全文获取类型
收费全文 | 9526篇 |
免费 | 451篇 |
国内免费 | 20篇 |
专业分类
电工技术 | 97篇 |
综合类 | 4篇 |
化学工业 | 1956篇 |
金属工艺 | 142篇 |
机械仪表 | 188篇 |
建筑科学 | 613篇 |
矿业工程 | 21篇 |
能源动力 | 317篇 |
轻工业 | 839篇 |
水利工程 | 108篇 |
石油天然气 | 28篇 |
无线电 | 697篇 |
一般工业技术 | 1939篇 |
冶金工业 | 1242篇 |
原子能技术 | 36篇 |
自动化技术 | 1770篇 |
出版年
2023年 | 70篇 |
2022年 | 135篇 |
2021年 | 215篇 |
2020年 | 175篇 |
2019年 | 210篇 |
2018年 | 232篇 |
2017年 | 231篇 |
2016年 | 254篇 |
2015年 | 226篇 |
2014年 | 334篇 |
2013年 | 657篇 |
2012年 | 554篇 |
2011年 | 785篇 |
2010年 | 501篇 |
2009年 | 474篇 |
2008年 | 586篇 |
2007年 | 510篇 |
2006年 | 433篇 |
2005年 | 386篇 |
2004年 | 328篇 |
2003年 | 306篇 |
2002年 | 276篇 |
2001年 | 146篇 |
2000年 | 155篇 |
1999年 | 133篇 |
1998年 | 133篇 |
1997年 | 143篇 |
1996年 | 130篇 |
1995年 | 113篇 |
1994年 | 88篇 |
1993年 | 84篇 |
1992年 | 79篇 |
1991年 | 61篇 |
1990年 | 75篇 |
1989年 | 61篇 |
1988年 | 42篇 |
1987年 | 59篇 |
1986年 | 52篇 |
1985年 | 56篇 |
1984年 | 52篇 |
1983年 | 67篇 |
1982年 | 49篇 |
1981年 | 40篇 |
1980年 | 36篇 |
1979年 | 38篇 |
1978年 | 29篇 |
1977年 | 26篇 |
1976年 | 23篇 |
1975年 | 22篇 |
1974年 | 14篇 |
排序方式: 共有9997条查询结果,搜索用时 15 毫秒
121.
Christian Collberg Andrew Huntwork Edward Carter Gregg Townsend Michael Stepp 《Information and Software Technology》2009,51(1):56-67
This paper presents an implementation of the watermarking method proposed by Venkatesan et al. in their paper [R. Venkatesan, V. Vazirani, S. Sinha, A graph theoretic approach to software watermarking, in: Fourth International Information Hiding Workshop, Pittsburgh, PA, 2001]. An executable program is marked by the addition of code for which the topology of the control-flow graph encodes a watermark. We discuss issues that were identified during construction of an actual implementation that operates on Java bytecode. We present two algorithms for splitting a watermark number into a redundant set of pieces and an algorithm for turning a watermark number into a control-flow graph. We measure the size and time overhead of watermarking, and evaluate the algorithm against a variety of attacks. 相似文献
122.
An examination into the effects of carried military equipment on the performance of two tactical combat movement simulations was conducted. Nineteen Airfield Defence Guards performed a break contact (five 30-m sprints) and a fire and movement simulation (16 6-m bounds) in five load conditions (10–30 kg). Heavier loads significantly increased movement duration on the break contact (0.8%/kg load) and fire and movement (1.1%/kg). Performance deterioration was observed from the beginning to the end of the series of movements (bounds or sprints) with deterioration becoming significantly greater in heavier load conditions. Inter-individual variation between slower and faster participants showed a range in load effects; 0.6, 0.8%/kg for fast and 1.0, 1.4%/kg for slow (break contact, fire and movement, respectively). Velocity profiles revealed that the initial acceleration and peak velocity were the primary determinants of performance. As the duration of these tactical combat movements reflects periods of heightened vulnerability, these findings highlight important implications for commanders.
Practitioner Summary: Increasing amounts of carried military equipment impairs the performance of tactical combat movements. Examination of inter-individual variation in velocity profiles identified that the initial acceleration and the peak velocity achieved during sprints and bounds are key determinants of overall performance. 相似文献
123.
Privacy‐preserving targeted mobile advertising: requirements,design and a prototype implementation 下载免费PDF全文
With the continued proliferation of mobile devices, the collection of information associated with such devices and their users—such as location, installed applications and cookies associated with built‐in browsers—has become increasingly straightforward. By analysing such information, organisations are often able to deliver more relevant and better focused advertisements. Of course, such targeted mobile advertising gives rise to a number of concerns, with privacy‐related concerns being prominent. In this paper, we discuss the necessary balance that needs to be struck between privacy and utility in this emerging area and propose privacy‐preserving targeted mobile advertising as a solution that tries to achieve that balance. Our aim is to develop a solution that can be deployed by users but is also palatable to businesses that operate in this space. This paper focuses on the requirements and design of privacy‐preserving targeted mobile advertising and also describes an initial prototype. We also discuss how more detailed technical aspects and a complete evaluation will underpin our future work in this area. Copyright © 2016 John Wiley & Sons, Ltd. 相似文献
124.
125.
Yin Zhaoxia Abel Andrew Tang Jin Zhang Xinpeng Luo Bin 《Multimedia Tools and Applications》2017,76(3):3899-3920
Multimedia Tools and Applications - In recent years there has been significant interest in reversible data hiding, and also in particular, reversible data hiding in encrypted images (RDH-EI). This... 相似文献
126.
Nuthan Munaiah Felivel Camilo Wesley Wigham Andrew Meneely Meiyappan Nagappan 《Empirical Software Engineering》2017,22(3):1305-1347
As developers face an ever-increasing pressure to engineer secure software, researchers are building an understanding of security-sensitive bugs (i.e. vulnerabilities). Research into mining software repositories has greatly increased our understanding of software quality via empirical study of bugs. Conceptually, however, vulnerabilities differ from bugs: they represent an abuse of functionality as opposed to insufficient functionality commonly associated with traditional, non-security bugs. We performed an in-depth analysis of the Chromium project to empirically examine the relationship between bugs and vulnerabilities. We mined 374,686 bugs and 703 post-release vulnerabilities over five Chromium releases that span six years of development. We used logistic regression analysis, ranking analysis, bug type classifications, developer experience, and vulnerability severity metrics to examine the overarching question: are bugs and vulnerabilities in the same files? While we found statistically significant correlations between pre-release bugs and post-release vulnerabilities, we found the association to be weak. Number of features, source lines of code, and pre-release security bugs are, in general, more closely associated with post-release vulnerabilities than any of our non-security bug categories. In further analysis, we examined sub-types of bugs, such as stability-related bugs, and the associations did not improve. Even the files with the most severe vulnerabilities (by measure of CVSS or bounty payouts) did not show strong correlations with number of bugs. These results indicate that bugs and vulnerabilities are empirically dissimilar groups, motivating the need for security engineering research to target vulnerabilities specifically. 相似文献
127.
Performing and composing for interactive audiovisual system presents many challenges to the performer. Working with visual, sonic and gestural components requires new skills and new ways of thinking about performance. However, there are few studies that focus on performer experience with interactive systems. We present the work Blue Space for oboe and interactive audiovisual system, highlighting the evolving process of the collaborative development of the work. We consider how musical and technical demands interact in this process, and outline the challenges of performing with interactive systems. Using the development of Blue Space as a self-reflective case study, we examine the role of gestures in interactive audiovisual works and identify new modes of performance. 相似文献
128.
Sarah Mostame Joonsuk Huh Christoph Kreisbeck Andrew J. Kerman Takatoshi Fujita Alexander Eisfeld Alán Aspuru-Guzik 《Quantum Information Processing》2017,16(2):44
With quantum computers being out of reach for now, quantum simulators are alternative devices for efficient and accurate simulation of problems that are challenging to tackle using conventional computers. Quantum simulators are classified into analog and digital, with the possibility of constructing “hybrid” simulators by combining both techniques. Here we focus on analog quantum simulators of open quantum systems and address the limit that they can beat classical computers. In particular, as an example, we discuss simulation of the chlorosome light-harvesting antenna from green sulfur bacteria with over 250 phonon modes coupled to each electronic state. Furthermore, we propose physical setups that can be used to reproduce the quantum dynamics of a standard and multiple-mode Holstein model. The proposed scheme is based on currently available technology of superconducting circuits consist of flux qubits and quantum oscillators. 相似文献
129.
We extend the traditional notion of passivity to a forced system whose equilibrium is dependent on the control input by defining equilibrium-independent passivity, a system property characterized by a dissipation inequality centered at an arbitrary equilibrium point. We provide a necessary input/output condition which can be tested for systems of arbitrary dimension and sufficient conditions to certify this property for scalar systems. An example from network stability analysis is presented which demonstrates the utility of this new definition. We then proceed to numerical certification of equilibrium-independent passivity using sum-of-squares programming. Finally, through numerical examples we show that equilibrium-independent passivity is less restrictive than incremental passivity. 相似文献
130.
A stability result is given for hybrid control systems singularly perturbed by fast but continuous actuators. If a hybrid control system has a compact set globally asymptotically stable when the actuator dynamics are omitted, or equivalently, are infinitely fast, then the same compact set is semiglobally practically asymptotically stable in the finite speed of the actuator dynamics. This result, which generalizes classical results for differential equations, justifies using a simplified plant model that ignores fast but continuous actuator dynamics, even when using a hybrid feedback control algorithm. 相似文献