首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1582篇
  免费   44篇
  国内免费   3篇
电工技术   18篇
综合类   9篇
化学工业   192篇
金属工艺   117篇
机械仪表   33篇
建筑科学   66篇
矿业工程   9篇
能源动力   41篇
轻工业   159篇
水利工程   4篇
石油天然气   8篇
无线电   197篇
一般工业技术   215篇
冶金工业   266篇
原子能技术   13篇
自动化技术   282篇
  2022年   10篇
  2021年   18篇
  2020年   12篇
  2019年   17篇
  2018年   23篇
  2017年   29篇
  2016年   26篇
  2015年   21篇
  2014年   36篇
  2013年   83篇
  2012年   55篇
  2011年   80篇
  2010年   69篇
  2009年   83篇
  2008年   95篇
  2007年   85篇
  2006年   83篇
  2005年   80篇
  2004年   56篇
  2003年   70篇
  2002年   61篇
  2001年   32篇
  2000年   25篇
  1999年   32篇
  1998年   52篇
  1997年   43篇
  1996年   44篇
  1995年   48篇
  1994年   25篇
  1993年   27篇
  1992年   16篇
  1991年   13篇
  1990年   15篇
  1989年   18篇
  1988年   13篇
  1987年   10篇
  1986年   14篇
  1985年   9篇
  1984年   9篇
  1983年   11篇
  1982年   11篇
  1981年   6篇
  1980年   7篇
  1979年   4篇
  1978年   7篇
  1977年   7篇
  1976年   14篇
  1975年   5篇
  1973年   4篇
  1970年   4篇
排序方式: 共有1629条查询结果,搜索用时 15 毫秒
51.
The notion of certificateless public-key encryption (CL-PKE) was introduced by Al-Riyami and Paterson in 2003 that avoids the drawbacks of both traditional PKI-based public-key encryption (i.e., establishing public-key infrastructure) and identity-based encryption (i.e., key escrow). So CL-PKE like identity-based encryption is certificate-free, and unlike identity-based encryption is key escrow-free. In this paper, we introduce simple and efficient CCA-secure CL-PKE based on (hierarchical) identity-based encryption. Our construction has both theoretical and practical interests. First, our generic transformation gives a new way of constructing CCA-secure CL-PKE. Second, instantiating our transformation using lattice-based primitives results in a more efficient CCA-secure CL-PKE than its counterpart introduced by Dent in 2008.  相似文献   
52.
We raise the question of approximating the compressibility of a string with respect to a fixed compression scheme, in sublinear time. We study this question in detail for two popular lossless compression schemes: run-length encoding (RLE) and a variant of Lempel-Ziv (LZ77), and present sublinear algorithms for approximating compressibility with respect to both schemes. We also give several lower bounds that show that our algorithms for both schemes cannot be improved significantly. Our investigation of LZ77 yields results whose interest goes beyond the initial questions we set out to study. In particular, we prove combinatorial structural lemmas that relate the compressibility of a string with respect to LZ77 to the number of distinct short substrings contained in it (its ?th subword complexity , for small ?). In addition, we show that approximating the compressibility with respect to LZ77 is related to approximating the support size of a distribution.  相似文献   
53.
54.
55.
56.
57.
Two-phase flow in a rectangular short horizontal channel 200 μm high was studied experimentally. The use of the fluorescent method made it possible to reveal flow of liquid in the channel and to determine its characteristics quantitatively. The existence of the regime of separate (stratified) flow is established. Based on analysis of previous investigations and newly obtained data, it is shown that a change in the height of the horizontal channel has a substantial effect on the boundaries between the regimes. The region of the churn regime increases with decreasing thickness of the channel.  相似文献   
58.
This paper discusses, in the context of computational modelling and simulation of cognition, the relevance of deeper structures in the control of behaviour. Such deeper structures include motivational control of behaviour, which provides underlying causes for actions, and also metacognitive control, which provides higher-order processes for monitoring and regulation. It is argued that such deeper structures are important and thus cannot be ignored in computational cognitive architectures. A general framework based on the Clarion cognitive architecture is outlined that emphasises the interaction amongst action selection, motivation, and metacognition. The upshot is that it is necessary to incorporate all essential processes; short of that, the understanding of cognition can only be incomplete.  相似文献   
59.
60.
Modern technology is affecting what is taught and how statistics is taught. Computer intensive methods like bootstrapping, generalized regression, coordinate exchange algorithms and computer experiment emulators are now part of the statistical toolkit. In parallel with these new methods and tools, a similar evolution appears in statistical education. Simulators offer opportunities for hands-on experience in the classroom, bridging the gap between theory and practice. In this article, we map a wide range of simulation based tools used in teaching statistical methods, putting them in the context of a quality ladder representing various maturity levels of organizations and course level sophistication. The mapping is designed to help educators assess and integrate options related to the incorporation of simulators as teaching aids in an educational and pedagogical roadmap. The mapping is applied to specific simulation products but provides a general framework that can be expanded and used in a generic way.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号