全文获取类型
收费全文 | 6996篇 |
免费 | 667篇 |
国内免费 | 840篇 |
专业分类
电工技术 | 254篇 |
综合类 | 592篇 |
化学工业 | 40篇 |
金属工艺 | 75篇 |
机械仪表 | 392篇 |
建筑科学 | 106篇 |
矿业工程 | 75篇 |
能源动力 | 14篇 |
轻工业 | 44篇 |
水利工程 | 24篇 |
石油天然气 | 19篇 |
武器工业 | 55篇 |
无线电 | 754篇 |
一般工业技术 | 146篇 |
冶金工业 | 21篇 |
原子能技术 | 8篇 |
自动化技术 | 5884篇 |
出版年
2024年 | 9篇 |
2023年 | 20篇 |
2022年 | 55篇 |
2021年 | 62篇 |
2020年 | 57篇 |
2019年 | 66篇 |
2018年 | 52篇 |
2017年 | 76篇 |
2016年 | 105篇 |
2015年 | 122篇 |
2014年 | 240篇 |
2013年 | 246篇 |
2012年 | 330篇 |
2011年 | 437篇 |
2010年 | 549篇 |
2009年 | 685篇 |
2008年 | 739篇 |
2007年 | 873篇 |
2006年 | 971篇 |
2005年 | 796篇 |
2004年 | 756篇 |
2003年 | 599篇 |
2002年 | 374篇 |
2001年 | 168篇 |
2000年 | 56篇 |
1999年 | 15篇 |
1998年 | 9篇 |
1997年 | 5篇 |
1996年 | 5篇 |
1995年 | 5篇 |
1994年 | 8篇 |
1993年 | 2篇 |
1992年 | 2篇 |
1991年 | 2篇 |
1987年 | 1篇 |
1986年 | 2篇 |
1985年 | 1篇 |
1984年 | 1篇 |
1981年 | 1篇 |
1979年 | 1篇 |
排序方式: 共有8503条查询结果,搜索用时 15 毫秒
1.
2.
3.
针对电子对抗技术的特点 ,考虑到异类仿真的广泛运用及其对电子对抗仿真的影响 ,运用XML技术对战情数据和计算机兵力生成的行为描述进行了编程实践。论述了用 XML技术实现电子对抗仿真的数据共享的内容、途径和可行性 ,对 XML在电子对抗领域可能的重大应用做了展望 相似文献
4.
GPRS全称通用分组无线业务,它在改进了现有GSM系统后能实现高速的数据传输。首先对GPRS系统做了简单介绍,然后在此基础上详细介绍了GPRS的板间切换在CPX8216硬件平台上的实现方法。 相似文献
5.
Kanda Runapongsa Jignesh M. Patel H.V. Jagadish Yun Chen Shurug Al-Khalifa 《Information Systems》2006
We propose a micro-benchmark for XML data management to aid engineers in designing improved XML processing engines. This benchmark is inherently different from application-level benchmarks, which are designed to help users choose between alternative products. We primarily attempt to capture the rich variety of data structures and distributions possible in XML, and to isolate their effects, without imitating any particular application. The benchmark specifies a single data set against which carefully specified queries can be used to evaluate system performance for XML data with various characteristics. 相似文献
6.
7.
J. Clausen L. Damkilde L. Andersen 《International journal for numerical methods in engineering》2006,66(6):1036-1059
A new return method for implicit integration of linear isotropic yield criteria is presented. The basic idea is to perform all the manipulations in the principal stress space and thereby achieve very simple formulae for calculating the plastic corrector stresses, based on the constant gradient of such criteria. The return formulae are in closed form and no iteration is required. The method accounts for three types of stress return: return to a single yield plane, to a discontinuity line at the intersection of two yield planes and to a discontinuity point at the intersection between three or more yield planes. The infinitesimal and the consistent elastoplastic constitutive matrix are calculated for each type of stress return, as are the conditions to ascertain which type of return is required. The method is exemplified with the Mohr–Coulomb yield criterion. Copyright © 2005 John Wiley & Sons, Ltd. 相似文献
8.
鉴于用户对目前数据库接入技术要求的提高,一种基于XML技术对数据库接入进行优化的技术出现了。这种技术利用了基于XML传输时的可扩展、高度结构化等特性,在JavaBean,JDBC,Apache,Tomcat等设计组件及Linux体系结构的配合使用下.为用户提供了一个安全、高效、可扩展且访问灵活的数据库接入方式。 相似文献
9.
Silvano Dal Zilio Denis Lugiez 《Applicable Algebra in Engineering, Communication and Computing》2006,17(5):337-377
XML documents may be roughly described as unranked, ordered trees and it is therefore natural to use tree automata to process or validate them. This idea has already been successfully applied in the context of Document Type Definition (DTD), the simplest standard for defining document validity, but additional work is needed to take into account XML Schema, a more advanced standard, for which regular tree automata are not satisfactory. In this paper, we introduce Sheaves Logic (SL), a new tree logic that extends the syntax of the – recursion-free fragment of – W3C XML Schema Definition Language (WXS). Then, we define a new class of automata for unranked trees that provides decision procedures for the basic questions about SL: model-checking; satisfiability; entailment. The same class of automata is also used to answer basic questions about WXS, including recursive schemas: decidability of type-checking documents; testing the emptiness of schemas; testing that a schema subsumes another one.This work was partially supported by the French government research grant ACI TRALALA and by IST Global Computing Profundis. 相似文献
10.
Mihir Bellare Adriana Palacio 《Applicable Algebra in Engineering, Communication and Computing》2006,16(6):379-396
Key-insulated encryption schemes use a combination of key splitting and key evolution to protect against key exposure. Existing
schemes, however scale poorly, having cost proportional to the number t of time periods that may be compromised by the adversary, and thus are practical only for small values of t. Yet in practice t might be large.
This paper presents a strongly key-insulated encryption scheme with optimal threshold. In our scheme, t need not be known in advance and can be as large as one less than the total number of periods, yet the cost of the scheme
is not impacted. This brings key-insulated encryption closer to practice. Our scheme is based on the Boneh-Franklin identity-based
encryption (IBE) scheme [9], and exploits algebraic properties of the latter.
Another contribution of this paper is to show that (not strongly) key-insulated encryption with optimal threshold and allowing
random-access key updates (which our scheme and all others known allow) is equivalent to a restricted form of IBE. This means
that the connection between key-insulated encryption and IBE is not accidental.
Supported in part by NSF grants CCR-0098123, ANR-0129617 and CCR-0208842, and by an IBM Faculty Partnership Development Award.
Supported in part by an NSF graduate fellowship. 相似文献