首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   4302篇
  免费   355篇
  国内免费   270篇
电工技术   216篇
综合类   364篇
化学工业   19篇
金属工艺   12篇
机械仪表   128篇
建筑科学   305篇
矿业工程   50篇
能源动力   76篇
轻工业   23篇
水利工程   80篇
石油天然气   12篇
武器工业   9篇
无线电   810篇
一般工业技术   164篇
冶金工业   313篇
原子能技术   5篇
自动化技术   2341篇
  2024年   5篇
  2023年   31篇
  2022年   61篇
  2021年   74篇
  2020年   119篇
  2019年   59篇
  2018年   85篇
  2017年   106篇
  2016年   117篇
  2015年   147篇
  2014年   260篇
  2013年   317篇
  2012年   283篇
  2011年   319篇
  2010年   298篇
  2009年   292篇
  2008年   425篇
  2007年   410篇
  2006年   325篇
  2005年   286篇
  2004年   221篇
  2003年   155篇
  2002年   94篇
  2001年   67篇
  2000年   65篇
  1999年   50篇
  1998年   32篇
  1997年   28篇
  1996年   27篇
  1995年   31篇
  1994年   20篇
  1993年   7篇
  1992年   5篇
  1991年   7篇
  1990年   9篇
  1989年   7篇
  1988年   6篇
  1987年   4篇
  1986年   7篇
  1984年   7篇
  1982年   7篇
  1981年   4篇
  1980年   4篇
  1979年   3篇
  1973年   4篇
  1966年   5篇
  1959年   2篇
  1956年   6篇
  1955年   6篇
  1954年   2篇
排序方式: 共有4927条查询结果,搜索用时 328 毫秒
21.
When considering the full range of Web service-related activities, it becomes clear that dealing with context is a major challenge, requiring greater expressiveness, reasoning capabilities, and architectural components than are provided by the current widely accepted building blocks of the Web services stack. This paper presents an informal overview of concepts, requirements and challenges for handling contextual knowledge in connection with Web services, and briefly discusses several interesting projects in this area of research.  相似文献   
22.
Comments on the original article, The dismantling of our health system: Strategies for the survival of psychological practice by Nicholas A. Cummings (see record 1986-22651-001). In response to this article, the current author says "no, no, no!" He believes that "survival with this degree of compromise amounts to doing anything for a buck." (PsycINFO Database Record (c) 2010 APA, all rights reserved)  相似文献   
23.
The research done by the Tenet Group in multimedia networking has reached a point where it may be useful to reflect on the significance of its results for the current debate on how integrated-services internetworks should be designed. Such reflections constitute the main subject of this paper. The principles of the work and the conclusions reached so far by the Tenet researchers are discussed in the light of the conflict between the two major technologies being proposed to build future information infrastructures: namely, the Internet and the ATM technologies. The Tenet approach suggests one feasible way for resolving the conflict to the advantage of all the users of those infrastructures. This paper discusses various fundamental aspects of integrated-services network design: the choice of the service model, the type of charging policy to be adopted, and the selection of a suitable architecture.  相似文献   
24.
25.
文章通过Web Services技术与工作流技术的结合,提供了Web Services对工作流系统建模和执行阶段的支持,设计了一个面向Web Services的工作流管理系统。利用以Web Services为基础的WS-BPEL工作流技术解决了当前工作流技术在不同企业间协作的互操作问题,从而实现了基于Internet的业务流程管理,为跨企业间的流程协作提出了一种新的解决方案。  相似文献   
26.
软件服务外包作为一个新型的软件产业方兴未艾,这种贸易方式加强了国际间的合作与区域性产业的互补。作为中国的近邻日本,这种互补方式的优势显得尤为突出。但是,由于中国外包企业的竞争力较弱、技术力量不够雄厚、企业规模尚未形成等弱点存在,大大制约着中国软件服务外包业的进一步发展。特别是随着诸多新兴接包国家和地区的崛起,使得中国所面临的竞争进一步加大,从前的低成本优势将得到削弱。这些都严重地制约着中国软件服务外包行业的健康发展。有序地调整以低端为主的产业结构,提高自主创新能力,加大服务外包在国家IT(Information Technology)产业中的比重,从而增强核心竞争力。  相似文献   
27.
Cyberattacks are difficult to prevent because the targeted companies and organizations are often relying on new and fundamentally insecure cloud-based technologies, such as the Internet of Things. With increasing industry adoption and migration of traditional computing services to the cloud, one of the main challenges in cybersecurity is to provide mechanisms to secure these technologies. This work proposes a Data Security Framework for cloud computing services (CCS) that evaluates and improves CCS data security from a software engineering perspective by evaluating the levels of security within the cloud computing paradigm using engineering methods and techniques applied to CCS. This framework is developed by means of a methodology based on a heuristic theory that incorporates knowledge generated by existing works as well as the experience of their implementation. The paper presents the design details of the framework, which consists of three stages: identification of data security requirements, management of data security risks and evaluation of data security performance in CCS.  相似文献   
28.
文章提出了一种基于虚拟化的服务备份技术,该技术能够以较低的成本投入实现在提供的服务崩溃时迅速恢复服务,提高用户对服务的满意度,同时,文章对就影响该技术实现效果的服务备份速度、服务恢复速度、负载均衡三个因素进行了研究,提出了解决方案。  相似文献   
29.
Many P2P applications require security services such as privacy, anonymity, authentication, and non-repudiation. Such services could be provided through a hierarchical Public Key Infrastructure. However, P2P networks are usually Internet-scale distributed systems comprised of nodes with an undetermined trust level, thus making hierarchical solutions unrealistic. In this paper, we propose Chord-PKI, a distributed PKI architecture which is build upon the Chord overlay network, in order to provide security services for P2P applications. Our solution distributes the functionality of a PKI across the peers by using threshold cryptography and proactive updating. We analyze the security of the proposed infrastructure and through simulations we evaluate its performance for various scenarios of untrusted node distributions.  相似文献   
30.
Distributed match-making   总被引:1,自引:0,他引:1  
In many distributed computing environments, processes are concurrently executed by nodes in a store- and-forward communication network. Distributed control issues as diverse as name server, mutual exclusion, and replicated data management involve making matches between such processes. We propose a formal problem called distributed match-making as the generic paradigm. Algorithms for distributed match-making are developed and the complexity is investigated in terms of messages and in terms of storage needed. Lower bounds on the complexity of distributed match-making are established. Optimal algorithms, or nearly optimal algorithms, are given for particular network topologies.The work of the second author was supported in part by the Office of Naval Research under Contract N00014-85-K-0168, by the Office of Army Research under Contract DAAG29-84-K-0058, by the National Science Foundation under Grant DCR-83-02391, and by the Defence Advanced Research Projects Agency (DARPA) under Contract N00014-83-K-0125. Current address of both authors: CWI, Kruislaan 413, 1098 SJ Amsterdam, The Netherlands.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号