全文获取类型
收费全文 | 11475篇 |
免费 | 1777篇 |
国内免费 | 1380篇 |
专业分类
电工技术 | 704篇 |
综合类 | 1451篇 |
化学工业 | 316篇 |
金属工艺 | 494篇 |
机械仪表 | 947篇 |
建筑科学 | 512篇 |
矿业工程 | 146篇 |
能源动力 | 245篇 |
轻工业 | 172篇 |
水利工程 | 260篇 |
石油天然气 | 405篇 |
武器工业 | 138篇 |
无线电 | 1969篇 |
一般工业技术 | 941篇 |
冶金工业 | 303篇 |
原子能技术 | 95篇 |
自动化技术 | 5534篇 |
出版年
2024年 | 64篇 |
2023年 | 229篇 |
2022年 | 345篇 |
2021年 | 441篇 |
2020年 | 428篇 |
2019年 | 329篇 |
2018年 | 267篇 |
2017年 | 358篇 |
2016年 | 349篇 |
2015年 | 465篇 |
2014年 | 670篇 |
2013年 | 666篇 |
2012年 | 865篇 |
2011年 | 947篇 |
2010年 | 789篇 |
2009年 | 837篇 |
2008年 | 860篇 |
2007年 | 965篇 |
2006年 | 760篇 |
2005年 | 690篇 |
2004年 | 546篇 |
2003年 | 486篇 |
2002年 | 388篇 |
2001年 | 282篇 |
2000年 | 243篇 |
1999年 | 219篇 |
1998年 | 191篇 |
1997年 | 171篇 |
1996年 | 157篇 |
1995年 | 104篇 |
1994年 | 125篇 |
1993年 | 79篇 |
1992年 | 50篇 |
1991年 | 52篇 |
1990年 | 38篇 |
1989年 | 35篇 |
1988年 | 29篇 |
1987年 | 18篇 |
1986年 | 7篇 |
1985年 | 17篇 |
1984年 | 12篇 |
1983年 | 11篇 |
1982年 | 12篇 |
1981年 | 6篇 |
1980年 | 7篇 |
1979年 | 4篇 |
1976年 | 3篇 |
1975年 | 2篇 |
1974年 | 3篇 |
1962年 | 2篇 |
排序方式: 共有10000条查询结果,搜索用时 31 毫秒
31.
Brian J. Ross 《Formal Aspects of Computing》1997,9(3):331-348
Imperative programs can be inverted directly from their forward-directed program code with the use of logical inference. The relational semantics of imperative computations treats programs as logical relations over the observable state of the environment, which is taken to be the state of the variables in memory. Program relations denote both forward and backward computations, and the direction of the computation depends upon the instantiation pattern of arguments in the relation. This view of inversion has practical applications when the relational semantics is treated as a logic program. Depending on the logic programming inference scheme used, execution of this relational program can compute the inverse of the imperative program. A number of nontrivial imperative computations can be inverted with minimal logic programming tools. 相似文献
32.
介绍了高上山成型法的工艺特点及理论上的可行性和实践中的可靠性,此方法能有效地解决薄钢带波浪状边缘的焊接方面存在的问题。 相似文献
33.
Dmitri E. Nikonov George I. Bourianoff Paolo A. Gargini 《Journal of Superconductivity and Novel Magnetism》2006,19(6):497-513
Quantum limits of power dissipation in spintronic computing are estimated. A computing element composed of a single electron
in a quantum dot is considered. Dynamics of its spin due to external magnetic field and interaction with adjacent dots are
described via the Bloch equations. Spin relaxation due to magnetic noise from various sources is described as coupling to
a reservoir. Resulting dissipation of energy is calculated and is shown to be much less than the thermal limit, ∼kT per bit,
if the rate of spin relaxation is much slower than the switching rate. Clues on how to engineer an energy efficient spintronic
device are provided. 相似文献
34.
Bo Gyeong Kang 《Information Processing Letters》2006,97(6):219-224
In this paper, we investigate the relationship between the squared Weil/Tate pairing and the plain Weil/Tate pairing. Along these lines, we first show that the squared pairing for an arbitrary chosen point can be transformed into the plain pairing for a trace zero point which has a special form to compute them more efficiently. Then the optimizations made for computing squared pairings are combined with the computation of pairings on these trace zero points, to achieve even better performance for the computation of the 4th powered Weil pairing. 相似文献
35.
36.
Oded Goldreich 《Distributed Computing》2003,16(2-3):177-199
We survey the paradigms, approaches and techniques used to conceptualize, define and provide solutions to natural cryptographic problems. We start by presenting some of the central tools (e.g., computational difficulty, pseudorandomness, and zero-knowledge proofs), and next turn to the treatment of encryption and signature schemes. We conclude with an extensive treatment of secure cryptographic protocols both when executed in a stand-alone manner and when many sessions of various protocols are concurrently executed and controlled by an adversary. The survey is intended for researchers in distributed computing, and assumes no prior familiarity with cryptography.Received: June 2001, Accepted: July 2002, 相似文献
37.
Joon C. Park Author Vitae Author Vitae 《Computer aided design》2003,35(9):807-812
Presented in this paper is a topology reconstruction algorithm from a set of unorganized trimmed surfaces. Error-prone small geometric elements are handled to give proper topological information. It gives complete topology to topologically complete models, and it is also tolerant to incomplete models. The proposed algorithm is vertex-based in that clues for topological information are searched from the set of vertices first, not from that of edges. 相似文献
38.
层序地层学在碳酸盐岩气藏开发早期地质评价阶段的应用——以川东北罗家寨鲕滩气藏为例 总被引:1,自引:0,他引:1
川东北地区罗家寨飞仙关组鲕滩储集层为碳酸盐岩台地边缘相沉积,具有厚度大、分布稳定的特点。应用层序地层学方法理论,对飞仙关组进行层序划分与对比,划分了5个四级层序10个体系域,建立了该区的沉积模式。作为主力储集类型的台地边缘鲕滩相发育于第1个层序的高位期及第Ⅱ、Ⅲ层序中。罗家寨地区发育两个(期)边缘鲡滩,由东向西推移,西部滩体的形成时间晚于东部。两个滩体经历的成岩过程有所差异,东部滩体经历了5期白云石化和淡水溶蚀作用,西部滩体白云石化及溶蚀作用明显减弱,只可以识别出微弱的白云石化作用,因此东部滩体储集性能优于西部。图4表1参7 相似文献
39.
40.
分形方法用于有噪图像边缘检测的研究 总被引:10,自引:0,他引:10
本文研究了加性高斯白噪声对于基于离散分数布朗随机场模型图像分形维数估计的影响,并将分形方法用于图像边缘检测,指出在加性高斯白噪声的情况下,分形方法用于图像边缘检测较之经典的基于梯度运算的边缘检测方法有好的抗噪性能,同时又能检测比较丰富的图像边缘细节。 相似文献