全文获取类型
收费全文 | 6003篇 |
免费 | 293篇 |
国内免费 | 10篇 |
专业分类
电工技术 | 83篇 |
综合类 | 7篇 |
化学工业 | 1608篇 |
金属工艺 | 132篇 |
机械仪表 | 102篇 |
建筑科学 | 244篇 |
矿业工程 | 7篇 |
能源动力 | 190篇 |
轻工业 | 481篇 |
水利工程 | 27篇 |
石油天然气 | 22篇 |
武器工业 | 1篇 |
无线电 | 680篇 |
一般工业技术 | 1011篇 |
冶金工业 | 557篇 |
原子能技术 | 54篇 |
自动化技术 | 1100篇 |
出版年
2023年 | 31篇 |
2022年 | 93篇 |
2021年 | 139篇 |
2020年 | 116篇 |
2019年 | 123篇 |
2018年 | 144篇 |
2017年 | 147篇 |
2016年 | 188篇 |
2015年 | 146篇 |
2014年 | 216篇 |
2013年 | 373篇 |
2012年 | 319篇 |
2011年 | 411篇 |
2010年 | 296篇 |
2009年 | 263篇 |
2008年 | 304篇 |
2007年 | 253篇 |
2006年 | 247篇 |
2005年 | 189篇 |
2004年 | 173篇 |
2003年 | 150篇 |
2002年 | 169篇 |
2001年 | 90篇 |
2000年 | 90篇 |
1999年 | 92篇 |
1998年 | 136篇 |
1997年 | 134篇 |
1996年 | 96篇 |
1995年 | 87篇 |
1994年 | 87篇 |
1993年 | 72篇 |
1992年 | 54篇 |
1991年 | 47篇 |
1990年 | 55篇 |
1989年 | 51篇 |
1988年 | 42篇 |
1987年 | 42篇 |
1986年 | 32篇 |
1985年 | 58篇 |
1984年 | 47篇 |
1983年 | 43篇 |
1982年 | 55篇 |
1981年 | 46篇 |
1980年 | 20篇 |
1979年 | 35篇 |
1978年 | 23篇 |
1977年 | 30篇 |
1976年 | 31篇 |
1974年 | 18篇 |
1973年 | 21篇 |
排序方式: 共有6306条查询结果,搜索用时 15 毫秒
81.
Bertrand Nathalie Konnov Igor Lazić Marijana Widder Josef 《International Journal on Software Tools for Technology Transfer (STTT)》2021,23(5):797-821
International Journal on Software Tools for Technology Transfer - Randomized fault-tolerant distributed algorithms pose a number of challenges for automated verification: (i) parameterization in... 相似文献
82.
Elevated temperature Mg-Al-Sr: Creep resistance,mechanical properties,and microstructure 总被引:13,自引:0,他引:13
Eric Baril Pierre Labelle Mihriban Pekguleryuz 《JOM Journal of the Minerals, Metals and Materials Society》2003,55(11):34-39
Mg-Al-Sr-based alloys (AJ alloys) have shown superior creep performance and tensile strength at temperatures as high as 175°
with stresses up to 70 MPa. Mg-6Al-2.4Sr (AJ62x) exhibits an optimum combination of creep resistance and excellent castability,
while AJ62Lx (strontium <2.1) has better ductility than other AJ formulations. The AJ alloy microstructure is characterized
by the Al4Sr-α(Mg) lamellar phase that forms at the interdendritic/grain boundary region of the primary magne sium matrix. Mg-5Al-2Sr
(AJ52x) contains a ternary phase that was tentatively named Al3Mg13Sr. When the strontium level is low in AJ62x, the volume fraction of Al4Sr is reduced, the aluminum supersaturation of the magnesium primary phase increases, and Mg17Al12 forms. In this article, a mechanism is proposed whereby the creep resistance decreases with the strontium level but the tensile
strength and ductility increase.
For more information, contact Eric Baril, Noranda, Noranda Technologies Centre, 240 Hymus Pointe-Claire (Montréal), Québec,
H9R 1G5 Canada; (514) 630-9347; fax (514) 630-9379; e-mail eric.baril@ntc.noranda.com. 相似文献
83.
84.
The problem of determining whether several finite automata accept a word in common is closely related to the well-studied membership problem in transformation monoids. We raise the issue of limiting the number of final states in the automata intersection problem. For automata with two final states, we show the problem to be \({\oplus}\)L-complete or NP-complete according to whether a nontrivial monoid other than a direct product of cyclic groups of order 2 is allowed in the automata. We further consider idempotent commutative automata and (Abelian, mainly) group automata with one, two, or three final states over a singleton or larger alphabet, elucidating (under the usual hypotheses on complexity classes) the complexity of the intersection nonemptiness and related problems in each case. 相似文献
85.
86.
Andre Suslik Spritzer Jeremy Boy Pierre Dragicevic Jean‐Daniel Fekete Carla Maria Dal Sasso Freitas 《Computer Graphics Forum》2015,34(3):461-470
Node‐link infographics are visually very rich and can communicate messages effectively, but can be very difficult to create, often involving a painstaking and artisanal process. In this paper we present an investigation of node‐link visualizations for communication and how to better support their creation. We begin by breaking down these images into their basic elements and analyzing how they are created. We then present a set of techniques aimed at improving the creation workflow by bringing more flexibility and power to users, letting them manipulate all aspects of a node‐link diagram (layout, visual attributes, etc.) while taking into account the context in which it will appear. These techniques were implemented in a proof‐of‐concept prototype called GraphCoiffure, which was designed as an intermediary step between graph drawing/editing software and image authoring applications. We describe how GraphCoiffure improves the workflow and illustrate its benefits through practical examples. 相似文献
87.
Matrix models are ubiquitous for constraint problems. Many such problems have a matrix of variables $\mathcal{M}$ , with the same constraint C defined by a finite-state automaton $\mathcal{A}$ on each row of $\mathcal{M}$ and a global cardinality constraint $\mathit{gcc}$ on each column of $\mathcal{M}$ . We give two methods for deriving, by double counting, necessary conditions on the cardinality variables of the $\mathit{gcc}$ constraints from the automaton $\mathcal{A}$ . The first method yields linear necessary conditions and simple arithmetic constraints. The second method introduces the cardinality automaton, which abstracts the overall behaviour of all the row automata and can be encoded by a set of linear constraints. We also provide a domain consistency filtering algorithm for the conjunction of lexicographic ordering constraints between adjacent rows of $\mathcal{M}$ and (possibly different) automaton constraints on the rows. We evaluate the impact of our methods in terms of runtime and search effort on a large set of nurse rostering problem instances. 相似文献
88.
Password-authenticated key exchange (PAKE) protocols allow parties to share secret keys in an authentic manner based on an easily memorizable password. Recently, Lu and Cao proposed a three-party password-authenticated key exchange protocol, so called S-3PAKE, based on ideas of the Abdalla and Pointcheval two-party SPAKE extended to three parties. S-3PAKE can be seen to have a structure alternative to that of another three-party PAKE protocol (3PAKE) by Abdalla and Pointcheval. Furthermore, a simple improvement to S-3PAKE was proposed very recently by Chung and Ku to resist the kind of attacks that applied to earlier versions of 3PAKE. In this paper, we show that S-3PAKE falls to unknown key-share attacks by any other client, and undetectable online dictionary attacks by any adversary. The latter attack equally applies to the recently improved S-3PAKE. Indeed, the provable security approach should be taken when designing PAKEs; and furthermore our results highlight that extra cautions still be exercised when defining models and constructing proofs in this direction. 相似文献
89.
Fabrice Rousselle Petrik Clarberg Luc Leblanc Victor Ostromoukhov Pierre Poulin 《The Visual computer》2008,24(7-9):465-474
We present an efficient method for importance sampling the product of multiple functions. Our algorithm computes a quick approximation of the product on the fly, based on hierarchical representations of the local maxima and averages of the individual terms. Samples are generated by exploiting the hierarchical properties of many low-discrepancy sequences, and thresholded against the estimated product. We evaluate direct illumination by sampling the triple product of environment map lighting, surface reflectance, and a visibility function estimated per pixel. Our results show considerable noise reduction compared to existing state-of-the-art methods using only the product of lighting and BRDF. 相似文献
90.
Search games are attractive for their correspondence with classical width parameters. For instance, the invisible search number (a.k.a. node search number) of a graph is equal to its pathwidth plus 1, and the visible search number of a graph is equal to its treewidth plus 1. The connected variants of these games ask for search strategies that are connected, i.e., at every step of the strategy, the searched part of the graph induces a connected subgraph. We focus on monotone search strategies, i.e., strategies for which every node is searched exactly once. The monotone connected visible search number of an n-node graph is at most O(logn) times its visible search number. First, we prove that this logarithmic bound is tight. Precisely, we prove that there is an infinite family of graphs for which the ratio monotone connected visible search number over visible search number is Ω(logn). Second, we prove that, as opposed to the non-connected variant of visible graph searching, “recontamination helps” for connected visible search. Precisely, we prove that, for any k4, there exists a graph with connected visible search number at most k, and monotone connected visible search number >k 相似文献