全文获取类型
收费全文 | 1100篇 |
免费 | 40篇 |
国内免费 | 2篇 |
专业分类
化学 | 14篇 |
综合类 | 1篇 |
数学 | 114篇 |
物理学 | 65篇 |
无线电 | 948篇 |
出版年
2024年 | 1篇 |
2023年 | 6篇 |
2022年 | 12篇 |
2021年 | 6篇 |
2020年 | 16篇 |
2019年 | 13篇 |
2018年 | 7篇 |
2017年 | 11篇 |
2016年 | 14篇 |
2015年 | 19篇 |
2014年 | 45篇 |
2013年 | 74篇 |
2012年 | 52篇 |
2011年 | 54篇 |
2010年 | 42篇 |
2009年 | 46篇 |
2008年 | 53篇 |
2007年 | 80篇 |
2006年 | 70篇 |
2005年 | 68篇 |
2004年 | 59篇 |
2003年 | 55篇 |
2002年 | 66篇 |
2001年 | 49篇 |
2000年 | 51篇 |
1999年 | 38篇 |
1998年 | 31篇 |
1997年 | 27篇 |
1996年 | 23篇 |
1995年 | 24篇 |
1994年 | 7篇 |
1993年 | 6篇 |
1992年 | 5篇 |
1991年 | 4篇 |
1990年 | 2篇 |
1989年 | 2篇 |
1988年 | 3篇 |
1986年 | 1篇 |
排序方式: 共有1142条查询结果,搜索用时 15 毫秒
61.
Access control in wireless sensor networks 总被引:2,自引:0,他引:2
Nodes in a sensor network may be lost due to power exhaustion or malicious attacks. To extend the lifetime of the sensor network, new node deployment is necessary. In military scenarios, adversaries may directly deploy malicious nodes or manipulate existing nodes to introduce malicious “new” nodes through many kinds of attacks. To prevent malicious nodes from joining the sensor network, access control is required in the design of sensor network protocols. In this paper, we propose an access control protocol based on Elliptic Curve Cryptography (ECC) for sensor networks. Our access control protocol accomplishes node authentication and key establishment for new nodes. Different from conventional authentication methods based on the node identity, our access control protocol includes both the node identity and the node bootstrapping time into the authentication procedure. Hence our access control protocol cannot only identify the identity of each node but also differentiate between old nodes and new nodes. In addition, each new node can establish shared keys with its neighbors during the node authentication procedure. Compared with conventional sensor network security solutions, our access control protocol can defend against most well-recognized attacks in sensor networks, and achieve better computation and communication performance due to the more efficient algorithms based on ECC than those based on RSA. 相似文献
62.
目前,在许多工程开发的过程中,都要和数据库相关联。例如:Oracle 9i,SQL Server 2000和Access 2003等。虽然每种数据库与Visual Studio.NET 2003中的C#连接方式多种多样,但也有很多相似之处,可以将相似的地方用统一方法写成实用的接口。这样可以很好地对C#Windows Forms程序和ASP.NET程序进行架构的组织,配合微软最近推出的ASP.NET 2.0版本的架构。可以将数据实体层(即数据库层)、业务逻辑层、界面表示层等进行分类。针对这3种数据库与C#.NET接口的相似性来写一种具有统一模式的接口。 相似文献
63.
本文基于西方经济学的局部均衡分析范式探讨由于电子商务降低产品边际成本,最终会对市场结构和社会物价水平造成的影响。得出了电子商务的普及有提高社会总产出和福利水平的作用的结论。 相似文献
64.
65.
66.
Zhao Dongfeng 《电子科学学刊(英文版)》1999,16(1):44-50
In this paper, the analyzing approaches proposed by Zhao Dongfeng, et al.(1997) have been extensively studied. The average cyclic times of the slotted multiple access systems are analyzed by using the average cycle method. Analytic formulae for mean values of a successful period and a colliding period and an idle period are derived. The upper bounds of the system throughput with capture effect and collision resolution are provided. Finally, the simulation results of the slotted multiple access channels are given. 相似文献
67.
在人们普遍给予全球移动通信系统高技术高效益评价的同时,其高投入高成本所带来的高负险也是不容忽视的。根据市场竞争的观点它同样面临着行为内和行业外多种力量的竞争。特别是近年来地面无线通信的迅速发展对该产业的怅惘敢巨大冲击。 相似文献
68.
中国移动电话市场发展迅速,目前用户总数已位居世界第三。近期的市场调查表明,移动电话市场中呈现出品牌意识强,中低档手机市场大,购机者关心因素多,个人购机比例高等现象。另外,中文手机仍然占主体,黑色手机备受用户青睐。 相似文献
69.
A market is considered where trading can take place only at discrete time points, the trading frequency cannot grow without bound, and the number of states of nature is finite. The main objectives of the paper are to show that the market can be completed also with highly correlated risky assets, and to describe an efficient algorithm to compute a self-financing hedging strategy. The algorithm consists off-line of a backwards recursion and on-line of the solution, in each period, of a system of linear equations; it is a consequence of a proof where, using a well-known mathematical property, it is shown that uniqueness of the martingale measure implies completeness also in our setting. The significance of ‘multistate’ models versus the familiar binomial model is discussed and it is shown how the evolution of prices of the (correlated) risky assets can be chosen so that a given probability measure is already the unique equivalent martingale measure. 相似文献
70.
The segmentation of customers on multiple bases is a pervasive problem in marketing research. For example, segmentation service providers partition customers using a variety of demographic and psychographic characteristics, as well as an array of consumption attributes such as brand loyalty, switching behavior, and product/service satisfaction. Unfortunately, the partitions obtained from multiple bases are often not in good agreement with one another, making effective segmentation a difficult managerial task. Therefore, the construction of segments using multiple independent bases often results in a need to establish a partition that represents an amalgamation or consensus of the individual partitions. In this paper, we compare three methods for finding a consensus partition. The first two methods are deterministic, do not use a statistical model in the development of the consensus partition, and are representative of methods used in commercial settings, whereas the third method is based on finite mixture modeling. In a large-scale simulation experiment the finite mixture model yielded better average recovery of holdout (validation) partitions than its non-model-based competitors. This result calls for important changes in the current practice of segmentation service providers that group customers for a variety of managerial goals related to the design and marketing of products and services. 相似文献