全文获取类型
收费全文 | 8568篇 |
免费 | 988篇 |
国内免费 | 834篇 |
专业分类
电工技术 | 452篇 |
技术理论 | 1篇 |
综合类 | 869篇 |
化学工业 | 185篇 |
金属工艺 | 59篇 |
机械仪表 | 275篇 |
建筑科学 | 398篇 |
矿业工程 | 97篇 |
能源动力 | 123篇 |
轻工业 | 55篇 |
水利工程 | 263篇 |
石油天然气 | 170篇 |
武器工业 | 89篇 |
无线电 | 1226篇 |
一般工业技术 | 494篇 |
冶金工业 | 198篇 |
原子能技术 | 42篇 |
自动化技术 | 5394篇 |
出版年
2024年 | 33篇 |
2023年 | 90篇 |
2022年 | 108篇 |
2021年 | 150篇 |
2020年 | 167篇 |
2019年 | 205篇 |
2018年 | 172篇 |
2017年 | 239篇 |
2016年 | 252篇 |
2015年 | 274篇 |
2014年 | 411篇 |
2013年 | 529篇 |
2012年 | 506篇 |
2011年 | 634篇 |
2010年 | 477篇 |
2009年 | 583篇 |
2008年 | 614篇 |
2007年 | 708篇 |
2006年 | 556篇 |
2005年 | 513篇 |
2004年 | 426篇 |
2003年 | 385篇 |
2002年 | 310篇 |
2001年 | 239篇 |
2000年 | 213篇 |
1999年 | 200篇 |
1998年 | 175篇 |
1997年 | 156篇 |
1996年 | 157篇 |
1995年 | 116篇 |
1994年 | 138篇 |
1993年 | 93篇 |
1992年 | 74篇 |
1991年 | 71篇 |
1990年 | 39篇 |
1989年 | 39篇 |
1988年 | 34篇 |
1987年 | 19篇 |
1986年 | 10篇 |
1985年 | 32篇 |
1984年 | 30篇 |
1983年 | 29篇 |
1982年 | 31篇 |
1981年 | 24篇 |
1980年 | 27篇 |
1979年 | 31篇 |
1978年 | 12篇 |
1977年 | 8篇 |
1976年 | 13篇 |
1964年 | 5篇 |
排序方式: 共有10000条查询结果,搜索用时 0 毫秒
1.
2.
Private information retrieval(PIR) is an important privacy protection issue of secure multi-party computation, but the PIR protocols based on classical cryptography are vulnerable because of new technologies,such as quantum computing and cloud computing. The quantum private queries(QPQ) protocols available, however, has a high complexity and is inefficient in the face of large database. This paper, based on the QKD technology which is mature now, proposes a novel QPQ protocol utilizing the key dilution and auxiliary parameter. Only N quits are required to be sent in the quantum channel to generate the raw key, then the straight k bits in the raw key are added bitwise to dilute the raw key, and a final key is consequently obtained to encrypt the database. By flexible adjusting of auxiliary parameters θ and k, privacy is secured and the query success ratio is improved. Feasibility and performance analyses indicate that the protocol has a high success ratio in first-trial query and is easy to implement, and that the communication complexity of O(N) is achieved. 相似文献
3.
The pharmacy service requires that some pharmacies are always available and shifts have to be organized: a shift corresponds to a subset of pharmacies that must be open 24 hours a day on a particular week. Under the requirement that each pharmacy belongs to exactly one shift and the assumption that users minimize the distance to the closest open pharmacy during each shift, we want to determine a partition of the pharmacies into a given number of shifts, such that the total distance covered by users is minimized. It may be also required that shift cardinalities are balanced. We discuss different versions and the related computational complexity, showing that the problem is NP-hard in general. A set packing formulation is presented and solved by branch-and-price, together with a fast solution technique based on a tabu search. They have been applied to real and random instances showing that (i) the set packing formulation is very tight and often exhibits no integrality gap; (ii) the branch-and-price solves problems of practical relevance to optimality in a reasonable amount of time (order of minutes); (iii) the tabu search finds optimal or near-optimal solutions in order of seconds. 相似文献
4.
5.
含缺陷压力管道经缺陷评定合乎使用后,其疲劳寿命的估计具有重要的工程意义。将整个含缺陷压力管道作为一个整体,分析了含缺陷压力管道的疲劳裂纹扩展特点,提出了相应的含缺陷压力管道疲劳寿命的计算过程,并在基于可靠性评价的基础上,给出了核压力管道的可接受失效概率,最终得到了含缺陷核压力管道疲劳寿命预测方法。 相似文献
6.
带隔板底水油藏油井临界产量计算公式 总被引:25,自引:9,他引:16
本给出了带隔板底水油藏油井的监界产量计算公式,它适用于所有带隔板底水油藏的油井。 相似文献
7.
John Watrous 《Computational Complexity》2003,12(1-2):48-84
This paper studies the space-complexity of predicting the
long-term behavior of a class of stochastic processes based on evolutions
and measurements of quantum mechanical systems. These processes
generalize a wide range of both quantum and classical space-bounded
computations, including unbounded error computations given by machines
having algebraic number transition amplitudes or probabilities.
It is proved that any space s quantum stochastic process from this class
can be simulated probabilistically with unbounded error in space O(s),
and therefore deterministically in space O(s2). 相似文献
8.
Comments on the article "A house divided? The psychology of red and blue America" by D. C. Seyle and M. L. Newman (see record 2006-11202-001). Seyle and Newman concluded that the red and blue metaphor is inaccurate and proposed a purple America strategy to better convey that the majority of people do not align themselves with political extremes. There is interdisciplinary agreement on this. Although not cited by Seyle and Newman, the findings by Professor Fiorina of Stanford University were reported by the APA Monitor on Psychology in its coverage of the 2005 APA State Leadership Conference (Murray Law, 2005). In contrast to their social psychological analysis, Seyle and Newman were incorrect in concluding that "[a]s psychologists, we are not in a position to change either the elements of the American political system that may spur this conflict or even the decisions made by pundits, politicians, and reporters about the terms they choose to use in political discussion" (p. 579). (PsycINFO Database Record (c) 2010 APA, all rights reserved) 相似文献
9.
Sándor P. Fekete 《Information Processing Letters》2003,88(5):219-223
We prove NP-completeness of deciding the existence of an economic equilibrium in so-called house allocation markets. House allocation markets are markets with indivisible goods in which every agent holds exactly one copy of some good. 相似文献
10.
Abstract. In this paper we refer to the Temporal Precedence Problem on Pure Pointer Machines . This problem asks for the design of a data structure, maintaining a set of stored elements and supporting the following
two operations: insert and precedes . The operation insert (a) introduces a new element a in the structure, while the operation precedes (a,b) returns true iff element a was inserted before element b temporally. In [11] a solution was provided to the problem with worst-case time complexity O (log log n ) per operation and O(n log log n) space, where n is the number of elements inserted. It was also demonstrated that the precedes operation has a lower bound of Ω (log log n ) for the Pure Pointer Machine model of computation. In this paper we present two simple solutions with linear space and worst-case constant insertion
time. In addition, we describe two algorithms that can handle the precedes (a,b) operation in O (log log d ) time, where d is the temporal distance between the elements a and b . 相似文献