首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   2377篇
  免费   95篇
  国内免费   133篇
系统科学   249篇
丛书文集   42篇
教育与普及   13篇
理论与方法论   7篇
现状及发展   4篇
综合类   2290篇
  2024年   8篇
  2023年   18篇
  2022年   44篇
  2021年   42篇
  2020年   62篇
  2019年   41篇
  2018年   44篇
  2017年   52篇
  2016年   62篇
  2015年   132篇
  2014年   210篇
  2013年   139篇
  2012年   192篇
  2011年   196篇
  2010年   169篇
  2009年   157篇
  2008年   156篇
  2007年   168篇
  2006年   155篇
  2005年   113篇
  2004年   94篇
  2003年   88篇
  2002年   78篇
  2001年   43篇
  2000年   27篇
  1999年   26篇
  1998年   20篇
  1997年   13篇
  1996年   11篇
  1995年   8篇
  1994年   6篇
  1993年   10篇
  1992年   3篇
  1991年   7篇
  1990年   2篇
  1989年   4篇
  1988年   2篇
  1987年   2篇
  1986年   1篇
排序方式: 共有2605条查询结果,搜索用时 552 毫秒
121.
分析了现代物流的基本特征,介绍了山西物流业发展的基础设施环境现状和山西现代物流发展战略及现代物流信息平台的规划,论述了道路现代物流信息平台的搭建方案。  相似文献   
122.
This paper, focusing on the trusted computing group's standards, explained the key concept of trusted compuling and provided the architecture of trusted PC. It built trust bottom-up by starting with trusted hardware and adding layers of trusted software. It is a system-level solution available to all applications running on the member platforms. This solution reduces the security burden on applications and thus simplifies application programming.  相似文献   
123.
0 IntroductionDigital signatureis a key technique to provide datainteg-rity andsource authenticationcapabilities to enhance da-ta trustworthiness in trusted computing platform. Most cur-rent digital signature schemes are based on complex mathe-matical problems , such as integer factoring, discrete log-arithm,and discrete logarithm on elliptic curves . The hard-ness of these underlying mathematical problems is really un-certain at present . Merkle treeis a method used for authenti-cation and di…  相似文献   
124.
Trusted path is one of the crucial features that operating systems must provide for fundamental security support. In order to explore the possibility of implementing a trusted path mechanism with the support of trusted platform module (TPM) technologies, and to support TPM capabilities in operating systems, the paper extended the scope of the conventional trusted path to cover the situation in which a user communicates with software residing on a remote host. The paper combined the concept of operating system support for trusted path with that for TPM platforms, and proposed the architecture of an extended trusted path mechanism in operating system with considerations on TPM-capable platforms support. As part of the author's research in secure operating systems, the work of the paper was carried out with Linux as an experimental prototype system. The research result shows that TPM capabilities can strengthen extended trusted path mechanisms of operating systems.  相似文献   
125.
The lunar-landing is the continuity of manned spaceflight engineering. Comparing with the manned spacecraft engineering, it requires more reliability , larger scale, and more funds. On the basis of China' s achievements and the experiences of foreign com~tries, the paper brings forward the idea that using the existing transportation technology to send the launch vehicles and cosmonauts to the near-earth orbit in batches, assembling the components together on the space-launch platform, and then launching them to the moon to fulfill our dream of manned landing on the moon. The paper also discusses the space launch platform and the launching ways.  相似文献   
126.
0 IntroductionPeople need a secure and dependable computing environ-ment[1]. The cryptology is known as the core of com-puter security[2]. The application of cryptologyis mainly ful-filled by key management and credential mechanism.In thispaper , we should study the key management and credentialmechanismbased ontrusted computing platform,and give theactual application of these security mechanisms for buildingtrusted computing environment .1 OverviewTrusted Computing1 .1 The Original of Trus…  相似文献   
127.
0 IntroductionDue to the fast development of communication technolo-gies ,the lowered cost of hardware,there is anincreas-ing reliance on computer networks . However ,along with thetremendous convenience provided,there is increasing numberof network based attacks .One particular kind of attacks exploits software vulnera-bilities .It is lunched by a virus or worm.Some examples in-clude earlier worms such as Code Red, Ni mda as well as re-cently high speed worms ,such as Slammer , Witty and F…  相似文献   
128.
物流公共实时基础数据平台设计   总被引:2,自引:0,他引:2  
物流公共实时基础数据平台已成为物流业发展的迫切需要。在分析平台建设可行性的基础上,对物流公 共实时基础数据平台的方案进行了设计,包括平台的目标、作用、基本功能、数据种类、系统结构和关键子系统,以 满足现有物流活动参与各方对信息共享的需求。  相似文献   
129.
基于MATLAB、NS2、Visual C ,采用软件组件设计思想,设计并实现了网络控制系统实时仿真平台NCS-RS(NCS-RealTime Simulation).NCS-RS主要包括Simulink控制器/被控对象模块、MATLAB数据接口模块、Visual C 网络接口模块以及NS2网络仿真模块,既发挥了NS2的网络仿真优势,又利用了MATLAB强大的控制系统仿真功能,很好的实现了对网络控制系统的实时仿真.最后,在仿真平台上进行了倒立摆网络控制系统的仿真实验,并分析了时延对控制品质和稳定性的影响.  相似文献   
130.
基于ADAMS的六自由度运动平台运动学分析   总被引:3,自引:0,他引:3       下载免费PDF全文
针对一种六自由度运动平台,建立其运动学模型,应用ADAMS分析软件进行了运动学仿真,证明了ADAMS分析软件对并联机构运动学正面和反面问题求解的有效性.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号