全文获取类型
收费全文 | 1470篇 |
免费 | 259篇 |
国内免费 | 51篇 |
专业分类
化学 | 110篇 |
力学 | 26篇 |
综合类 | 13篇 |
数学 | 425篇 |
物理学 | 219篇 |
无线电 | 987篇 |
出版年
2024年 | 4篇 |
2023年 | 37篇 |
2022年 | 55篇 |
2021年 | 73篇 |
2020年 | 68篇 |
2019年 | 44篇 |
2018年 | 49篇 |
2017年 | 57篇 |
2016年 | 81篇 |
2015年 | 73篇 |
2014年 | 138篇 |
2013年 | 94篇 |
2012年 | 112篇 |
2011年 | 123篇 |
2010年 | 107篇 |
2009年 | 76篇 |
2008年 | 84篇 |
2007年 | 89篇 |
2006年 | 84篇 |
2005年 | 51篇 |
2004年 | 53篇 |
2003年 | 38篇 |
2002年 | 38篇 |
2001年 | 31篇 |
2000年 | 24篇 |
1999年 | 16篇 |
1998年 | 23篇 |
1997年 | 12篇 |
1996年 | 7篇 |
1995年 | 6篇 |
1994年 | 5篇 |
1993年 | 5篇 |
1992年 | 4篇 |
1991年 | 7篇 |
1990年 | 2篇 |
1989年 | 1篇 |
1988年 | 1篇 |
1987年 | 2篇 |
1986年 | 1篇 |
1981年 | 1篇 |
1977年 | 1篇 |
1976年 | 2篇 |
1973年 | 1篇 |
排序方式: 共有1780条查询结果,搜索用时 15 毫秒
81.
The Visual multi-secret sharing (VMSS) scheme is characterized by encoding several secret images into a set of noise-like shares. Most existing VMSS meth- ods have to distort shares to embed additional secret im- ages. As a result, the quality of the decoded original secret image is degraded. This paper proposes a folding-up op- eration based VMSS scheme, which is able to encode one secret image and a group of tag images into shares. The secret image is revealed by stacking all shares, and fold- ing up each chosen share discloses the tag image. The proposed scheme encodes tag images without affecting the quality of the reconstructed secret image. The quality of the decoded secret image is equal to that of the conven- tional Visual secret sharing (VSS) scheme. The superiority of the proposed method is experimental verified. 相似文献
82.
This paper proposes a circular threshold quantum secret sharing (TQSS) scheme with polarized single photons. A polarized single photon sequence runs circularly among any t or more of n parties and any t or more of n parties can reconstruct the secret key when they collaborate. It shows that entanglement is not necessary for quantum secret sharing. Moreover, the theoretic efficiency is improved to approach 100% as the single photons carrying the secret key are deterministically forwarded among any t or more of n parties, and each photon can carry one bit of information without quantum storage. This protocol is feasible with current technology. 相似文献
83.
Quantum state sharing of an arbitrary qudit state by using nonmaximally generalized GHZ state
下载免费PDF全文
![点击此处可从《中国物理 B》网站下载免费的PDF全文](/ch/ext_images/free.gif)
We present a scheme for quantum state sharing of an arbitrary qudit state by using nonmaximally entangled generalized Greenberger-Horne-Zeilinger (GHZ) states as the quantum channel and generalized Bell-basis states as the joint measurement basis. We show that the probability of successful sharing an unknown qudit state depends on the joint measurements chosen by Alice. We also give an expression for the maximally probability of this scheme. 相似文献
84.
Anastasios Stamoulis Georgios B. Giannakis 《The Journal of VLSI Signal Processing》2002,30(1-3):71-87
In integrated services networks, the provision of Quality of Service (QoS) guarantees depends critically upon the scheduling algorithm employed at the network layer. In this work we review fundamental results on scheduling, and we focus on Packet Fair Queueing (PFQ) algorithms, which have been proposed for QoS wireline-wireless networking. The basic notion in PFQ is that the bandwidth allocated to a session is proportional to a positive weight
i
. Because of the fixed weight assignment, the inherent in PFQ delay-bandwidth coupling imposes limitations on the range of QoS that can be supported. We develop PFQ with deterministic time-varying weight assignments, and we propose a low-overhead algorithm capable of supporting arbitrary piecewise linear service curves which achieve delay-bandwidth decoupling. Unlike existing service-curve based algorithms, our time-varying PFQ scheme does not exhibit the punishment phenomenon, and allows sessions to exploit the extra bandwidth in under-loaded networks. 相似文献
85.
Threshold Visual Cryptography Schemes with Specified Whiteness Levels of Reconstructed Pixels 总被引:6,自引:0,他引:6
In 1994, Naor and Shamir introduced an unconditionally secure method for encoding black and white images. This method, known as a threshold visual cryptography scheme (VCS), has the benefit of requiring no cryptographic computation on the part of the decoders. In a
-VCS, a share, in the form of a transparency, is given to ">n users. Any ">k users can recover the secret simply by stacking transparencies, but ">k-1 users can gain no information about the secret whatsoever.In this paper, we first explore the issue of contrast, by demonstrating that the current definitions are inadequate, and by providing an alternative definition. This new definition motivates an examination of minimizing pixel expansion subject to fixing the VCS parameters ">h and ">l. New bounds on pixel expansion are introduced, and connections between these bounds are examined. The best bound presented is tighter than any previous bound. An analysis of connections between (2, ">n) schemes and designs such as BIBD's, PBD's, and (">r, )-designs is performed. Also, an integer linear program is provided whose solution exactly determines the minimum pixel expansion of a (2, ">n)-VCS with specified ">h and >l. 相似文献
86.
JIA Xiao-yun LUO Shou-shan YUAN Chao-wei.School of Continuing Education Beijing University of Posts Telecommunications Beijing P.R. China .School of Software Engineering Beijing University of Posts Telecommunications Beijing P.R. China .National Key Laboratory of Integrated Service Networks Xidian University Xi'an P.R. China 《中国邮电高校学报(英文版)》2006,13(2):66-69
1Introduction Withthedevelopmentofcomputerandnetworkcom municationtechnology,andwiththedifferenceofuser s demands,digitalsignaturetechniquesarebeingexpand edgreatly,fromthesinglesignature,singleverification modetothemulti user sone.Forexample,adocument sy… 相似文献
87.
我国广电网络正处在由模拟向数字转换的新的发展阶段,面对全国各试点城市的数字电视热潮,冷静分析了我国西部地区广电网络发展的现状,归纳并总结了西部地区发展数字电视所面临的困难、存在的问题及阻碍发展的因素,提出了对促进西部地区数字电视发展的一些看法。 相似文献
88.
知识被认为是企业最重要的战略资源,企业成功与否取决于知识管理的成败。知识共享是企业实施知识管理活动的重要议题。本文详细分析了软件企业员工知识的特点,识别出影响员工知识共享的关键因素,提出了影响软件企业知识共享的基本模式。 相似文献
89.
基于Harn签名方案的远距离通行字认证方案 总被引:20,自引:3,他引:17
本文首先利用Shamir的秘密共享方法将Chang-Liao通行字认证方案转变成(t,n)共享认证方案,从而使n个认证者中任意t个人能够认证通行字的正确性。其次提出了一个基于Harn数字签名方案的远距离通行字认证方案。 相似文献
90.
Juan?Antonio?MaestroEmail author Daniel?Mozos Raquel?Dormido Pedro?Reviriego 《Design Automation for Embedded Systems》2004,9(3):193-210
As Codesign problems become larger and more realistic, the required time to estimate their solutions turns into an important bottleneck. This paper presents a new approach to improve the traditional estimation techniques, in order to avoid this drawback. The presented method has been successfully tested on a large experimental benchmark, attaining quality levels close to those provided by the Synopsys Behavioral Compiler. Finally, a case study based on the standard H.261 video co-dec is described, proving the convenience of the technique on real-life situations. The obtained results show a significant improvement in the process time, while keeping the good precision and fidelity levels that the traditional estimation models usually offer. 相似文献