全文获取类型
收费全文 | 4212篇 |
免费 | 120篇 |
国内免费 | 353篇 |
专业分类
系统科学 | 271篇 |
丛书文集 | 109篇 |
教育与普及 | 28篇 |
理论与方法论 | 9篇 |
现状及发展 | 15篇 |
综合类 | 4252篇 |
自然研究 | 1篇 |
出版年
2024年 | 10篇 |
2023年 | 16篇 |
2022年 | 38篇 |
2021年 | 22篇 |
2020年 | 40篇 |
2019年 | 32篇 |
2018年 | 45篇 |
2017年 | 64篇 |
2016年 | 65篇 |
2015年 | 121篇 |
2014年 | 231篇 |
2013年 | 211篇 |
2012年 | 277篇 |
2011年 | 320篇 |
2010年 | 256篇 |
2009年 | 301篇 |
2008年 | 331篇 |
2007年 | 430篇 |
2006年 | 458篇 |
2005年 | 331篇 |
2004年 | 300篇 |
2003年 | 229篇 |
2002年 | 161篇 |
2001年 | 133篇 |
2000年 | 98篇 |
1999年 | 63篇 |
1998年 | 27篇 |
1997年 | 20篇 |
1996年 | 12篇 |
1995年 | 14篇 |
1994年 | 6篇 |
1993年 | 6篇 |
1992年 | 3篇 |
1991年 | 1篇 |
1990年 | 6篇 |
1989年 | 3篇 |
1988年 | 3篇 |
1985年 | 1篇 |
排序方式: 共有4685条查询结果,搜索用时 0 毫秒
201.
202.
WANG Wei ZENG Guosun YUAN Lulai 《武汉大学学报:自然科学英文版》2006,11(5):1137-1140
0 IntroductionThe goal of Semantic Webis to build a web of meaning.Semantic Web will consist of a distributed environmentof shared andinteroperable ontologies ,which have emerged ascommonformalisms for knowledge representation.It is prom-isingto combine P2P networks with Semantic Web technolo-gy. On one hand,P2P networks can help semantic web withsharing knowledge;onthe other hand,P2P networks use thesemantic concept to query routing and efficient content-basedlocation. However ,evenafter… 相似文献
203.
LIAO Rikun JI Yuefeng LI Hui 《武汉大学学报:自然科学英文版》2006,11(5):1157-1160
A kind of Web voice browser based on improved synchronous linear predictive coding (ISLPC) and Text-toSpeech (TTS) algorithm and Internet application was proposed. The paper analyzes the features of TTS system with ISLPC speech synthesis and discusses the design and implementation of ISLPC TTS-based Web voice browser. The browser integrates Web technology, Chinese information processing, artificial intelligence and the key technology of Chinese ISLPC speech synthesis. It's a visual and audible web browser that can improve information precision for network users. The evaluation results show that ISLPC-based TTS model has a better performance than other browsers in voice quality and capability of identifying Chinese characters. 相似文献
204.
TANG Xueming WANG Xiaofei HONG Fan CUI Guohua 《武汉大学学报:自然科学英文版》2006,11(5):1267-1270
0 IntroductionThe security of most commonly used cryptographicschemesis essentially based onthree families of compu-tational problems :the integer factoring problem(RSAprob-lem) ,the Diffie-Hell man problemand the discrete logarithmproblem,andthe elliptic curve variants thereof .Inthe middleof 1990s , Shor[1], Bonehet al[2]presented some remarkablequantumalgorithms which can solveinteger factoring problemand discrete logarithmproblemover any group including Ga-lois fields and elliptic curve… 相似文献
205.
WU Qingtao SHAO Zhiqing DING Zhiyi LIU Gang 《武汉大学学报:自然科学英文版》2006,11(5):1271-1277
Distributed denial of service (DDoS) attacks exploit the availability of Web servers, resulting in the severe loss of their connectivity. We present a robust IP packets filtering mechanism which combines the detection and filtering engine together to protect Web Servers from DDoS Attacks. The mechanism can detect DDoS attacks by inspecting inbound packets with an IP address database, and filter out lower priority IP addresses to preserve the connection for valid users by monitoring the queues status. We use the Netfilter's technique, a framework inside the Linux 2.4. X, to implement it on a Web server. Also, we evaluate this mechanism and analyze the influence of some important parameters on system performance. The experimental results show that this mechanism is effective against DDoS attacks. 相似文献
206.
WANG Xiaofei HONG Fan~ TANG Xueming CUI Guohua College of Computer Science Technology Huazhong University of Science Technology Wuhan Hubei China 《武汉大学学报:自然科学英文版》2006,11(6):1467-1472
0 IntroductionDigital signatureis a key technique to provide datainteg-rity andsource authenticationcapabilities to enhance da-ta trustworthiness in trusted computing platform. Most cur-rent digital signature schemes are based on complex mathe-matical problems , such as integer factoring, discrete log-arithm,and discrete logarithm on elliptic curves . The hard-ness of these underlying mathematical problems is really un-certain at present . Merkle treeis a method used for authenti-cation and di… 相似文献
207.
针对输油管线分布城广,其监测困难的实际情况,提出了输油管线自动监测系统的构架以及相应模块。该系统采用无线通信技术作为泄漏定位手段;采用GPRS,RS232和工业以太网作为通信总线;采用OPC中间服务器作为监测单元和工作站间的通信接口;用Web服务器系统将信息及时发布到Internet上,该系统具有高效、快捷、实时性好的特点。 相似文献
208.
In order to study uncertainty reasoning and automatic reasoning with linguistic terms, in this paper, the set of basic linguistic truth values and the set of modifiers are defined, according to common sense; partially orderings are defined on them. Based on it, a lattice implication algebra model L18 of linguistic terms is built; furthermore, its some basic properties are discussed. 相似文献
209.
SHEN Zhidong ZHANG Huanguo ZHANG Miao YAN Fei ZHANG Liqiang 《武汉大学学报:自然科学英文版》2006,11(6):1641-1644
0 IntroductionPeople need a secure and dependable computing environ-ment[1]. The cryptology is known as the core of com-puter security[2]. The application of cryptologyis mainly ful-filled by key management and credential mechanism.In thispaper , we should study the key management and credentialmechanismbased ontrusted computing platform,and give theactual application of these security mechanisms for buildingtrusted computing environment .1 OverviewTrusted Computing1 .1 The Original of Trus… 相似文献
210.
ZHANG Huanguo WANG Fan 《武汉大学学报:自然科学英文版》2006,11(6):1819-1822
0 IntroductionDue to the fast development of communication technolo-gies ,the lowered cost of hardware,there is anincreas-ing reliance on computer networks . However ,along with thetremendous convenience provided,there is increasing numberof network based attacks .One particular kind of attacks exploits software vulnera-bilities .It is lunched by a virus or worm.Some examples in-clude earlier worms such as Code Red, Ni mda as well as re-cently high speed worms ,such as Slammer , Witty and F… 相似文献