全文获取类型
收费全文 | 181篇 |
免费 | 5篇 |
国内免费 | 8篇 |
专业分类
系统科学 | 21篇 |
丛书文集 | 1篇 |
教育与普及 | 1篇 |
理论与方法论 | 1篇 |
现状及发展 | 1篇 |
综合类 | 169篇 |
出版年
2022年 | 1篇 |
2020年 | 2篇 |
2018年 | 2篇 |
2017年 | 2篇 |
2016年 | 1篇 |
2015年 | 3篇 |
2014年 | 5篇 |
2013年 | 2篇 |
2012年 | 5篇 |
2011年 | 11篇 |
2010年 | 12篇 |
2009年 | 8篇 |
2008年 | 12篇 |
2007年 | 17篇 |
2006年 | 17篇 |
2005年 | 22篇 |
2004年 | 17篇 |
2003年 | 11篇 |
2002年 | 13篇 |
2001年 | 8篇 |
2000年 | 5篇 |
1999年 | 3篇 |
1998年 | 2篇 |
1996年 | 1篇 |
1995年 | 2篇 |
1993年 | 2篇 |
1992年 | 2篇 |
1991年 | 1篇 |
1989年 | 3篇 |
1987年 | 1篇 |
1986年 | 1篇 |
排序方式: 共有194条查询结果,搜索用时 31 毫秒
81.
结合AdHoc网络技术的特点和网格思想,提出了适应军事通信平台需求的无线通信网络体系结构。设计并编程实现了适应军事通信平台需求的路由算法,并设计了仿真实验模型,利用多线程技术实现了仿真程序,对路由算法的有效性进行了检验。 相似文献
82.
张进 《吉林大学学报(信息科学版)》1995,(2)
简述了固有TP(事务处理)协议开发的背景、协议性能及特点。对协议的开发与实现方法进行了深入的分析和探讨。并对采用该协议的系统进行了综合评价。该系统经试运行和实际运行,用户反映良好,各项指标均达到设计要求。 相似文献
83.
According to analyze the facade phenomenon of wire-less sensor networks(WSNs),this paper proposes a feasible method to state clearly and improve the power control efficiency of wire-less sensor networks(WSNs). One of the crucial problems for WSNs is the design of medium access control (MAC) protocol. Our method want to adjust the activities of the MAC protocols control to achieve the enery conservation when the wireless communication module of sensor nodes is running, which is the major consumer of energy consumed by sensors energy. The energy efficiency of MAC protocol makes a strong impact on the network performance. To some extent,our research work describes and analyze the sources of energy consumption in MAC layer and simultaneously present an optimal method for the design of MAC protocol. Then we discusses some factors impacting on the performance of MAC protocol and metrics of performance evaluation. Eventually, the coming research direction is summarized. 相似文献
84.
The certificateless authenticated key agreement protocol proposed by Mandt et al does not haVE the property of key-compromise impersonation (K-CI) resilience. An improved protocol with a simple modification of their protocol is proposed in this paper. In particular, our improved protocol is proved to be immune to the K-CI attack and at the same time possess other security properties. 相似文献
85.
This paper proposes second-order consensus protocols and gives a measure of the robustness of the protocols to the time-delays
existing in the dynamics of agents with second-order dynamics. By employing a frequency domain method, it is proven that the
information states achieve second-order consensus asymptotically for appropriate time-delay if the topology of the network
is connected. Particularly, a nonconservative upper bound on the fixed time-delay that can be tolerated is found. The consensus
protocols are distributed in the sense that each agent only needs information from its neighboring agents, which makes the
proposed protocols scalable. It reduces the complexity of connections among agents significantly. Simulation results are provided
to verify the effectiveness of the theoretical results for second-order consensus in networks in the presence of time-delays
existing in the dynamics of agents.
相似文献
86.
基于Petri网的双重数字签名的描述与验证 总被引:4,自引:0,他引:4
双重数字签名是保障电子交易中持卡人、商户及银行三方安全传输信息的重要技术之一。Petri网是一种描述和验证密码协议的有效手段。利用Petri网从静态和动态两方面仿真分析双重数字签名在电子支付系统中的应用。在静态描述方面,建立了双重数字签名的Petri网模型,并给出形式化描述。在动态验证方面,采用可达树分析此密码协议,验证了可达性、有界性、活性等性质。同时分析表明双重数字签名具有抵抗非法入侵的能力,可以提高电子支付系统的安全性。 相似文献
87.
林宏伟 《贵州师范大学学报(自然科学版)》2006,24(2):95-98
为了更好的管理校园网络,提出了一个基于SNMP协议的用户监视系统模型,该系统采用W eb/Java技术的3层应用模型,通过SNMP协议来采集交换机中的数据信息,并与用户认证系统、DHCP服务器的日志信息进行关联分析,从而实现校园网内用户的安全监控过程。 相似文献
88.
89.
Towards the Idealization Procedure of BAN-Like Logics 总被引:1,自引:0,他引:1
CAOLi-li CHENKe-fei 《武汉大学学报:自然科学英文版》2005,10(1):214-218
We demonstrate the flaws of Mao‘s method, which is an augmentation of protocol idealization in BAN-like logics, and then offer some new idealization rules based on Mao‘s method. Furthermore, we give some theoretical analysis of our rules using the strand space formalism, and show the soundness of our idealization rules under strand spaces. Some examples on using the new rules to analyze security protocols are also concerned. Our idealization method is more effective than Mao‘s method towards many protocol instances, and is supported by a formal model. 相似文献
90.
《系统工程与电子技术(英文版)》2000,(1)
1.INTRODUCTIONThetheoryandmethodfordesiringcollUnwhcationprotocolsareoneoftheimportantresearchingissuesinfieldsofcomputernetworksanddistributedcomputingsystems.Withtherapiddevelopmelltofhigh-speednetworks,multimediacolnlnwhcationnetworksandmadbilecomputernetworks,theresearchingissuerelatedtocommunicationprotocoldesignhasbeenmoreextensivelyhavenattentionbymanypeOPleworldwide.Becausecommwhcationprotocolsdealwithcomplexissuesrelatedtodistributionsuchascolnmwhcation,concurrency,synchroniZati… 相似文献