首页 | 官方网站   微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   108篇
  免费   7篇
工业技术   115篇
  2023年   2篇
  2022年   1篇
  2021年   3篇
  2019年   1篇
  2018年   4篇
  2017年   6篇
  2016年   5篇
  2015年   7篇
  2014年   4篇
  2013年   8篇
  2012年   7篇
  2011年   7篇
  2010年   5篇
  2009年   6篇
  2008年   5篇
  2007年   5篇
  2006年   2篇
  2005年   3篇
  2004年   1篇
  2002年   2篇
  2001年   1篇
  2000年   4篇
  1999年   4篇
  1998年   5篇
  1996年   1篇
  1995年   1篇
  1994年   4篇
  1993年   1篇
  1992年   1篇
  1991年   1篇
  1990年   1篇
  1985年   2篇
  1984年   3篇
  1981年   1篇
  1976年   1篇
排序方式: 共有115条查询结果,搜索用时 687 毫秒
1.
Dealing with discrepancies in data is still a big challenge in data integration systems. The problem occurs both during eliminating duplicates from semantic overlapping sources as well as during combining complementary data from different sources. Though using SQL operations like grouping and join seems to be a viable way, they fail if the attribute values of the potential duplicates or related tuples are not equal but only similar by certain criteria. As a solution to this problem, we present in this paper similarity-based variants of grouping and join operators. The extended grouping operator produces groups of similar tuples, the extended join combines tuples satisfying a given similarity condition. We describe the semantics of this operator, discuss efficient implementations for the edit distance similarity and present evaluation results. Finally, we give examples of application from the context of a data reconciliation project for looted art.  相似文献   
2.
Designing efficient as well as secure cryptographic protocols for resource-constrained applications is a challenging task. In this paper, we formally analyze the security of an efficient one-pass authenticated key establishment protocol, the 1P-AKE protocol, which is primarily proposed for resource-constrained sensor nodes devices in wireless sensor networks (WSNs). In contrast to the existing identity-based one-pass key establishment protocols, the 1P-AKE protocol does not require any bilinear pairing computation in order to establish a key. This feature makes it really attractive for resource-constrained application environments, such as WSNs, where pairing computations are too expensive. We show that in the random oracle model, the 1P-AKE protocol is a secure authenticated one-pass key establishment protocol under the computational Diffie–Hellman assumption. The performance of the 1P-AKE protocol is also discussed and compared with the existing relevant protocols.  相似文献   
3.
4.
This work demonstrates an optofluidic system, where dielectrophoretically controlled suspended nanoparticles are used to manipulate the properties of an optical waveguide. This optofluidic device is composed of a multimode polymeric rib waveguide and a microfluidic channel as its upper cladding. This channel integrates dielectrophoretic (DEP) microelectrodes and is infiltrated with suspended silica and tungsten trioxide nanoparticles. By applying electrical signals with various intensities and frequencies to the DEP microelectrodes, the nanoparticles can be concentrated close to the waveguide surface significantly altering the optical properties in this region. Depending on the particle refractive indices, concentrations, positions and dimensions, the light remains confined or is scattered into the surrounding media in the microfluidic channel.  相似文献   
5.
Visually assessing the effect of the coronary artery anatomy on the perfusion of the heart muscle in patients with coronary artery disease remains a challenging task. We explore the feasibility of visualizing this effect on perfusion using a numerical approach. We perform a computational simulation of the way blood is perfused throughout the myocardium purely based on information from a three-dimensional anatomical tomographic scan. The results are subsequently visualized using both three-dimensional visualizations and bull's eye plots, partially inspired by approaches currently common in medical practice. Our approach results in a comprehensive visualization of the coronary anatomy that compares well to visualizations commonly used for other scanning technologies. We demonstrate techniques giving detailed insight in blood supply, coronary territories and feeding coronary arteries of a selected region. We demonstrate the advantages of our approach through visualizations that show information which commonly cannot be directly observed in scanning data, such as a separate visualization of the supply from each coronary artery. We thus show that the results of a computational simulation can be effectively visualized and facilitate visually correlating these results to for example perfusion data.  相似文献   
6.
A formal model of atomicity in asynchronous systems   总被引:1,自引:0,他引:1  
Summary We propose a generalisation of occurrence graphs as a formal model of computational structure. The model is used to define the atomic occurrence of a program, to characterise interference freeness between programs, and to model error recovery in a decentralised system.  相似文献   
7.
8.
At CRYPTO 2004, Kurosawa and Desmedt presented a new hybrid encryption scheme that is chosen-ciphertext (CCA2) secure in the standard model. Until now it was unknown if the key encapsulation part of the Kurosawa-Desmedt scheme by itself is still CCA2-secure or not. In this note we answer this question to the negative, namely we present a simple CCA2 attack on the Kurosawa-Desmedt key encapsulation mechanism. Our attack further supports the design paradigm of Kurosawa and Desmedt to build CCA2-secure hybrid encryption from weak key encapsulation.  相似文献   
9.
In this paper, we consider finite labelled transition systems. We show that if such transition systems are deterministic, persistent, and weakly periodic, then they can be decomposed in the following sense. There exists a finite set of label-disjoint cycles such that any other cycle is Parikh-equivalent to a multiset of cycles from this set.  相似文献   
10.
The aim of the present study was to investigate the effect of a 10 Hz alternating current (10 Hz 1 V cm−1) and a 50 Hz alternating current (50 Hz 1 V cm−1) on the lettuce plant (Lactuca sativa) growing in a hydroponic (soil-free) culture. Thirty lettuce plants were pre-germinated, and then 15 of them were treated with cadmium solution (CdCl2) of 5 mg/L in concentration. Ten plants (five plants with Cd and five plants without Cd) were subjected to a 10 Hz alternating current (AC) electrical field; 10 plants were subjected to a 50 Hz AC field. The rest of the plants were used as a control. The lettuce plants were harvested after a growth of 60 days. The chlorophyll content, biomass and metal content of the lettuce plants were determined. The biomass of the plants growing in non-contaminated medium was 28 and 106% higher under the 10 and the 50 Hz AC fields respectively compared to the control. Although the plant biomass was reduced by the presence of Cd in the growth medium, the biomass of the plants growing in Cd contaminated medium was 40 and 63% higher respectively for 10 and 50 Hz AC field compared to the plant growing in Cd contaminated medium without electrical treatment. Increased uptake of Cd in the plant shoot was found with the 50 Hz AC field. Significant accumulation and uptake of Cu in plant roots and shoots was found under both electrical treatments.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号