首页 | 官方网站   微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   518篇
  免费   20篇
  国内免费   27篇
工业技术   565篇
  2023年   1篇
  2022年   2篇
  2021年   4篇
  2020年   10篇
  2019年   4篇
  2018年   7篇
  2017年   15篇
  2016年   11篇
  2015年   17篇
  2014年   31篇
  2013年   41篇
  2012年   31篇
  2011年   42篇
  2010年   32篇
  2009年   36篇
  2008年   46篇
  2007年   31篇
  2006年   28篇
  2005年   30篇
  2004年   28篇
  2003年   27篇
  2002年   18篇
  2001年   11篇
  2000年   8篇
  1999年   8篇
  1998年   4篇
  1997年   5篇
  1996年   4篇
  1995年   5篇
  1994年   4篇
  1993年   4篇
  1992年   4篇
  1990年   5篇
  1989年   1篇
  1988年   3篇
  1986年   1篇
  1985年   1篇
  1984年   1篇
  1981年   2篇
  1977年   2篇
排序方式: 共有565条查询结果,搜索用时 234 毫秒
1.
提出在县市级广电宽带数据网络的建设过程中,要着眼业务发展,突出高扩展性,构建基于标准、扩展灵活的主干网,实现网络建设的可持续性发展,并结合实际,从核心设备、端口、中继带宽、网络业务4个方面对扩展能力进行了阐述.  相似文献   
2.
可靠组播中的差错检测与恢复技术   总被引:1,自引:0,他引:1  
马戈芳  徐明伟 《计算机工程》2004,30(17):53-55,108
在可靠组播的实现中要解决的关键问题之一是如何进行快速有效的差错检测和恢复,主要有重传和纠错两类机制。文章介绍了这两类机制的研究现状,从模型特点、网络负荷、适用悄况等不同角度进行分析,讨沦了本地重传及其范围策略。  相似文献   
3.
WCDMA的MBMS技术   总被引:2,自引:0,他引:2  
主要介绍了基于WCDMA的MBMS技术,给出了其网络架构和技术难点,并对其应用给无线网络带来的影响作了一定深度的探讨。  相似文献   
4.
就电视现场直播中如何保障安全播出、各路信号同步以及保证信号质量等问题进行探讨.同时就常用于直播信号传输的微波传输系统的多种不同使用场合及使用方法作一介绍.  相似文献   
5.
It has recently been shown that authenticated Byzantine agreement, in which more than a third of the parties are corrupted, cannot be securely realized under concurrent or parallel (stateless) composition. This result puts into question any usage of authenticated Byzantine agreement in a setting where many executions take place. In particular, this is true for the whole body of work of secure multi-party protocols in the case that a third or more of the parties are corrupted. This is because these protocols strongly rely on the extensive use of a broadcast channel, which is in turn realized using authenticated Byzantine agreement. We remark that it was accepted folklore that the use of a broadcast channel (or authenticated Byzantine agreement) is actually essential for achieving meaningful secure multi-party computation whenever a third or more of the parties are corrupted. In this paper we show that this folklore is false. We present a mild relaxation of the definition of secure computation allowing abort. Our new definition captures all the central security issues of secure computation, including privacy, correctness and independence of inputs. However, the novelty of the definition is in decoupling the issue of agreement from these issues. We then show that this relaxation suffices for achieving secure computation in a point-to-point network. That is, we show that secure multi-party computation for this definition can be achieved for any number of corrupted parties and without a broadcast channel (or trusted pre-processing phase as required for running authenticated Byzantine agreement). Furthermore, this is achieved by just replacing the broadcast channel in known protocols with a very simple and efficient echo-broadcast protocol. An important corollary of our result is the ability to obtain multi-party protocols that remain secure under composition, without assuming a broadcast channel.  相似文献   
6.
The mobile ad hoc network (MANET) has recently been recognized as an attractive network architecture for wireless communication. Reliable broadcast is an important operation in MANET (e.g., giving orders, searching routes, and notifying important signals). However, using a naive flooding to achieve reliable broadcasting may be very costly, causing a lot of contention, collision, and congestion, to which we refer as the broadcast storm problem. This paper proposes an efficient reliable broadcasting protocol by taking care of the potential broadcast storm problem that could occur in the medium-access level. Existing protocols are either unreliable, or reliable but based on a too costly approach. Our protocol differs from existing protocols by adopting a low-cost broadcast, which does not guarantee reliability, as a basic operation. The reliability is ensured by additional acknowledgement and handshaking. Simulation results do justify the efficiency of the proposed protocol.  相似文献   
7.
Collision of suspended entities with surrounding molecules in a fluid environment leads to random movements of these entities, known as Brownian motion. Suppression of this motion in a Brownian ensemble has recently become essential for facilitating emerging applications in biology and in micro and nano scale self-assembled systems. How optimally this suppression can be performed remains an open question of great interest to both the natural science and the control engineering communities. In this paper, we address this question theoretically by introducing a novel “Broadcast Stochastic Receding Horizon Control” strategy for trapping an ensemble of non-interacting Brownian particles. The strategy designs a control input, independent of the number of particles, using measurements from a single particle as the only available feedback information and broadcasts it to all particles in the ensemble. We show the existence of a minimum region in which all particles can be driven and trapped indefinitely using the proposed control action. Under specific conditions, we guarantee the trapping of all particles in this region with probability 1. Finally, we demonstrate the efficacy of our control design in a simulation environment by trapping 100 Brownian particles in one, two and three dimensional homogeneous medium.  相似文献   
8.
在交换网络环境中,物理环路可以提高网络的冗余,但容易产生双向的广播环,甚至形成广播风暴,使交换机瘫痪;通过生成树协议生成根网桥,根端口,指定端口和阻塞端口,在逻辑上断开该网段,形成一个无环网络,使网络中无法产生广播环和广播风暴;当其它链路出现故障时,阻塞的端口自动恢复,逻辑断开的线路又被连通,继续传输数据。  相似文献   
9.
Urban sensing is an emerging application field for Wireless Sensor Networks (WSNs), where a number of static sensors is sparsely deployed in an urban area to collect environmental information. Data sensed by each sensor are, then, opportunistically transmitted to Mobile Nodes (MNs) that happen to be in contact. In the considered scenario, communications between MNs and sensors require paradigms with a minimal synchronization between devices, extremely fast and energy efficient, especially at the sensor side. To deal with the above issues, in [1] we proposed a hybrid protocol for data delivery from sensors to MNs, named Hybrid Adaptive Interleaved Data Protocol (HI). By combining Erasure Coding (EC) with an Automatic Repeat reQuest (ARQ) scheme, the proposed protocol maximizes the reliability of communications while minimizing the energy consumed by sensors. In this paper, we present an in-depth analysis of the HI performance. We provide an analytical evaluation by defining a flexible model to derive the probability of data delivery and exploiting it to investigate the performance over a wide range of parameters. Moreover, we perform an experimental study to evaluate the HI effectiveness on real sensor platforms. Specifically, we analyze the impact of resource constraints imposed by sensors on data delivery and provide a careful characterization of its actual consumption of resources.  相似文献   
10.
阐述网络电台的发展现状及前景。结合校园广播电台的实际,在分析校园网络电台功能结构的基础上,提出校园网络电台的设计方案。利用PHP和MySQL搭建网络电台,详细介绍声音的采集、模拟信号的编码和广播的实现过程,进而对校园网络电台的搭建进行总结。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号