全文获取类型
收费全文 | 3063篇 |
免费 | 142篇 |
国内免费 | 3篇 |
专业分类
电工技术 | 15篇 |
综合类 | 4篇 |
化学工业 | 1138篇 |
金属工艺 | 326篇 |
机械仪表 | 36篇 |
建筑科学 | 47篇 |
矿业工程 | 13篇 |
能源动力 | 34篇 |
轻工业 | 467篇 |
水利工程 | 6篇 |
石油天然气 | 5篇 |
武器工业 | 1篇 |
无线电 | 55篇 |
一般工业技术 | 287篇 |
冶金工业 | 459篇 |
原子能技术 | 6篇 |
自动化技术 | 309篇 |
出版年
2023年 | 24篇 |
2022年 | 207篇 |
2021年 | 279篇 |
2020年 | 76篇 |
2019年 | 60篇 |
2018年 | 130篇 |
2017年 | 145篇 |
2016年 | 155篇 |
2015年 | 141篇 |
2014年 | 96篇 |
2013年 | 126篇 |
2012年 | 108篇 |
2011年 | 652篇 |
2010年 | 71篇 |
2009年 | 85篇 |
2008年 | 74篇 |
2007年 | 59篇 |
2006年 | 40篇 |
2005年 | 40篇 |
2004年 | 35篇 |
2003年 | 20篇 |
2002年 | 13篇 |
2001年 | 7篇 |
2000年 | 19篇 |
1999年 | 15篇 |
1998年 | 75篇 |
1997年 | 78篇 |
1996年 | 51篇 |
1995年 | 39篇 |
1994年 | 15篇 |
1993年 | 26篇 |
1992年 | 10篇 |
1991年 | 6篇 |
1990年 | 7篇 |
1989年 | 10篇 |
1988年 | 5篇 |
1987年 | 5篇 |
1986年 | 7篇 |
1985年 | 6篇 |
1984年 | 7篇 |
1983年 | 6篇 |
1982年 | 8篇 |
1981年 | 16篇 |
1980年 | 18篇 |
1979年 | 8篇 |
1978年 | 4篇 |
1977年 | 32篇 |
1976年 | 78篇 |
1973年 | 3篇 |
1972年 | 4篇 |
排序方式: 共有3208条查询结果,搜索用时 15 毫秒
31.
Marc Karle Johannes W?hrle Junichi Miwa Nils Paust G��nter Roth Roland Zengerle Felix von Stetten 《Microfluidics and nanofluidics》2011,10(4):935-939
We demonstrate controlled transport of superparamagnetic beads in the opposite direction of a laminar flow. A permanent magnet
assembles 200 nm magnetic particles into about 200 μm long bead chains that are aligned in parallel to the magnetic field
lines. Due to a magnetic field gradient, the bead chains are attracted towards the wall of a microfluidic channel. A rotation
of the permanent magnet results in a rotation of the bead chains in the opposite direction to the magnet. Due to friction
on the surface, the bead chains roll along the channel wall, even in counter-flow direction, up to at a maximum counter-flow
velocity of 8 mm s−1. Based on this approach, magnetic beads can be accurately manoeuvred within microfluidic channels. This counter-flow motion
can be efficiently be used in Lab-on-a-Chip systems, e.g. for implementing washing steps in DNA purification. 相似文献
32.
Georg Birkenheuer Andr�� Brinkmann Mikael H?gqvist Alexander Papaspyrou Bernhard Schott Dietmar Sommerfeld Wolfgang Ziegler 《Journal of Grid Computing》2011,9(3):355-377
Infrastructure federation is becoming an increasingly important issue for modern Distributed Computing Infrastructures (DCIs):
Dynamic elasticity of quasi-static Grid environments, incorporation of special-purpose resources into commoditized Cloud infrastructures,
cross-community collaboration for increasingly diverging areas of modern e-Science, and Cloud Bursting pose major challenges
on the technical level for many resource and middleware providers. Especially with respect to increasing costs of operating
data centers, the intelligent yet automated and secure sharing of resources is a key factor for success. With the D-Grid Scheduler
Interoperability (DGSI) project within the German D-Grid Initiative, we provide a strategic technology for the automatically
negotiated, SLA-secured, dynamically provisioned federation of resources and services for Grid-and Cloud-type infrastructures.
This goal is achieved by complementing current DCI schedulers with the ability to federate infrastructure for the temporary
leasing of resources and rechanneling of workloads. In this work, we describe the overall architecture and SLA-secured negotiation
protocols within DGSI and depict an advanced mechanism for resource delegation through means of dynamically provisioned, virtualized
middleware. Through this methodology, we provide the technological foundation for intelligent capacity planning and workload
management in a cross-infrastructure fashion. 相似文献
33.
Sergio S��nchez Garc��a Ana G��mez Oliva Emilia P��rez Belleboni Iv��n Pau de la Cruz 《International Journal of Information Security》2011,10(6):351-372
At present, many countries allow citizens or entities to interact with the government outside the telematic environment through
a legal representative who is granted powers of representation. However, if the interaction takes place through the Internet,
only primitive mechanisms of representation are available, and these are mainly based on non-dynamic offline processes that
do not enable quick and easy identity delegation. This paper proposes a system of dynamic delegation of identity between two
generic entities that can solve the problem of delegated access to the telematic services provided by public authorities.
The solution herein is based on the generation of a delegation token created from a proxy certificate that allows the delegating
entity to delegate identity to another on the basis of a subset of its attributes as delegator, while also establishing in
the delegation token itself restrictions on the services accessible to the delegated entity and the validity period of delegation.
Further, the paper presents the mechanisms needed to either revoke a delegation token or to check whether a delegation token
has been revoked. Implications for theory and practice and suggestions for future research are discussed. 相似文献
34.
Stephen Gilmore L��szl�� G?nczy Nora Koch Philip Mayer Mirco Tribastone D��niel Varr�� 《Software and Systems Modeling》2011,10(3):287-311
Systems based on the service-oriented architecture (SOA) principles have become an important cornerstone of the development
of enterprise-scale software applications. They are characterized by separating functions into distinct software units, called
services, which can be published, requested and dynamically combined in the production of business applications. Service-oriented
systems (SOSs) promise high flexibility, improved maintainability, and simple re-use of functionality. Achieving these properties
requires an understanding not only of the individual artifacts of the system but also their integration. In this context,
non-functional aspects play an important role and should be analyzed and modeled as early as possible in the development cycle.
In this paper, we discuss modeling of non-functional aspects of service-oriented systems, and the use of these models for
analysis and deployment. Our contribution in this paper is threefold. First, we show how services and service compositions
may be modeled in UML by using a profile for SOA (UML4SOA) and how non-functional properties of service-oriented systems can
be represented using the non-functional extension of UML4SOA (UML4SOA-NFP) and the MARTE profile. This enables modeling of
performance, security and reliable messaging. Second, we discuss formal analysis of models which respect this design, in particular
we consider performance estimates and reliability analysis using the stochastically timed process algebra PEPA as the underlying
analytical engine. Last but not least, our models are the source for the application of deployment mechanisms which comprise
model-to-model and model-to-text transformations implemented in the framework VIATRA. All techniques presented in this work
are illustrated by a running example from an eUniversity case study. 相似文献
35.
36.
A spatial orthogonal allocation method is devised for multirobot tasks allocation.A 3D space model is adopted to describe exploration mission;meanwhile spatial orthogonal tentative technology is utilized to update the attractor position for load balance.Heterogeneous interactive cultural hybrid architecture is proposed to solve a robot route planning problem;it utilizes good-point-set to initialize population spaces,redefine novel evolution model and particle evolution ability,and introduce near-neighbor lo... 相似文献
37.
Michele Barletta Silvio Ranise Luca Vigan�� 《Service Oriented Computing and Applications》2011,5(2):105-137
The specification of distributed service-oriented applications spans several levels of abstraction, e.g., the protocol for
exchanging messages, the set of interface functionalities, the types of the manipulated data, the workflow, the access policy,
etc. Many (even executable) specification languages are available to describe each level in separation. However, these levels
may interact in subtle ways (for example, the control flow may depend on the values of some data variables) so that a precise
abstraction of the application amounts to more than the sum of its per level components. This problem is even more acute in
the design phase when automated analysis techniques may greatly help the difficult task of building “correct” applications
faced by designers. To alleviate this kind of problems, this paper introduces a framework for the formal specification and
automated analysis of distributed service-oriented applications in two levels: one for the workflow and one for the authorization
policies. The former allows one to precisely describe the control and data parts of an application with their mutual dependencies.
The latter focuses on the specification of the criteria for granting or denying third-party applications the possibility to
access shared resources or to execute certain interface functionalities. These levels can be seen as abstractions of one or
of several levels of specification mentioned above. The novelty of our proposal is the possibility to unambiguously specify
the—often subtle—interplay between the workflow and policy levels uniformly in the same framework. Additionally, our framework
allows us to define and investigate verification problems for service-oriented applications (such as executability and invariant
checking) and give sufficient conditions for their decidability. These results are non-trivial because their scope of applicability
goes well beyond the case of finite state spaces allowing for applications manipulating variables ranging over infinite domains.
As proof of concept, we show the suitability and flexibility of our approach on two quite different examples inspired by industrial
case studies. 相似文献
38.
39.
Maher El��Arbi Mohamed Koubaa Maha Charfeddine Chokri Ben Amar 《Multimedia Tools and Applications》2011,55(3):579-600
In this paper, we propose a video watermarking algorithm which embeds different parts of a single watermark into different shots of a video under the wavelet domain. Based on a Motion Activity Analysis, different regions of the original video are separated into perceptually distinct categories according to motion information and region complexity. Thus, the localizations of the watermark are adjusted adaptively in accordance with the human visual system and signal characteristics, which makes them perceptually invisible and less vulnerable to automated removal. In addition, contrary to traditional methods where the watermark remains at a fixed position on the screen, the watermark moves along with moving objects and thus motion artefacts can be avoid. The multi-frame based extraction strategy ensures that the watermark can be correctly recovered from a very short segment of video. Individual frames extracted from the video also contain watermark information. Experimental results show that the inserted watermark is not only less perceptible but also robust against common video processing attacks. 相似文献
40.
Emmanuel Bruno Nicolas Faessel Herv�� Glotin Jacques Le Maitre Michel Scholl 《World Wide Web》2011,14(5-6):623-649
We present in this paper a model for indexing and querying web pages, based on the hierarchical decomposition of pages into blocks. Splitting up a page into blocks has several advantages in terms of page design, indexing and querying such as (i) blocks of a page most similar to a query may be returned instead of the page as a whole (ii) the importance of a block can be taken into account, as well as (iii) the permeability of the blocks to neighbor blocks: a block b is said to be permeable to a block b?? in the same page if b?? content (text, image, etc.) can be (partially) inherited by b upon indexing. An engine implementing this model is described including: the transformation of web pages into blocks hierarchies, the definition of a dedicated language to express indexing rules and the storage of indexed blocks into an XML repository. The model is assessed on a dataset of electronic news, and a dataset drawn from web pages of the ImagEval campaign where it improves by 16% the mean average precision of the baseline. 相似文献