献
72.
It has recently been shown that authenticated Byzantine agreement,
in which more than a third of the parties are corrupted, cannot be
securely realized under concurrent or parallel (stateless)
composition. This result puts into question any usage of
authenticated Byzantine agreement in a setting where many
executions take place. In particular, this is true for the whole
body of work of secure multi-party protocols in the case that a
third or more of the parties are corrupted. This is because these
protocols strongly rely on the extensive use of a broadcast
channel, which is in turn realized using authenticated Byzantine
agreement. We remark that it was accepted folklore that the use of
a broadcast channel (or authenticated Byzantine agreement) is
actually essential for achieving meaningful secure multi-party
computation whenever a third or more of the parties are corrupted.
In this paper we show that this folklore is false. We present a
mild relaxation of the definition of secure computation allowing
abort. Our new definition captures all the central security issues
of secure computation, including privacy, correctness and
independence of inputs. However, the novelty of the definition is
in decoupling the issue of agreement from these issues. We
then show that this relaxation suffices for achieving secure
computation in a point-to-point network. That is, we show that
secure multi-party computation for this definition can be achieved
for any number of corrupted parties and without a
broadcast channel (or trusted pre-processing phase as required for
running authenticated Byzantine agreement). Furthermore, this is
achieved by just replacing the broadcast channel in known
protocols with a very simple and efficient echo-broadcast
protocol. An important corollary of our result is the ability to
obtain multi-party protocols that remain secure under composition,
without assuming a broadcast channel. 相似文献
73.
王炜 《石油工业计算机应用》2007,15(3):10-12
虚拟专用网(VPN)代表了当今网络发展的最新趋势,它综合了传统数据网络的性能优点(安全和QoS)和共享数据网络结构的优点(简单和低成本),并能够提供远程访问外部网和内部网的连接。目前VPN主要采用四项技术来保证安全,这四项技术分别是隧道技术(Tunneling)、加解密技术、密钥管理技术、使用者与设备身份认证技术。本文将重点介绍如何选择合适的隧道技术来实现陆梁自动化远程监控系统。 相似文献
74.
随着IP数据、话音和图像等多种业务传输需求的不断提高,现有以承载话音为主要业务的城域网在容量以及接口能力上都已经无法满足业务传输与汇聚的要求。以SDH为基础的多业务传输平台能够克服传统城域网的缺点,可以更有效地支持分组数据业务,并有助于实现从电路交换网向分组网的过度。介绍了MSTP的分类方法,给出了MSTP的分层结构,并对各功能模块的需求和特点进行了详细分析。 相似文献
75.
Co-evolution as a computational and cognitive model of design 总被引:6,自引:0,他引:6
Co-evolutionary design has been developed as a computational model that assumes two parallel search spaces: the problem space
and the solution space. The design process iteratively searches each space using the other space as the basis for a fitness
function when evaluating the alternatives. Co-evolutionary design can also be developed as a cognitive model of design by
characterizing the way in which designers iteratively search for a design solution, making revisions to the problem specification.
This paper presents the computational model of co-evolutionary design and then describes a protocol study of human designers
looking for evidence of co-evolution of problem specifications and design solutions. The study shows that co-evolutionary
design is a good cognitive model of design and highlights the similarities and differences between the computational model
and the cognitive model. The results show that the two kinds of co-evolutionary design complement each other, having strengths
in different aspects of the design process.
Electronic Publication 相似文献
76.
77.
面向应用的无线传感器网络 总被引:1,自引:0,他引:1
结合具体的应用环境分析了无线传感器网络发展到第二阶段需要考虑的重点问题;探讨了基于上述应用需求的无线传感器网络的协议栈结构和今后的研究方向。 相似文献
78.
79.
80.