全文获取类型
收费全文 | 4231篇 |
免费 | 383篇 |
国内免费 | 14篇 |
专业分类
化学 | 305篇 |
晶体学 | 3篇 |
力学 | 26篇 |
综合类 | 36篇 |
数学 | 50篇 |
物理学 | 129篇 |
无线电 | 4079篇 |
出版年
2024年 | 7篇 |
2023年 | 44篇 |
2022年 | 54篇 |
2021年 | 78篇 |
2020年 | 97篇 |
2019年 | 75篇 |
2018年 | 64篇 |
2017年 | 126篇 |
2016年 | 137篇 |
2015年 | 175篇 |
2014年 | 288篇 |
2013年 | 289篇 |
2012年 | 256篇 |
2011年 | 281篇 |
2010年 | 228篇 |
2009年 | 177篇 |
2008年 | 208篇 |
2007年 | 232篇 |
2006年 | 227篇 |
2005年 | 214篇 |
2004年 | 228篇 |
2003年 | 235篇 |
2002年 | 207篇 |
2001年 | 192篇 |
2000年 | 109篇 |
1999年 | 75篇 |
1998年 | 54篇 |
1997年 | 39篇 |
1996年 | 51篇 |
1995年 | 48篇 |
1994年 | 32篇 |
1993年 | 12篇 |
1992年 | 15篇 |
1991年 | 10篇 |
1990年 | 5篇 |
1989年 | 7篇 |
1988年 | 6篇 |
1987年 | 5篇 |
1986年 | 6篇 |
1984年 | 3篇 |
1982年 | 7篇 |
1981年 | 9篇 |
1980年 | 7篇 |
1979年 | 7篇 |
1978年 | 1篇 |
1957年 | 1篇 |
排序方式: 共有4628条查询结果,搜索用时 968 毫秒
41.
基于移动端多天线系统的无线衰落信道模型 总被引:11,自引:11,他引:0
根据当前无线移动通信对多天线移动接收端性能仿真的要求,讨论并建立了适于空时信号处理的移动端矢量信道模型。通过分析无线移动信道特点。研究了影响接收信号幅度相位的诸多因素,建立了相应的数学模型。并对随机参数选取进行了探讨。其中考虑到移动端接收信号到达角扩散的特点,采用GBSB椭圆模型产生了适于移动端接收信号仿真的随机角度,改进了一种瑞利衰落生成算法。最后信道的数值仿真结果符合理论和经验。同时,通过TD-SCDMA系统链路级仿真,也证明了该信道模型的有效性。 相似文献
42.
本详细描述了移动IP的工作过程,并介绍了移动IP的隧道技术和IPSec,最后对移动IP技术中存在几个热点问题进行了讨论。 相似文献
43.
The development of future mobile networks will be driven, in large part, by content and web based services. In this paper,
we examine several performance, scalability and architectural challenges faced by future mobile web applications and how advanced
mobile content delivery techniques can address these challenges. We review existing content delivery using a taxonomy that
consists of three categories: network scaling, end system acceleration, and content and protocol optimization. While wireline
content delivery focuses on network and server scalability, mobile content delivery will likely benefit most from optimizing
radio link usage. We also present our ongoing work in this area, which extends the functionality of edge caching to the terminal,
uses user interest correlation information to maintain low terminal power consumption and adds a new dimension to radio resource
management.
This revised version was published online in August 2006 with corrections to the Cover Date. 相似文献
44.
To provide responsive information services in a ubiquitous computing environment, service software and system development are indispensable. A component-based ubiquitous information system with a JAIN (Java APIs for Integrated Networks) platform to achieve seamless transmissions and reach-everywhere communications was designed in our research. In this development, numerous ubiquitous service modules were identified: location management, roaming, mobile IP and WAP networking. These component-based network modules were constructed using a component composition language with component specification and interface definition, running on top of a distributed service architecture using a JAIN platform to distribute the ubiquitous information services to mobile users. Two applications, Wireless-Application-Protocol (WAP) Mail and Video-on-Demand (VoD) services, show that the JAIN-like platform with the developed networking components effectively fills the gap for application developers between mobile appliances and various kinds of ubiquitous information services. 相似文献
45.
我国移动通信制造业在2G上晚了十年,未能取得相应的市场份额。但在3G领域,已经逐渐同步业界先进水平。如何改变现有市场格局,我国移动通信业面临全新的机会和重大的挑战,本就我国WCDMA系统产业化现状做了简要论述。 相似文献
46.
环境演算(MA)的模态逻辑AL进行了研究.在考虑了复制操作和限制操作的情况下,提出了逻辑等价的协归纳操作描述,并利用协归纳关系与进程结构同余关系进行比较,证明了若对MA加上约束条件得到子集MAIF^syn,此时逻辑等价(=L)与结构同余关系是等价的,即AL在MAIF^syn中是内涵的.同时发现由于复制操作的存在,AL的内涵性受到了影响,使得AL的区分能力被削弱,但通过对复制公式的构造验证了AL的表达能力. 相似文献
47.
The mobile agent is a fundamental building block of the mobile computing paradigm. In mobile agent security, oblivious transfer
(OT) from a trusted party can be used to protect the agent’s privacy and the hosts’ privacy. In this paper, we introduce a
new cryptographic primitive called Verifiable Distributed Oblivious Transfer (VDOT), which allows us to replace a single trusted party with a group of threshold trusted servers. The design of VDOT uses a novel
technique called consistency verification of encrypted secret shares. VDOT protects the privacy of both the sender and the receiver against malicious attacks of the servers. We also show the
design of a system to apply VDOT to protect the privacy of mobile agents. Our design partitions an agent into the general
portion and the security-sensitive portion. We also implement the key components of our system. As far as we know, this is
the first effort to implement a system that protects the privacy of mobile agents. Our preliminary evaluation shows that protecting
mobile agents not only is possible, but also can be implemented efficiently.
This work was supported in part by the DoD University Research Initiative (URI) program administered by the Office of Naval
Research under grant N00014-01-1-0795. Sheng Zhong was supported by ONR grant N00014-01-1-0795 and NSF grants ANI-0207399
and CCR-TC-0208972. Yang Richard Yang was supported in part by NSF grant ANI-0207399. A preliminary version of this paper
was presented at the DialM-POMC Joint Workshop on Foundations of Mobile Computing in 2003.
Sheng Zhong received his Ph.D. in computer science from Yale University in the year of 2004. He holds an assistant professor position
at SUNY Buffalo and is currently on leave for postdoctoral research at the Center for Discrete Mathematics and Theoretical
Computer Science (DIMACS). His research interests, on the practical side, are security and incentives in data mining, databases,
and wireless networks. On the theoretical side, he is interested in cryptography and game theory.
Yang Richard Yang is an Assistant Professor of Computer Science at Yale University. His research interests include computer networks, mobile
computing, wireless networking, sensor networks, and network security. He leads the LAboratory of Networked Systems (LANS)
at Yale. His recent awards include a Schlumberger Fellowship and a CAREER Award from the National Science Foundation. He received
his B.E. degree from Tsinghua University (1993), and his M.S. and Ph.D. degrees from the University of Texas at Austin (1998
and 2001). 相似文献
48.
49.
The area covered by a mobile ad hoc network consists of obstacles that inhibit transmission and areas where communications
can take place. Physical structures, such as buildings, that block transmission, or lakes, where forwarding nodes cannot be
located, are permanent obstacles. Temporary obstacles are created as mobile nodes enter or leave an area. Our hypothesis is
that the spaces between nearby obstacles are bottlenecks that inhibit the flows in the network. We partition the network into
areas that are encompassed by obstacles and bottlenecks. All of the nodes in an area are treated as a single super node, and
the bottlenecks between areas are the links between the super nodes. As individual nodes move, the flows and paths in the
model change more slowly than the paths and flows between the individual nodes. We apply flow control algorithms to the model
and perform admission control within a super node based on the flows that are assigned by the flow control algorithm. We apply
the model to the Columbia University campus, and use max–min, fair bottleneck flow control to assign the flows. Our hypothesis
is verified for this example. 相似文献
50.
依据柱相比的热力学定义和反相液相色谱中溶质的计量置换保留理论(the stoichiometric dispheement heory of solute for retention,SDT-R),对反相液相色谱中固定相和流动相性质、温度对柱相比的影响进行了研究。结果表明:固定相的种类和配基的疏水性对柱相比影响较大,而流动相中有机溶剂的种类,特别是脂肪酸作为置换剂时,对柱相比的影响更大,而柱相比受温度的影响较小。此外,通过用27种小分子溶质对柱相比的测定,其logI和Z良好的线性关系,进一步证明柱相比是一个与溶质性质无关的常数。 相似文献