首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   4040篇
  免费   163篇
  国内免费   242篇
系统科学   377篇
丛书文集   75篇
教育与普及   30篇
理论与方法论   11篇
现状及发展   12篇
综合类   3940篇
  2024年   14篇
  2023年   35篇
  2022年   79篇
  2021年   74篇
  2020年   100篇
  2019年   74篇
  2018年   67篇
  2017年   75篇
  2016年   93篇
  2015年   182篇
  2014年   290篇
  2013年   191篇
  2012年   320篇
  2011年   323篇
  2010年   251篇
  2009年   262篇
  2008年   287篇
  2007年   365篇
  2006年   342篇
  2005年   227篇
  2004年   171篇
  2003年   142篇
  2002年   98篇
  2001年   75篇
  2000年   44篇
  1999年   53篇
  1998年   39篇
  1997年   26篇
  1996年   26篇
  1995年   14篇
  1994年   16篇
  1993年   18篇
  1992年   10篇
  1991年   16篇
  1990年   9篇
  1989年   15篇
  1988年   11篇
  1987年   7篇
  1986年   4篇
排序方式: 共有4445条查询结果,搜索用时 671 毫秒
201.
0 IntroductionDigital signatureis a key technique to provide datainteg-rity andsource authenticationcapabilities to enhance da-ta trustworthiness in trusted computing platform. Most cur-rent digital signature schemes are based on complex mathe-matical problems , such as integer factoring, discrete log-arithm,and discrete logarithm on elliptic curves . The hard-ness of these underlying mathematical problems is really un-certain at present . Merkle treeis a method used for authenti-cation and di…  相似文献   
202.
Trusted path is one of the crucial features that operating systems must provide for fundamental security support. In order to explore the possibility of implementing a trusted path mechanism with the support of trusted platform module (TPM) technologies, and to support TPM capabilities in operating systems, the paper extended the scope of the conventional trusted path to cover the situation in which a user communicates with software residing on a remote host. The paper combined the concept of operating system support for trusted path with that for TPM platforms, and proposed the architecture of an extended trusted path mechanism in operating system with considerations on TPM-capable platforms support. As part of the author's research in secure operating systems, the work of the paper was carried out with Linux as an experimental prototype system. The research result shows that TPM capabilities can strengthen extended trusted path mechanisms of operating systems.  相似文献   
203.
In recent years, with the development of 3D data acquisition equipments, the study on reverse engineering has become more and more important. However, the existing methods for parameterization can hardly ensure that the parametric domain is rectangular, and the parametric curve grid is regular. In order to overcome these limitations, we present a novel method for parameterization of triangular meshes in this paper. The basic idea is twofold: first, because the isotherms in the steady temperature do not intersect with each other, and are distributed uniformly, no singularity (fold-over) exists in the parameterization; second, a 3D harmonic equation is solved by the finite element method to obtain the steady temperature field on a 2D triangular mesh surface with four boundaries. Therefore, our proposed method avoids the embarrassment that it is impossible to solve the 2D quasi-harmonic equation on the 2D triangular mesh without the parametric values at mesh vertices. Furthermore, the isotherms on the temperature field are taken as a set of iso-parametric curves on the triangular mesh surface. The other set of iso-parametric curves can be obtained by connecting the points with the same chord-length on the isotherms sequentially. The obtained parametric curve grid is regular, and distributed uniformly, and can map the triangular mesh surface to the unit square domain with boundaries of mesh surface to boundaries of parametric domain, which ensures that the triangular mesh surface or point cloud can be fitted with the NURBS surface.  相似文献   
204.
The lunar-landing is the continuity of manned spaceflight engineering. Comparing with the manned spacecraft engineering, it requires more reliability , larger scale, and more funds. On the basis of China' s achievements and the experiences of foreign com~tries, the paper brings forward the idea that using the existing transportation technology to send the launch vehicles and cosmonauts to the near-earth orbit in batches, assembling the components together on the space-launch platform, and then launching them to the moon to fulfill our dream of manned landing on the moon. The paper also discusses the space launch platform and the launching ways.  相似文献   
205.
0 IntroductionPeople need a secure and dependable computing environ-ment[1]. The cryptology is known as the core of com-puter security[2]. The application of cryptologyis mainly ful-filled by key management and credential mechanism.In thispaper , we should study the key management and credentialmechanismbased ontrusted computing platform,and give theactual application of these security mechanisms for buildingtrusted computing environment .1 OverviewTrusted Computing1 .1 The Original of Trus…  相似文献   
206.
0 IntroductionDue to the fast development of communication technolo-gies ,the lowered cost of hardware,there is anincreas-ing reliance on computer networks . However ,along with thetremendous convenience provided,there is increasing numberof network based attacks .One particular kind of attacks exploits software vulnera-bilities .It is lunched by a virus or worm.Some examples in-clude earlier worms such as Code Red, Ni mda as well as re-cently high speed worms ,such as Slammer , Witty and F…  相似文献   
207.
物流公共实时基础数据平台设计   总被引:2,自引:0,他引:2  
物流公共实时基础数据平台已成为物流业发展的迫切需要。在分析平台建设可行性的基础上,对物流公 共实时基础数据平台的方案进行了设计,包括平台的目标、作用、基本功能、数据种类、系统结构和关键子系统,以 满足现有物流活动参与各方对信息共享的需求。  相似文献   
208.
针对浙江大学各高性能计算资源过于分散、无法充分利用的问题,提出一种校园网格的架构.通过使用Globus Toolkit和Sun Grid Engine两种网格中间件,部署层次化结构的校园网格,并在此基础上提供科学计算、生物信息、流体力学等服务.通过在不同节点数的网格中的应用程序运行情况的测试,表明校园网格能够提供高效、稳定的计算能力.提供了在校园网格环境下本地绘制和服务器绘制两种可视化服务,用户可以针对不同的数据和计算环境,选择不同的可视化方法;用户可对可视化结果进行协同操作,便于联合研究和分析.  相似文献   
209.
鉴于缓存管理在分布式系统中可以减少网络流量,提高系统响应速度,尤其在网格计算环境中可以克服网络连接的带宽瓶颈,提出了一个用于优化网格信息查询的缓存管理模型.网格搜索引擎进行信息检索时,依据用户的查询需求,从网格异地异构数据库中查询并自动抽取信息,进行查询集成并存储在高速缓存中;根据缓存调度算法合理地组织中间结果;按照打分函数的控制,在生成的评分表下进行Top-K排序,合并生成最终结果;在保证网格查询准确性的同时,提高网格异构数据源查询速度.实验表明此方法是有效的.  相似文献   
210.
作业迁移是实现网格作业服务质量保证和系统高效能的重要方法,在分析了传统进程迁移技术的基础上,根据网格系统的特点,提出了一种基于代理的网格作业全局自适应迁移模型,通过设计网格作业全局自适应迁移对象选定原则、迁移时机确定机制和作业迁移信息监控管理,解决了网格环境下作业迁移的关键问题.试验结果以及在西北工业大学校园计算网格中的实际应用验证了模型的有效性.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号