全文获取类型
收费全文 | 1544篇 |
免费 | 121篇 |
国内免费 | 4篇 |
专业分类
电工技术 | 28篇 |
化学工业 | 333篇 |
金属工艺 | 21篇 |
机械仪表 | 16篇 |
建筑科学 | 46篇 |
矿业工程 | 7篇 |
能源动力 | 32篇 |
轻工业 | 253篇 |
水利工程 | 45篇 |
石油天然气 | 2篇 |
武器工业 | 1篇 |
无线电 | 79篇 |
一般工业技术 | 155篇 |
冶金工业 | 172篇 |
原子能技术 | 5篇 |
自动化技术 | 474篇 |
出版年
2024年 | 1篇 |
2023年 | 9篇 |
2022年 | 29篇 |
2021年 | 62篇 |
2020年 | 26篇 |
2019年 | 28篇 |
2018年 | 42篇 |
2017年 | 50篇 |
2016年 | 54篇 |
2015年 | 46篇 |
2014年 | 56篇 |
2013年 | 73篇 |
2012年 | 109篇 |
2011年 | 129篇 |
2010年 | 75篇 |
2009年 | 73篇 |
2008年 | 51篇 |
2007年 | 139篇 |
2006年 | 40篇 |
2005年 | 146篇 |
2004年 | 130篇 |
2003年 | 86篇 |
2002年 | 20篇 |
2001年 | 11篇 |
2000年 | 9篇 |
1999年 | 10篇 |
1998年 | 52篇 |
1997年 | 31篇 |
1996年 | 17篇 |
1995年 | 11篇 |
1994年 | 9篇 |
1993年 | 10篇 |
1992年 | 5篇 |
1991年 | 1篇 |
1990年 | 1篇 |
1989年 | 4篇 |
1988年 | 3篇 |
1986年 | 4篇 |
1985年 | 2篇 |
1984年 | 3篇 |
1983年 | 1篇 |
1982年 | 1篇 |
1981年 | 1篇 |
1977年 | 3篇 |
1976年 | 4篇 |
1975年 | 1篇 |
1974年 | 1篇 |
排序方式: 共有1669条查询结果,搜索用时 15 毫秒
31.
Lu??s Antunes Armando Matos Alexandre Pinto Andr?? Souto Andreia Teixeira 《Theory of Computing Systems》2013,52(1):162-178
We prove several results relating injective one-way functions, time-bounded conditional Kolmogorov complexity, and time-bounded conditional entropy. First we establish a connection between injective, strong and weak one-way functions and the expected value of the polynomial time-bounded Kolmogorov complexity, denoted here by?E(K t (x|f(x))). These results are in both directions. More precisely, conditions on?E(K t (x|f(x))) that imply that?f is a weak one-way function, and properties of?E(K t (x|f(x))) that are implied by the fact that?f is a strong one-way function. In particular, we prove a separation result: based on the concept of time-bounded Kolmogorov complexity, we find an interval in which every function?f is a necessarily weak but not a strong one-way function. Then we propose an individual approach to injective one-way functions based on Kolmogorov complexity, defining Kolmogorov one-way functions and prove some relationships between the new proposal and the classical definition of one-way functions, showing that a Kolmogorov one-way function is also a deterministic one-way function. A relationship between Kolmogorov one-way functions and the conjecture of polynomial time symmetry of information is also proved. Finally, we relate?E(K t (x|f(x))) and two forms of time-bounded entropy, the unpredictable entropy?H unp, in which ??one-wayness?? of a function can be easily expressed, and the Yao+ entropy, a measure based on compression/decompression schema in which only the decompressor is restricted to be time-bounded. 相似文献
32.
Félix Gómez Mármol Christoph Sorge Ronald Petrlic Osman Ugus Dirk Westhoff Gregorio Martínez Pérez 《International Journal of Information Security》2013,12(2):67-82
The recent deployment of smart grids promises to bring numerous advantages in terms of energy consumption reduction in both homes and businesses. A more transparent and instantaneous measurement of electricity consumption through smart meters utilization leads to an enhancement in the ability of monitoring, controlling and predicting energy usage. Nevertheless, it also has associated drawbacks related to the privacy of customers, since such management might reveal their personal habits, which electrical appliances they are using at each moment, whether they are at home or not, etc. In this work, we present a privacy-enhanced architecture for smart metering aimed at tackling this threat by means of encrypting individual measurements while allowing the electricity supplier to access the aggregation of the corresponding decrypted values. 相似文献
33.
A general topology-based framework for adaptive insertion of cohesive elements in finite element meshes 总被引:1,自引:1,他引:0
Glaucio?H.?PaulinoEmail author Waldemar?Celes Rodrigo?Espinha Zhengyu??Zhang 《Engineering with Computers》2008,24(1):59-78
Large-scale simulation of separation phenomena in solids such as fracture, branching, and fragmentation requires a scalable
data structure representation of the evolving model. Modeling of such phenomena can be successfully accomplished by means
of cohesive models of fracture, which are versatile and effective tools for computational analysis. A common approach to insert
cohesive elements in finite element meshes consists of adding discrete special interfaces (cohesive elements) between bulk
elements. The insertion of cohesive elements along bulk element interfaces for fragmentation simulation imposes changes in
the topology of the mesh. This paper presents a unified topology-based framework for supporting adaptive fragmentation simulations,
being able to handle two- and three-dimensional models, with finite elements of any order. We represent the finite element
model using a compact and “complete” topological data structure, which is capable of retrieving all adjacency relationships
needed for the simulation. Moreover, we introduce a new topology-based algorithm that systematically classifies fractured
facets (i.e., facets along which fracture has occurred). The algorithm follows a set of procedures that consistently perform
all the topological changes needed to update the model. The proposed topology-based framework is general and ensures that
the model representation remains always valid during fragmentation, even when very complex crack patterns are involved. The
framework correctness and efficiency are illustrated by arbitrary insertion of cohesive elements in various finite element
meshes of self-similar geometries, including both two- and three-dimensional models. These computational tests clearly show
linear scaling in time, which is a key feature of the present data-structure representation. The effectiveness of the proposed
approach is also demonstrated by dynamic fracture analysis through finite element simulations of actual engineering problems.
相似文献
Glaucio H. PaulinoEmail: |
34.
35.
J. F. Muñoz‐Rosas E. Álvarez‐Verdejo M. N. Pérez‐Aróstegui L. Gutiérrez‐Gutiérrez 《Quality and Reliability Engineering International》2016,32(2):453-464
A control chart is a very common tool used to monitor the quality of business processes. An estimator of the process variability is generally considered to obtain the control limits of a chart when parameters of the process are unknown. Assuming Monte Carlo simulations, this paper first compares the efficiency of the various estimators of the process variability. Two empirical measures used to analyze the performance of control charts are defined. Results derived from various empirical studies reveal the existence of a linear relationship between the performance of the various estimators of the process variability and the performance of charts. The various Monte Carlo simulations are conducted under the assumption that the process is in both situations of in‐control and out‐of‐control. Copyright © 2015 John Wiley & Sons, Ltd. 相似文献
36.
Electronic transactions are becoming more important everyday. Several tasks like buying goods, booking flights or hotel rooms, or paying for streaming a movie, for instance, can be carried out through the Internet. Nevertheless, they are still some drawbacks due to security threats while performing such operations. Trust and reputation management rises as a novel way of solving some of those problems. In this paper we present our work TRIMS (a privacy-aware trust and reputation model for identity management systems), which applies a trust and reputation model to guarantee an acceptable level of security when deciding if a different domain might be considered reliable when receiving certain sensitive user’s attributes. Specifically, we will address the problems which surfaces when a domain needs to decide whether to exchange some information with another possibly unknown domain to effectively provide a service to one of its users. This decision will be determined by the trust deposited in the targeting domain. As far as we know, our proposal is one of the first approaches dealing with trust and reputation management in a multi-domain scenario. Finally, the performed experiments have demonstrated the robustness and accuracy of our model in a wide variety of scenarios. 相似文献
37.
38.
39.
Konrad?SiekEmail author Pawe??T.?Wojciechowski 《International journal of parallel programming》2016,44(3):598-619
This paper presents Atomic RMI, a distributed transactional memory framework that supports the control flow model of execution. Atomic RMI extends Java RMI with distributed transactions that can run on many Java virtual machines located on different network nodes. Our system employs SVA, a fully-pessimistic concurrency control algorithm that provides exclusive access to shared objects and supports rollback and fault tolerance. SVA is capable of achieving a relatively high level of parallelism by interweaving transactions that access the same objects and by making transactions that do not share objects independent of one another. It also allows any operations within transactions, including irrevocable ones, like system calls, and provides an unobtrusive API. Our evaluation shows that in most cases Atomic RMI performs better than fine grained mutual-exclusion and read/write locking mechanisms. Atomic RMI also performs better than an optimistic transactional memory in environments with high contention and a high ratio of write operations, while being competitive otherwise. 相似文献
40.
Anthony?Etuk Timothy?J.?Norman Murat??ensoyEmail author Mudhakar?Srivatsa 《Autonomous Agents and Multi-Agent Systems》2017,31(3):531-560
The presence of numerous and disparate information sources available to support decision-making calls for efficient methods of harnessing their potential. Information sources may be unreliable, and misleading reports can affect decisions. Existing trust and reputation mechanisms typically rely on reports from as many sources as possible to mitigate the influence of misleading reports on decisions. In the real world, however, it is often the case that querying information sources can be costly in terms of energy, bandwidth, delay overheads, and other constraints. We present a model of source selection and fusion in resource-constrained environments, where there is uncertainty regarding the trustworthiness of sources. We exploit diversity among sources to stratify them into homogeneous subgroups to both minimise redundant sampling and mitigate the effect of certain biases. Through controlled experiments, we demonstrate that a diversity-based approach is robust to biases introduced due to dependencies among source reports, performs significantly better than existing approaches when sampling budget is limited and equally as good with an unlimited budget. 相似文献