首页 | 官方网站   微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   334篇
  免费   9篇
  国内免费   1篇
工业技术   344篇
  2023年   3篇
  2022年   11篇
  2021年   13篇
  2020年   3篇
  2019年   11篇
  2018年   15篇
  2017年   12篇
  2016年   9篇
  2015年   7篇
  2014年   9篇
  2013年   24篇
  2012年   16篇
  2011年   15篇
  2010年   17篇
  2009年   24篇
  2008年   18篇
  2007年   23篇
  2006年   20篇
  2005年   10篇
  2004年   8篇
  2003年   15篇
  2002年   11篇
  2001年   6篇
  2000年   8篇
  1998年   3篇
  1997年   1篇
  1996年   2篇
  1995年   1篇
  1993年   2篇
  1992年   4篇
  1990年   2篇
  1988年   2篇
  1987年   1篇
  1985年   4篇
  1984年   4篇
  1983年   3篇
  1981年   1篇
  1980年   2篇
  1979年   1篇
  1976年   1篇
  1975年   1篇
  1973年   1篇
排序方式: 共有344条查询结果,搜索用时 0 毫秒
1.
Reusability of software, regardless of its utilizing technique, is widely believed to be a promising means for improving software productivity and reliability. However it is not practiced adequately due to the lack of techniques that facilitate the locating of reusable components that are functionally close. In this paper we apply Kohonen's Self-Organizing Maps to develop an approach for promoting Software Reuse. We look at the details of how Self-Organization can arrange and regularize data from the original pattern space into a topology preserving map. We describe a practical implementation of the SOM methodology for Software Reuse using a database of UNIX commands. And finally we briefly present our proposed Software Reuse Methodology.  相似文献   
2.
Ubiquitous computing refers to building a global computing environment where seamless and invisible access to computing resources is provided to the user. Pervasive computing deals with acquiring context knowledge from the environment and providing dynamic, proactive and context-aware services to the user. A Ubiquitous computing environment is created by sharing knowledge and information between Pervasive computing environments. In this paper we propose a framework that uses the potential of the Semantic Web to weave Pervasive computing environments into a Ubiquitous computing environment. We discuss how the collaboration of these Pervasive environments can create an effective Ubiquitous computing environment referred herein as the Integrated Global Pervasive Computing Framework (IGPF). We test the effectiveness of the Ubiquitous environment through a small scenario from a prototype system that we have implemented over this framework to handle medical emergency scenario.  相似文献   
3.
A discrete element model (DEM) is used to investigate the behavior of spherical particles flowing down a semicylindrical rotating chute. The DEM simulations are validated by comparing with particle tracking velocimetry results of spherical glass particles flowing through a smooth semicylindrical chute at different rotation rates of the chute. The DEM model predictions agree well with experimental results of surface velocity and particle bed height evolution. The validated DEM model is used to investigate the influence of chute roughness on the flow behavior of monodisperse granular particles in rotating chutes. To emulate different base roughnesses, a rough base is constructed out of a square close packing of fixed spherical particles with a diameter equal to, smaller, or larger than the flowing particles. Finally, the DEM model is used to study segregation in a binary density mixture for different degrees of roughness of the chute. © 2015 American Institute of Chemical Engineers AIChE J, 61: 2117–2135, 2015  相似文献   
4.
Abstract

To demonstrate the Pancharatnam phase as a geometric (Berry's) phase, each polarization state must be obtained by projecting the previous state on it. We describe a simple interferometric arrangement for such a demonstration which only uses a single rotation linear analyser to introduce a continuously variable phase difference between the two beams.  相似文献   
5.
Alloy nanoparticles (NPs) can offer a wide range of opportunities for various applications due to their composition and structure dependent properties such as multifunctionality, electronic heterogeneity, site-specific response, and multiple plasmon resonance bands. In this work, the fabrication of self-assembled PdxAg1-x NPs alloy nanostructures with distinct size, density, shape, and composition is demonstrated via the solid-state dewetting of sputtered Pd/Ag thin films on c-plane sapphire. The initial stage of bilayer dewetting exhibits the nucleation of voids, followed by the expansion of voids and cluster breakdown and finally shape transformation along with the temperature control. Bilayer composition shows a substantial influence on the dewetting such that the overall dewetting is enhanced along with the increased Ag composition, i.e. Pd0.25Ag0.75 > Pd0.5Ag0.5 > Pd0.75Ag0.25. On the other hand, the size and density of NPs can be efficiently controlled by varying the initial thickness of bilayers. Reflectance peaks in UV and near-infrared (NIR) regions and a wide absorption band in the visible region arisen from the surface plasmon resonance are observed in reflectance spectra. The peak intensity depends on the composition of PdxAg1-x NPs and the NIR peaks gradually blue-shift with the size decrement.  相似文献   
6.
7.
8.
Minimum-cost network hardening using attack graphs   总被引:3,自引:0,他引:3  
Lingyu  Steven  Sushil 《Computer Communications》2006,29(18):3812-3824
In defending one’s network against cyber attack, certain vulnerabilities may seem acceptable risks when considered in isolation. But an intruder can often infiltrate a seemingly well-guarded network through a multi-step intrusion, in which each step prepares for the next. Attack graphs can reveal the threat by enumerating possible sequences of exploits that can be followed to compromise given critical resources. However, attack graphs do not directly provide a solution to remove the threat. Finding a solution by hand is error-prone and tedious, particularly for larger and less secure networks whose attack graphs are overly complicated. In this paper, we propose a solution to automate the task of hardening a network against multi-step intrusions. Unlike existing approaches whose solutions require removing exploits, our solution is comprised of initially satisfied conditions only. Our solution is thus more enforceable, because the initial conditions can be independently disabled, whereas exploits are usually consequences of other exploits and hence cannot be disabled without removing the causes. More specifically, we first represent given critical resources as a logic proposition of initial conditions. We then simplify the proposition to make hardening options explicit. Among the options we finally choose solutions with the minimum cost. The key improvements over the preliminary version of this paper include a formal framework of the minimum network hardening problem, and an improved one-pass algorithm in deriving the logic proposition while avoiding logic loops.  相似文献   
9.
This paper describes data mining and data warehousing techniques that can improve the performance and usability of Intrusion Detection Systems (IDS). Current IDS do not provide support for historical data analysis and data summarization. This paper presents techniques to model network traffic and alerts using a multi-dimensional data model and star schemas. This data model was used to perform network security analysis and detect denial of service attacks. Our data model can also be used to handle heterogeneous data sources (e.g. firewall logs, system calls, net-flow data) and enable up to two orders of magnitude faster query response times for analysts as compared to the current state of the art. We have used our techniques to implement a prototype system that is being successfully used at Army Research Labs. Our system has helped the security analyst in detecting intrusions and in historical data analysis for generating reports on trend analysis. Recommended by: Ashfaq Khokhar  相似文献   
10.
A computationally simple kernel method is proposed for obtaining drawdowns due to unsteady pumping of large diameter wells. The kernels can be worked out even on a hand-held calculator. The new method can also be used to obtain residual drawdowns. The new method yields results as good as those obtained using earlier methods.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号