全文获取类型
收费全文 | 125篇 |
免费 | 29篇 |
国内免费 | 23篇 |
学科分类
工业技术 | 177篇 |
出版年
2023年 | 1篇 |
2021年 | 1篇 |
2020年 | 2篇 |
2019年 | 3篇 |
2018年 | 2篇 |
2017年 | 3篇 |
2016年 | 5篇 |
2015年 | 3篇 |
2014年 | 10篇 |
2013年 | 13篇 |
2012年 | 11篇 |
2011年 | 8篇 |
2010年 | 14篇 |
2009年 | 19篇 |
2008年 | 12篇 |
2007年 | 11篇 |
2006年 | 3篇 |
2005年 | 8篇 |
2004年 | 11篇 |
2003年 | 7篇 |
2002年 | 5篇 |
2001年 | 4篇 |
2000年 | 5篇 |
1999年 | 3篇 |
1998年 | 3篇 |
1997年 | 4篇 |
1995年 | 1篇 |
1994年 | 2篇 |
1993年 | 1篇 |
1992年 | 1篇 |
1991年 | 1篇 |
排序方式: 共有177条查询结果,搜索用时 15 毫秒
71.
安全协议的形式化方法概述 总被引:2,自引:0,他引:2
介绍了安全协议的形式化分析思路,阐述了安全协议形式化描述、需求、验证及设计四个方面的研究状况和它们的基本原理,并对常用的几种形式化验证技术的优缺点进行了分析,最后针对形式化技术在该领域的发展前景提出了自己的见解。 相似文献
72.
73.
74.
Web service discovery was the key problem in the study of the Web application.Multiple user community relations between each other on the result of Web service discovery was studied,the user community relations was decomposed into predilection relation,clustering and trust relation,while describing the methods of formalization.Based on the formalized community relations a differential service discovery strategy was put forward,a Web service discovery system framework was built,which can retrieve or recommend candidate Web services step by step to produce the final result according to the “from strong to weak” principle in terms of the correlation between Web service and the user interest background.The experimental results show that proposed method can effectively improve the efficiency and precision of Web service discovery. 相似文献
75.
76.
Macario Polo Juan ngel Gmez Mario Piattini Francisco Ruiz 《Information and Software Technology》2002,44(15)
This article describes a method for building applications with a three-tier structure (presentation, business, persistence) from an existing relational database. The method works as a transformation function that takes the relational schema as its input, producing three sets of classes (which depend on the actual system being reengineered) to represent the final application, as well as some additional auxiliary classes (which are ‘constant’ and always generated, such as an ‘About’ dialog, for example). All the classes generated are adequately placed along the three-tiers.The method is based on (1) the formalization of all the sets involved in the process, and (2) the mathematical formulation of the required functions to get the final application. For this second step, we have taken into account several well-known, widely used design and transformation patterns that produce high quality designs and highly maintainable software.The method is implemented in a tool that we have successfully used in several projects of medium size. Obviously, it is quite difficult for the obtained software to fulfill all the requirements desired by the customer, but the uniformity and understandability of its design makes very easy its modification. 相似文献
77.
V. G. Akulovsky 《Cybernetics and Systems Analysis》2008,44(6):941-950
A system of algorithmic algebras is considered whose basic concepts are newly interpreted to formalize the interrelation between
operators and data of such a system. A modified formal instrument is constructed that extends the possibilities of design
and transformation of regular schemes of algorithms.
Translated from Kibernetika i Sistemnyi Analiz, No. 6, pp. 170–182, November–December 2008. 相似文献
78.
79.
介绍了富媒体内容对网络服务器所带来的负载压力.在对负载类型进行统计分析的基础上,详细阐述了优化后富媒体发布方式的页面解析规则、实现过程,以及安全性设置.并测试和比较了传统发布方式和优化后的发布方式对服务器造成的负载压力. 相似文献
80.
This paper addresses the problem of enumerating all words having a combinatoric property called “rhythmic oddity property”. This enumeration is motivated by the fact that this property is satisfied by many rhythmic patterns used in traditional Central African music. 相似文献