首页 | 官方网站   微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1957篇
  免费   221篇
  国内免费   309篇
工业技术   2487篇
  2023年   4篇
  2022年   9篇
  2021年   12篇
  2020年   11篇
  2019年   8篇
  2018年   17篇
  2017年   13篇
  2016年   17篇
  2015年   35篇
  2014年   79篇
  2013年   97篇
  2012年   129篇
  2011年   171篇
  2010年   156篇
  2009年   127篇
  2008年   177篇
  2007年   217篇
  2006年   193篇
  2005年   222篇
  2004年   164篇
  2003年   160篇
  2002年   145篇
  2001年   85篇
  2000年   74篇
  1999年   29篇
  1998年   30篇
  1997年   25篇
  1996年   25篇
  1995年   16篇
  1994年   10篇
  1993年   10篇
  1992年   6篇
  1991年   2篇
  1990年   3篇
  1988年   4篇
  1987年   1篇
  1986年   3篇
  1981年   1篇
排序方式: 共有2487条查询结果,搜索用时 31 毫秒
71.
Micromobility protocols such as Cellular IP, Hawaii and Hierarchical Mobile IP are developed to solve problems of high handoff latency and control overhead, which occur when Mobile IP is used in combination with frequent handoffs. Up to now, tree access network topologies are considered to evaluate the protocol performance. However, for reasons of robustness against link failures and load balancing, extra uplinks and mesh links in the topology are desired. This article makes a classification of several topology types and gives a model that points out to which extent the topology influences the protocol performance in terms of handoff latency and handoff packet loss. Simulations confirm the results calculated by the model. Performance metrics such as load balancing, end-to-end delay and robustness against link failures are also evaluated. The study points to several shortcomings of the existing micromobility protocols for different topology types. Several aspects of the studied handoff schemes, their advantages and drawbacks are identified. L. Peters is a Research Assistant of the Fund for Scientific Research – Flanders (F.W.O.-V., Belgium) Liesbeth Peters was born in Temse, Belgium, in 1978. She received her Master of Science degree in Electrotechnical Engineering from Ghent University, Gent, Belgium in 2001. Since August 2001, she has been working as a doctoral researcher with the Department of Information Technology (INTEC) of the Faculty of Applied Sciences, Ghent University, where she joined the Broadband Communications Networks Group. Since October 2002, she works there as a research assistant of the Fund for Scientific Research—Flanders (F.W.O.-V., Belgium). Her current research interests are in broadband wireless communication and the support of IP mobility in wired cum wireless networks. Ingrid Moerman was born in Gent, Belgium, in 1965. She received the degree in Electro-technical Engineering and the Ph.D degree from the Ghent University, Gent, Belgium in 1987 and 1992, respectively. Since 1987, she has been with the Interuniversity Micro-Electronics Centre (IMEC) at the Department of Information Technology (INTEC) of the Ghent University, where she conducted research in the field of optoelectronics. In 1997, she became a permanent member of the Research Staff at IMEC. Since 2000 she is part-time professor at the Ghent University. Since 2001 she has switched her research domain to broadband communication networks. She is currently involved in the research and education on broadband mobile & wireless communication networks and on multimedia over IP. Her main research interests related to mobile & wireless communication networks are: adaptive QoS routing in wireless ad hoc networks, personal networks, body area networks, wireless access to vehicles (high bandwidth & driving speed), protocol boosting on wireless links, design of fixed access/metro part, traffic engineering and QoS support in the wireless access network. Ingrid Moerman is author or co-author of more than 300 publications in the field of optoelectronics and communication networks. Bart Dhoedt received a degree in Engineering from the Ghent University in 1990. In September 1990, he joined the Department of Information Technology of the Faculty of Applied Sciences, University of Ghent. His research, addressing the use of micro-optics to realize parallel free space optical interconnects, resulted in a PhD degree in 1995. After a 2 year post-doc in opto-electronics, he became professor at the Faculty of Applied Sciences, Department of Information Technology. Since then, he is responsible for several courses on algorithms, programming and software development. His research interests are software engineering and mobile & wireless communications. Bart Dhoedt is author or co-author of more than 100 papers published in international journals or in the proceedings of international conferences. His current research addresses software technologies for communication networks, peer-to-peer networks, mobile networks and active networks. Piet Demeester finished his PhD thesis at the Department of Information Technology (INTEC) at the Ghent University in 1988. At the same department he became group leader of the activities on Metal Organic Vapour Phase Epitaxial growth for optoelectronic components. In 1992 he started a new research group on Broadband Communication Networks. The research in this field resulted in already more than 300 publications. In this research domain he was and is a member of several programme committees of international conferences, such as: ICCCN, the International Conference on Telecommunication Systems, OFC, ICC, and ECOC. He was Chairman of DRCN’98. In 2001 he was chairman of the Technical Programme Committee ECOC’01. He was Guest Editor of three special issues of the IEEE Communications Magazine. He is also a member of the Editorial Board of the Journals “Optical Networks Magazine” and “Photonic Network Communications”. He was a member of several national and international PhD thesis commissions. Piet Demeester is a member of IEEE (Senior Member), ACM and KVIV. His current research interests include: multilayer networks, Quality of Service (QoS) in IP-networks, mobile networks, access networks, grid computing, distributed software, network and service management and applications (supported by FWO-Vlaanderen, the BOF of the Ghent University, the IWT and the European Commission). Piet Demeester is currently full-time professor at the Ghent University, where he is teaching courses in Communication Networks. He has also been teaching in different international courses.  相似文献   
72.
It has recently been shown that authenticated Byzantine agreement, in which more than a third of the parties are corrupted, cannot be securely realized under concurrent or parallel (stateless) composition. This result puts into question any usage of authenticated Byzantine agreement in a setting where many executions take place. In particular, this is true for the whole body of work of secure multi-party protocols in the case that a third or more of the parties are corrupted. This is because these protocols strongly rely on the extensive use of a broadcast channel, which is in turn realized using authenticated Byzantine agreement. We remark that it was accepted folklore that the use of a broadcast channel (or authenticated Byzantine agreement) is actually essential for achieving meaningful secure multi-party computation whenever a third or more of the parties are corrupted. In this paper we show that this folklore is false. We present a mild relaxation of the definition of secure computation allowing abort. Our new definition captures all the central security issues of secure computation, including privacy, correctness and independence of inputs. However, the novelty of the definition is in decoupling the issue of agreement from these issues. We then show that this relaxation suffices for achieving secure computation in a point-to-point network. That is, we show that secure multi-party computation for this definition can be achieved for any number of corrupted parties and without a broadcast channel (or trusted pre-processing phase as required for running authenticated Byzantine agreement). Furthermore, this is achieved by just replacing the broadcast channel in known protocols with a very simple and efficient echo-broadcast protocol. An important corollary of our result is the ability to obtain multi-party protocols that remain secure under composition, without assuming a broadcast channel.  相似文献   
73.
虚拟专用网(VPN)代表了当今网络发展的最新趋势,它综合了传统数据网络的性能优点(安全和QoS)和共享数据网络结构的优点(简单和低成本),并能够提供远程访问外部网和内部网的连接。目前VPN主要采用四项技术来保证安全,这四项技术分别是隧道技术(Tunneling)、加解密技术、密钥管理技术、使用者与设备身份认证技术。本文将重点介绍如何选择合适的隧道技术来实现陆梁自动化远程监控系统。  相似文献   
74.
随着IP数据、话音和图像等多种业务传输需求的不断提高,现有以承载话音为主要业务的城域网在容量以及接口能力上都已经无法满足业务传输与汇聚的要求。以SDH为基础的多业务传输平台能够克服传统城域网的缺点,可以更有效地支持分组数据业务,并有助于实现从电路交换网向分组网的过度。介绍了MSTP的分类方法,给出了MSTP的分层结构,并对各功能模块的需求和特点进行了详细分析。  相似文献   
75.
Co-evolution as a computational and cognitive model of design   总被引:6,自引:0,他引:6  
Co-evolutionary design has been developed as a computational model that assumes two parallel search spaces: the problem space and the solution space. The design process iteratively searches each space using the other space as the basis for a fitness function when evaluating the alternatives. Co-evolutionary design can also be developed as a cognitive model of design by characterizing the way in which designers iteratively search for a design solution, making revisions to the problem specification. This paper presents the computational model of co-evolutionary design and then describes a protocol study of human designers looking for evidence of co-evolution of problem specifications and design solutions. The study shows that co-evolutionary design is a good cognitive model of design and highlights the similarities and differences between the computational model and the cognitive model. The results show that the two kinds of co-evolutionary design complement each other, having strengths in different aspects of the design process. Electronic Publication  相似文献   
76.
基于Winsock的多数据库间数据同步的实现   总被引:7,自引:1,他引:6  
从Winsock的角度阐述了一种多数据库间数据同步的方法。首先描述了整个方案的总体框架,然后着重讨论其中的通讯策略以及容错机制;最后指出了这种方案的不足之处并提出了一些解决的办法,整个实现比较好地达到了自动化的功能并且具有良好的容错性。  相似文献   
77.
面向应用的无线传感器网络   总被引:1,自引:0,他引:1  
结合具体的应用环境分析了无线传感器网络发展到第二阶段需要考虑的重点问题;探讨了基于上述应用需求的无线传感器网络的协议栈结构和今后的研究方向。  相似文献   
78.
79.
张炘  刘爱江  史燕 《通信技术》2003,(12):153-155
提出了一个基于CRL和OCSP策略的新的证书撤销方案。首先分析比较了CRL和OCSP协议的优缺点,然后结合两者的优点通过建立一个请求处理服务器提出了一个新的证书撤销方案,最后对改进方案的优劣做了分析总结。  相似文献   
80.
为解决现有Web数据库系统在多宿主、可移动网络环境中的应用安全问题,引入策略执霂模块(PEM),提出一种基于可雷计算和主机标识雟议(HIP)的Web数据库安全模雿。使用HIP对平台身份进霂验证,利用可雷计算模块确保平台安全。分析结果表明,该模雿具有较好的安全霆,在支持主机移动和多宿主应用的同时,能够抵御病毒、木马等平台内部危害以及拒绝服务攻击、中间人攻击等网络威雤。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号