全文获取类型
收费全文 | 51110篇 |
免费 | 4148篇 |
国内免费 | 3004篇 |
专业分类
电工技术 | 5206篇 |
技术理论 | 8篇 |
综合类 | 5078篇 |
化学工业 | 3306篇 |
金属工艺 | 1396篇 |
机械仪表 | 1750篇 |
建筑科学 | 5855篇 |
矿业工程 | 1950篇 |
能源动力 | 1399篇 |
轻工业 | 1803篇 |
水利工程 | 1929篇 |
石油天然气 | 1545篇 |
武器工业 | 332篇 |
无线电 | 5937篇 |
一般工业技术 | 2117篇 |
冶金工业 | 3000篇 |
原子能技术 | 275篇 |
自动化技术 | 15376篇 |
出版年
2024年 | 183篇 |
2023年 | 473篇 |
2022年 | 906篇 |
2021年 | 1143篇 |
2020年 | 1251篇 |
2019年 | 984篇 |
2018年 | 839篇 |
2017年 | 1116篇 |
2016年 | 1344篇 |
2015年 | 1464篇 |
2014年 | 3385篇 |
2013年 | 2751篇 |
2012年 | 3804篇 |
2011年 | 4161篇 |
2010年 | 3247篇 |
2009年 | 3391篇 |
2008年 | 3330篇 |
2007年 | 4023篇 |
2006年 | 3646篇 |
2005年 | 3103篇 |
2004年 | 2509篇 |
2003年 | 2340篇 |
2002年 | 1760篇 |
2001年 | 1371篇 |
2000年 | 1163篇 |
1999年 | 825篇 |
1998年 | 571篇 |
1997年 | 513篇 |
1996年 | 447篇 |
1995年 | 421篇 |
1994年 | 316篇 |
1993年 | 221篇 |
1992年 | 220篇 |
1991年 | 149篇 |
1990年 | 128篇 |
1989年 | 141篇 |
1988年 | 87篇 |
1987年 | 47篇 |
1986年 | 56篇 |
1985年 | 86篇 |
1984年 | 57篇 |
1983年 | 61篇 |
1982年 | 30篇 |
1981年 | 46篇 |
1980年 | 23篇 |
1979年 | 19篇 |
1978年 | 12篇 |
1977年 | 10篇 |
1976年 | 10篇 |
1975年 | 10篇 |
排序方式: 共有10000条查询结果,搜索用时 1 毫秒
971.
根据精神专科医院的实际情况提出了以电子病历为核心,整合现有资源、统一集成、信息共享,服务患者的医院综合信息管理解决方案.也为未来实现医疗信息的区域共享打下基础. 相似文献
972.
973.
974.
975.
Yufeng Wang Akihiro Nakao Athanasios V. VasilakosJianhua Ma 《Computer Communications》2011,34(3):241-249
This paper thoroughly investigates the evolutionary dynamics of soft security mechanism, namely, reciprocity-based incentive mechanism, in P2P systems based on Evolutionary Game Theory (EGT). By soft security mechanism, it means social control mechanisms to overcome peers’ selfish (rational) behaviors, and encourage cooperation in P2P systems. Specifically, there exist three strategies in P2P systems: always cooperative (ALLC), always defect (ALLD) and reciprocator (R). Instead of existing work which take it for granted that, like ALLC users, R users did not bear any information-seeking cost, we assume small reciprocation cost, and study generalized mutation-selection dynamics. Our contributions are threefold: firstly, we prove and illustrate that, in a well-mixed P2P structure, ALLD is the only strict Nash equilibrium; secondly, we infer the specific condition under which evolution dynamics exhibits rock-scissors-paper oscillation in a structured P2P population. That is, the population cycles from ALLD to R to ALLC and back to ALLD; finally, we theoretically illustrate that the intensity of selection plays an important role in the evolutionary dynamics of P2P incentive mechanism. That is, when the intensity of selection is relatively weak and reciprocation cost limits to zero, the time average can be mostly concentrated on reciprocator. In brief, considering the existence of reciprocation cost and the small mutation in P2P incentive mechanisms, unlike existing work, it is impossible to simply achieve the “absolute cooperative” in P2P incentive mechanisms. On the other hand, stochastic evolution in P2P incentive mechanism with finite population and network structure still favor reciprocation. 相似文献
976.
Yaoxue Zhang Yuezhi Zhou 《Computer Communications》2011,34(13):1539-1548
Recent advances of hardware, software, and networks have made the management and security issues increasingly challenging in PC usage. Due to the tight coupling of hardware and software, each one of the hundreds or thousands of PCs connected in a networked environment has to be managed and administrated individually, leading to a high Total Cost of Ownership (TCO). We argue that a centralized storage of software and data, while distributed computation in clients, i.e., transparent computing, can address these challenges potentially and reduce the complexity with reduced software maintenance time, improved system availability, and enhanced security.This paper presents a novel approach, named StoreVirt, to realize transparent computing, which separates computation and storage from inside a single physical machine to different machines with a storage virtualization mechanism. With virtualization, all the OSes, applications, and data of clients are centered on the servers and scheduled on demand to run on different clients in a “block-streaming” way. Therefore, due to the central storage of OSes and applications, the installation, maintenance, and management are also centralized, leaving the clients light-weighted. Further, due to timely patching and upgrading, the system security can be improved. Experimental and real-world experiences demonstrate that this approach is efficient and feasible for real usages. 相似文献
977.
Paul ValckenaersAuthor Vitae Hendrik Van BrusselAuthor VitaeHerman BruyninckxAuthor Vitae Bart Saint GermainAuthor VitaeJan Van BelleAuthor Vitae Johan PhilipsAuthor Vitae 《Computers in Industry》2011,62(6):623-637
Dagstuhl seminar no. 10102 on discrete event logistic systems recognized a network of persistent models to be a “Grand Challenge.” Such on-line model network will offer an infrastructure that facilitates the management of logistic operations. This ambition to create a network of persistent models implies a radical shift for model design activities as the objective is an infrastructure rather than application-specific solutions. In particular, model developers can no longer assume that they know what their model will be used for. It is no longer possible to design for the expected.This paper presents insights in model development and design in the absence of precise knowledge concerning a model's usage. Basically, model developers may solely rely on the presence of the real-world counterpart mirrored by their model and a general idea about the nature of the application (e.g. coordination of logistic operations). When the invariants of their real-world counterpart suffice for models to be valid, these models become reusable and integrate-able. As these models remain valid under a wide range of situations, they become multi-purpose and durable resources rather than single-purpose short-lived components or legacy, which is even worse.Moreover and more specifically, the paper describes how to build models that allow their users to generate predictions in unexpected situations and atypical conditions. Referring to previous work, the paper concisely discusses how these predictions can be generated starting from the models. This prediction-generating technology is currently being transferred into an industrial MES. 相似文献
978.
Olivier Kerbrat Pascal Mognol Jean-Yves HascoëtAuthor vitae 《Computers in Industry》2011,62(7):684-692
Design for manufacturing (DFM) approaches aim to integrate manufacturability aspects during the design stage. Most of DFM approaches usually consider only one manufacturing process, but product competitiveness may be improved by designing hybrid modular products, in which products are seen as 3-D puzzles with modules realized individually by the best manufacturing process and further gathered. A new DFM system is created in order to give quantitative information during the product design stage of which modules will benefit in being machined and which ones will advantageously be realized by an additive process (such as Selective Laser Sintering or laser deposition). A methodology for a manufacturability evaluation in case of a subtractive or an additive manufacturing process is developed and implemented in a CAD software. Tests are carried out on industrial products from automotive industry. 相似文献
979.
Loren Paul ReesAuthor VitaeJason K. DeaneAuthor Vitae Terry R. RakesAuthor VitaeWade H. BakerAuthor Vitae 《Decision Support Systems》2011,51(3):493-505
Security countermeasures help ensure the confidentiality, availability, and integrity of information systems by preventing or mitigating asset losses from Cybersecurity attacks. Due to uncertainty, the financial impact of threats attacking assets is often difficult to measure quantitatively, and thus it is difficult to prescribe which countermeasures to employ. In this research, we describe a decision support system for calculating the uncertain risk faced by an organization under cyber attack as a function of uncertain threat rates, countermeasure costs, and impacts on its assets. The system uses a genetic algorithm to search for the best combination of countermeasures, allowing the user to determine the preferred tradeoff between the cost of the portfolio and resulting risk. Data collected from manufacturing firms provide an example of results under realistic input conditions. 相似文献
980.
In a buyer-supplier game, a special type of assignment game, a distinguished player, called the buyer, wishes to purchase some combinatorial structure. A set of players, called suppliers, offer various components of the structure for sale. Any combinatorial minimization problem can be transformed into a buyer-supplier game. While most previous work has been concerned with characterizing the core of buyer-supplier games, in this paper we study optimization over the set of core vectors. We give a polynomial time algorithm for optimizing over the core of any buyer-supplier game for which the underlying minimization problem is solvable in polynomial time. In addition, we show that it is hard to determine whether a given vector belongs to the core if the base minimization problem is not solvable in polynomial time. Finally, we introduce and study the concept of focus point price, which answers the question: If we are constrained to play in equilibrium, how much can we lose by playing the wrong equilibrium? 相似文献