全文获取类型
收费全文 | 4302篇 |
免费 | 355篇 |
国内免费 | 270篇 |
专业分类
电工技术 | 216篇 |
综合类 | 364篇 |
化学工业 | 19篇 |
金属工艺 | 12篇 |
机械仪表 | 128篇 |
建筑科学 | 305篇 |
矿业工程 | 50篇 |
能源动力 | 76篇 |
轻工业 | 23篇 |
水利工程 | 80篇 |
石油天然气 | 12篇 |
武器工业 | 9篇 |
无线电 | 810篇 |
一般工业技术 | 164篇 |
冶金工业 | 313篇 |
原子能技术 | 5篇 |
自动化技术 | 2341篇 |
出版年
2024年 | 5篇 |
2023年 | 31篇 |
2022年 | 61篇 |
2021年 | 74篇 |
2020年 | 119篇 |
2019年 | 59篇 |
2018年 | 85篇 |
2017年 | 106篇 |
2016年 | 117篇 |
2015年 | 147篇 |
2014年 | 260篇 |
2013年 | 317篇 |
2012年 | 283篇 |
2011年 | 319篇 |
2010年 | 298篇 |
2009年 | 292篇 |
2008年 | 425篇 |
2007年 | 410篇 |
2006年 | 325篇 |
2005年 | 286篇 |
2004年 | 221篇 |
2003年 | 155篇 |
2002年 | 94篇 |
2001年 | 67篇 |
2000年 | 65篇 |
1999年 | 50篇 |
1998年 | 32篇 |
1997年 | 28篇 |
1996年 | 27篇 |
1995年 | 31篇 |
1994年 | 20篇 |
1993年 | 7篇 |
1992年 | 5篇 |
1991年 | 7篇 |
1990年 | 9篇 |
1989年 | 7篇 |
1988年 | 6篇 |
1987年 | 4篇 |
1986年 | 7篇 |
1984年 | 7篇 |
1982年 | 7篇 |
1981年 | 4篇 |
1980年 | 4篇 |
1979年 | 3篇 |
1973年 | 4篇 |
1966年 | 5篇 |
1959年 | 2篇 |
1956年 | 6篇 |
1955年 | 6篇 |
1954年 | 2篇 |
排序方式: 共有4927条查询结果,搜索用时 328 毫秒
21.
When considering the full range of Web service-related activities, it becomes clear that dealing with context is a major challenge, requiring greater expressiveness, reasoning capabilities, and architectural components than are provided by the current widely accepted building blocks of the Web services stack. This paper presents an informal overview of concepts, requirements and challenges for handling contextual knowledge in connection with Web services, and briefly discusses several interesting projects in this area of research. 相似文献
22.
Comments on the original article, The dismantling of our health system: Strategies for the survival of psychological practice by Nicholas A. Cummings (see record 1986-22651-001). In response to this article, the current author says "no, no, no!" He believes that "survival with this degree of compromise amounts to doing anything for a buck." (PsycINFO Database Record (c) 2010 APA, all rights reserved) 相似文献
23.
Domenico Ferrari 《Multimedia Systems》1998,6(3):179-185
The research done by the Tenet Group in multimedia networking has reached a point where it may be useful to reflect on the
significance of its results for the current debate on how integrated-services internetworks should be designed. Such reflections
constitute the main subject of this paper. The principles of the work and the conclusions reached so far by the Tenet researchers
are discussed in the light of the conflict between the two major technologies being proposed to build future information infrastructures:
namely, the Internet and the ATM technologies. The Tenet approach suggests one feasible way for resolving the conflict to
the advantage of all the users of those infrastructures. This paper discusses various fundamental aspects of integrated-services
network design: the choice of the service model, the type of charging policy to be adopted, and the selection of a suitable
architecture. 相似文献
24.
25.
26.
软件服务外包作为一个新型的软件产业方兴未艾,这种贸易方式加强了国际间的合作与区域性产业的互补。作为中国的近邻日本,这种互补方式的优势显得尤为突出。但是,由于中国外包企业的竞争力较弱、技术力量不够雄厚、企业规模尚未形成等弱点存在,大大制约着中国软件服务外包业的进一步发展。特别是随着诸多新兴接包国家和地区的崛起,使得中国所面临的竞争进一步加大,从前的低成本优势将得到削弱。这些都严重地制约着中国软件服务外包行业的健康发展。有序地调整以低端为主的产业结构,提高自主创新能力,加大服务外包在国家IT(Information Technology)产业中的比重,从而增强核心竞争力。 相似文献
27.
Cyberattacks are difficult to prevent because the targeted companies and organizations are often relying on new and fundamentally insecure cloud-based technologies, such as the Internet of Things. With increasing industry adoption and migration of traditional computing services to the cloud, one of the main challenges in cybersecurity is to provide mechanisms to secure these technologies. This work proposes a Data Security Framework for cloud computing services (CCS) that evaluates and improves CCS data security from a software engineering perspective by evaluating the levels of security within the cloud computing paradigm using engineering methods and techniques applied to CCS. This framework is developed by means of a methodology based on a heuristic theory that incorporates knowledge generated by existing works as well as the experience of their implementation. The paper presents the design details of the framework, which consists of three stages: identification of data security requirements, management of data security risks and evaluation of data security performance in CCS. 相似文献
28.
文章提出了一种基于虚拟化的服务备份技术,该技术能够以较低的成本投入实现在提供的服务崩溃时迅速恢复服务,提高用户对服务的满意度,同时,文章对就影响该技术实现效果的服务备份速度、服务恢复速度、负载均衡三个因素进行了研究,提出了解决方案。 相似文献
29.
Many P2P applications require security services such as privacy, anonymity, authentication, and non-repudiation. Such services could be provided through a hierarchical Public Key Infrastructure. However, P2P networks are usually Internet-scale distributed systems comprised of nodes with an undetermined trust level, thus making hierarchical solutions unrealistic. In this paper, we propose Chord-PKI, a distributed PKI architecture which is build upon the Chord overlay network, in order to provide security services for P2P applications. Our solution distributes the functionality of a PKI across the peers by using threshold cryptography and proactive updating. We analyze the security of the proposed infrastructure and through simulations we evaluate its performance for various scenarios of untrusted node distributions. 相似文献
30.
Distributed match-making 总被引:1,自引:0,他引:1
In many distributed computing environments, processes are concurrently executed by nodes in a store- and-forward communication network. Distributed control issues as diverse as name server, mutual exclusion, and replicated data management involve making matches between such processes. We propose a formal problem called distributed match-making as the generic paradigm. Algorithms for distributed match-making are developed and the complexity is investigated in terms of messages and in terms of storage needed. Lower bounds on the complexity of distributed match-making are established. Optimal algorithms, or nearly optimal algorithms, are given for particular network topologies.The work of the second author was supported in part by the Office of Naval Research under Contract N00014-85-K-0168, by the Office of Army Research under Contract DAAG29-84-K-0058, by the National Science Foundation under Grant DCR-83-02391, and by the Defence Advanced Research Projects Agency (DARPA) under Contract N00014-83-K-0125. Current address of both authors: CWI, Kruislaan 413, 1098 SJ Amsterdam, The Netherlands. 相似文献