全文获取类型
收费全文 | 9583篇 |
免费 | 489篇 |
国内免费 | 20篇 |
专业分类
电工技术 | 96篇 |
综合类 | 4篇 |
化学工业 | 1928篇 |
金属工艺 | 140篇 |
机械仪表 | 188篇 |
建筑科学 | 614篇 |
矿业工程 | 21篇 |
能源动力 | 318篇 |
轻工业 | 909篇 |
水利工程 | 107篇 |
石油天然气 | 27篇 |
无线电 | 696篇 |
一般工业技术 | 1955篇 |
冶金工业 | 1271篇 |
原子能技术 | 43篇 |
自动化技术 | 1775篇 |
出版年
2023年 | 65篇 |
2022年 | 107篇 |
2021年 | 216篇 |
2020年 | 175篇 |
2019年 | 210篇 |
2018年 | 232篇 |
2017年 | 232篇 |
2016年 | 254篇 |
2015年 | 226篇 |
2014年 | 334篇 |
2013年 | 659篇 |
2012年 | 556篇 |
2011年 | 790篇 |
2010年 | 501篇 |
2009年 | 474篇 |
2008年 | 587篇 |
2007年 | 511篇 |
2006年 | 435篇 |
2005年 | 387篇 |
2004年 | 329篇 |
2003年 | 308篇 |
2002年 | 277篇 |
2001年 | 146篇 |
2000年 | 157篇 |
1999年 | 134篇 |
1998年 | 147篇 |
1997年 | 150篇 |
1996年 | 134篇 |
1995年 | 115篇 |
1994年 | 89篇 |
1993年 | 87篇 |
1992年 | 79篇 |
1991年 | 62篇 |
1990年 | 76篇 |
1989年 | 61篇 |
1988年 | 42篇 |
1987年 | 60篇 |
1986年 | 52篇 |
1985年 | 56篇 |
1984年 | 53篇 |
1983年 | 67篇 |
1982年 | 50篇 |
1981年 | 40篇 |
1980年 | 36篇 |
1979年 | 38篇 |
1978年 | 29篇 |
1977年 | 27篇 |
1976年 | 23篇 |
1975年 | 23篇 |
1912年 | 20篇 |
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
201.
Martin Kenirons Oisín Curran John Cunniffe Jenny Ryan Paul Ryan Andrew Shearer 《Computers & Geosciences》2009,35(2):205-213
The 1999–2007 Irish National Seabed Survey is one of the largest ocean floor mapping projects ever attempted. Its aim is to map the ocean floor of the Irish territorial waters (approximately ). To date, the Geological Survey of Ireland has gathered in excess of 4 TB of multibeam sonar data from the Irish National Seabed, and this data set is expected to exceed 10 TB upon completion. The main challenge that arises from having so much data is how to extract accurate information given the size of the data set. Geological interpretation is carried out by visual inspection of bathymetric patterns. The size of this, and similar, data sets renders the extraction of knowledge by human observers infeasible. Consequently, the focus has turned to using artificial intelligence and computational methods for assistance. The commercial and environmental sensitivity of the data means that secure data processing and transmission are of paramount importance. This has lead to the creation of the MarineGrid project within the Grid-Ireland organisation. New methods have been developed for statistical analysis of bathymetric information specifically for automated geological interpretation of rock types on the sea floor and feature extraction from the sea floor. We present a discussion on how to provide Marine and Geological researchers convenient yet secure access to resources that make use of grid technologies including pre-written algorithms in order to exploit the Irish National Seabed Survey data archive. 相似文献
202.
Secure authentication features of communication and electronic commerce protocols involve computationally expensive and memory intensive cryptographic operations that have the potential to be turned into denial-of-service (DoS) exploits. Recent proposals attempt to improve DoS resistance by implementing a trade-off between the resources required for the potential victim(s) with the resources used by a prospective attacker. Such improvements have been proposed for the Internet Key Exchange (IKE), the Just Fast Keying (JFK) key agreement protocol and the Secure Sockets Layer (SSL/TLS) protocol. In present article, we introduce probabilistic model checking as an efficient tool-assisted approach for systematically quantifying DoS security threats. We model a security protocol with a fixed network topology using probabilistic specifications for the protocol participants. We attach into the protocol model, a probabilistic attacker model which performs DoS related actions with assigned cost values. The costs for the protocol participants and the attacker reflect the level of some resource expenditure (memory, processing capacity or communication bandwidth) for the associated actions. From the developed model we obtain a Discrete Time Markov Chain (DTMC) via property preserving discrete-time semantics. The DTMC model is verified using the PRISM model checker that produces probabilistic estimates for the analyzed DoS threat. In this way, it is possible to evaluate the level of resource expenditure for the attacker, beyond which the likelihood of widespread attack is reduced and subsequently to compare alternative design considerations for optimal resistance to the analyzed DoS threat. Our approach is validated through the analysis of the Host Identity Protocol (HIP). The HIP base-exchange is seen as a cryptographic key-exchange protocol with special features related to DoS protection. We analyze a serious DoS threat, for which we provide probabilistic estimates, as well as results for the associated attacker and participants' costs. 相似文献
203.
We present second steps in the construction of formal models of NAND flash memory, based on a recently emerged open standard for such devices. The model is intended as a key part of a pilot project to develop a verified file store system based on flash memory. The project was proposed by Joshi and Holzmann as a contribution to the Grand Challenge in Verified Software, and involves constructing a highly assured flash file store for use in space-flight missions. The model is at a level of abstraction that captures the internal architecture of NAND flash devices. In this paper, we focus on mechanising the state model and its initialisation operation, where most of the conceptual complexity resides. 相似文献
204.
A drawback of structured prediction methods is that parameter estimation requires repeated inference, which is intractable for general structures. In this paper, we present an approximate training algorithm called piecewise training (PW) that divides the factors into tractable subgraphs, which we call pieces, that are trained independently. Piecewise training can be interpreted as approximating the exact likelihood using belief propagation, and different ways of making this interpretation yield different insights into the method. We also present an extension to piecewise training, called piecewise pseudolikelihood (PWPL), designed for when variables have large cardinality. On several real-world natural language processing tasks, piecewise training performs superior to Besag’s pseudolikelihood and sometimes comparably to exact maximum likelihood. In addition, PWPL performs similarly to PW and superior to standard pseudolikelihood, but is five to ten times more computationally efficient than batch maximum likelihood training. 相似文献
205.
Andrew L. Nelson Gregory J. Barlow Lefteris Doitsidis 《Robotics and Autonomous Systems》2009,57(4):345-370
This paper surveys fitness functions used in the field of evolutionary robotics (ER). Evolutionary robotics is a field of research that applies artificial evolution to generate control systems for autonomous robots. During evolution, robots attempt to perform a given task in a given environment. The controllers in the better performing robots are selected, altered and propagated to perform the task again in an iterative process that mimics some aspects of natural evolution. A key component of this process–one might argue, the key component–is the measurement of fitness in the evolving controllers. ER is one of a host of machine learning methods that rely on interaction with, and feedback from, a complex dynamic environment to drive synthesis of controllers for autonomous agents. These methods have the potential to lead to the development of robots that can adapt to uncharacterized environments and which may be able to perform tasks that human designers do not completely understand. In order to achieve this, issues regarding fitness evaluation must be addressed. In this paper we survey current ER research and focus on work that involved real robots. The surveyed research is organized according to the degree of a priori knowledge used to formulate the various fitness functions employed during evolution. The underlying motivation for this is to identify methods that allow the development of the greatest degree of novel control, while requiring the minimum amount of a priori task knowledge from the designer. 相似文献
206.
Enhancing a dependable multiserver operating system with temporal protection via resource reservations 总被引:1,自引:0,他引:1
Antonio Mancina Dario Faggioli Giuseppe Lipari Jorrit N. Herder Ben Gras Andrew S. Tanenbaum 《Real-Time Systems》2009,43(2):177-210
Nowadays, microkernel-based systems are getting studied and adopted with a renewed interest in a wide number of IT scenarios. Their advantages over classical monolithic solutions mainly concern the dependability domain. By being capable of dynamically detect and solve non-expected behaviours within its core components, a microkernel-based OS would eventually run forever with no need to be restarted. Dependability in this context mainly aims at isolating components from a spatial point of view: a microkernel-based system may definitely not be adopted in the context of real-time environments, simply basing on this kind of protection only. One of the most active real-time research areas concerns adding temporal protection mechanisms to general purpose operating systems. By making use of such mechanisms, these systems become suitable for being adopted in the context of time-sensitive domains. Microkernel-based systems have always been thought of as a kind of platform not suited to real-time contexts, due to the high latencies introduced by the message passing technique as the only inter-process communication (IPC) facility within the system. With computer performances growing at a fairly high rate, this overhead becomes negligible with respect to the typical real-time processing times. In the last years, many algorithms belonging to the class of the so-called Resource Reservations (RRES) have been devised in order to provide the systems with the needed temporal isolation. By introducing a RRES-aware scheduler in the context of a microkernel-based system, we may enrich it with the temporal benefits it needs in order to be deployed within domains with real-time requirements. In this paper we propose a generic way to implement these mechanisms, dependent for a very small part on the underlying OS mechanisms. In order to show the generality of our RRES framework we implemented it in the context of Minix 3, a highly dependable microkernel-based OS with an impressive users base. 相似文献
207.
Andrew Brampton Andrew MacQuire Michael Fry Idris A. Rai Nicholas J. P. Race Laurent Mathy 《Multimedia Systems》2009,15(1):3-17
This paper presents a detailed characterisation of user behaviour for a series of interactive video experiments over a 12
month period, in which we served popular sporting and musical content. In addition to generic VCR-like features, our custom-built
video-on-demand application provides advanced interactivity features such as bookmarking. The dramatic impact of such functionality
on how users consume content is studied and analysed. We discuss in detail how this user behaviour can be exploited by content
distributors to improve user experience. Specifically, we study how simple dynamic bookmark placement and interactivity-aware
content pre-fetching and replication can reduce the impact of highly interactive media on CDN performance. 相似文献
208.
Christian Collberg Andrew Huntwork Edward Carter Gregg Townsend Michael Stepp 《Information and Software Technology》2009,51(1):56-67
This paper presents an implementation of the watermarking method proposed by Venkatesan et al. in their paper [R. Venkatesan, V. Vazirani, S. Sinha, A graph theoretic approach to software watermarking, in: Fourth International Information Hiding Workshop, Pittsburgh, PA, 2001]. An executable program is marked by the addition of code for which the topology of the control-flow graph encodes a watermark. We discuss issues that were identified during construction of an actual implementation that operates on Java bytecode. We present two algorithms for splitting a watermark number into a redundant set of pieces and an algorithm for turning a watermark number into a control-flow graph. We measure the size and time overhead of watermarking, and evaluate the algorithm against a variety of attacks. 相似文献
209.
An examination into the effects of carried military equipment on the performance of two tactical combat movement simulations was conducted. Nineteen Airfield Defence Guards performed a break contact (five 30-m sprints) and a fire and movement simulation (16 6-m bounds) in five load conditions (10–30 kg). Heavier loads significantly increased movement duration on the break contact (0.8%/kg load) and fire and movement (1.1%/kg). Performance deterioration was observed from the beginning to the end of the series of movements (bounds or sprints) with deterioration becoming significantly greater in heavier load conditions. Inter-individual variation between slower and faster participants showed a range in load effects; 0.6, 0.8%/kg for fast and 1.0, 1.4%/kg for slow (break contact, fire and movement, respectively). Velocity profiles revealed that the initial acceleration and peak velocity were the primary determinants of performance. As the duration of these tactical combat movements reflects periods of heightened vulnerability, these findings highlight important implications for commanders.
Practitioner Summary: Increasing amounts of carried military equipment impairs the performance of tactical combat movements. Examination of inter-individual variation in velocity profiles identified that the initial acceleration and the peak velocity achieved during sprints and bounds are key determinants of overall performance. 相似文献
210.
Privacy‐preserving targeted mobile advertising: requirements,design and a prototype implementation
下载免费PDF全文
![点击此处可从《Software》网站下载免费的PDF全文](/ch/ext_images/free.gif)
With the continued proliferation of mobile devices, the collection of information associated with such devices and their users—such as location, installed applications and cookies associated with built‐in browsers—has become increasingly straightforward. By analysing such information, organisations are often able to deliver more relevant and better focused advertisements. Of course, such targeted mobile advertising gives rise to a number of concerns, with privacy‐related concerns being prominent. In this paper, we discuss the necessary balance that needs to be struck between privacy and utility in this emerging area and propose privacy‐preserving targeted mobile advertising as a solution that tries to achieve that balance. Our aim is to develop a solution that can be deployed by users but is also palatable to businesses that operate in this space. This paper focuses on the requirements and design of privacy‐preserving targeted mobile advertising and also describes an initial prototype. We also discuss how more detailed technical aspects and a complete evaluation will underpin our future work in this area. Copyright © 2016 John Wiley & Sons, Ltd. 相似文献