首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   973篇
  免费   60篇
化学   12篇
综合类   21篇
数学   140篇
物理学   24篇
无线电   836篇
  2023年   1篇
  2022年   16篇
  2021年   9篇
  2020年   19篇
  2019年   16篇
  2018年   18篇
  2017年   21篇
  2016年   19篇
  2015年   25篇
  2014年   66篇
  2013年   70篇
  2012年   59篇
  2011年   53篇
  2010年   52篇
  2009年   51篇
  2008年   71篇
  2007年   56篇
  2006年   36篇
  2005年   40篇
  2004年   40篇
  2003年   50篇
  2002年   39篇
  2001年   26篇
  2000年   39篇
  1999年   23篇
  1998年   15篇
  1997年   17篇
  1996年   24篇
  1995年   21篇
  1994年   16篇
  1993年   4篇
  1992年   1篇
  1991年   5篇
  1990年   5篇
  1989年   2篇
  1988年   2篇
  1987年   1篇
  1985年   1篇
  1984年   3篇
  1970年   1篇
排序方式: 共有1033条查询结果,搜索用时 93 毫秒
31.
With the rapid development of the Internet of Things (IoT), Location-Based Services (LBS) are becoming more and more popular. However, for the users being served, how to protect their location privacy has become a growing concern. This has led to great difficulty in establishing trust between the users and the service providers, hindering the development of LBS for more comprehensive functions. In this paper, we first establish a strong identity verification mechanism to ensure the authentication security of the system and then design a new location privacy protection mechanism based on the privacy proximity test problem. This mechanism not only guarantees the confidentiality of the user’s information during the subsequent information interaction and dynamic data transmission, but also meets the service provider’s requirements for related data.  相似文献   
32.
Privacy issues are becoming more and more important especially since the cyber and the real world are converging up to certain extent when using mobile devices. Means that really protect privacy are still missing. The problem is, as soon as a user provides data to a service provider the user looses control over her data. The simple solution is not to provide any data but then many useful services, e.g. navigation applications, cannot be used. In order to solve this problem, we propose privacy guaranteeing execution containers (PGEC). Basically the concept is that the application obtains access to the user data in a specially protected and certified environment, the PGEC. PGECs enable applications to access private user data and guarantee that the user data is deleted as soon as the service is quit. The PGEC also restricts the communication between the application and the service provider to what is explicitly allowed by the service user. In addition to those means the PGEC also implements countermeasures against malicious attacks such as modified host systems and covert channel attacks, which might be misusing CPU load to signal data out of the PGEC. Thus, the PGEC guarantees a “one time use” of the provided private data.  相似文献   
33.
远程医疗服务为人们提供了远程获得优质医疗服务的可能性.但远程医疗服务系统本身是一个复杂的系统,提供远程医疗服务,需要患者医疗记录等的数字化和标准化以及医疗设施的互操作性,这对标准工作提出了一些新的需求.本文将重要介绍远程医疗服务的种类、远程医疗服务系统对标准的需求、以及相关标准化工作的进展.  相似文献   
34.
移动网络中数据业务关键性能指标KPI探讨   总被引:1,自引:0,他引:1  
张艳超  高泽华 《通信技术》2009,42(10):211-212
移动网络的性能评估是网络规划和优化建设的前提,数据业务的迅速发展为移动网络的性能评估提出新的课题,当前评价数据业务网络的关键性能指标主要有吞吐量、时延等,从网络的容量和质量角度出发提出每用户平均吞吐量和网络资源利用率两个关键性能指标,并分别进行理论分析,为数据业务网络的性能评估提供参考依据。  相似文献   
35.
本文对LMSS遮蔽环境中的衰落分布进行了分析,利用现有实验数据和ERS模式的基本形式,重新确定了经验模式参数在不同遮蔽条件下与仰角和频率的关系;  相似文献   
36.
信元在 ATM 网内传输时,由于网内缓存的存在,造成了信元延时变化。信元延时变化对基于锁相环(PLL)的恒定比特率业务时钟的恢复有很大影响,即时钟的抖动和漂移比较明显。从而使这种基于 PLL 的CBR 业务时钟恢复方案在某些场合不能应用。本文提出了一种基于 PLL 的时钟恢复新方案,该方案可以明显地降低由于信元延时变化而造成的 CBR 业务时钟的抖动和漂移,同时不增加缓存的容量。  相似文献   
37.
谭淑贞 《世界电信》1995,8(2):14-16
本文展望了21世纪初社会、家庭、企业对通信的需求与通信在信息化社会中的重要地位,指出通信事业经营者应向社会提供什么样的通信业务(服务),应建设什么样的通信网来实现这些业务以及未来的网络需要哪些关键性通信技术来支持。  相似文献   
38.
The AROUND Architecture for Dynamic Location-Based Services   总被引:1,自引:0,他引:1  
This paper presents a generic concept of location-based service as an abstraction for supporting the association between computational resources and location. The objective is to extend the advantages of service-based architectures to the development of location-based systems, thus providing a more open and extensible alternative to the vertical approaches typically used in this type of system. The novel AROUND architecture is proposed as an approach for supporting location-based services in the Internet environment. AROUND provides a service location infrastructure that allows applications to select services that are specifically associated with their current location. The architecture includes a flexible scope model that defines the association between services and location, and a service location infrastructure organised by spatial criteria and optimised for location-based queries. Based on a prototype implementation of this architecture, we have developed two case studies that illustrate the use of this approach for developing location-based systems. The overall results provide a valuable insight into the applicability of the architecture, and suggest that this model of location-based services can provide a useful approach for the development of a wide range of location-based applications.  相似文献   
39.
Núñez-Queija  R. 《Queueing Systems》2000,34(1-4):351-386
We study the sojourn times of customers in an M/M/1 queue with the processor sharing service discipline and a server that is subject to breakdowns. The lengths of the breakdowns have a general distribution, whereas the on-periods are exponentially distributed. A branching process approach leads to a decomposition of the sojourn time, in which the components are independent of each other and can be investigated separately. We derive the Laplace–Stieltjes transform of the sojourn-time distribution in steady state, and show that the expected sojourn time is not proportional to the service requirement. In the heavy-traffic limit, the sojourn time conditioned on the service requirement and scaled by the traffic load is shown to be exponentially distributed. The results can be used for the performance analysis of elastic traffic in communication networks, in particular, the ABR service class in ATM networks, and best-effort services in IP networks.  相似文献   
40.
李春梅  蒋运承 《现代电子技术》2007,30(7):149-152,158
参考日常生活中人们的交易行为,在网络服务中常用信誉度作为服务选取的依据,然而传统的信誉度评估方法不能全面揭示服务提供方的信誉本质,不能应用到语义Web服务的选取中。经过分析,提出了一个以本体为基础的语义Web服务信誉度评估过程及评估模型,深入研究了信誉度评估算法与具体实现,以提高在语义Web服务选择中的准确性和可靠性。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号