全文获取类型
收费全文 | 118200篇 |
免费 | 10212篇 |
国内免费 | 4976篇 |
专业分类
电工技术 | 7154篇 |
技术理论 | 7篇 |
综合类 | 7633篇 |
化学工业 | 20220篇 |
金属工艺 | 6541篇 |
机械仪表 | 7420篇 |
建筑科学 | 9678篇 |
矿业工程 | 3417篇 |
能源动力 | 3567篇 |
轻工业 | 7863篇 |
水利工程 | 2114篇 |
石油天然气 | 7241篇 |
武器工业 | 884篇 |
无线电 | 13452篇 |
一般工业技术 | 14384篇 |
冶金工业 | 5386篇 |
原子能技术 | 1304篇 |
自动化技术 | 15123篇 |
出版年
2024年 | 383篇 |
2023年 | 2012篇 |
2022年 | 3200篇 |
2021年 | 4877篇 |
2020年 | 3772篇 |
2019年 | 3183篇 |
2018年 | 3421篇 |
2017年 | 3968篇 |
2016年 | 3340篇 |
2015年 | 4754篇 |
2014年 | 5790篇 |
2013年 | 6868篇 |
2012年 | 7506篇 |
2011年 | 8095篇 |
2010年 | 7037篇 |
2009年 | 6704篇 |
2008年 | 6482篇 |
2007年 | 6120篇 |
2006年 | 6382篇 |
2005年 | 5538篇 |
2004年 | 3784篇 |
2003年 | 3298篇 |
2002年 | 3096篇 |
2001年 | 2815篇 |
2000年 | 2959篇 |
1999年 | 3154篇 |
1998年 | 2676篇 |
1997年 | 2272篇 |
1996年 | 2095篇 |
1995年 | 1819篇 |
1994年 | 1460篇 |
1993年 | 1044篇 |
1992年 | 852篇 |
1991年 | 662篇 |
1990年 | 494篇 |
1989年 | 428篇 |
1988年 | 343篇 |
1987年 | 231篇 |
1986年 | 147篇 |
1985年 | 88篇 |
1984年 | 54篇 |
1983年 | 37篇 |
1982年 | 60篇 |
1981年 | 36篇 |
1980年 | 31篇 |
1979年 | 10篇 |
1978年 | 3篇 |
1965年 | 3篇 |
1959年 | 4篇 |
1951年 | 1篇 |
排序方式: 共有10000条查询结果,搜索用时 78 毫秒
941.
942.
通过分析目前电子商务信任模型的研究现状,总结出了研究基于声望的信任模型的主要方法,讨论了信任研究中所涉及的各种问题,并给出了目前声望式信任管理研究面临的挑战以及下一步的研究方向. 相似文献
943.
944.
Wu Li Yann-Hang Lee Wei-Tek Tsai Jingjing Xu Young-Sung Son Jun-Hee Park Kyung-Duk Moon 《Service Oriented Computing and Applications》2012,6(1):65-79
A smart home usually has a variety of devices or home appliance, instead of designing software for a specific home, this paper
proposes a service-oriented framework with a set of ontology systems to support service and device publishing, discovery of
devices and their services, composition of control software using existing control services that wrap devices, deployment,
and execution of the composed service in an computing environment, monitoring the execution, and recovery from device failure.
The ontology systems specify semantic information about devices, services, and workflows used in various smart home, and users
can compose and recompose services for their specific needs. New devices, workflows, and services can be added into ontology.
Most of the steps in this process can be automated including code generation. For example, service composition will be carried
out in three steps: abstract workflow design, function construction, and device discovery, and different codes can be generated
for different computing platforms such as Java and Open Services Gateway initiative environments. In this way, a variety of
smart home can be constructed rapidly using the framework by discovery and composition using existing services and workflows.
This paper illustrates this framework using a media control example to illustrate the ontology, discovery, composition, deployment,
execution, monitoring, and recovery. 相似文献
945.
Prediction mode modulated data-hiding algorithm for H.264/AVC 总被引:4,自引:0,他引:4
In this paper, a data-hiding algorithm with large data payload for H.264/AVC is proposed. The secret information is embedded by modulating the prediction modes of 4?×?4 luminance blocks. If the best mode does not match the information bit, the prediction mode should be modulated by replacing the best mode with the substitute mode. The substitute mode is the one with the least Lagrangian cost among those having different parity with the best mode. Due to high secrecy and easy reproducibility of chaos, the secret information is first encrypted by a chaotic sequence and then a small number of luminance blocks used for data embedding are randomly selected in each macroblock based on another chaotic sequence. The usefulness of multilevel chaotic keys and privacy of the number of 4?×?4 luminance blocks enhance the security. The hidden information can be extracted directly from the encoded stream without resorting to the original video, and merely requires decoding the intra-prediction mode from bit stream rather than decoding the whole video. Experimental results show that the proposed hiding scheme can effectively embed information with little bit rate increase and almost no quality degradation. 相似文献
946.
Chunjie Luo Jianfeng Zhan Zhen Jia Lei Wang Gang Lu Lixin Zhang Cheng-Zhong Xu Ninghui Sun 《Frontiers of Computer Science》2012,6(4):347-362
With the explosive growth of information, more and more organizations are deploying private cloud systems or renting public cloud systems to process big data. However, there is no existing benchmark suite for evaluating cloud performance on the whole system level. To the best of our knowledge, this paper proposes the first benchmark suite CloudRank-D to benchmark and rank cloud computing systems that are shared for running big data applications. We analyze the limitations of previous metrics, e.g., floating point operations, for evaluating a cloud computing system, and propose two simple metrics: data processed per second and data processed per Joule as two complementary metrics for evaluating cloud computing systems. We detail the design of CloudRank-D that considers representative applications, diversity of data characteristics, and dynamic behaviors of both applications and system software platforms. Through experiments, we demonstrate the advantages of our proposed metrics. In several case studies, we evaluate two small-scale deployments of cloud computing systems using CloudRank-D. 相似文献
947.
Hui Chen Ping Lu Pengcheng Xiong Cheng-Zhong Xu Zhiping Wang 《Frontiers of Computer Science》2012,6(4):373-387
Both performance and energy cost are important concerns for current data center operators. Traditionally, however, IT and mechanical engineers have separately optimized the cyber and physical aspects of data center operations. This paper considers both of these aspects with the eventual goal of developing performance and power management techniques that operate holistically to control the entire cyber-physical complex of data center installations. Toward this end, we propose a balance of payments model for holistic power and performance management. As an example of coordinated cyber-physical system management, the energy-aware cyber-physical system (EaCPS) uses an application controller on the cyber side to guarantee application performance, and on the physical side, it utilizes electric current-aware capacity management (CACM) to smartly place executables to reduce the energy consumption of each chassis present in a data center rack. A web application, representative of a multi-tier web site, is used to evaluate the performance of the controller on the cyber side, the CACM control on the physical side, and the holistic EaCPS methods in a mid-size instrumented data center. Results indicate that coordinated EaCPS outperforms separate cyber and physical control modules. 相似文献
948.
可逆逻辑综合是可逆计算的重要内容,为了解决可逆逻辑综合中可逆电路构造和优化问题,提出一种基于关联选择的可逆逻辑综合算法及相应的优化算法.将可逆函数用真值表表示,按真值表从上往下的顺序综合,并若干相关联变量作为综合的目标位,分别计算相对混乱度和绝对混乱度,以最小混乱度原则选取可逆逻辑门.该算法及其优化算法的时间复杂度为O(n2×2n),空间复杂度为O(n×2n),优于最佳算法的空间复杂度O(2n!).通过C++语言实现对3变量全部函数及部分4变量函数的综合,并与其他可逆逻辑综合算法的结果及benchmark范例比较,结果表明平均门数均具有一定优势. 相似文献
949.
提出一种根据用户指定的人体运动和观察视角生成真实感视频的方法.首先采集演员进行少数基本运动时的多视角视频数据库,并使用无标记运动捕捉的方法获得任意时刻人体对应的骨骼和3D模型.其次,用户对人体骨架指定运动并设定视角,以此定义目标视频.实验结果验证了文中方法能够利用有限的数据库合成演员在用户指定运动和视角下的真实感视频. 相似文献
950.
手绘服装动画是艺术化绘制风格与服装运动规律的结合体,将手绘风格与服装运动模拟相融合,提出一种高效生成具有手绘效果的服装动画方法.通过手绘图来指定服装动画的艺术效果,并基于逆向动力学原理,采用非线性优化方法从用户输入的手绘图中恢复出服装运动的动力学参数;在此基础上,设计实现了基于广义的中间帧插值方法和结合显式动作数据的外推方法,自动生成用户所期望的、与手绘图风格一致的服装动画序列.实验结果表明,该方法可有效地生成融合服装物理运动属性并保留动画师手绘风格的服装动画,显著提高了手绘服装动画的制作效率. 相似文献