全文获取类型
收费全文 | 236篇 |
免费 | 9篇 |
专业分类
公路运输 | 56篇 |
综合类 | 52篇 |
水路运输 | 84篇 |
铁路运输 | 35篇 |
综合运输 | 18篇 |
出版年
2024年 | 1篇 |
2022年 | 1篇 |
2021年 | 7篇 |
2020年 | 7篇 |
2019年 | 2篇 |
2018年 | 4篇 |
2017年 | 6篇 |
2016年 | 1篇 |
2015年 | 8篇 |
2014年 | 5篇 |
2013年 | 8篇 |
2012年 | 17篇 |
2011年 | 19篇 |
2010年 | 16篇 |
2009年 | 21篇 |
2008年 | 15篇 |
2007年 | 30篇 |
2006年 | 23篇 |
2005年 | 12篇 |
2004年 | 5篇 |
2003年 | 7篇 |
2002年 | 2篇 |
2001年 | 4篇 |
2000年 | 3篇 |
1999年 | 3篇 |
1998年 | 3篇 |
1997年 | 3篇 |
1996年 | 4篇 |
1994年 | 4篇 |
1993年 | 2篇 |
1986年 | 1篇 |
1984年 | 1篇 |
排序方式: 共有245条查询结果,搜索用时 140 毫秒
241.
针对散体材料桩复合地基承载力随时间延续而增长的现象,基于复合地基承载力计算的面积比公式,分别对桩体和桩周土体承载力的时效进行分析,提出了一种考虑时效的散体材料桩复合地基承载力的方法,并给出了公式中重要参数的参考值.最后结合某一工程实例,对一具体的碎石桩复合地基的承载力进行时效分析,其结果表明,在进行散体材料桩复合地基的承载力计算时考虑时效是很有必要的. 相似文献
242.
OSPF是一种典型的链路状态路由协议,是当前局域网中最常用的路由协议之一.文中简要介绍了OSPF协议的网络安全需求,提出了新的安全OSPF路由协议SOSPF,其中使用加密速度更快的公钥加密算法NTRU来实现OSPF协议的数字签名.采用NS-2平台对其进行仿真,并进行性能和安全性分析. 相似文献
243.
An artificial immunity based multimodal evolution algorithm is developed to generate detectors with variable coverage for multidimensional intrusion detection. In this algorithm, a proper fitness function is used to drive the detectors to fill in those detection holes close to self set or among self spheres, and genetic algorithm is adopted to reduce the negative effects that different distribution of self imposes on the detector generating process. The validity of the algorithm is tested with spherical and rectangular detectors, respectively, and experiments performed on two real data sets (machine learning database and DAPRA99) indicate that the proposed algorithm can obtain good results on spherical detectors, and that its performances in detection rate, false alarm rate, stabih'ty, time cost, and adaptability to incomplete training set on spherical detectors are all better than on rectangular ones. 相似文献
244.
Parallel Key-insulated Signature: Framework and Construction 总被引:1,自引:0,他引:1
To deal with the key-exposure problem in signature systems, a new framework named parallel key-insulated signature (PKIS) was introduced, and a concrete PKIS scheme was proposed. Compared with traditional key-insulated signature (KIS) schemes, the proposed PKIS scheme allows a frequent updating for temporary secret keys without increasing the risk of helper key-exposure. Moreover, the proposed PKIS scheme does not collapse even if some (not all) of the helper keys and some of the temporary secret keys are simultaneously exposed. As a result, the security of the PKIS scheme is greatly enhanced, and the damage caused by key-exposure is successfully minimized. 相似文献
245.
In proxy signature schemes, an original signer A delegates its signing capability to a proxy signer B, in such a way that B can sign message on behalf of A.The recipient of the final message verifies at the same time that B computes the signature and that A has delegated its signing capability to B.Recently many identity-based(ID-based) proxy signature schemes have been proposed, however, the problem of key escrow is inherent in this setting.Certificateless cryptography can overcome the key escrow problem.In this paper, we present a general security model for certificateless proxy signature scheme.Then, we give a method to construct a secure certificateless proxy scheme from a secure certificateless signature scheme, and prove that the security of the construction can be reduced to the security of the original certificateless signature scheme. 相似文献