首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1913篇
  免费   129篇
  国内免费   89篇
电工技术   51篇
综合类   90篇
化学工业   114篇
金属工艺   68篇
机械仪表   88篇
建筑科学   103篇
矿业工程   72篇
能源动力   133篇
轻工业   66篇
水利工程   198篇
石油天然气   68篇
武器工业   3篇
无线电   208篇
一般工业技术   143篇
冶金工业   46篇
原子能技术   12篇
自动化技术   668篇
  2024年   2篇
  2023年   17篇
  2022年   36篇
  2021年   43篇
  2020年   33篇
  2019年   49篇
  2018年   39篇
  2017年   51篇
  2016年   60篇
  2015年   48篇
  2014年   112篇
  2013年   106篇
  2012年   126篇
  2011年   143篇
  2010年   100篇
  2009年   115篇
  2008年   134篇
  2007年   161篇
  2006年   139篇
  2005年   105篇
  2004年   73篇
  2003年   80篇
  2002年   55篇
  2001年   36篇
  2000年   43篇
  1999年   40篇
  1998年   40篇
  1997年   35篇
  1996年   12篇
  1995年   26篇
  1994年   14篇
  1993年   11篇
  1992年   9篇
  1991年   6篇
  1990年   1篇
  1989年   6篇
  1988年   5篇
  1987年   1篇
  1986年   2篇
  1985年   4篇
  1984年   2篇
  1983年   2篇
  1982年   2篇
  1981年   3篇
  1979年   1篇
  1978年   1篇
  1975年   1篇
  1973年   1篇
排序方式: 共有2131条查询结果,搜索用时 0 毫秒
1.
本文描述数据访问组件MDAC(Microsoft Data Access Components)的结构与编程接口,分析了MDAC缓冲区溢出安全漏洞的原因,最后阐述了最新MDAC2.8的安全特征.  相似文献   
2.
水电站引水发电系统无压隧洞中的水力过渡过程是近年来电站设计中出现的一个新课题,特别是流域梯级电站开发中经常遇到。结合工程实例应用扩散法,给出了无压隧洞水力过渡过程数值模拟的基本方程以及上下游及弃水堰等边界附加方程,模拟了弃水堰布置在不同位置下,无压隧洞内的水位变化过程。研究成果和讨论对实际工程应用具有参考意义。  相似文献   
3.
In this paper, we re-examine the results of prior work on methods for computing ad hoc joins. We develop a detailed cost model for predicting join algorithm performance, and we use the model to develop cost formulas for the major ad hoc join methods found in the relational database literature. We show that various pieces of “common wisdom” about join algorithm performance fail to hold up when analyzed carefully, and we use our detailed cost model to derive op timal buffer allocation schemes for each of the join methods examined here. We show that optimizing their buffer allocations can lead to large performance improvements, e.g., as much as a 400% improvement in some cases. We also validate our cost model's predictions by measuring an actual implementation of each join algorithm considered. The results of this work should be directly useful to implementors of relational query optimizers and query processing systems. Edited by M. Adiba. Received May 1993 / Accepted April 1996  相似文献   
4.
长25-29井在完井阶段通井过程中发生粘附卡钻事故,在处理卡钻过程中又发生卡套铣筒、井漏、溢流等事故及复杂情况。通过对井下情况的认真分析,采取先堵漏后循环再解卡的处理方案,顺利地解除了该次卡钻事故,大大地减少了经济损失。  相似文献   
5.
A new dynamic buffer allocation strategy based on the notion of marginal gains is presented for the buffer cache that is used by the operating system to store frequently accessed disk blocks in main memory, and the performance of the proposed strategy is compared with those of previous allocation strategies. In the proposed strategy, marginal gain values are predicted by exploiting functions that approximate the expected number of buffer hits per unit time. Experimental results from both trace-driven simulation and an actual implementation in the FreeBSD operating system show that the proposed strategy accurately predicts the marginal gain values for various workloads resulting in significantly improved buffer hit ratios.  相似文献   
6.
本文在分析局域网服务器信息缓冲区、数据包接受和发送缓冲区的相互关系基础上提出一种新的局域网服务器缓冲区设计方法─—广义随机Petri网方法,并给出了局域网服务器信息缓冲区的广义随机Petri网模型。该设计方法理论完备、严谨实用,且不再局限于追求某一边界值(上限或下限),并且避免了排队理论处理多级服务的繁琐公式。最后本文用一例题说明了这种方法的应用。  相似文献   
7.
While static open loop rate controls may be adequate for handling continuous bit rate (CBR) traffic, relatively smooth data traffic, and relatively low speed bursty data traffic over broadband integrated networks, high speed bursty data sources need more dynamic controls. Burst level resource allocation is one such dynamic control. Potential benefits and other issues for burst level resource parameter negotiations for bursty data traffic over high speed wide area packet networks have been discussed earlier.1–6 A detailed analysis of an adaptive buffer/window negotiation scheme for long file transfers using these concepts is presented in Reference 1. In this paper we discuss two burst level buffer/window negotiation schemes for short intermittent file transfers, focusing on the specific needs of such traffic streams. We develop closed network of queues models to reflect the behaviour of the proposed schemes. These models, while being simple, capture essential details of the control schemes. Under fairly general assumptions, the resulting network of queues is of product form and can be analysed using the mean value analysis. We use such an analysis to compare the proposed schemes and to determine appropriate sizes of trunk buffers to achieve the desired balance between bandwidth utilization and file transfer delay. The effects of other parameters on the performance of these schemes as well as on the buffer sizing rules are also discussed. Burst level (in-call) parameter negotiation may be carried out by the end system with the network elements or by an interface system (access controller) with the broadband network elements. We discuss implications of this location as well as the needed protocol features. Finally, the service discrimination capabilities desired at the trunk controllers in switching nodes are briefly discussed.  相似文献   
8.
A. Oku  W. Huang  Y. Ikeda 《Polymer》2002,43(26):7289-7293
The KOH-catalyzed depolymerization of vulcanized silicone rubbers to reproduce cyclosiloxane monomers was studied. First, the depolymerization was carried out in toluene with varying amounts of KOH to find that the yield of monomers first increased and then decreased with the increment of KOH, the highest yield was 65% at the molar ratio KOH/(Si–O) UNITS=0.08. At the molar ratio 0.13 in the absence of solvent, the monomers yield was 46%. However, when an acid buffer such as KH2PO4 and KCOOC6H4COOH was added after the KOH-catalyzed depolymerization was over, the product yield was increased remarkably to more than 80%.  相似文献   
9.
Buffer overflow vulnerabilities are one of the most commonly and widely exploited security vulnerabilities in programs. Most existing solutions for avoiding buffer overflows are either inadequate, inefficient or incompatible with existing code. In this paper, we present a novel approach for transparent and efficient runtime protection against buffer overflows. The approach is implemented by two tools: Type Information Extractor and Depositor (TIED) and LibsafePlus. TIED is first used on a binary executable or shared library file to extract type information from the debugging information inserted in the file by the compiler and reinsert it in the file as a data structure available at runtime. LibsafePlus is a shared library that is preloaded when the program is run. LibsafePlus intercepts unsafe C library calls such as strcpy and uses the type information made available by TIED at runtime to determine whether it would be ‘safe’ to carry out the operation. With our simple design we are able to protect most applications with a performance overhead of less than 10%. Copyright © 2006 John Wiley & Sons, Ltd.  相似文献   
10.
本文介绍一种基于VME总线的高速A/D缓冲系统的原理和结构。着重阐述了高速数据采集技术,高速FIFO缓冲技术,存储器总线切换技术,VME及PC/ISA总线接口技术在本系统中的成功应用。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号