首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1934篇
  免费   109篇
  国内免费   3篇
电工技术   21篇
化学工业   615篇
金属工艺   28篇
机械仪表   55篇
建筑科学   90篇
矿业工程   2篇
能源动力   90篇
轻工业   204篇
水利工程   10篇
石油天然气   13篇
无线电   132篇
一般工业技术   314篇
冶金工业   91篇
原子能技术   10篇
自动化技术   371篇
  2024年   3篇
  2023年   18篇
  2022年   78篇
  2021年   102篇
  2020年   52篇
  2019年   58篇
  2018年   63篇
  2017年   73篇
  2016年   79篇
  2015年   61篇
  2014年   87篇
  2013年   131篇
  2012年   97篇
  2011年   165篇
  2010年   92篇
  2009年   103篇
  2008年   109篇
  2007年   92篇
  2006年   75篇
  2005年   53篇
  2004年   65篇
  2003年   61篇
  2002年   49篇
  2001年   27篇
  2000年   30篇
  1999年   28篇
  1998年   21篇
  1997年   15篇
  1996年   22篇
  1995年   20篇
  1994年   6篇
  1993年   9篇
  1992年   10篇
  1991年   7篇
  1990年   6篇
  1989年   7篇
  1988年   3篇
  1987年   5篇
  1986年   5篇
  1985年   10篇
  1984年   8篇
  1983年   4篇
  1982年   5篇
  1981年   6篇
  1980年   3篇
  1979年   4篇
  1978年   3篇
  1975年   2篇
  1972年   2篇
  1965年   4篇
排序方式: 共有2046条查询结果,搜索用时 15 毫秒
41.
Privacy preserving technologies are likely to become an essential component of adaptive services in pervasive and mobile computing. Although privacy issues have been studied for a long time in computer science as well as in other fields, most studies are focused on the release of data from large repositories. Mobile and pervasive computing pose new challenges, requiring specific formal models for attacks and new privacy preserving techniques. This paper considers a specific pervasive computing scenario, and shows that the application of state-of-the-art techniques for the anonymization of service requests is insufficient to protect the privacy of users. A specific class of attacks, called shadow attacks, is formally defined and a defense technique is proposed. This defense is formally proved to be correct, and its effectiveness is validated by extensive experiments in a simulated environment.  相似文献   
42.
A customized atomic force microscopy (AFM) instrument optimized for imaging protein crystals in solution is described. The device was tested on crystals and Langmuir-Blodgett (LB) films of two proteins with quite different molecular weights. This approach enables the periodicity and morphology of crystals to be studied in their mother liquid, thereby preserving the native periodic protein crystal structure, which is typically destroyed by drying. Moreover, the instrument appears to distinguish protein crystals from salt crystals, which under the optical microscope are frequently quite similar, the difference between them often being revealed only during x-ray analysis. AFM estimates of the packing, order, and morphology of the given single proteins appear quite similar in the LB thin film and in the crystals, which means that routine crystal measurements can be performed at high resolution. The AFM consists of a custom-built measuring head and a homemade flexible SPM controller which can drive the head for contact, noncontact and spectroscopy modes, thus providing the user with a high degree of customization for crystal measurement.  相似文献   
43.
While there have been advances in visualization systems, particularly in multi-view visualizations and visual exploration, the process of building visualizations remains a major bottleneck in data exploration. We show that provenance metadata collected during the creation of pipelines can be reused to suggest similar content in related visualizations and guide semi-automated changes. We introduce the idea of query-by-example in the context of an ensemble of visualizations, and the use of analogies as first-class operations in a system to guide scalable interactions. We describe an implementation of these techniques in VisTrails, a publicly-available, open-source system.  相似文献   
44.
The paper presents a set of combined techniques to enhance the real-time visualization of simple or complex molecules (up to order of 106 atoms) space fill mode. The proposed approach includes an innovative technique for efficient computation and storage of ambient occlusion terms, a small set of GPU accelerated procedural impostors for space-fill and ball-and-stick rendering, and novel edge-cueing techniques. As a result, the user's understanding of the three-dimensional structure under inspection is strongly increased (even for still images), while the rendering still occurs in real time.  相似文献   
45.
In this paper, we introduce two algorithms to address the two-echelon capacitated location-routing problem (2E-CLRP). We introduce a branch-and-cut algorithm based on the solution of a new two-index vehicle-flow formulation, which is strengthened with several families of valid inequalities. We also propose an adaptive large-neighbourhood search (ALNS) meta-heuristic with the objective of finding good-quality solutions quickly. The computational results on a large set of instances from the literature show that the ALNS outperforms existing heuristics. Furthermore, the branch-and-cut method provides tight lower bounds and is able to solve small- and medium-size instances to optimality within reasonable computing times.  相似文献   
46.
47.
In order to speedup retrieval in large collections of data, index structures partition the data into subsets so that query requests can be evaluated without examining the entire collection. As the complexity of modern data types grows, metric spaces have become a popular paradigm for similarity retrieval. We propose a new index structure, called D-Index, that combines a novel clustering technique and the pivot-based distance searching strategy to speed up execution of similarity range and nearest neighbor queries for large files with objects stored in disk memories. We have qualitatively analyzed D-Index and verified its properties on actual implementation. We have also compared D-Index with other index structures and demonstrated its superiority on several real-life data sets. Contrary to tree organizations, the D-Index structure is suitable for dynamic environments with a high rate of delete/insert operations.  相似文献   
48.
49.
Cases of pipeline damage caused by landslides are common in coastal or mountainous regions, where a continuous monitoring/repair activity is planned in order to maintain their serviceability. The analysis of the soil–structure interaction phenomenon can be invoked to improve the planning and design of buried pipelines, to guide monitoring, and to reduce the risk of damage or failure. Two different approaches are considered in this paper: small scale laboratory tests and numerical simulations using the distinct element method (DEM). The experimental setup consists of a box filled with sand and water. Several experiments were performed, in which the diameter and the depth of the tube varied. The numerical simulations are divided in two separate series: in the first, the numerical model is calibrated and its reliability in reproducing the experimental tests is checked; in the second series, the direction of the relative displacement between the tube and the surrounding “numerical soil” varies over the range ±90° with respect to the horizontal. In the latter, both vertical and horizontal components of the drag force are measured and the corresponding interaction diagrams are constructed. The DEM simulations provide useful information about the shape of the failure mechanisms and the force transfer within the soil.  相似文献   
50.
The paper is about some families of rewriting P systems, where the application of evolution rules is extended from the classical sequential rewriting to the parallel one (as, for instance, in Lindenmayer systems). As a result, consistency problems for the communication of strings may arise. Three variants of parallel rewriting P systems (already present in the literature) are considered here, together with the strategies they use to face the communication problem, and some parallelism methods for string rewriting are defined. We give a survey of all known results about each variant and we state some relations among the three variants, thus establishing hierarchies of parallel rewriting P systems. Various open problems related to the subject are also presented. Danicla Besozzi: She is assistant professor at the University of Milano. She received her M.S. in Mathematics (2000) from the University of Como and Ph.D. in Computer Science (2004) from the University of Milano. Her research interests cover topics in Formal Language Theory, Molecular Computing, Systems Biology. She is member of EATCS (European Association for Theoretical Computer Science) and EMCC (European Molecular Computing Consortium). Giancarlo Mauri: He is full professor of Computer Science at the University of Milano-Bicocca. His research interests are mainly in the area of theoretical computer science, and include: formal languages and automata, computational complexity, computational learning theory, soft computing techniques, cellular automata, bioinformatics and molecular computing. On these subjects, he published more than 150 scientific papers in international journals, contributed volumes and conference proceedings. Claudio Zandron: He received Ph.D. in Computer Science at the University of Milan, Italy, in 2001. Since 2002 he is assistant professor at the University of Milano-Bicocca, Italy. He is member of the EATCS (European Association for Theoretical Computer Science) and of EMCC (European Molecular Computing Consortium). His research interests are Molecular Computing (DNA and Membrane Computing) and Formal Languages.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号