全文获取类型
收费全文 | 4043篇 |
免费 | 439篇 |
国内免费 | 25篇 |
专业分类
化学 | 50篇 |
力学 | 19篇 |
综合类 | 72篇 |
数学 | 612篇 |
物理学 | 53篇 |
无线电 | 3701篇 |
出版年
2024年 | 5篇 |
2023年 | 18篇 |
2022年 | 77篇 |
2021年 | 82篇 |
2020年 | 121篇 |
2019年 | 79篇 |
2018年 | 84篇 |
2017年 | 102篇 |
2016年 | 123篇 |
2015年 | 156篇 |
2014年 | 283篇 |
2013年 | 280篇 |
2012年 | 279篇 |
2011年 | 295篇 |
2010年 | 223篇 |
2009年 | 205篇 |
2008年 | 247篇 |
2007年 | 236篇 |
2006年 | 254篇 |
2005年 | 264篇 |
2004年 | 209篇 |
2003年 | 193篇 |
2002年 | 164篇 |
2001年 | 108篇 |
2000年 | 123篇 |
1999年 | 65篇 |
1998年 | 44篇 |
1997年 | 32篇 |
1996年 | 30篇 |
1995年 | 21篇 |
1994年 | 35篇 |
1993年 | 11篇 |
1992年 | 9篇 |
1991年 | 4篇 |
1990年 | 11篇 |
1989年 | 8篇 |
1988年 | 5篇 |
1987年 | 9篇 |
1986年 | 1篇 |
1985年 | 4篇 |
1984年 | 3篇 |
1983年 | 2篇 |
1978年 | 1篇 |
1977年 | 1篇 |
1959年 | 1篇 |
排序方式: 共有4507条查询结果,搜索用时 15 毫秒
31.
In a mobile ad hoc network, difficulties exist in supporting address autoconfiguration and naming resolution due to the lack of centralized servers. This letter presents a novel approach, called name‐based autoconfiguration (NBA), which uses host names to determine IP addresses and provides address autoconfiguration and name resolution as a single protocol. 相似文献
32.
33.
Joseph Dunn Michael Neufeld Anmol Sheth Dirk Grunwald John Bennett 《Mobile Networks and Applications》2006,11(1):37-45
Many companies, organizations and communities are providing wireless hotspots that provide networking access using 802.11b wireless networks. Since wireless networks are more sensitive to variations
in bandwidth and environmental interference than wired networks, most networks support a number of transmission rates that
have different error and bandwidth properties. Access points can communicate with multiple clients running at different rates,
but this leads to unfair bandwidth allocation. If an access point communicates with a mix of clients using both 1 Mb/s and
11 Mb/s transmission rates, the faster clients are effectively throttled to 1 Mb/s as well. This happens because the 802.11
MAC protocol approximate “station fairness”, with each station given an equal chance to access the media. We provide a solution
to provide “rate proportional fairness”, where the 11 Mb/s stations receive more bandwidth than the 1 Mb/s stations. Unlike
previous solutions to this problem, our mechanism is easy to implement, works with common operating systems and requires no
change to the MAC protocol or the stations.
Joseph Dunn received an M.S. in computer science from the University of Colorado at Boulder in 2003, and B. S. in coputer science and
mathematics from the University of Arizona in 2001. His research interests are in the general area of computer systems, primarily
focusing on security and scalability in distributed systems. He is currently working on his Ph.D. in computer science from
the University of Colorado at Boulder.
Michael Neufeld received a Ph.D. in Computer Science from the University of Colorado at Boulder in December of 2004, having previously received
an M.S. in Computer Science from the University of Colorado at Boulder in 2000 and an A.B. in Computer Science from Princeton
University in 1993. His research interests are in the general area of computer system, specifically concentrating on wireless
networking, software defind/cognitive radio, and streerable antennas. He is currently a postdoc in the Computer Science department
at the University of Calorado at Boulder pursuing research related to software defined radio and new MAC protocols for steerable
phase array antennas.
Anmol Sheth is a Ph.D. student in Computer Science at the University of Colorado at Boulder. He received his B.S. in Computer Science
from the University of Pune, India in 2001. He has been co-leading the development of the MANTIS operating system. He has
co-authored three papers include MAC layer protocol design, energy-efficient wireless communication, and adapting communications
to mobility.
Dirk Grunwald received his Ph.D. from the University of Illinois in 1989 and joined the University of Colorado the same year. His work
addresses research and teaching in the broad area of “computer systems”, which includes computer architecture, operating systems,
networks, and storage systems. His interests also include issues in pervasive computing, novel computing models, and enjoying
the mountains. He is currently an Associate Professor in the Department of Computer Science and in Electrical and Computer
Engineering and is also the Director of the Colorado Center for Information Storage.
John Bennett is a Professor of Computer Science with a joint appointment in Electrical and Computer Engineering at the University of Colorado
at Boulder. He also serves as Associate Dean for Education in the College of Engineering and Applied Science. He joined the
CU-Boulder faculty in 2000, after serving on the faculty of Rice University for 11 years. While at Rice, Bennett pioneered
a course in engineering design for both engineering and non-engineering students that has been emulated at several universities
and high schools. In addition to other teaching awards, Bennett received the Keck Foundation National Award for Engineering
Teaching Excellence for his work on this course. Bennett received his Ph.D. in 1988 from the University of Washington. Prior
to completing his doctoral studies, he was a U.S. Naval Officer for several years and founded and served as President of Pacific
Mountain Research, Inc., where he supervised the design and development of a number of commercial computing systems. Bennett's
primary research interests are broadly focused in the area of distributed systems, and more narrowly in distributed information
management and distributed robotic macrosensors. 相似文献
34.
资源共享方式若干问题的研讨 总被引:3,自引:1,他引:2
社会公用服务系统和工程技术系统,存在共同的资源共享问题。本文通过典例就资源共享方式的若干问题加以探究:讨论广义的多用户系统中人工资源共享方式的分类;阐述常用的共享方式的特点、优缺点;分析系统时间性能及其改进与共享方式的关系等。文章还提出在系统工程范畴里,应对社会公用服务和工程技术两类系统的资源共享方式予以综合研究,并相互借鉴和移植。 相似文献
35.
本文对宽带综合通信网交换系统几个主要方面技术的发展趋向作了概括介绍,内容包括:电子交换的分布结构、ATM交换的开始应用,个人通信的无线进网,宽带交换引用光子技术和多媒体交换结构分析。 相似文献
36.
针对现有船舶过闸排队规则的欠缺,基于“限时服务规则”,构建复线船闸多目标双层优化调度模型:上层模型用于获得两个闸室安全区域的船舶排布可行方案;下层模型用于获得不同船舶排布可行方案的优化闸次数。下层模型分两个阶段完成:对符合“限时服务规则”的船舶,构建以闸次最少为目标的0-1规划模型,获得此类船舶安排的闸次;对其余船舶按照“先到先服务规则”,构建以闸次最少、闸室利用率最大为目标的多目标决策模型,获得不同船舶排布可行方案应该安排的频次。以位于江苏省干线航道上的某复线船闸某日24小时内过闸船舶的数据为例,计算结果表明:采用本文优化模型获得的优化方案与“经验编排方式”相比,两座船闸各节约2个闸次,两个船闸的平均闸室利用率分别提高了3.66和4.72个百分点。 相似文献
37.
考虑政府补贴、市场化程度、养老机构服务成本、老年人偏好等因素,构建了完全国有化、公私并存的半市场化和完全市场化三种情形下公办和民办养老机构之间的两阶段博弈模型,比较分析了市场化程度对养老机构服务价格制定和服务水平选择的影响,实证讨论了各参数变化对养老机构收益及社会福利的影响。研究表明:完全市场化机制会降低养老机构服务质量,完全国有化机制会陷入社会福利陷阱,探索公私并存的最佳市场化水平才能更好地提高社会福利;适度推进市场化改革,提高养老机构服务水平,降低民办养老机构服务成本,适度提高对民办养老机构的补贴,将有效缓解公办和民办养老机构的不公平竞争;提高老年人支付能力,推进养老机构供给侧结构性改革,将保障机构养老服务的有效供给,促进养老服务业的健康有序发展。 相似文献
38.
Xuan Xie Linyu Huang Chengwen Tang Qian Ning 《International Journal of Satellite Communications and Networking》2023,41(5):427-440
The low-earth orbit (LEO) satellite network, composed of a large number of satellite nodes, is a hot research topic at present. Due to the characteristics of the large-scale LEO satellite network, such as many satellite nodes, short orbit period, large dynamic change of topology, and unstable link-state, its communication quality of service (QoS) requirements are difficult to meet. Aiming at this problem, various factors that may affect data transmission are first analyzed. The network link selection problem is modeled as a multi-constraint optimization decision problem, a routing mathematical model based on linear programming (LP) is designed, and its solution is solved. Aiming at the problem of limited onboard computing resources, a multi-object optimization Dijkstra algorithm (MOODA) is designed. The MOODA finds the optimal path according to the comprehensive performance of the link. It solves the problems of poor comprehensive QoS performance and the low degree of load balancing of the paths found by the Dijkstra algorithm. The simulation results show that the paths found by the two algorithms have good QoS, robustness, and load balancing performance. 相似文献
39.
Ajay Kumar K. Abhishek M.R. Ghalib A. Shankar X. Cheng 《Digital Communications & Networks》2022,8(4):540-551
Internet of Things (IoT) security is the act of securing IoT devices and networks. IoT devices, including industrial machines, smart energy grids, and building automation, are extremely vulnerable. With the goal of shielding network systems from illegal access in cloud servers and IoT systems, Intrusion Detection Systems (IDSs) and Network-based Intrusion Prevention Systems (NBIPSs) are proposed in this study. An intrusion prevention system is proposed to realize NBIPS to safeguard top to bottom engineering. The proposed NBIPS inspects network activity streams to identify and counteract misuse instances. The NBIPS is usually located specifically behind a firewall, and it provides a reciprocal layer of investigation that adversely chooses unsafe substances. Network-based IPS sensors can be installed either in an inline or a passive model. An inline sensor is installed to monitor the traffic passing through it. The sensors are installed to stop attacks by blocking the traffic using an IoT signature-based protocol. 相似文献
40.
Jie Song Pengyi Zhang Mohammed Alkubati Yubin Bao Ge Yu 《Digital Communications & Networks》2022,8(4):466-475
Due to the complexity of blockchain technology, it usually costs too much effort to build, maintain and monitor a blockchain system that supports a targeted application. To this end, the emerging “Blockchain as a Service” (BaaS) makes the blockchain and distributed ledgers more accessible, particularly for businesses, by reducing costs and overheads. BaaS combines the high computing power of cloud computing, the pervasiveness of IoT and the decentralization of blockchain, allowing people to build their own applications while ensuring the transparency and openness of the system. This paper surveys the research outputs of both academia and industry. First, it introduces the representative architectures of BaaS systems and then summarizes the research contributions of BaaS from the technologies for service provision, roles, container and virtualization, interfaces, customization and evaluation. The typical applications of BaaS in both academic and practical domains are also introduced. At present, the research on the blockchain is abundant, but research on BaaS is still in its infancy. Six challenges of BaaS are concluded in this paper for further study directions. 相似文献