全文获取类型
收费全文 | 624篇 |
免费 | 49篇 |
国内免费 | 46篇 |
专业分类
电工技术 | 12篇 |
综合类 | 36篇 |
化学工业 | 31篇 |
金属工艺 | 2篇 |
机械仪表 | 16篇 |
建筑科学 | 29篇 |
矿业工程 | 5篇 |
能源动力 | 9篇 |
轻工业 | 19篇 |
水利工程 | 33篇 |
石油天然气 | 4篇 |
武器工业 | 4篇 |
无线电 | 46篇 |
一般工业技术 | 27篇 |
冶金工业 | 34篇 |
原子能技术 | 1篇 |
自动化技术 | 411篇 |
出版年
2024年 | 1篇 |
2023年 | 4篇 |
2022年 | 4篇 |
2021年 | 3篇 |
2020年 | 4篇 |
2019年 | 9篇 |
2018年 | 16篇 |
2017年 | 15篇 |
2016年 | 12篇 |
2015年 | 20篇 |
2014年 | 29篇 |
2013年 | 33篇 |
2012年 | 37篇 |
2011年 | 45篇 |
2010年 | 26篇 |
2009年 | 38篇 |
2008年 | 44篇 |
2007年 | 43篇 |
2006年 | 61篇 |
2005年 | 37篇 |
2004年 | 22篇 |
2003年 | 32篇 |
2002年 | 20篇 |
2001年 | 20篇 |
2000年 | 15篇 |
1999年 | 14篇 |
1998年 | 18篇 |
1997年 | 15篇 |
1996年 | 12篇 |
1995年 | 8篇 |
1994年 | 5篇 |
1993年 | 8篇 |
1992年 | 10篇 |
1991年 | 3篇 |
1990年 | 6篇 |
1989年 | 1篇 |
1988年 | 5篇 |
1987年 | 2篇 |
1986年 | 1篇 |
1985年 | 1篇 |
1983年 | 4篇 |
1981年 | 4篇 |
1980年 | 1篇 |
1979年 | 5篇 |
1975年 | 1篇 |
1966年 | 1篇 |
1965年 | 1篇 |
1964年 | 1篇 |
1961年 | 1篇 |
1957年 | 1篇 |
排序方式: 共有719条查询结果,搜索用时 15 毫秒
1.
The requirements on an object-oriented DBMS for management of information in a large, complex enterprise are presented. These requirements aid in the achievement of an environment characterized by data sharing, open architectures, application and data portability, and assurance of data integrity. They were defined from the point of view of a user of the DBMS; therefore they describe the expected functionality of the DBMS and do not specify the method of implementation to achieve this functionality. They encompass requirements on the data model, query and data manipulation languages, the system architecure, interfaces to the system, change management, and transaction management. 相似文献
2.
辽宁省是水资源严重短缺的省份之一,水资源不足已成为制约全省经济社会可持续发展的瓶颈。通过对全省大型取用水户的调查分析,找出了辽宁省节水工作中存在的问题,提出了节约用水工作的对策和建议。 相似文献
3.
通过对晋煤集团赵庄煤矿建筑外部空间规划的实例分析,综合考虑工业、行政、生活区的不同功能,构建园林、人文、旅游式矿山,从文化提炼、总体把握、景观构成等方面解决了煤矿建设中的可持续发展问题,以达到良好的规划效果。 相似文献
4.
Information Visualization Within a Digital Video Library 总被引:1,自引:0,他引:1
The Informedia Digital Video Library contains over a thousand hours of video, consuming over a terabyte of disk space. This paper summarizes the multimedia abstractions used to represent this video in prior systems and introduces the visualization techniques employed to browse and navigate multiple video documents at once. 相似文献
5.
6.
OAuth协议是一套用于在不同的服务中进行身份认证并且实现资源互访一套协议.由于关系到用户隐私,所以OAuth协议的安全性非常重要.这篇文章的主要贡献是研究OAuth2.0协议文本,对协议进行抽象,并且使用验证工具AVISPA对抽象后的协议进行建模与验证,找到协议中会导致隐私泄露的一种攻击模式.我们在建模过程中提出需将要验证的消息作为双方的对称密码这样一种创新思路.这种对协议的抽象和验证的方法可以推广到其他安全协议上,例如在线支付协议等等. 相似文献
7.
Jean-Gabriel Ganascia 《人工智能实验与理论杂志》2015,27(1):23-35
The notion of level of abstraction (LoA) is one of the foundations of the Floridi's Philosophy of Information. It also serves for many practical purposes as in information ethics. But the notion of abstraction is not new; it has been given many different meanings in various fields, especially in scientific disciplines and, in particular, in computer science. Our purpose here is to examine the use of abstraction in Floridi's works in conjunction with some of the meanings of abstraction in computer science. The article is divided into five sections. After a general introduction to the Floridi's method of abstraction (MoA) in Section 1, Section 2 revisits Floridi's definition of abstraction and Section 3 gives the different senses of abstraction in computer science. The Section 4 compares them with the Floridi's LoAs and proposes to generalise the Floridi's approach to abstraction using an abstraction of the LoAs, while Section 5 concludes on what we think to be some new arguments in favour of MoA and LoA. 相似文献
8.
9.
Sagar Chaki Edmund Clarke Natasha Sharygina Nishant Sinha 《Formal Methods in System Design》2008,32(3):235-266
This paper presents an automated and compositional procedure to solve the substitutability problem in the context of evolving software systems. Our solution contributes two
techniques for checking correctness of software upgrades: (1) a technique based on simultaneous use of over-and under-approximations
obtained via existential and universal abstractions; (2) a dynamic assume-guarantee reasoning algorithm—previously generated component assumptions are reused and altered on-the-fly to prove
or disprove the global safety properties on the updated system. When upgrades are found to be non-substitutable, our solution
generates constructive feedback to developers showing how to improve the components. The substitutability approach has been
implemented and validated in the ComFoRT reasoning framework, and we report encouraging results on an industrial benchmark.
This is an extended version of a paper, Dynamic Component Substitutability Analysis, published in the Proceedings of the Formal Methods 2005 Conference, Lecture Notes in Computer Science, vol. 3582, by the
same authors. This research was sponsored by the National Science Foundation under grant nos. CNS-0411152, CCF-0429120, CCR-0121547,
and CCR-0098072, the Semiconductor Research Corporation under grant no. TJ-1366, the US Army Research Office under grant no.
DAAD19-01-1-0485, the Office of Naval Research under grant no. N00014-01-1-0796, the ICAST project and the Predictable Assembly
from Certifiable Components (PACC) initiative at the Software Engineering Institute, Carnegie Mellon University. The views
and conclusions contained in this document are those of the authors and should not be interpreted as representing the official
policies, either expressed or implied, of any sponsoring institution, the US government or any other entity. 相似文献
10.
In our previous work, we introduced a computational architecture that effectively supports the tasks of continuous monitoring
and of aggregation querying of complex domain meaningful time-oriented concepts and patterns (temporal abstractions), in environments featuring large volumes of continuously arriving and accumulating time-oriented raw data. Examples include
provision of decision support in clinical medicine, making financial decisions, detecting anomalies and potential threats
in communication networks, integrating intelligence information from multiple sources, etc. In this paper, we describe the
general, domain-independent but task-specific problem-solving method underling our computational architecture, which we refer
to as incremental knowledge-based temporal abstraction (IKBTA). The IKBTA method incrementally computes temporal abstractions by maintaining persistence and validity of continuously computed
temporal abstractions from arriving time-stamped data. We focus on the computational framework underlying our reasoning method,
provide well-defined semantic and knowledge requirements for incremental inference, which utilizes a logical model of time,
data, and high-level abstract concepts, and provide a detailed analysis of the computational complexity of our approach. 相似文献