全文获取类型
收费全文 | 2644篇 |
免费 | 513篇 |
国内免费 | 52篇 |
专业分类
化学 | 508篇 |
晶体学 | 2篇 |
力学 | 67篇 |
综合类 | 26篇 |
数学 | 287篇 |
物理学 | 228篇 |
无线电 | 2091篇 |
出版年
2024年 | 10篇 |
2023年 | 46篇 |
2022年 | 85篇 |
2021年 | 105篇 |
2020年 | 133篇 |
2019年 | 106篇 |
2018年 | 100篇 |
2017年 | 129篇 |
2016年 | 163篇 |
2015年 | 179篇 |
2014年 | 271篇 |
2013年 | 227篇 |
2012年 | 221篇 |
2011年 | 249篇 |
2010年 | 179篇 |
2009年 | 138篇 |
2008年 | 157篇 |
2007年 | 138篇 |
2006年 | 99篇 |
2005年 | 102篇 |
2004年 | 79篇 |
2003年 | 59篇 |
2002年 | 46篇 |
2001年 | 29篇 |
2000年 | 42篇 |
1999年 | 25篇 |
1998年 | 10篇 |
1997年 | 9篇 |
1996年 | 12篇 |
1995年 | 12篇 |
1994年 | 6篇 |
1993年 | 6篇 |
1992年 | 12篇 |
1991年 | 5篇 |
1990年 | 4篇 |
1989年 | 1篇 |
1988年 | 2篇 |
1986年 | 1篇 |
1985年 | 2篇 |
1984年 | 2篇 |
1982年 | 1篇 |
1979年 | 1篇 |
1977年 | 2篇 |
1976年 | 3篇 |
1974年 | 1篇 |
排序方式: 共有3209条查询结果,搜索用时 0 毫秒
1.
因特网防御DoS攻击技术评述Ⅰ--攻击分类与特征·包过滤·攻击检测与防御 总被引:1,自引:0,他引:1
概述了因特网上DoS攻击的相应分类及基本特征,评述了包过滤、攻击检测及防御技术的最新成果.前一部分介绍了入口过滤、基于路由的过滤网和有效源地址强制协议.后一方面主要讨论了适合于检测攻击包的技术,介绍了新近提出的频谱分析方法和泛滥检测系统.简要评述了已有的防御SYN泛滥攻击的技术措施,介绍了Cisco的TCP拦截技术,提出了改进策略. 相似文献
2.
3.
Shideh Rezaeifar Slava Voloshynovskiy Meisam Asgari Jirhandeh Vitality Kinakh 《Entropy (Basel, Switzerland)》2022,24(5)
With the recent developments of Machine Learning as a Service (MLaaS), various privacy concerns have been raised. Having access to the user’s data, an adversary can design attacks with different objectives, namely, reconstruction or attribute inference attacks. In this paper, we propose two different training frameworks for an image classification task while preserving user data privacy against the two aforementioned attacks. In both frameworks, an encoder is trained with contrastive loss, providing a superior utility-privacy trade-off. In the reconstruction attack scenario, a supervised contrastive loss was employed to provide maximal discrimination for the targeted classification task. The encoded features are further perturbed using the obfuscator module to remove all redundant information. Moreover, the obfuscator module is jointly trained with a classifier to minimize the correlation between private feature representation and original data while retaining the model utility for the classification. For the attribute inference attack, we aim to provide a representation of data that is independent of the sensitive attribute. Therefore, the encoder is trained with supervised and private contrastive loss. Furthermore, an obfuscator module is trained in an adversarial manner to preserve the privacy of sensitive attributes while maintaining the classification performance on the target attribute. The reported results on the CelebA dataset validate the effectiveness of the proposed frameworks. 相似文献
4.
5.
Password authentication has been accepted as one of the commonly used solutions in network environment to protect resources from unauthorized access. The emerging mobile Ad hoc network, however, has called for new requirements for designing authentication schemes due to its dynamic nature and vulnerable-to-attack structure, which the traditional schemes overlooked, such as availability and strong security against off line guessing attacks in face of node compromise. In this paper, we propose a threshold password authentication scheme, which meets both availability and strong security requirements in the mobile Ad hoc networks. In our scheme, t out of n server nodes can jointly achieve mutual authentication with a registered user within only two rounds of message exchanges. Our scheme allows users to choose and change their memorable password without subjecting to guessing attacks. Moreover, there is no password table in the server nodes end, which is preferable since mobile nodes are usually memory-restricted devices. We also show that our scheme is efficient to be implemented in mobile devices. 相似文献
6.
本文提出了ε线性结构的概念,研究了其基本性质,给出了多输出函数的ε线性结构与其坐标函数的线性组合的ε线性结构之间的关系,给出了具有ε线性结构的Boole函数的Walsh谱特征。最后证明了利用密码算法的ε线性结构,在选择明文攻击下,可保证成功率不小于1-ε/2有前提下大幅度降低密钥穷举量。 相似文献
7.
空中制导-攻击匹配(GAM)旨在确定武器单元、制导单元以及目标三者之间的最优匹配关系,以使多作战智能体任务联盟整体作战效能最大。分析了基于混合通信方式的多作战智能体制导-攻击匹配过程,建立制导攻击匹配约束优化问题模型,设计了一种禁忌策略的嵌套遗传算法(TS-NGA)对模型进行求解,算法的外层循环寻求武器单元和制导单元的最优配对,内层循环寻求武器单元和目标的最优配对。针对GAM问题特点,制定了编码与解码策略、交叉、变异规则以及选择、禁忌策略。仿真实验结果表明所设计求解算法能较好地解决三维变量的GAM问题模型。 相似文献
8.
An open question about the asymptotic
cost of connecting many processors to a
large memory using three dimensions for wiring
is answered, and this result is used
to find the full cost of several
cryptanalytic attacks. In many cases this full
cost is higher than the accepted complexity
of a given algorithm based on the number of processor
steps. The full costs of several
cryptanalytic attacks are determined, including
Shanks method for computing discrete
logarithms in cyclic groups of prime order n,
which requires n1/2+o(1) processor steps, but,
when all factors are taken into account, has full
cost n2/3+o(1). Other attacks analyzed are
factoring with the number field sieve, generic
attacks on block ciphers, attacks on double
and triple encryption, and finding hash collisions.
In many cases parallel collision search
gives a significant asymptotic advantage over
well-known generic attacks. 相似文献
9.
XuBaomin LianWeimin 《电子科学学刊(英文版)》2003,20(3):183-188
The research work presented in this paper is based on the concrete background of the Cooperative Graphics Editor(GGE),allowing two or more persons to remotely deit a graphic document simultaneously.A new concurrency control algorithm based on partial order set is presented,which has fast response and less undo-redo operations as there are no lock mechanisms.It is used to solve inconsistency caused by operation on intersecting graphics concurrently.CGE also possesses a mask strategy to solve inconsistency caused by operation on the same graphic concurrently. 相似文献
10.
Dr. Carlo Fasting Prof. Christoph A. Schalley Dr. Marcus Weber Prof. Oliver Seitz Prof. Stefan Hecht Prof. Beate Koksch Dr. Jens Dernedde Prof. Christina Graf Prof. Ernst‐Walter Knapp Prof. Rainer Haag 《Angewandte Chemie (International ed. in English)》2012,51(42):10472-10498
Multivalent interactions can be applied universally for a targeted strengthening of an interaction between different interfaces or molecules. The binding partners form cooperative, multiple receptor–ligand interactions that are based on individually weak, noncovalent bonds and are thus generally reversible. Hence, multi‐ and polyvalent interactions play a decisive role in biological systems for recognition, adhesion, and signal processes. The scientific and practical realization of this principle will be demonstrated by the development of simple artificial and theoretical models, from natural systems to functional, application‐oriented systems. In a systematic review of scaffold architectures, the underlying effects and control options will be demonstrated, and suggestions will be given for designing effective multivalent binding systems, as well as for polyvalent therapeutics. 相似文献