首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1470篇
  免费   259篇
  国内免费   51篇
化学   110篇
力学   26篇
综合类   13篇
数学   425篇
物理学   219篇
无线电   987篇
  2024年   4篇
  2023年   37篇
  2022年   55篇
  2021年   73篇
  2020年   68篇
  2019年   44篇
  2018年   49篇
  2017年   57篇
  2016年   81篇
  2015年   73篇
  2014年   138篇
  2013年   94篇
  2012年   112篇
  2011年   123篇
  2010年   107篇
  2009年   76篇
  2008年   84篇
  2007年   89篇
  2006年   84篇
  2005年   51篇
  2004年   53篇
  2003年   38篇
  2002年   38篇
  2001年   31篇
  2000年   24篇
  1999年   16篇
  1998年   23篇
  1997年   12篇
  1996年   7篇
  1995年   6篇
  1994年   5篇
  1993年   5篇
  1992年   4篇
  1991年   7篇
  1990年   2篇
  1989年   1篇
  1988年   1篇
  1987年   2篇
  1986年   1篇
  1981年   1篇
  1977年   1篇
  1976年   2篇
  1973年   1篇
排序方式: 共有1780条查询结果,搜索用时 15 毫秒
81.
The Visual multi-secret sharing (VMSS) scheme is characterized by encoding several secret images into a set of noise-like shares. Most existing VMSS meth- ods have to distort shares to embed additional secret im- ages. As a result, the quality of the decoded original secret image is degraded. This paper proposes a folding-up op- eration based VMSS scheme, which is able to encode one secret image and a group of tag images into shares. The secret image is revealed by stacking all shares, and fold- ing up each chosen share discloses the tag image. The proposed scheme encodes tag images without affecting the quality of the reconstructed secret image. The quality of the decoded secret image is equal to that of the conven- tional Visual secret sharing (VSS) scheme. The superiority of the proposed method is experimental verified.  相似文献   
82.
This paper proposes a circular threshold quantum secret sharing (TQSS) scheme with polarized single photons. A polarized single photon sequence runs circularly among any t or more of n parties and any t or more of n parties can reconstruct the secret key when they collaborate. It shows that entanglement is not necessary for quantum secret sharing. Moreover, the theoretic efficiency is improved to approach 100% as the single photons carrying the secret key are deterministically forwarded among any t or more of n parties, and each photon can carry one bit of information without quantum storage. This protocol is feasible with current technology.  相似文献   
83.
We present a scheme for quantum state sharing of an arbitrary qudit state by using nonmaximally entangled generalized Greenberger-Horne-Zeilinger (GHZ) states as the quantum channel and generalized Bell-basis states as the joint measurement basis. We show that the probability of successful sharing an unknown qudit state depends on the joint measurements chosen by Alice. We also give an expression for the maximally probability of this scheme.  相似文献   
84.
In integrated services networks, the provision of Quality of Service (QoS) guarantees depends critically upon the scheduling algorithm employed at the network layer. In this work we review fundamental results on scheduling, and we focus on Packet Fair Queueing (PFQ) algorithms, which have been proposed for QoS wireline-wireless networking. The basic notion in PFQ is that the bandwidth allocated to a session is proportional to a positive weight i . Because of the fixed weight assignment, the inherent in PFQ delay-bandwidth coupling imposes limitations on the range of QoS that can be supported. We develop PFQ with deterministic time-varying weight assignments, and we propose a low-overhead algorithm capable of supporting arbitrary piecewise linear service curves which achieve delay-bandwidth decoupling. Unlike existing service-curve based algorithms, our time-varying PFQ scheme does not exhibit the punishment phenomenon, and allows sessions to exploit the extra bandwidth in under-loaded networks.  相似文献   
85.
In 1994, Naor and Shamir introduced an unconditionally secure method for encoding black and white images. This method, known as a threshold visual cryptography scheme (VCS), has the benefit of requiring no cryptographic computation on the part of the decoders. In a -VCS, a share, in the form of a transparency, is given to ">n users. Any ">k users can recover the secret simply by stacking transparencies, but ">k-1 users can gain no information about the secret whatsoever.In this paper, we first explore the issue of contrast, by demonstrating that the current definitions are inadequate, and by providing an alternative definition. This new definition motivates an examination of minimizing pixel expansion subject to fixing the VCS parameters ">h and ">l. New bounds on pixel expansion are introduced, and connections between these bounds are examined. The best bound presented is tighter than any previous bound. An analysis of connections between (2, ">n) schemes and designs such as BIBD's, PBD's, and (">r, )-designs is performed. Also, an integer linear program is provided whose solution exactly determines the minimum pixel expansion of a (2, ">n)-VCS with specified ">h and >l.  相似文献   
86.
1Introduction Withthedevelopmentofcomputerandnetworkcom municationtechnology,andwiththedifferenceofuser s demands,digitalsignaturetechniquesarebeingexpand edgreatly,fromthesinglesignature,singleverification modetothemulti user sone.Forexample,adocument sy…  相似文献   
87.
我国广电网络正处在由模拟向数字转换的新的发展阶段,面对全国各试点城市的数字电视热潮,冷静分析了我国西部地区广电网络发展的现状,归纳并总结了西部地区发展数字电视所面临的困难、存在的问题及阻碍发展的因素,提出了对促进西部地区数字电视发展的一些看法。  相似文献   
88.
知识被认为是企业最重要的战略资源,企业成功与否取决于知识管理的成败。知识共享是企业实施知识管理活动的重要议题。本文详细分析了软件企业员工知识的特点,识别出影响员工知识共享的关键因素,提出了影响软件企业知识共享的基本模式。  相似文献   
89.
基于Harn签名方案的远距离通行字认证方案   总被引:20,自引:3,他引:17  
祁明  肖国镇 《通信学报》1996,17(1):114-119
本文首先利用Shamir的秘密共享方法将Chang-Liao通行字认证方案转变成(t,n)共享认证方案,从而使n个认证者中任意t个人能够认证通行字的正确性。其次提出了一个基于Harn数字签名方案的远距离通行字认证方案。  相似文献   
90.
As Codesign problems become larger and more realistic, the required time to estimate their solutions turns into an important bottleneck. This paper presents a new approach to improve the traditional estimation techniques, in order to avoid this drawback. The presented method has been successfully tested on a large experimental benchmark, attaining quality levels close to those provided by the Synopsys Behavioral Compiler. Finally, a case study based on the standard H.261 video co-dec is described, proving the convenience of the technique on real-life situations. The obtained results show a significant improvement in the process time, while keeping the good precision and fidelity levels that the traditional estimation models usually offer.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号