全文获取类型
收费全文 | 43111篇 |
免费 | 3466篇 |
国内免费 | 1702篇 |
专业分类
电工技术 | 2255篇 |
技术理论 | 3篇 |
综合类 | 2903篇 |
化学工业 | 7591篇 |
金属工艺 | 2450篇 |
机械仪表 | 2701篇 |
建筑科学 | 3166篇 |
矿业工程 | 1291篇 |
能源动力 | 1169篇 |
轻工业 | 3760篇 |
水利工程 | 790篇 |
石油天然气 | 2471篇 |
武器工业 | 308篇 |
无线电 | 4363篇 |
一般工业技术 | 5073篇 |
冶金工业 | 2046篇 |
原子能技术 | 461篇 |
自动化技术 | 5478篇 |
出版年
2024年 | 129篇 |
2023年 | 698篇 |
2022年 | 1348篇 |
2021年 | 1930篇 |
2020年 | 1500篇 |
2019年 | 1122篇 |
2018年 | 1379篇 |
2017年 | 1442篇 |
2016年 | 1327篇 |
2015年 | 1835篇 |
2014年 | 2335篇 |
2013年 | 2862篇 |
2012年 | 3102篇 |
2011年 | 3190篇 |
2010年 | 2832篇 |
2009年 | 2794篇 |
2008年 | 2575篇 |
2007年 | 2431篇 |
2006年 | 2370篇 |
2005年 | 1784篇 |
2004年 | 1128篇 |
2003年 | 993篇 |
2002年 | 869篇 |
2001年 | 702篇 |
2000年 | 742篇 |
1999年 | 856篇 |
1998年 | 732篇 |
1997年 | 663篇 |
1996年 | 577篇 |
1995年 | 484篇 |
1994年 | 368篇 |
1993年 | 277篇 |
1992年 | 210篇 |
1991年 | 160篇 |
1990年 | 124篇 |
1989年 | 103篇 |
1988年 | 83篇 |
1987年 | 50篇 |
1986年 | 56篇 |
1985年 | 25篇 |
1984年 | 20篇 |
1983年 | 17篇 |
1982年 | 18篇 |
1981年 | 14篇 |
1980年 | 13篇 |
1979年 | 2篇 |
1977年 | 3篇 |
1966年 | 1篇 |
1959年 | 1篇 |
1951年 | 1篇 |
排序方式: 共有10000条查询结果,搜索用时 62 毫秒
991.
The survivability of the future Internet is largely dependent on whether it will be able to successfully address both security and performance issues facing the Internet. On one hand, the Internet becomes more and more vulnerable due to fast spreading malicious attacks. On the other hand, it is under great stress to meet ever growing/changing application demands while having to sustain multi-gigabit forwarding performance. In this paper, we propose a Ternary Content Addressable Memory (TCAM) coprocessor based solution for high speed, integrated TCP flow anomaly detection and policy filtering. The attacking packets with spoofed source IP addresses are detected through two-dimensional (2D) matching. The key features of the solution are: (1) setting flag bits in TCAM action code to support various packet treatments; (2) managing TCP flow state in pair to do 2D matching. We evaluate the solution’s ability to detect TCP-based flooding attacks based on real-world-trace simulations. The results show that the proposed solution can match up OC-192 line rate. The possible modifications of the solution for the detection of low rate TCP-targeted attacks are also discussed. 相似文献
992.
The voltage–transmittance (V–T) property is important for the liquid crystal displays (LCDs). In this work, we propose a sub-pixel structure with two common electrodes of a multi-domain vertical alignment (MVA) mode. The sub-pixel is divided into two sub-areas and different common electrode voltages are applied to it. The optimal voltage difference of the common electrodes between sub-area 1 and sub-area 2 is proposed. The simulated results on the plotted displays and the voltage–transmittance property of the LCD, which has 1:1 sub-area ratio, have been carried out. The results show that the structure can form MVA liquid crystal display mode, such as 8-domain VA mode. It can improve the V–T property at large oblique viewing angle and make the transmittance difference between the normal direction and the oblique direction viewing angle less than that of conventional 4-domain MVA mode. 相似文献
993.
Michael?DeBoleEmail author Ramakrishnan?Krishnan Varsha?Balakrishnan Wenping?Wang Hong?Luo Yu?Wang Yuan?Xie Yu?Cao N.?Vijaykrishnan 《International journal of parallel programming》2009,37(4):417-431
Degradation of device parameters over the lifetime of a system is emerging as a significant threat to system reliability.
Among the aging mechanisms, wearout resulting from Negative Bias Temperature Instability (NBTI) is of particular concern in
deep submicron technology generations. While there has been significant effort at the device and circuit level to model and
characterize the impact of NBTI, the analysis of NBTI’s impact at the architectural level is still at its infancy. To facilitate
architectural level aging analysis, a tool capable of evaluating NBTI vulnerabilities early in the design cycle has been developed
that evaluates timing degradation due to NBTI. The tool includes workload-based temperature and performance degradation analysis
across a variety of technologies and operating conditions, revealing a complex interplay between factors influencing NBTI
timing degradation. 相似文献
994.
Jun Cao Ayush Goyal Krista A. Novstrup Samuel P. Midkiff James M. Caruthers 《International journal of parallel programming》2009,37(2):127-152
Well designed domain specific languages have three important benefits: (1) the easy expression of problems, (2) the application
of domain specific optimizations (including parallelization), and (3) dramatic improvements in productivity for their users.
In this paper we describe a compiler and parallel runtime system for modeling the complex kinetics of rubber vulcanization
and olefin polymerization that achieves all of these goals. The compiler allows the development of a system of ordinary differential
equations describing a complex vulcanization reaction or single-site olefin polymerization reaction—a task that used to require
months—to be done in hours. A specialized common sub-expression elimination and other algebraic optimizations sufficiently
simplify the complex machine generated code to allow it to be compiled—eliminating all but 8.0% of the operations in our largest
program and enabling over 60 times faster execution on our largest benchmark codes. The parallel runtime and dynamic load
balancing scheme enables fast simulations of the model. 相似文献
995.
Dimension reduction methods are often applied in machine learning and data mining problems. Linear subspace methods are the commonly used ones, such as principal component analysis (PCA), Fisher's linear discriminant analysis (FDA), common spatial pattern (CSP), et al. In this paper, we describe a novel feature extraction method for binary classification problems. Instead of finding linear subspaces, our method finds lower-dimensional affine subspaces satisfying a generalization of the Fukunaga–Koontz transformation (FKT). The proposed method has a closed-form solution and thus can be solved very efficiently. Under normality assumption, our method can be seen as finding an optimal truncated spectrum of the Kullback–Leibler divergence. Also we show that FDA and CSP are special cases of our proposed method under normality assumption. Experiments on simulated data show that our method performs better than PCA and FDA on data that is distributed on two cylinders, even one within the other. We also show that, on several real data sets, our method provides statistically significant improvement on test set accuracy over FDA, CSP and FKT. Therefore the proposed method can be used as another preliminary data-exploring tool to help solve machine learning and data mining problems. 相似文献
996.
This paper proposes a fuzzy modeling method via Enhanced Objective Cluster Analysis to obtain the compact and robust approximate TSK fuzzy model. In our approach, the Objective Cluster Analysis algorithm is introduced. In order to obtain more compact and more robust fuzzy rule prototypes, this algorithm is enhanced by introducing the Relative Dissimilarity Measure and the new consistency criterion to represent the similarity degree between the clusters. By these additional criteria, the redundant clusters caused by iterations are avoided; the subjective influence from human judgment for clustering is weakened. Moreover the clustering results including the number of clusters and the cluster centers are considered as the initial condition of the premise parameters identification. Thus the traditional iteration modeling procedure for determining the number of rules and identifying parameters is changed into one-off modeling, which significantly reduces the burden of computation. Furthermore the decomposition errors and the approximation errors resulted from premise parameters identification by Fuzzy c-Means clustering are decreased. For the consequence parameters identification, the Stable Kalman Filter algorithm is adopted. The performance of the proposed modeling method is evaluated by the example of Box–Jenkins gas furnace. The simulation results demonstrate the power of our model. 相似文献
997.
信任管理方法提供了一种新的思路,弥补了传统授权机制应用于分布式系统的不足.SPKI/SDSI2.0是目前较普及的信任管理系统,系统中的每个主体都可以发放证书.在一个特定的系统状态中,系统管理员需要知道关于系统的一些"特性",如某一主体是否有权访问被保护资源、一个本地名有哪些成员等.当证书数量庞大时,这些问题需要借助一定的工具才能回答.但以前的算法均集中于对授权问题的讨论,没有考虑与名字相关的系统策略分析,且分析效率偏低.提出了一种基于逻辑的SPKI/SDSI2.0策略分析算法EPAAS,从本质上拓宽了策略分析的领域,利用它不仅可以分析SPKI/SDSI2.0的授权问题及名字问题,还可以将这两类问题结合起来对系统策略进行综合查询;此外,EPAAS将策略分析的时间复杂度由原先算法的O(n<'3>/l)降至O(n),提高了分析效率.EPAAS用标准的Datalog程序表示SPKI/SDSI2.0的系统状态,以Datalog程序的最小Herbrand模型作为它的语义,证明了该语义的可靠性. 相似文献
998.
提出了一种数据块关系指导的缓存替换方法BDP(block correlations directed replacement policy).数据块关系所表示的空间局部性可以用来指导存储系统的缓存替换策略.BDP利用历史访问信息和实时访问信息,预测数据块未来的空间局部性特征,并设计数据块驻留时间的控制策略,减少现有替换算法对空间局部性预测失败带来的失效惩罚.同时给出了BDP的有效缓存模型.模拟结果显示,对大多数实际系统工作负载,BDP的失效率相对LRU算法下降11%~38%,优于现有的考虑空间局部性的替换算法. 相似文献
999.
基于OWL的软件工程数据建模 总被引:1,自引:0,他引:1
网络本体语言(Web ontology language,OWL)是语义网技术的一个重要组成部分,适合于对复杂的数据进行语义描述和建模.在软件系统的开发过程中通常会产生大量结构复杂、语义丰富的数据,而建立一个灵活的语义模型是对各类软件工程数据进行统一管理的基础.从设计和实现海量软件工程数据管理平台的需求出发,提出了一种基于OWL的软件工程数据描述模型.该模型不仅能够对源代码、需求、测试、版本和缺陷数据进行描述,同时还能对这些数据之问的语义关联进行描述.通过案例分析对模型的有效性进行了讨论. 相似文献
1000.
小数据集贝叶斯网络多父节点参数的修复 总被引:1,自引:0,他引:1
具有已知结构的小数据集贝叶斯网络多父节点参数学习是一个重要而困难的研究课题,由于信息不充分,使得无法直接对多父节点参数进行有效的估计,如何修复这些参数便是问题的核心.针对问题提出了一种有效的小数据集多父节点参数修复方法,该方法首先使用Bootstrap抽样扩展小数据集,然后分别将Gibbs抽样与最大似然树和贝叶斯网络相结合,通过依次对扩展数据按一定比例的迭代修正来实现对多父节点参数的修复.实验结果表明,这种方法能够有效地使大部分多父节点参数得到修复. 相似文献