全文获取类型
收费全文 | 1263篇 |
免费 | 73篇 |
国内免费 | 5篇 |
专业分类
电工技术 | 10篇 |
化学工业 | 443篇 |
金属工艺 | 52篇 |
机械仪表 | 56篇 |
建筑科学 | 45篇 |
矿业工程 | 13篇 |
能源动力 | 44篇 |
轻工业 | 96篇 |
水利工程 | 2篇 |
石油天然气 | 9篇 |
无线电 | 83篇 |
一般工业技术 | 227篇 |
冶金工业 | 58篇 |
原子能技术 | 2篇 |
自动化技术 | 201篇 |
出版年
2024年 | 1篇 |
2023年 | 17篇 |
2022年 | 108篇 |
2021年 | 133篇 |
2020年 | 39篇 |
2019年 | 45篇 |
2018年 | 65篇 |
2017年 | 46篇 |
2016年 | 77篇 |
2015年 | 62篇 |
2014年 | 67篇 |
2013年 | 101篇 |
2012年 | 70篇 |
2011年 | 86篇 |
2010年 | 50篇 |
2009年 | 48篇 |
2008年 | 55篇 |
2007年 | 36篇 |
2006年 | 27篇 |
2005年 | 31篇 |
2004年 | 27篇 |
2003年 | 20篇 |
2002年 | 10篇 |
2001年 | 9篇 |
2000年 | 7篇 |
1999年 | 9篇 |
1998年 | 11篇 |
1997年 | 12篇 |
1996年 | 10篇 |
1995年 | 9篇 |
1994年 | 3篇 |
1993年 | 4篇 |
1991年 | 3篇 |
1990年 | 6篇 |
1989年 | 7篇 |
1988年 | 3篇 |
1987年 | 2篇 |
1986年 | 3篇 |
1985年 | 4篇 |
1984年 | 5篇 |
1983年 | 2篇 |
1981年 | 1篇 |
1980年 | 4篇 |
1978年 | 2篇 |
1977年 | 2篇 |
1976年 | 1篇 |
1975年 | 1篇 |
排序方式: 共有1341条查询结果,搜索用时 15 毫秒
11.
Ciesielczyk Tomasz Cabrera Alberto Oleksiak Ariel Piątek Wojciech Waligóra Grzegorz Almeida Francisco Blanco Vicente 《Journal of Scheduling》2021,24(5):489-505
Journal of Scheduling - Rapid growth of demand for remote computational power, along with high energy costs and infrastructure limits, has led to treating power usage as a primary constraint in... 相似文献
12.
Tomasz Idziaszek Michał Skrzypczak Mikołaj Bojańczyk 《Theory of Computing Systems》2016,58(4):614-663
An infinite tree is called thin if it contains only countably many infinite branches. Thin trees can be seen as intermediate structures between infinite words and infinite trees. In this work we investigate properties of regular languages of thin trees. Our main tool is an algebra suitable for thin trees. Using this framework we characterize various classes of regular languages: commutative, open in the standard topology, and definable in weak MSO logic among all trees. We also show that in various meanings thin trees are not as rich as all infinite trees. In particular we observe a collapse of the parity index to the level (1, 3) and a collapse of the topological complexity to co-analytic sets. Moreover, a gap property is shown: a regular language of thin trees is either weak MSO-definable among all trees or co-analytic-complete. 相似文献
13.
Zeyad A. Almutairi Tomasz Glawdel Carolyn L. Ren David A. Johnson 《Microfluidics and nanofluidics》2009,6(2):241-251
This study presents a new Y-channel design for measuring the zeta potential and surface conductance of a solid-liquid pairing
using the current monitoring technique. The new design improves the throughput and reliability of the testing apparatus since
the displacement between two solutions can be repeated many times without interfering with the experiments. It also increases
the accuracy of the measurement by producing sharper start and end transitions for the current–time plot of the solution displacement
process. In this design, efforts have been made to minimize the effects of electrolysis, Joule heating and undesired pressure
driven flow on the measurements. An improvement on the current–time slope analysis is also presented. The Y-channel design
was validated by comparing zeta potential measurements to published results. The zeta potential of several biological buffers
relevant to the microfluidic community in plasma treated PDMS/PDMS and PDMS/Glass microchannels are presented. Preliminary
studies of surface conductivity measurements using the Y-channel design were also conducted and are briefly discussed. 相似文献
14.
Transistors: Impact of Interfacial Microstructure on Charge Carrier Transport in Solution‐Processed Conjugated Polymer Field‐Effect Transistors (Adv. Mater. 11/2016) 下载免费PDF全文
15.
Modeling spatially distributed phenomena in terms of its controlling factors is a recurring problem in geoscience. Most efforts
concentrate on predicting the value of response variable in terms of controlling variables either through a physical model
or a regression model. However, many geospatial systems comprises complex, nonlinear, and spatially non-uniform relationships,
making it difficult to even formulate a viable model. This paper focuses on spatial partitioning of controlling variables
that are attributed to a particular range of a response variable. Thus, the presented method surveys spatially distributed
relationships between predictors and response. The method is based on association analysis technique of identifying emerging
patterns, which are extended in order to be applied more effectively to geospatial data sets. The outcome of the method is
a list of spatial footprints, each characterized by a unique “controlling pattern”—a list of specific values of predictors
that locally correlate with a specified value of response variable. Mapping the controlling footprints reveals geographic
regionalization of relationship between predictors and response. The data mining underpinnings of the method are given and
its application to a real world problem is demonstrated using an expository example focusing on determining variety of environmental
associations of high vegetation density across the continental United States. 相似文献
16.
Cezary Graczykowski Tomasz Lewiński 《Structural and Multidisciplinary Optimization》2010,42(6):869-877
The paper delivers the benchmark results for the Michell cantilevers constructed within a half strip, for selected values
of the σ
T
/σ
C
ratio, σ
T
, σ
C
being the admissible stresses in tension and compression, respectively. 相似文献
17.
Tomasz Fałat Kazimierz Friedel Norman Marenco Stephan Warnat 《Microsystem Technologies》2009,15(1):181-190
The current paper focuses on several mechanical aspects of a waferlevel packaging approach using a direct face-to-face Chip-to-Wafer
(C2W) bonding of a MEMS device on an ASIC substrate wafer. Requirements of minimized inherent stress from packaging and good
decoupling from forces applied in manufacturing and application are discussed with particular attention to the presence of
through-silicon vias (TSV) in the substrate wafer. The paper deals with FEM analysis of temperature excursion, pressure during
molding, materials used and handling load influence on mechanical stress within the TSV system and on wafer level, which can
be large enough to disintegrate the system. 相似文献
18.
19.
In the Horn theory based approach for cryptographic protocol analysis, cryptographic protocols and (Dolev?CYao) intruders are modeled by Horn theories and security analysis boils down to solving the derivation problem for Horn theories. This approach and the tools based on this approach, including ProVerif, have been very successful in the automatic analysis of cryptographic protocols. However, dealing with the algebraic properties of operators, such as the exclusive OR (XOR), which are frequently used in cryptographic protocols has been problematic. In particular, ProVerif cannot deal with XOR. In this paper, we show how to reduce the derivation problem for Horn theories with XOR to the XOR-free case. Our reduction works for an expressive class of Horn theories. A large class of intruder capabilities and protocols that employ the XOR operator can be modeled by these theories. Our reduction allows us to carry out protocol analysis using tools, such as ProVerif, that cannot deal with XOR, but are very efficient in the XOR-free case. We implemented our reduction and, in combination with ProVerif, used it for the fully automatic analysis of several protocols that employ the XOR operator. Among others, our analysis revealed a new attack on an IBM security module. 相似文献
20.
Leftist grammars are characterized in terms of rules of the form a → ba and cd → d, without distinction between terminals and nonterminals. They were introduced by Motwani et al. [13], where the accessibility problem for some general protection system was related to these grammars. This protection system was originally proposed in [4] and [15] in the context of Java virtual worlds. The accessibility problem is formulated in the form "Can object p gain (illegal) access to object q by a series of legal moves (as prescribed by the policy)?" The membership problem for leftist grammar is decidable [13], which implies decidability of the accessibility problem for the appropriate protection system. We study relationships between language classes defined by various types of leftist grammars and classes of the Chomsky hierarchy. We show that general leftist grammars can define languages which arenot context free, answering in the negative a question from [13]. Moreover, we study some restricted variants of leftist grammars and relate them to regular, deterministic context-free, and context-free languages. 相似文献