全文获取类型
收费全文 | 199282篇 |
免费 | 10662篇 |
国内免费 | 5335篇 |
专业分类
电工技术 | 7834篇 |
技术理论 | 7篇 |
综合类 | 9674篇 |
化学工业 | 31369篇 |
金属工艺 | 11123篇 |
机械仪表 | 10229篇 |
建筑科学 | 11738篇 |
矿业工程 | 3982篇 |
能源动力 | 4567篇 |
轻工业 | 11133篇 |
水利工程 | 3338篇 |
石油天然气 | 7606篇 |
武器工业 | 876篇 |
无线电 | 22288篇 |
一般工业技术 | 30062篇 |
冶金工业 | 8066篇 |
原子能技术 | 1539篇 |
自动化技术 | 39848篇 |
出版年
2024年 | 552篇 |
2023年 | 2028篇 |
2022年 | 3518篇 |
2021年 | 4868篇 |
2020年 | 3733篇 |
2019年 | 3145篇 |
2018年 | 17314篇 |
2017年 | 16845篇 |
2016年 | 12908篇 |
2015年 | 5261篇 |
2014年 | 5914篇 |
2013年 | 6948篇 |
2012年 | 10450篇 |
2011年 | 17108篇 |
2010年 | 14995篇 |
2009年 | 11976篇 |
2008年 | 13004篇 |
2007年 | 13680篇 |
2006年 | 6446篇 |
2005年 | 6689篇 |
2004年 | 4858篇 |
2003年 | 4428篇 |
2002年 | 3597篇 |
2001年 | 2895篇 |
2000年 | 3118篇 |
1999年 | 3218篇 |
1998年 | 2720篇 |
1997年 | 2301篇 |
1996年 | 2142篇 |
1995年 | 1835篇 |
1994年 | 1485篇 |
1993年 | 1065篇 |
1992年 | 871篇 |
1991年 | 699篇 |
1990年 | 491篇 |
1989年 | 436篇 |
1988年 | 362篇 |
1987年 | 245篇 |
1986年 | 167篇 |
1985年 | 97篇 |
1984年 | 65篇 |
1983年 | 49篇 |
1982年 | 63篇 |
1981年 | 39篇 |
1968年 | 43篇 |
1966年 | 42篇 |
1965年 | 47篇 |
1959年 | 39篇 |
1955年 | 63篇 |
1954年 | 68篇 |
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
31.
32.
33.
34.
Novel algorithms for shared segment protection 总被引:8,自引:0,他引:8
Dahai Xu Yizhi Xiong Chunming Qiao 《Selected Areas in Communications, IEEE Journal on》2003,21(8):1320-1331
The major challenges in designing survivable schemes are how to allocate a minimal amount of spare resources (e.g., bandwidth) using fast (e.g., polynomial-time) algorithms, and, in case a failure occurs, to be able to recover quickly from it. All existing approaches invariably make tradeoffs. We propose novel shared segment protection algorithms which make little or no compromise . We develop an elegant integer linear programming (ILP) model to determine an optimal set of segments to protect a given active path. Although the ILP approach is useful for a medium-size network, it is too time consuming for large networks. Accordingly, we also design a fast heuristic algorithm based on dynamic programming to obtain a near-optimal set of segments. Although the heuristic algorithm has a polynomial time complexity, it can achieve a bandwidth efficiency as high as some best-performing shared path protection schemes and, at the same time, much faster recovery than these shared path protection schemes. The proposed scheme is also applicable to a wide range of networking technologies, including Internet Protocol and wavelength-division multiplexing networks under the generalized multiprotocol label switched framework. 相似文献
35.
36.
This paper reports the findings of a detailed study of Web-based systems design (WBSD) practices in Ireland based on data
collected over a 3-year period (2002–2005), the objectives of which were to (1) contribute towards a richer understanding
of the current “real-world” context of WBSD by characterising the profile of a typical project (team size, timeframe, nature
of requirements, etc.) and identifying the key challenges, constraints, and imperatives (i.e. “mediating factors”) faced by
Web-based system designers, and (2) understand how those contextual parameters and mediating factors influence the activity
of WBSD as regards the selection and enactment of whatever design practices are therefore engaged (i.e. the use of methods,
procedures, etc.). Data was gathered through a survey which yielded 165 usable responses, and later through a series of semi-structured
qualitative interviews. Using grounded theory, an explanatory conceptual framework is derived, based on an extension of the
“method-in-action” model, the application of which to WBSD has not been previously investigated in depth. It is proposed that
this framework of WBSD issues is valuable in a number of ways to educators, researchers, practitioners, and method engineers. 相似文献
37.
In this article, we present a detailed theoretical analysis and a prototype implementation of a family of cameras designed with the explicit goal of detecting and removing interfering dynamic occluders in real time, during live capture, as opposed to fixing the resulting artifacts a posteriori. Such an early-acquisition approach improves efficiency: more valid samples are acquired faster without worrying about moving occluders. One option for designing a camera to be unaffected by moving occluders is to sample through the occluder, but true x-ray-like vision is technically impractical. Another option is to sample around the occluder using a camera with a large effective aperture, but such an approach requires a bulky acquisition device. Yet another possibility of sampling around an occluder is to rely on second and higher order reflected rays that indirectly sample surfaces not directly visible. However, devising an acquisition device sufficiently sensitive and efficient to capture large environments using reflected rays will remain challenging for the foreseeable future. 相似文献
38.
39.
40.