首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   107篇
  免费   5篇
  国内免费   1篇
化学   68篇
晶体学   1篇
力学   3篇
数学   1篇
物理学   17篇
无线电   23篇
  2024年   1篇
  2023年   5篇
  2022年   2篇
  2021年   3篇
  2020年   5篇
  2019年   5篇
  2018年   8篇
  2017年   5篇
  2016年   6篇
  2014年   7篇
  2013年   8篇
  2012年   8篇
  2011年   2篇
  2010年   4篇
  2009年   7篇
  2008年   4篇
  2007年   3篇
  2006年   5篇
  2005年   4篇
  2004年   3篇
  2002年   3篇
  2000年   1篇
  1999年   2篇
  1998年   2篇
  1997年   1篇
  1994年   1篇
  1989年   2篇
  1984年   1篇
  1982年   1篇
  1969年   1篇
  1956年   1篇
  1955年   1篇
  1954年   1篇
排序方式: 共有113条查询结果,搜索用时 4 毫秒
111.
Wireless networks are deployed in many critical areas, such as health care centers, hospitals, police departments, and airports. In these areas, communication through the networks plays a vital role, and real‐time connectivity along with constant availability of the networks is highly important. However, one of the most serious threats against the networks availability is the denial‐of‐service attacks. In wireless networks, clear text form of control frames is a security flaw that can be exploited by the attackers to bring the wireless networks to a complete halt. To prevent the denial‐of‐service attacks against the wireless networks, we propose two distinct security models. The models are capable of preventing the attacks by detecting and discarding the forgery control frames belonging to the attackers. The models are implemented and evaluated under various experiments and trials. The results have proved that the proposed models significantly improve the security performance of the wireless networks. This gives advantage of safe communication that can substantially enhance the network availability while maintaining the quality of the network performance. Copyright © 2011 John Wiley & Sons, Ltd.  相似文献   
112.
In optical Wavelength Division Multiplexing (WDM) networks, different protection schemes have been proposed in the literature, namely, dedicated protection and shared protection. Shared protection techniques significantly reduce the required spare capacity by providing the same level of availability as dedicated protection. However, current mission critical applications (which heavily depend on the availability of communication resources) require connection availability in the order of 99.999% or higher, which corresponds to a downtime of almost 5 min a year on the average. Therefore, in order to satisfy a connection serviceavailability requirement defined by the users Service Level Agreement in a cost-effective and resource-efficient way, network operators need a systematic mechanism to evaluate the network availability under multiple failure scenario to ensure that current network configuration can meet the required availability degree; otherwise, a network upgrade is required. Unfortunately, under multiple failure scenario, traditional availability analysis techniques based on reliability block diagrams are not suitable for survivable networks with shared spare capacity. Therefore, a new concept is proposed to facilitate the calculations of network availability. In this paper, we propose an analytical model for evaluating the availability of a WDM network with shared-link connections under multiple link failures. The analytical model is also verified using Monte Carlo simulation. The proposed model significantly contributes to the related areas by providing network operators with a quantitative tool to evaluate the system availability and, thus, the expected survivability degree of WDM optical networks with shared connections under multiple link failures.  相似文献   
113.
Virtual multiple input multiple output (MIMO) techniques are used for energy efficient communication in wireless sensor networks. In this paper, we propose energy efficient routing based on virtual MIMO. We investigate virtual MIMO for both fixed and variable rates. We use a cluster based virtual MIMO cognitive model with the aim of changing operational parameters (constellation size) to provide energy efficient communication. We determine the routing path based on the virtual MIMO communication cost to delay the first node death. For larger distances, the simulation results show that virtual MIMO (2×2) based routing is more energy efficient than SISO (single input single output) and other MIMO variations.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号