首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   13780篇
  免费   1592篇
  国内免费   193篇
化学   1713篇
晶体学   15篇
力学   175篇
综合类   88篇
数学   1799篇
物理学   1860篇
无线电   9915篇
  2024年   28篇
  2023年   202篇
  2022年   264篇
  2021年   354篇
  2020年   364篇
  2019年   265篇
  2018年   276篇
  2017年   377篇
  2016年   474篇
  2015年   504篇
  2014年   840篇
  2013年   1014篇
  2012年   868篇
  2011年   839篇
  2010年   779篇
  2009年   820篇
  2008年   865篇
  2007年   967篇
  2006年   774篇
  2005年   699篇
  2004年   589篇
  2003年   592篇
  2002年   483篇
  2001年   449篇
  2000年   326篇
  1999年   262篇
  1998年   194篇
  1997年   188篇
  1996年   195篇
  1995年   163篇
  1994年   132篇
  1993年   80篇
  1992年   76篇
  1991年   48篇
  1990年   30篇
  1989年   34篇
  1988年   29篇
  1987年   17篇
  1986年   17篇
  1985年   20篇
  1984年   15篇
  1983年   3篇
  1982年   14篇
  1981年   15篇
  1980年   8篇
  1979年   7篇
  1978年   2篇
  1971年   1篇
  1969年   1篇
  1957年   1篇
排序方式: 共有10000条查询结果,搜索用时 890 毫秒
11.
介绍了数字集群的技术性能和在国外的发展概况,叙述了数字集群通信在我国的使用和发展前景。  相似文献   
12.
With the proliferation of mobile computing technologies, location based services have been identified as one of the most promising target application. We classify mobile information service domains based on feature characteristics of the information sources and different patterns of mobile information access. By carefully examining the service requirements, we identify the dynamic data management problem that must be addressed for effective location based services in mobile environments. We then devise a general architecture and cost model for servicing both location independent and location dependent data. Based on the architecture and cost model, we propose a set of dynamic data management strategies that employs judicious caching, proactive server pushing and neighborhood replication to reduce service cost and improve response time under changing user mobility and access patterns. Detail behavior analysis helps us in precisely capturing when and how to apply these strategies. Simulation results suggest that different strategies are effective for different types of data in response to different patterns of movement and information access. Shiow-yang Wu is an associate professor of the Department of Computer Science and Information Engineering at National Dong Hwa University, Hualien, Taiwan, R.O.C. He received the BS and MS degrees in computer engineering from National Chiao Tung University, Hsinchu, Taiwan, ROC, and the PhD degree in computer science from the University of Texas at Austin in 1984, 1986, and 1995, respectively. His research interests include data/knowledge bases, mobile computing, distributed processing, intelligence information systems, and electronic commerce. Kun-Ta Wu was born in Taipei, Taiwan, R.O.C., in 1976. He received the B.S. degree in computer science from Soochow University, Taipei, Taiwan, R.O.C., in 1999 and the M.S. degree in computer science and information engineering from National Dong Hwa University, Hualien, Taiwan, R.O.C., in 2001. Currently, he is an Assistant Researcher in the Domestic Division at Science and Technology Information Center, National Science Council, R.O.C., as a member of Information Gathering and Analysis Group of National Information and Communication Security Taskforce. His research interests include mobile computing, wireless network and information security.  相似文献   
13.
GPRS技术在SCADA系统中的实现与应用   总被引:3,自引:0,他引:3  
GPRS是一种构建于GSM移动网络之上的通信新技术,可以提供中低速率的数据通信能力,本文介绍了GPRS的技术规范和特点,并提出了该技术在SCADA(即数据采集与监视控制)系统中的应用,给出相应的系统结构与软硬件设计要点,说明了其广泛的应用领域与前景。  相似文献   
14.
基于mobile agent的分布式网络自管理模型   总被引:2,自引:1,他引:1  
郭楠  赵宏 《通信学报》2003,24(3):130-138
为了解决大规模、异构网络环境下基于“管理员密集”的传统网络管理模式带来的低效率和高出错率问题,提出了一种网络自管理模型,从网络管理的自动初始化和动态自管理两个方面实现对网络自动、自主、自适应的管理;提出了管理定位服务这一关键技术,在多个管理站协同工作的分布式网络环境中为设备自动定位出合适的管理站及初始的管理任务;采用可伸缩的分布式体系结构,适应了大规模网络的规模可变性等特点;基于mobile agent的管理框架进一步提高了管理的自适应性和灵活性。  相似文献   
15.
Efficient multicast search under delay and bandwidth constraints   总被引:1,自引:0,他引:1  
The issue of a multicast search for a group of users is discussed in this study. Given the condition that the search is over only after all the users in the group are found, this problem is called the Conference Call Search (CCS) problem. The goal is to design efficient CCS strategies under delay and bandwidth constraints. While the problem of tracking a single user has been addressed by many studies, to the best of our knowledge, this study is one of the first attempts to reduce the search cost for multiple users. Moreover, as oppose to the single user tracking, for which one can always reduce the expected search delay by increasing the expected search cost, for a multicast search the dependency between the delay and the search cost is more complicated, as demonstrated in this study. We identify the key factors affecting the search efficiency, and the dependency between them and the search delay. Our analysis shows that under tight bandwidth constraints, the CCS problem is NP-hard. We therefore propose a search method that is not optimal, but has a low computational complexity. In addition, the proposed strategy yields a low search delay as well as a low search cost. The performance of the proposed search strategy is superior to the implementation of an optimal single user search on a group of users. Amotz Bar-Noy received the B.Sc. degree in 1981 in Mathematics and Computer Science and the Ph.D. degree in 1987 in Computer Science, both from the Hebrew University, Israel. From October 1987 to September 1989 he was a post-doc fellow in Stanford University, California. From October 1989 to August 1996 he was a Research Staff Member with IBM T. J. Watson Research Center, New York. From February 1995 to September 2001 he was an associate Professor with the Electrical Engineering-Systems department of Tel Aviv University, Israel. From September 1999 to December 2001 he was with AT research labs in New Jersey. Since February 2002 he is a Professor with the Computer and Information Science Department of Brooklyn College - CUNY, Brooklyn New York. Zohar Naor received the Ph.D. degree in Computer Science from Tel Aviv University, Tel Aviv, Israel, in 2000. Since 2003 he is with the University of Haifa, Israel. His areas of interests include wireless networks, resource management of computer networks, mobility, search strategies, and multiple access protocols.  相似文献   
16.
移动机器人路径规划方法研究   总被引:3,自引:0,他引:3  
董宇欣 《信息技术》2006,30(6):108-111
移动机器人技术研究中的一个重要领域是路径规划技术,它分为基于模型的环境已知的全局路径规划和基于传感器的环境未知的局部路径规划。综述了移动机器人路径规划技术的发展现状指出了各种方法的优点与不足,最后对移动机器人路径规划技术的发展趋势进行了展望。  相似文献   
17.
本文提出一种适用于移动网络的安全管理系统,由于访问网络能够独立地对漫游用户进行认证,所以称该系统为独立式安全管理(ISM).基于ISM设计一种漫游用户的认证协议,通过对协议的比较分析可以看出,相对于其它安全管理系统,ISM的突出优点是安全责任划分清晰、认证效率高.  相似文献   
18.
移动卫星通信信道多普勒频移特性研究   总被引:1,自引:0,他引:1  
在分析移动卫星通信信道特性的基础上,研究增加直射分量的多普勒实时频移和多径信号入射角范围及其变化对移动卫星通信信道多普勒频移特性的影响,推导了其不对称多普勒功率谱形式,对其进行了理论分析并给出了仿真结果。  相似文献   
19.
一种新的主动网络安全体系的设计   总被引:5,自引:0,他引:5  
尽管主动网络原型系统中设计了一些安全措施,但是它们都不具通用性且主要集中在security方面,这在主动网络必须和传统网络相兼容的情况下,阻碍了主动网络的发展。本文在定义消极型错误和积极型错误的基础上,设计了主动网络资源控制核。然后提出了集security和safety保障为一体的基于资源控制核的一种通用的主动网络安全体系,探讨了该体系应具有的特点、设计目标和可行性,并设计了主动节点的安全机制。  相似文献   
20.
Security for ad hoc network environments has received a lot of attention as of today. Previous work has mainly been focussing on secure routing, fairness issues, and malicious node detection. However, the issue of introducing and conserving trust relationships has received considerably less attention. In this article, we present a scalable method for the use of public key certificates and their revocation in mobile ad hoc networks (MANETs). With the LKN-ad hoc security framework (LKN-ASF) a certificate management protocol has been introduced, bringing PKI technology to MANETs. In addition a performance analysis of two different revocation approaches for MANETs will be presented.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号