全文获取类型
收费全文 | 6460篇 |
免费 | 508篇 |
国内免费 | 27篇 |
专业分类
化学 | 155篇 |
晶体学 | 2篇 |
力学 | 25篇 |
综合类 | 41篇 |
数学 | 42篇 |
物理学 | 367篇 |
无线电 | 6363篇 |
出版年
2025年 | 25篇 |
2024年 | 111篇 |
2023年 | 129篇 |
2022年 | 113篇 |
2021年 | 135篇 |
2020年 | 219篇 |
2019年 | 146篇 |
2018年 | 122篇 |
2017年 | 190篇 |
2016年 | 258篇 |
2015年 | 376篇 |
2014年 | 569篇 |
2013年 | 487篇 |
2012年 | 612篇 |
2011年 | 537篇 |
2010年 | 380篇 |
2009年 | 330篇 |
2008年 | 363篇 |
2007年 | 378篇 |
2006年 | 333篇 |
2005年 | 260篇 |
2004年 | 217篇 |
2003年 | 202篇 |
2002年 | 173篇 |
2001年 | 131篇 |
2000年 | 68篇 |
1999年 | 42篇 |
1998年 | 20篇 |
1997年 | 19篇 |
1996年 | 21篇 |
1995年 | 18篇 |
1994年 | 4篇 |
1993年 | 2篇 |
1992年 | 1篇 |
1988年 | 1篇 |
1985年 | 1篇 |
1982年 | 2篇 |
排序方式: 共有6995条查询结果,搜索用时 0 毫秒
51.
Techniques for modeling and simulating channel conditions play an essential role in understanding network protocol and application behavior. In [11], we demonstrated that inaccurate modeling using a traditional analytical model yielded suboptimal error control protocol parameters choices. In this paper, we demonstrate that time-varying effects on wireless channels result in wireless traces which exhibit non-stationary behavior over small window sizes. We then present an algorithm that extracts stationary components from a collected trace in order to provide analytical channel models that, relative to traditional approaches, more accurately represent characteristics such as burstiness, statistical distribution of errors, and packet loss processes. Our algorithm also generates artificial traces with the same statistical characteristics as actual collected network traces. For validation, we develop a channel model for the circuit-switched data service in GSM and show that it: (1) more closely approximates GSM channel characteristics than traditional Markov models and (2) generates artificial traces that closely match collected traces' statistics. Using these traces in a simulator environment enables future protocol and application testing under different controlled and repeatable conditions. 相似文献
52.
This paper evaluates four mechanisms for providing service differentiation in IEEE 802.11 wireless LANs. The evaluated schemes are the Point Coordinator Function (PCF) of IEEE 802.11, the Enhanced Distributed Coordinator Function (EDCF) of the proposed IEEE 802.11e extension to IEEE 802.11, Distributed Fair Scheduling (DFS), and Blackburst. The evaluation was done using the ns-2 simulator. Furthermore, the impact of some parameter settings on performance has also been investigated. The metrics used in the evaluation are throughput, medium utilization, collision rate, average access delay, and delay distribution for a variable load of real time and background traffic. The simulations show that the best performance is achieved by Blackburst. PCF and EDCF are also able to provide pretty good service differentiation. DFS can give a relative differentiation and consequently avoids starvation of low priority traffic. 相似文献
53.
An analytical model of TCP (Transport Control Protocol) over an end-to-end path with random abrupt round-trip time (RTT) changes is presented. Modeling the RTT as a stochastic process, we analytically quantify and compare between the degree of degradation of the steady-state average throughput and window size due to spurious retransmissions for the different versions of TCP (Reno/NewReno versus Tahoe). The modeling methodology in this paper is used for evaluating different design alternatives for TCP for highly dynamic networks. 相似文献
54.
个人通信接入系统(PAS)的关键技术 总被引:1,自引:0,他引:1
在介绍个人通信接入系统(PAS)的体系结构的基础上,进一步阐述了个人通信接入系统的几点关键技术。 相似文献
55.
Distributed detection of replica node attacks with group deployment knowledge in wireless sensor networks 总被引:3,自引:0,他引:3
Several protocols have been proposed to mitigate the threat against wireless sensor networks due to an attacker finding vulnerable nodes, compromising them, and using these nodes to eavesdrop or undermine the operation of the network. A more dangerous threat that has received less attention, however, is that of replica node attacks, in which the attacker compromises a node, extracts its keying materials, and produces a large number of replicas to be spread throughout the network. Such attack enables the attacker to leverage the compromise of a single node to create widespread effects on the network. To defend against these attacks, we propose distributed detection schemes to identify and revoke replicas. Our schemes are based on the assumption that nodes are deployed in groups, which is realistic for many deployment scenarios. By taking advantage of group deployment knowledge, the proposed schemes perform replica detection in a distributed, efficient, and secure manner. Through analysis and simulation experiments, we show that our schemes achieve effective and robust replica detection capability with substantially lower communication, computational, and storage overheads than prior work in the literature. 相似文献
56.
本文详细介绍了随机编码技术的提出、编码规则及评价,研究了随机编码技术得以在无线网络中实现的关键技术,并总结了随机编码技术相对于传统的以路由为基础的网络理论的特点和优势,为相关研究人员在该领域的研究工作提供一些理论依据。 相似文献
57.
无线传感器网络的应用一直受能量的制约,因此如何降低系统能耗始终是无线传感器网络的核心问题.研究了一类基于ZigBee的缓变数据监测系统中的数据处理问题,提出了一种改进的数据精简算法.该方法考虑了测量误差,通过综合数字滤波法及改进的数据精简算法,降低了数据通信量,延长无线传感器网络的生命周期.采用三次样条数据插值,对温度数据进行插值,实验结果表明通过该方法得到的温度曲线较为平滑,该方法具有可行性、实用性和推广价值. 相似文献
58.
随着信息技术的迅猛发展,无线通信成为越来越重要的通信方式之一,从而对信道提出了更严格的要求。回顾并综述了常用的典型无线信道模型,对各种信道的特点和适应场景进行了详细的分析、对比与总结,为实际应用中根据不同环境选择合适的信道模型提供了参考。最后,对其中一些信道模型的优化方向给出了建议,并对信道模型的应用前景进行了概括与展望。 相似文献
59.
本设计通过对小车设计制作整体思路、机械调教、电路设计、算法设计、调试等方面的介绍,详尽地阐述了整个设计过程的思想和创意。具体表现在机械的合理规划、电路的创新设计、算法方面的独特想法。 相似文献
60.
无线信道安全传输的目的是保证期望用户具有良好的通信质量(高速率、低误码率),同时尽可能地提高窃听者的误码率,从而防止信息被窃听者截获。本文重点讲述无线信息安全传输机制。 相似文献