全文获取类型
收费全文 | 940篇 |
免费 | 254篇 |
国内免费 | 193篇 |
学科分类
工业技术 | 1387篇 |
出版年
2024年 | 5篇 |
2023年 | 10篇 |
2022年 | 17篇 |
2021年 | 14篇 |
2020年 | 21篇 |
2019年 | 23篇 |
2018年 | 28篇 |
2017年 | 29篇 |
2016年 | 27篇 |
2015年 | 35篇 |
2014年 | 52篇 |
2013年 | 61篇 |
2012年 | 106篇 |
2011年 | 110篇 |
2010年 | 89篇 |
2009年 | 97篇 |
2008年 | 107篇 |
2007年 | 127篇 |
2006年 | 108篇 |
2005年 | 81篇 |
2004年 | 55篇 |
2003年 | 58篇 |
2002年 | 43篇 |
2001年 | 28篇 |
2000年 | 30篇 |
1999年 | 15篇 |
1998年 | 6篇 |
1997年 | 3篇 |
1996年 | 2篇 |
排序方式: 共有1387条查询结果,搜索用时 15 毫秒
1.
Navid Ehsan Mingyan Liu Roderick J. Ragland 《International Journal of Communication Systems》2003,16(6):513-534
Performance enhancing proxies (PEPs) are widely used to improve the performance of TCP over high delay‐bandwidth product links and links with high error probability. In this paper we analyse the performance of using TCP connection splitting in combination with web caching via traces obtained from a commercial satellite system. We examine the resulting performance gain under different scenarios, including the effect of caching, congestion, random loss and file sizes. We show, via analysing our measurements, that the performance gain from using splitting is highly sensitive to random losses and the number of simultaneous connections, and that such sensitivity is alleviated by caching. On the other hand, the use of a splitting proxy enhances the value of web caching in that cache hits result in much more significant performance improvement over cache misses when TCP splitting is used. We also compare the performance of using different versions of HTTP in such a system. Copyright © 2003 John Wiley & Sons, Ltd. 相似文献
2.
Christos Bouras Agisilaos Konidaris 《International Journal of Communication Systems》2005,18(2):119-142
Redundant data transfers over the Web, can be mainly attributed to the repeated transfers of unchanged data. Web caches and Web proxies are some of the solutions that have been proposed, to deal with the issue of redundant data transfers. In this paper we focus on the efficient estimation and reduction of redundant data transfers over the Web. We first prove that a vast amount of redundant data is transferred in Web pages that are considered to carry fresh data. We show this by following an approach based on Web page fragmentation and manipulation. Web pages are broken down to fragments, based on specific criteria. We then deal with these fragments as independent constructors of the Web page and study their change patterns independently and in the context of the whole Web page. After the fragmentation process, we propose solutions for dealing with redundant data transfers. This paper has been based on our previous work on ‘Web Components’ but also on related work by other researchers. It utilises a proxy based, client/server architecture, and imposes changes to the algorithms executed on the Proxy server and on clients. We show that our proposed solution can considerably reduce the amount of redundant data transferred on the Web. Copyright © 2004 John Wiley & Sons, Ltd. 相似文献
3.
The development of future mobile networks will be driven, in large part, by content and web based services. In this paper,
we examine several performance, scalability and architectural challenges faced by future mobile web applications and how advanced
mobile content delivery techniques can address these challenges. We review existing content delivery using a taxonomy that
consists of three categories: network scaling, end system acceleration, and content and protocol optimization. While wireline
content delivery focuses on network and server scalability, mobile content delivery will likely benefit most from optimizing
radio link usage. We also present our ongoing work in this area, which extends the functionality of edge caching to the terminal,
uses user interest correlation information to maintain low terminal power consumption and adds a new dimension to radio resource
management.
This revised version was published online in August 2006 with corrections to the Cover Date. 相似文献
4.
Stateful session handoff for mobile WWW 总被引:1,自引:0,他引:1
This paper proposes a web session handoff system that can hand over not only stateless but also stateful sessions between homogenous and heterogeneous user devices to enable uninterrupted and seamless web access. The proposed system adopts a proxy-based approach and an optional client-assisted scheme in order to track and hand over session information. In the proposed system, a session is registered at a User Agent Proxy (UAP) and then tracked by the UAP so that the session can be handed over from one device via the UAP to another device. In addition to session information tracked by a UAP, the UAP can hand over more comprehensive session information by using the client-assisted scheme. Compared with client-based approaches, our design has several advantages, such as less modification to user devices, practicability, and fault tolerance. We have implemented a UAP on a PC and client programs for both PC and PDA. The implementation can successfully hand over between PC and PDA a stateful session for online shopping applications. 相似文献
5.
一个通用代理计费系统开发框架的设计与实现 总被引:4,自引:4,他引:0
用户在不同的网络环境中选择不同的代理软件实现上网和用户管理,这些代理软件既有共性又各具特色,为减少开发不同代理计费软件的工作量,提高开发效率,加快开发周期,提出利用软件重用的思想,将代理软件的差异集中到少数几个类的实现上,设计并实现一个通用代理计费系统开发框架,基于此框架利用相对简单的步骤开发了基于SQUID的代理计费系统,验证了框架的实用性和可行性,达到了设计目标。 相似文献
6.
TAN Zuo-wen 《通讯和计算机》2007,4(5):40-46
Signcryption is a public key or asymmetric cryptographic method that provides simultaneously both message confidentiality and integrity at a lower computational and communication cost. This paper presents a (t, n) threshold proxy signcryption scheme in which no less than t proxy agents in the proxy group can produce the signcryption cryptogram. combines the functionality of threshold proxy signing and encryption. The proposed scheme combines the functionality of both threshold proxy signing and encryption, and provides fair protection for the sender and the proxy agents. This scheme is secure against attack of public key substitution. It also satisfies security properties such as confidentiality and authenticity. 相似文献
7.
文章首先分析了张青坡等人中提出的多项式形式的E1Gamal签名体制的安全缺陷,然后基于有限域上多项式的性质,提出了有限域上多项式形式代理保护代理签名方案;新的签名方案中,利用多项式进行签名权利的委托,并由改进的有限域上的多项式形式的E1Gamal签名体制生成代理签名。新方案的安全性基于离散对数的难解性。 相似文献
8.
9.
10.
网上资金结算系统对传统资金结算系统的发展具有良好的推动作用,但安全问题是必须解决的核心问题之一。在分析了网上资金结算系统结构及安全需求的基础上,提出了一种基于HTTP协议的安全代理方案和相关数据处理的流程,并结合该流程设计了服务器安全代理和用户端安全代理,满足了网上资金结算对信息安全的要求。 相似文献