首页 | 官方网站   微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1538篇
  免费   71篇
  国内免费   10篇
工业技术   1619篇
  2024年   9篇
  2023年   50篇
  2022年   52篇
  2021年   89篇
  2020年   58篇
  2019年   59篇
  2018年   90篇
  2017年   60篇
  2016年   60篇
  2015年   35篇
  2014年   51篇
  2013年   105篇
  2012年   74篇
  2011年   93篇
  2010年   71篇
  2009年   69篇
  2008年   71篇
  2007年   62篇
  2006年   46篇
  2005年   38篇
  2004年   30篇
  2003年   19篇
  2002年   19篇
  2001年   18篇
  2000年   14篇
  1999年   15篇
  1998年   29篇
  1997年   19篇
  1996年   25篇
  1995年   18篇
  1994年   14篇
  1993年   20篇
  1992年   9篇
  1991年   15篇
  1990年   7篇
  1989年   9篇
  1988年   8篇
  1987年   13篇
  1986年   9篇
  1985年   6篇
  1984年   6篇
  1983年   7篇
  1982年   7篇
  1981年   10篇
  1980年   7篇
  1979年   5篇
  1978年   3篇
  1977年   5篇
  1976年   5篇
  1972年   2篇
排序方式: 共有1619条查询结果,搜索用时 15 毫秒
51.
Integrated circuits (ICs) are often produced in foundries that lack effective security controls. In these foundries, sophisticated attackers are able to insert malicious Trojan circuits that are easily hidden in the large, complex circuitry that comprises modern ICs. These so-called Trojan circuits are capable of launching attacks directly in hardware, or, more deviously, can facilitate software attacks. Current defense against Trojan circuits consists of statistical detection techniques to find such circuits before product deployment. The fact that statistical detection can result in false negatives raises the obvious questions: can attacks be detected post-deployment, and is secure execution nonetheless possible using chips with undetected Trojan circuits? In this paper we present the Secure Heartbeat And Dual-Encryption (SHADE) architecture, a compiler–hardware solution for detecting and preventing a subset of Trojan circuit attacks in deployed systems. Two layers of hardware encryption are combined with a heartbeat of off-chip accesses to provide a secure execution environment using untrusted hardware. The SHADE system is designed to complement pre-deployment detection techniques and to add a final, last-chance layer of security.  相似文献   
52.
Information Systems and e-Business Management - Collaborative filtering (CF) is a popular and widely accepted recommendation technique. CF is an automated form of word-of-mouth communication...  相似文献   
53.
Clustered VLIW architectures solve the scalability problem associated with flat VLIW architectures by partitioning the register file and connecting only a subset of the functional units to a register file. However, inter-cluster communication in clustered architectures leads to increased leakage in functional components and a high number of register accesses. In this paper, we propose compiler scheduling algorithms targeting two previously ignored power-hungry components in clustered VLIW architectures, viz., instruction decoder and register file.We consider a split decoder design and propose a new energy-aware instruction scheduling algorithm that provides 14.5% and 17.3% benefit in the decoder power consumption on an average over a purely hardware based scheme in the context of 2-clustered and 4-clustered VLIW machines. In the case of register files, we propose two new scheduling algorithms that exploit limited register snooping capability to reduce extra register file accesses. The proposed algorithms reduce register file power consumption on an average by 6.85% and 11.90% (10.39% and 17.78%), respectively, along with performance improvement of 4.81% and 5.34% (9.39% and 11.16%) over a traditional greedy algorithm for 2-clustered (4-clustered) VLIW machine.  相似文献   
54.
Abstract— A novel approach of modeling a‐Si:H TFTs with the industry‐standard BSIM3 compact model is presented. The described approach defines the a‐Si:H TFT drain current and terminal charges as explicit functions of terminal voltages using a minimum set of BSIM3 parameters. The set of BSIM3 parameters is chosen based on the electrical and physical characteristics of the a‐Si:H TFT and their values extracted from measured data. By using the selected BSIM3 model parameters, the a‐Si:H TFT is simulated inside SPICE to fit the simulated I‐V and C‐V curves with the measured results. Finally, the extracted BSIM3 model is validated by simulating the kickback voltage effect in an AMLCD pixel array.  相似文献   
55.
We present an approach for controlling robotic interactions with objects, using synthetic images generated by morphing shapes. In particular, we attempt the problem of positioning an eye-in-hand robotic system with respect to objects in the workspace for grasping and manipulation. In our formulation, the grasp position (and consequently the approach trajectory of the manipulator), varies with each object. The proposed solution to the problem consists of two parts. First, based on a model-based object recognition framework, images of the objects taken at the desired grasp pose are stored in a database. The recognition and identification of the grasp position for an unknown input object (selected from the family of recognizable objects) occurs by morphing its contour to the templates in the database and using the virtual energy spent during the morph as a dissimilarity measure. In the second step, the images synthesized during the morph are used to guide the eye-in-hand system and execute the grasp. The proposed method requires minimal calibration of the system. Furthermore, it conjoins techniques from shape recognition, computer graphics, and vision-based robot control in a unified engineering amework. Potential applications range from recognition and positioning with respect to partially-occluded or deformable objects to planning robotic grasping based on human demonstration.  相似文献   
56.
We propose a cross-layer approach with tightly-coupled time synchronization for real-time support and predictable lifetime in battery-operated sensor networks. Our design spans a sensor hardware platform with hardware-based global time synchronization, a TDMA link layer protocol with collision-free multi-hop support and node scheduling algorithms for maximum concurrency and streaming. Our dual-radio sensor platform, FireFly, features an IEEE 802.15.4 transceiver and supports global time synchronization indoors by using an AM radio carrier-current method and an atomic clock receiver for outdoors. A TDMA-based link protocol, RT-Link, leverages the hardware for fixed and mobile nodes with a near-optimal and predictable node lifetime of over 2 years. It outperforms comparable sensor network link protocols such as B-MAC and S-MAC in terms of end-to-end latency and throughput and node lifetime across all duty cycle ratios. Operating over RT-Link is MAX, a scheduling framework which offers optimal transmission concurrency and bandwidth management for networks with regular structure. Through analysis and experiments we show that global time sync is a robust, economical and scalable alternative to in-band software-based techniques. To illustrate the capabilities and flexibility of our platform, we describe our experiences with two-way voice streaming over multiple hops. We have deployed a 42-node network with sub-100 μs synchronization accuracy in the NIOSH experimental coal mine for people-tracking and voice communication.
Raj RajkumarEmail:
  相似文献   
57.
Members of the Smad protein family function as signal transducers of the transforming growth factor (TGF-beta) superfamily proteins. The human Smad5 protein, a signal transducer downstream of TGF-beta/BMP receptors, is composed of N-terminal DNA binding domain (MH1) and C-terminal protein-protein interaction domain (MH2) connected together by a linker motif. We used homology-modeling techniques to generate a reliable molecular model of the Smad5 MH1 domain based on the crystal structure of Smad3 MH1 domain. Our study presents the structural features of a BMP-regulated, R-Smad subfamily member (consisting of Smad1, Smad5 and Smad8) for the first time. This model provides a structural basis for explaining both functional similarities and differences between Smad3 and Smad5. Also, the structural model of this molecular target would be useful for structure-based inhibitor design because of its high accuracy. The results of our study provide important insights into understanding the structure-function relationship of the members of the Smad protein family and can serve to guide future genetic and biochemical experiments in this area.  相似文献   
58.
The increasing complexities of modern networks coupled with the popularity of multimedia applications have placed higher demands on network managers. This paper reviews the main requirements and challenges for effective management of multimedia networks, presents a case study of a thin-client-based multimedia system called CSL (Computer-supported Learning System) and proposes a framework for managing such networks. CSL delivers browser-based assessments and other learning materials to thousands of students at the University of Auckland. This type of demand requires more flexible schemes for the management of the network. In the framework proposed, most of the link management information will be kept in a MIB in the network and a very simple MIB will be maintained in the thin client. The MIB in the network is accessible to the network management application, and a lightweight protocol is proposed for updating of the network MIB using an agent at the thin client.  相似文献   
59.
The d.c.-electrical conductivity studies have been done in poly(vinylidene fluoride) (PVDF), poly(methylmethacrylate) (PMMA) and their polyblends in the entire composition range as a function of voltage and temperature. Some studies on thickness and electrode dependence of the electrical conductivity were also carried out. The results obtained show that the charge carriers are generated by Richardson-Schottky emission from the electrode as well as from trapped ionic impurities at high fields and are conducted through the bulk of the material by a carrier hopping process. The values of Schottky field lowering constant RS, the Poole-Frenkel trap lowering constant PF, the effective metal insulator potential barrier, the ionic jump distance and the activation energy involved in the conduction process are reported. A.c.-conductivity values were calculated from a.c.-dielectric data and the results show the evidence of hopping conduction in the bulk of polyblends.  相似文献   
60.
Clustered architecture processors are preferred for embedded systems because centralized register file architectures scale poorly in terms of clock rate, chip area, and power consumption. Although clustering helps by improving the clock speed, reducing the energy consumption of the logic, and making the design simpler, it introduces extra overheads by way of inter-cluster communication. This communication happens over long global wires having high load capacitance which leads to delay in execution and significantly high energy consumption. Inter-cluster communication also introduces many short idle cycles, thereby significantly increasing the overall leakage energy consumption in the functional units. The trend towards miniaturization of devices (and associated reduction in threshold voltage) makes energy consumption in interconnects and functional units even worse, and limits the usability of clustered architectures in smaller technologies. However, technological advancements now permit the design of interconnects and functional units with varying performance and power modes. In this paper, we propose scheduling algorithms that aggregate the scheduling slack of instructions and communication slack of data values to exploit the low-power modes of functional units and interconnects. Finally, we present a synergistic combination of these algorithms that simultaneously saves energy in functional units and interconnects to improves the usability of clustered architectures by achieving better overall energy–performance trade-offs. Even with conservative estimates of the contribution of the functional units and interconnects to the overall processor energy consumption, the proposed combined scheme obtains on average 8% and 10% improvement in overall energy–delay product with 3.5% and 2% performance degradation for a 2-clustered and a 4-clustered machine, respectively. We present a detailed experimental evaluation of the proposed schemes. Our test bed uses the Trimaran compiler infrastructure.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号