首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   10340篇
  免费   1247篇
  国内免费   178篇
化学   1400篇
晶体学   11篇
力学   147篇
综合类   55篇
数学   1709篇
物理学   1722篇
无线电   6721篇
  2024年   20篇
  2023年   154篇
  2022年   209篇
  2021年   278篇
  2020年   265篇
  2019年   185篇
  2018年   208篇
  2017年   254篇
  2016年   340篇
  2015年   330篇
  2014年   542篇
  2013年   722篇
  2012年   604篇
  2011年   532篇
  2010年   538篇
  2009年   626篇
  2008年   633篇
  2007年   723篇
  2006年   536篇
  2005年   485篇
  2004年   400篇
  2003年   430篇
  2002年   355篇
  2001年   377篇
  2000年   326篇
  1999年   313篇
  1998年   259篇
  1997年   239篇
  1996年   209篇
  1995年   174篇
  1994年   133篇
  1993年   79篇
  1992年   68篇
  1991年   54篇
  1990年   27篇
  1989年   35篇
  1988年   27篇
  1987年   12篇
  1986年   11篇
  1985年   20篇
  1984年   12篇
  1983年   3篇
  1982年   7篇
  1981年   6篇
  1980年   1篇
  1978年   1篇
  1974年   1篇
  1971年   1篇
  1969年   1篇
排序方式: 共有10000条查询结果,搜索用时 500 毫秒
11.
Security for ad hoc network environments has received a lot of attention as of today. Previous work has mainly been focussing on secure routing, fairness issues, and malicious node detection. However, the issue of introducing and conserving trust relationships has received considerably less attention. In this article, we present a scalable method for the use of public key certificates and their revocation in mobile ad hoc networks (MANETs). With the LKN-ad hoc security framework (LKN-ASF) a certificate management protocol has been introduced, bringing PKI technology to MANETs. In addition a performance analysis of two different revocation approaches for MANETs will be presented.  相似文献   
12.
可信计算与可信网络   总被引:3,自引:0,他引:3  
论文对主流的可信计算技术——TCPA和NGSCB进行了分析,并对可信计算平台(TCP)进行了研究,对基于可信计算的可信网络的三个基本属性进行了分析和研究,最后介绍了可信网络的发展现状。  相似文献   
13.
对三网互联的几个关键技术进行分析与研究,介绍利用IP技术解决有线电视网地址选择问题,探讨怎样将ATM技术与IP技术相互融合,使真正的信息高速公路成为现实,阐述利用H.323标准全面解决视频网络方案。  相似文献   
14.
主要探讨交互式视频多媒体通信网络的相关技术以及网络的体系结构,并深入研究了作为宽带综合业务数字网B-ISDN目标解决方案的ATM技术.  相似文献   
15.
This paper addresses the problem of power control in a multihop wireless network supporting multicast traffic. We face the problem of forwarding packet traffic to multicast group members while meeting constraints on the signal-to-interference-plus-noise ratio (SINR) at the intended receivers. First, we present a distributed algorithm which, given the set of multicast senders and their corresponding receivers, provides an optimal solution when it exists, which minimizes the total transmit power. When no optimal solution can be found for the given set of multicast senders and receivers, we introduce a distributed, joint scheduling and power control algorithm which eliminates the weak connections and tries to maximize the number of successful multicast transmissions. The algorithm allows the other senders to solve the power control problem and minimize the total transmit power. We show that our distributed algorithm converges to the optimal solution when it exists, and performs close to centralized, heuristic algorithms that have been proposed to address the joint scheduling and power control problem.  相似文献   
16.
分布式无线传感器网络通信协议研究   总被引:64,自引:2,他引:62  
于海斌  曾鹏  王忠锋  梁英  尚志军 《通信学报》2004,25(10):102-110
在归纳分布式无线传感器网络研究进展的基础上,给出了综合分布式无线传感器网络技术各个方面的协议体系结构,并在新的体系结构下,系统地阐述了分布式无线传感器网络通信协议研究的进展,介绍了典型的应用案例和国外相关计划的研究情况。最后,指明了这一处于发展初期的研究领域的未来发展方向。  相似文献   
17.
Resilient optical networks are predominately designed to protect against single failures of fiber links. But in larger networks, operators also see dual failures. As the capacity was planned for single failures, disconnections can occur by dual failures even if enough topological connectivity is provided. In our approach the design of the network minimizes the average loss caused by dual failures, while single failures are still fully survived. High dual failure restorability is the primary aim, capacity is optimized in a second step. For WDM networks with full wavelength conversion, we formulate mixed integer linear programming models for dedicated path protection, shared (backup) path protection, and path rerouting with and without stub-release. For larger problem instances in path rerouting, we propose two heuristics. Computational results indicate that the connectivity is of much more importance for high restorability values than the overall protection capacity. Shared protection has similar restorability levels as dedicated protection while the capacity is comparable to rerouting. Rerouting surpasses the protection mechanisms in restorability and comes close to 100% dual failure survivability. Compared to single failure planning, both shared path protection and rerouting need significantly more capacity in dual failure planning.  相似文献   
18.
In this letter, a new sharing mechanism, SRLG sharing, is proposed, which allows the links of the same shared risk link group (SRLG) in a primary light tree to share protections in WDM optical networks. In previous studies, how to share spare resources with SRLG constraints has not been studied in multicast optical networks. In this letter, considering SRLG sharing, we propose a novel algorithm –multicast with SRLG sharing (MSS)– to establish a protection light tree. Finally, the algorithm MSS and the algorithm multicast with no SRLG sharing (MNSS) are compared through a simulation to show that our new sharing scheme of SRLG sharing is more efficient than that of no SRLG sharing in terms of spare resource utilization and blocking probability.  相似文献   
19.
Optical packet assembly is a key function to support inter-working between TCP/IP networks and optical packet-switched networks. It is characterized by the assembly delay and by the segment aggregation needed to form an optical packet. These counter-balancing aspects depend on several environment variables, such as the TCP parameters, the access link speed, the optical packet size whose effects are studied in this paper. Performance evaluations are obtained by extensive simulations in terms of send rate of TCP flows, fairness, efficiency, and assembly delay. Some guidelines in the design of optical packets that take into account the results presented are given.  相似文献   
20.
WDM网络光层保护新算法的探讨   总被引:1,自引:1,他引:0  
首先介绍了几种按照不同标准划分的WDM网络光层保护方法,然后提出了三种实现光层保护的新算法,对它们的内容和性能做了详细描述。按照提出的算法所求得的解,可以为WDM网络提供新的光层保护方式。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号