全文获取类型
收费全文 | 1865篇 |
免费 | 76篇 |
国内免费 | 277篇 |
专业分类
系统科学 | 215篇 |
丛书文集 | 50篇 |
教育与普及 | 17篇 |
理论与方法论 | 5篇 |
现状及发展 | 11篇 |
综合类 | 1920篇 |
出版年
2024年 | 9篇 |
2023年 | 13篇 |
2022年 | 37篇 |
2021年 | 19篇 |
2020年 | 32篇 |
2019年 | 28篇 |
2018年 | 42篇 |
2017年 | 58篇 |
2016年 | 54篇 |
2015年 | 95篇 |
2014年 | 184篇 |
2013年 | 166篇 |
2012年 | 177篇 |
2011年 | 176篇 |
2010年 | 90篇 |
2009年 | 103篇 |
2008年 | 112篇 |
2007年 | 142篇 |
2006年 | 142篇 |
2005年 | 110篇 |
2004年 | 95篇 |
2003年 | 79篇 |
2002年 | 56篇 |
2001年 | 38篇 |
2000年 | 43篇 |
1999年 | 33篇 |
1998年 | 17篇 |
1997年 | 16篇 |
1996年 | 12篇 |
1995年 | 14篇 |
1994年 | 6篇 |
1993年 | 5篇 |
1992年 | 3篇 |
1991年 | 1篇 |
1990年 | 4篇 |
1989年 | 3篇 |
1988年 | 3篇 |
1985年 | 1篇 |
排序方式: 共有2218条查询结果,搜索用时 15 毫秒
131.
基于高性能计算环境的并行仿真建模框架 总被引:3,自引:0,他引:3
为提高大规模分析评估推演类仿真的运行速度,基于高性能计算环境(HPC)的并行分布仿真正成为当前仿真研究的一个重要方向。论文在深入分析研究SPEEDES仿真引擎的基础上,阐述了基于HPC的并行仿真建模框架的组成及功能,分析了其设计思想,并给出了建模框架相应的实现。 相似文献
132.
133.
TANG Xueming WANG Xiaofei HONG Fan CUI Guohua 《武汉大学学报:自然科学英文版》2006,11(5):1267-1270
0 IntroductionThe security of most commonly used cryptographicschemesis essentially based onthree families of compu-tational problems :the integer factoring problem(RSAprob-lem) ,the Diffie-Hell man problemand the discrete logarithmproblem,andthe elliptic curve variants thereof .Inthe middleof 1990s , Shor[1], Bonehet al[2]presented some remarkablequantumalgorithms which can solveinteger factoring problemand discrete logarithmproblemover any group including Ga-lois fields and elliptic curve… 相似文献
134.
SHU Wanneng ZHENG Shijue~ Department of Computer Science Huazhong Normal University Wuhan Hubei China 《武汉大学学报:自然科学英文版》2006,11(5):1378-1382
0 IntroductionGrid computingis a hot topic inthe current internet research,and a developing direction of the parallel and distributedprocess[1 ,2].Since the task scheduling in grid computing faces aNP-hard problem[3];it has drawn attention from many scholarsand become the focusinthe field of the current grid computing re-search.In recent years , two global random and opti mal algorithmhave been widelystudiedandappliedinthefield of the gridcompu-ting research: GA(Genetic Algorithm) and SA( … 相似文献
135.
WANG Xiaofei HONG Fan~ TANG Xueming CUI Guohua College of Computer Science Technology Huazhong University of Science Technology Wuhan Hubei China 《武汉大学学报:自然科学英文版》2006,11(6):1467-1472
0 IntroductionDigital signatureis a key technique to provide datainteg-rity andsource authenticationcapabilities to enhance da-ta trustworthiness in trusted computing platform. Most cur-rent digital signature schemes are based on complex mathe-matical problems , such as integer factoring, discrete log-arithm,and discrete logarithm on elliptic curves . The hard-ness of these underlying mathematical problems is really un-certain at present . Merkle treeis a method used for authenti-cation and di… 相似文献
136.
In order to study uncertainty reasoning and automatic reasoning with linguistic terms, in this paper, the set of basic linguistic truth values and the set of modifiers are defined, according to common sense; partially orderings are defined on them. Based on it, a lattice implication algebra model L18 of linguistic terms is built; furthermore, its some basic properties are discussed. 相似文献
137.
SHEN Zhidong ZHANG Huanguo ZHANG Miao YAN Fei ZHANG Liqiang 《武汉大学学报:自然科学英文版》2006,11(6):1641-1644
0 IntroductionPeople need a secure and dependable computing environ-ment[1]. The cryptology is known as the core of com-puter security[2]. The application of cryptologyis mainly ful-filled by key management and credential mechanism.In thispaper , we should study the key management and credentialmechanismbased ontrusted computing platform,and give theactual application of these security mechanisms for buildingtrusted computing environment .1 OverviewTrusted Computing1 .1 The Original of Trus… 相似文献
138.
ZHANG Huanguo WANG Fan 《武汉大学学报:自然科学英文版》2006,11(6):1819-1822
0 IntroductionDue to the fast development of communication technolo-gies ,the lowered cost of hardware,there is anincreas-ing reliance on computer networks . However ,along with thetremendous convenience provided,there is increasing numberof network based attacks .One particular kind of attacks exploits software vulnera-bilities .It is lunched by a virus or worm.Some examples in-clude earlier worms such as Code Red, Ni mda as well as re-cently high speed worms ,such as Slammer , Witty and F… 相似文献
139.
基于集群系统的导弹流场并行数值模拟 总被引:2,自引:0,他引:2
采用36颗安腾2处理器和Infiniband网络设备构建了一套18节点的高性能计算集群系统,经过性能调优,其Linpack值达到每秒可执行1 886亿次浮点运算(188.6 GFlops)的水平.然后,将集群系统扩展为适用于计算流体力学并行应用的数值模拟平台.建立了约为783万结构化网格的战术导弹三维流场仿真模型,通过网格分区算法将模型移植到集群系统上并行求解,并测试了集群系统的性能.结果表明,构建的CFD数值模拟平台硬、软件资源配置合理,能够适用于中等规模的CFD并行仿真. 相似文献
140.