全文获取类型
收费全文 | 462篇 |
免费 | 4篇 |
国内免费 | 3篇 |
专业分类
电工技术 | 2篇 |
化学工业 | 65篇 |
金属工艺 | 2篇 |
机械仪表 | 9篇 |
建筑科学 | 42篇 |
矿业工程 | 5篇 |
能源动力 | 12篇 |
轻工业 | 14篇 |
水利工程 | 6篇 |
石油天然气 | 4篇 |
无线电 | 32篇 |
一般工业技术 | 61篇 |
冶金工业 | 47篇 |
自动化技术 | 168篇 |
出版年
2023年 | 2篇 |
2022年 | 3篇 |
2021年 | 4篇 |
2020年 | 2篇 |
2019年 | 5篇 |
2018年 | 8篇 |
2017年 | 7篇 |
2016年 | 12篇 |
2015年 | 8篇 |
2014年 | 10篇 |
2013年 | 40篇 |
2012年 | 21篇 |
2011年 | 23篇 |
2010年 | 22篇 |
2009年 | 18篇 |
2008年 | 21篇 |
2007年 | 29篇 |
2006年 | 17篇 |
2005年 | 20篇 |
2004年 | 19篇 |
2003年 | 25篇 |
2002年 | 16篇 |
2001年 | 2篇 |
2000年 | 9篇 |
1999年 | 9篇 |
1998年 | 17篇 |
1997年 | 7篇 |
1996年 | 7篇 |
1995年 | 7篇 |
1994年 | 3篇 |
1993年 | 3篇 |
1992年 | 2篇 |
1991年 | 8篇 |
1990年 | 4篇 |
1989年 | 4篇 |
1988年 | 6篇 |
1987年 | 4篇 |
1986年 | 3篇 |
1985年 | 2篇 |
1983年 | 2篇 |
1982年 | 3篇 |
1981年 | 6篇 |
1980年 | 3篇 |
1979年 | 4篇 |
1978年 | 4篇 |
1977年 | 3篇 |
1976年 | 2篇 |
1975年 | 3篇 |
1973年 | 2篇 |
1970年 | 3篇 |
排序方式: 共有469条查询结果,搜索用时 15 毫秒
11.
J?rg Brunsmann Wolfgang Wilkes Gunter Schlageter Matthias Hemmje 《International Journal on Digital Libraries》2012,12(1):27-39
Providing access to digital information for the indefinite future is the intention of long-term digital preservation systems. One application domain that certainly needs to implement such long-term digital preservation processes is the design and engineering industry. In this industry, products are designed, manufactured, and operated with the help of sophisticated software tools provided by product lifecycle management (PLM) systems. During all PLM phases, including geographically distributed cross-domain and cross-company collaboration, a huge amount of heterogeneous digital product data and metadata is created. Legal and economic requirements demand that this product data has to be archived and preserved for a long-time period. Unfortunately, the software that is able to interpret the data will become obsolete earlier than the data since the software and hardware lifecycle is relatively short-lived compared to a product lifecycle. Companies in the engineering industry begin to realize that their data is in danger of becoming unusable while the products are in operation for several decades. To address this issue, different academic and industrial initiatives have been initiated that try to solve this problem. This article provides an overview of these projects including their motivations, identified problems, and proposed solutions. The studied projects are also verified against a classification of important aspects regarding scope and functionality of digital preservation in the engineering industry. Finally, future research topics are identified. 相似文献
12.
13.
14.
Blanchet-Sadri et al. have shown that Avoidability, or the problem of deciding the avoidability of a finite set of partial words over an alphabet of size k≥2, is NP-hard [F. Blanchet-Sadri, R. Jungers, J. Palumbo, Testing avoidability on sets of partial words is hard, Theoret. Comput. Sci. 410 (2009) 968-972]. Building on their work, we analyze in this paper the complexity of natural variations on the problem. While some of them are NP-hard, others are shown to be efficiently decidable. Using some combinatorial properties of de Bruijn graphs, we establish a correspondence between lengths of cycles in such graphs and periods of avoiding words, resulting in a tight bound for periods of avoiding words. We also prove that Avoidability can be solved in polynomial space, and reduces in polynomial time to the problem of deciding the avoidability of a finite set of partial words of equal length over the binary alphabet. We give a polynomial bound on the period of an infinite avoiding word, in the case of sets of full words, in terms of two parameters: the length and the number of words in the set. We give a polynomial space algorithm to decide if a finite set of partial words is avoided by a non-ultimately periodic infinite word. The same algorithm also decides if the number of words of length n avoiding a given finite set of partial words grows polynomially or exponentially with n. 相似文献
15.
16.
Gunter Ritter Volker Weispfenning 《Applicable Algebra in Engineering, Communication and Computing》1991,2(1):55-79
By an admissible order on a finite subsetQ of
n
we mean the restriction toQ of a linear order on
n
compatible with the group structure of
n
and such that
n
is contained in the positive cone of the order. We first derive upper and lower bounds on the number of admissible orders on a given setQ in terms of the dimensionn and the cardinality ofQ. Better estimates are possible if the setQ enjoys symmetry properties and in the case whereQ is a discrete hyperbox of the form
In the latter case, we also give asymptotic results as
d
k for fixedn. We finally present algorithms which compute the set of admissible orders that extend a given binary relation onQ and their number. The algorithms are useful in connection with the construction of universal Gröbner bases.AMS Classification: primary 06F20 secondary 06-04, 11N25 相似文献
17.
18.
Gunter Ollmann 《Network Security》2003,2003(6):13-17
Most organizations now have substantial investments in their online Internet presences. For major financial institutions and retailers, the Internet provides both a cost effective means of presenting their offerings to customers, and a method of delivering a personalised 24/7 presence. In almost all cases, the preferred method of delivering these services is over common HTTP. Due to limitations within the protocol, there is no in-built facility to identify or track a particular customer (or session) uniquely within an application. Thus the connection between the customer’s Web browser and the organisation's Web service is commonly referred to as being “stateless”. Because of this, organizations have been forced to adopt custom methods of managing client sessions if they wish to maintain state.An important aspect of correctly managing state information through session IDs relates directly to authentication processes. While it is possible to insist that a client using an organization's Web application provide authentication information for each “restricted” page or data submission, it would soon become tedious and untenable. Thus session IDs are not only used to follow clients throughout the Web application, they are also used to identify each unique, authenticated user — thereby indirectly regulating access to site content or information. 相似文献
19.
Frank Stefani Gunter Gerbeth Thomas Gundrum 《Materials and Manufacturing Processes》2004,19(4):651-663
The knowledge of the flow in metallic and semiconducting melts is important for a number of industrial problems. Optical methods cannot be applied due to the opaqueness of those fluids. Ultrasonic methods have problems with wetting and thermal stability when applied in hot metallic melts. Evidently, contactless methods for velocity determination would be highly desirable. In some applications, even a coarse knowledge of the flow topology and the direction of the main eddies would be of high value. The study examines the possibility of velocity reconstruction in electrically conducting fluids from external measurements of different induced magnetic fields. It is shown that, for a reliable velocity reconstruction, the effect of the electric potential at the fluid boundary on the induced magnetic field should be taken into account. 相似文献
20.