首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   21786篇
  免费   1413篇
  国内免费   792篇
电工技术   331篇
技术理论   1篇
综合类   1585篇
化学工业   7433篇
金属工艺   543篇
机械仪表   330篇
建筑科学   1642篇
矿业工程   911篇
能源动力   180篇
轻工业   2871篇
水利工程   155篇
石油天然气   2390篇
武器工业   136篇
无线电   584篇
一般工业技术   1314篇
冶金工业   694篇
原子能技术   168篇
自动化技术   2723篇
  2024年   40篇
  2023年   135篇
  2022年   335篇
  2021年   384篇
  2020年   380篇
  2019年   295篇
  2018年   314篇
  2017年   484篇
  2016年   554篇
  2015年   580篇
  2014年   985篇
  2013年   996篇
  2012年   1373篇
  2011年   1473篇
  2010年   1026篇
  2009年   1148篇
  2008年   1038篇
  2007年   1605篇
  2006年   1563篇
  2005年   1538篇
  2004年   1301篇
  2003年   1195篇
  2002年   1026篇
  2001年   920篇
  2000年   721篇
  1999年   625篇
  1998年   483篇
  1997年   318篇
  1996年   257篇
  1995年   252篇
  1994年   186篇
  1993年   128篇
  1992年   95篇
  1991年   65篇
  1990年   57篇
  1989年   48篇
  1988年   20篇
  1987年   20篇
  1986年   9篇
  1985年   2篇
  1984年   6篇
  1983年   2篇
  1982年   1篇
  1981年   2篇
  1980年   2篇
  1979年   1篇
  1977年   1篇
  1976年   1篇
  1957年   1篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
111.
Stateful session handoff for mobile WWW   总被引:1,自引:0,他引:1  
This paper proposes a web session handoff system that can hand over not only stateless but also stateful sessions between homogenous and heterogeneous user devices to enable uninterrupted and seamless web access. The proposed system adopts a proxy-based approach and an optional client-assisted scheme in order to track and hand over session information. In the proposed system, a session is registered at a User Agent Proxy (UAP) and then tracked by the UAP so that the session can be handed over from one device via the UAP to another device. In addition to session information tracked by a UAP, the UAP can hand over more comprehensive session information by using the client-assisted scheme. Compared with client-based approaches, our design has several advantages, such as less modification to user devices, practicability, and fault tolerance. We have implemented a UAP on a PC and client programs for both PC and PDA. The implementation can successfully hand over between PC and PDA a stateful session for online shopping applications.  相似文献   
112.
李敬文 《炼油与化工》2003,14(1):35-35,42
介绍了传统的焊补法堵漏及目前常用的不停车带压堵漏技术的基本原理、操作步骤以及密封剂类型,并对两种方法进行了比较。  相似文献   
113.
The transitions and reactions involved in the thermal treatment of several commercial azodicarbonamides (ADC) in an inert atmosphere have been studied by dynamic thermogravimetry analysis (TGA), mass spectrometry and Fourier transform infrared (FTIR) spectroscopy. A pseudo‐mechanistic model, involving several competitive and non‐competitive reactions, has been suggested and applied to the correlation of the weight loss data. The model applied is capable of accurately representing the different processes involved, and can be of great interest in the understanding and quantification of such phenomena, including the simulation of the instantaneous amount of gases evolved in a foaming process. In addition, a brief discussion on the methodology related to the mathematical modeling of TGA data is presented, taking into account the complex thermal behaviour of the ADC. © 2007 Wiley Periodicals, Inc. J Appl Polym Sci, 2008  相似文献   
114.
Even with attractive computational advantages, mobile agent technology has not developed its full potential due to various security issues. This paper proposes a method called Private Key Consignment to solve the problem of how to protect the data carried by mobile agents. It exploits new functionalities and mechanism provided by the trusted computing technology, and adopts both public key and symmetric key cryptographic means for data and key protection. The most notable feature of this method is that it protects the private key of the agent by consigning it to a tamper proof hardware, thus, enabling convenient and secure use of the private key. It provides a new scheme of mobile agents' data protection.  相似文献   
115.
随着网络的迅猛发展,管理网技术的相关研究也越来越得到广泛重视,传统的集中式管理方法在可扩展性、可靠性、灵活性方面存在一定的不足。基于移动代理的分布式网络管理方案可以很好地解决这些问题。网管站派遣移动代理到各被管节点上去收集数据和执行网管操作,这样可以分散网络管理站的工作量和降低网络的流量,并提升网络管理系统的主动性。  相似文献   
116.
The popularity of grid services has widened their application to numerous domains and increased the utilization of computational resources. In order to create more incentives for the resources owners to lease their resources and prevent users from wasting the resources, the introduction of a market-oriented grid is inevitable. However, the issues for the negotiation between service provider and consumer over the supply and demand of resources can be complex, with highly interdependent issues. In this research, a simulated automated negotiation mechanism including a co-evolutionary mechanism and a modified game theory approach is proposed, to assist them in reaching an agreement over the conflicting issues. In the proposed architecture, the co-evolution process is able to reduce the multiple dimensional search space into a two-dimension search space and identify the appropriate negotiation strategies for the negotiating agents to form a payoff matrix which can be used for the game theory related stage of their interaction. The multiple stage negotiation process is introduced to improve the negotiation result. In this paper, an application which requires a large amount of computational resources to process the data generated from mobile devises is used to demonstrate that the proposed system is able to resolve the conflicts and obtain a valid solution.  相似文献   
117.
Verifiable Distributed Oblivious Transfer and Mobile Agent Security   总被引:1,自引:0,他引:1  
The mobile agent is a fundamental building block of the mobile computing paradigm. In mobile agent security, oblivious transfer (OT) from a trusted party can be used to protect the agent’s privacy and the hosts’ privacy. In this paper, we introduce a new cryptographic primitive called Verifiable Distributed Oblivious Transfer (VDOT), which allows us to replace a single trusted party with a group of threshold trusted servers. The design of VDOT uses a novel technique called consistency verification of encrypted secret shares. VDOT protects the privacy of both the sender and the receiver against malicious attacks of the servers. We also show the design of a system to apply VDOT to protect the privacy of mobile agents. Our design partitions an agent into the general portion and the security-sensitive portion. We also implement the key components of our system. As far as we know, this is the first effort to implement a system that protects the privacy of mobile agents. Our preliminary evaluation shows that protecting mobile agents not only is possible, but also can be implemented efficiently. This work was supported in part by the DoD University Research Initiative (URI) program administered by the Office of Naval Research under grant N00014-01-1-0795. Sheng Zhong was supported by ONR grant N00014-01-1-0795 and NSF grants ANI-0207399 and CCR-TC-0208972. Yang Richard Yang was supported in part by NSF grant ANI-0207399. A preliminary version of this paper was presented at the DialM-POMC Joint Workshop on Foundations of Mobile Computing in 2003. Sheng Zhong received his Ph.D. in computer science from Yale University in the year of 2004. He holds an assistant professor position at SUNY Buffalo and is currently on leave for postdoctoral research at the Center for Discrete Mathematics and Theoretical Computer Science (DIMACS). His research interests, on the practical side, are security and incentives in data mining, databases, and wireless networks. On the theoretical side, he is interested in cryptography and game theory. Yang Richard Yang is an Assistant Professor of Computer Science at Yale University. His research interests include computer networks, mobile computing, wireless networking, sensor networks, and network security. He leads the LAboratory of Networked Systems (LANS) at Yale. His recent awards include a Schlumberger Fellowship and a CAREER Award from the National Science Foundation. He received his B.E. degree from Tsinghua University (1993), and his M.S. and Ph.D. degrees from the University of Texas at Austin (1998 and 2001).  相似文献   
118.
Tributyltin (TBT) released into seawater from ship hulls is a stable marine pollutant and obviously remains in marine environments. We isolated a TBT resistant marine Pseudoalteromonas sp. TBT1 from sediment of a ship’s ballast water. The isolate (109.3 ± 0.2 colony-forming units mL−1) adsorbed TBT in proportion to the concentrations of TBTCl externally added up to 3 mM, where the number of TBT adsorbed by a single cell was estimated to be 108.2. The value was reduced to about one-fifth when the lysozyme-treated cells were used. The surface of ethanol treated cells became rough, but the capacity of TBT adsorption was the same as that for native cells. These results indicate that the function of the cell surface, rather than that structure, plays an important role to the adsorption of TBT. The adsorption state of TBT seems to be multi-layer when the number of more than 106.8 TBT molecules is adsorbed by a single cell.  相似文献   
119.
吸水膨胀型膨润土/交联聚丙烯酰胺颗粒堵剂   总被引:9,自引:0,他引:9  
栾守杰 《油田化学》2003,20(3):230-231
使丙烯酰胺、少量N,N-亚甲基双丙烯酰胺在钙膨润土存在下进行水溶液引发接枝共聚合,聚合产物经造粒、粉碎、筛分,得到粒径0.5~1.0mm的颗粒堵剂。根据颗粒堵剂吸水量大小确定丙烯酰胺与膨润土最佳质量比为7:1,引发剂最佳用量为500g/t,交联剂最佳用量为300g/t,吸水量与这3个参数之间的关系曲线都经过最大值,颗粒堵剂在去离子水中的吸水量为560~650mL/g。该堵剂已大规模生产,在胜利、中原油田许多采油厂已用于调剖、堵水和调驱施工,在青海、江苏、大港、冀东等油田也已开始使用。在胜利东辛采油厂的一个井组,连续3个月在3口井注入该堵剂共27t,使井口压力上升3MPa,产油量大幅度增加。表l参l。  相似文献   
120.
The experimental research in displacement of gold particles in washed-out thickness of sand-gravel layer is conducted. The parameters of ability of gold particles to migrate in pulp flow are determined, and their immersion into loose soil is investigated.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号