全文获取类型
收费全文 | 555篇 |
免费 | 112篇 |
国内免费 | 84篇 |
学科分类
工业技术 | 751篇 |
出版年
2023年 | 1篇 |
2022年 | 5篇 |
2021年 | 7篇 |
2020年 | 4篇 |
2019年 | 12篇 |
2018年 | 10篇 |
2017年 | 7篇 |
2016年 | 18篇 |
2015年 | 23篇 |
2014年 | 43篇 |
2013年 | 44篇 |
2012年 | 63篇 |
2011年 | 82篇 |
2010年 | 59篇 |
2009年 | 66篇 |
2008年 | 57篇 |
2007年 | 63篇 |
2006年 | 55篇 |
2005年 | 21篇 |
2004年 | 15篇 |
2003年 | 7篇 |
2002年 | 11篇 |
2001年 | 4篇 |
2000年 | 6篇 |
1999年 | 1篇 |
1998年 | 6篇 |
1997年 | 4篇 |
1996年 | 3篇 |
1995年 | 4篇 |
1994年 | 1篇 |
1993年 | 7篇 |
1992年 | 4篇 |
1991年 | 4篇 |
1990年 | 1篇 |
1989年 | 1篇 |
1988年 | 5篇 |
1987年 | 4篇 |
1986年 | 4篇 |
1985年 | 3篇 |
1984年 | 2篇 |
1983年 | 4篇 |
1982年 | 1篇 |
1981年 | 2篇 |
1980年 | 1篇 |
1979年 | 3篇 |
1978年 | 2篇 |
1976年 | 1篇 |
排序方式: 共有751条查询结果,搜索用时 0 毫秒
1.
Yu Long Author Vitae Kefei Chen Author Vitae Shengli Liu Author Vitae 《Computers & Electrical Engineering》2007,33(3):166-176
This paper proposes an identity-based threshold decryption scheme IB-ThDec and reduces its security to the Bilinear Diffie-Hellman problem. Compared with previous work, this conceals two pairing computations in the ciphertext validity verification procedure. The formal proof of security of this scheme is provided in the random oracle model. Additionally, we show that IB-ThDec can be applied to the threshold key escrow and the mediated cryptosystems. 相似文献
2.
Eduardo D. Sontag 《Systems & Control Letters》1987,9(5):361-367
Explicit equations are given for the moduli space of framed instantons as a quasi-affine variety, based on the representation theory of noncommutative power series, or equivalently, the minimal realization theory of bilinear systems. 相似文献
3.
4.
Abstract. In this paper we define subset bilinear time series models, and then describe an algorithm for the estimation of these models. It is also pointed out that for this class of non-linear time series models, it is possible to obtain optimal several step predictors. The estimation technique of these models is illustrated with respect to three time series, and the optimal several steps ahead forecasts of these time series models are calculated. A comparison of these forecasts is made with the forecasts obtained by the best linear autoregressive and threshold autoregressive models. The residuals obtained from the models are tested for independence and Gaussianity using higher order moments. 相似文献
5.
6.
7.
In this paper,we use elliptic nets to implement the optimized Ate pairings and optimal pairings on the Barreto-Naehrig curves with embedding degree 12.In order to do the arithmetic of elliptic curves over finite fields with elliptic nets,we first give some basic properties of elliptic nets associated to elliptic curves over finite fields and the expression of Miller function in terms of elliptic nets.Then we give formulae to compute some optimized pairings with elliptic nets,which is a new method to implement pairings.This method with elliptic nets has time complexity comparable to Miller’s algorithm and it can be optimized. 相似文献
8.
该方案是门限代理多重签名与盲签名的有机集成 ,既解决了代理签名方案中代理签名人权利过于集中的问题 ,又通过盲签名实现了签名的匿名性和不可追踪性。在该数字签名方案的基础上 ,采用双线性对的签名和验证方式 ,提出了基于双线性对的门限代理盲多重签名方案 ,极大地提高了门限代理盲多重签名的安全性和实现速度。 相似文献
9.
This paper studies the controllability of a class of time‐invariant discrete‐time bilinear systems. Although the system is not controllable in the whole space, there is a very large region where control is effective. Results show that the uncontrollable region of this kind of bilinear system has a Lebesgue measure of zero. In other words, for almost any initial state and any terminal state in the state space, the former can be transferred to the latter. Further, a necessary condition for near controllability is presented. Therefore, the results in this paper unify and generalize the corresponding conclusions in the literature. ©2014 Chinese Automatic Control Society and Wiley Publishing Asia Pty Ltd 相似文献
10.
Directed signature scheme allows only a designated verifier to check the validity of the signature issued to him; and at the time of trouble or if necessary, any third party can verify the signature with the help of the signer or the designated verifier as well. Due to its merits, directed signature scheme is widely used in situations where the receiver’s privacy should be protected. Threshold directed signature is an extension of the standard directed signature, in which several signers may be required to cooperatively sign messages for sharing the responsibility and authority. To the best of our knowledge, threshold directed signature has not been well studied till now. Therefore, in this paper, we would like to formalize the threshold directed signature and its security model, then present a new (t, n) threshold directed signature scheme from bilinear pairings and use the techniques from provable security to analyze its security. 相似文献