全文获取类型
收费全文 | 2651篇 |
免费 | 78篇 |
国内免费 | 3篇 |
专业分类
电工技术 | 33篇 |
综合类 | 5篇 |
化学工业 | 588篇 |
金属工艺 | 75篇 |
机械仪表 | 40篇 |
建筑科学 | 134篇 |
矿业工程 | 29篇 |
能源动力 | 63篇 |
轻工业 | 234篇 |
水利工程 | 17篇 |
石油天然气 | 17篇 |
无线电 | 226篇 |
一般工业技术 | 407篇 |
冶金工业 | 489篇 |
原子能技术 | 25篇 |
自动化技术 | 350篇 |
出版年
2022年 | 18篇 |
2021年 | 41篇 |
2020年 | 29篇 |
2019年 | 35篇 |
2018年 | 47篇 |
2017年 | 44篇 |
2016年 | 55篇 |
2015年 | 43篇 |
2014年 | 70篇 |
2013年 | 165篇 |
2012年 | 112篇 |
2011年 | 128篇 |
2010年 | 118篇 |
2009年 | 103篇 |
2008年 | 106篇 |
2007年 | 88篇 |
2006年 | 89篇 |
2005年 | 79篇 |
2004年 | 54篇 |
2003年 | 70篇 |
2002年 | 66篇 |
2001年 | 42篇 |
2000年 | 34篇 |
1999年 | 44篇 |
1998年 | 104篇 |
1997年 | 67篇 |
1996年 | 67篇 |
1995年 | 56篇 |
1994年 | 44篇 |
1993年 | 60篇 |
1992年 | 36篇 |
1991年 | 22篇 |
1990年 | 21篇 |
1989年 | 28篇 |
1988年 | 27篇 |
1987年 | 33篇 |
1986年 | 26篇 |
1985年 | 25篇 |
1984年 | 33篇 |
1983年 | 24篇 |
1982年 | 23篇 |
1981年 | 40篇 |
1980年 | 35篇 |
1979年 | 24篇 |
1978年 | 25篇 |
1977年 | 29篇 |
1976年 | 29篇 |
1975年 | 26篇 |
1973年 | 16篇 |
1972年 | 14篇 |
排序方式: 共有2732条查询结果,搜索用时 0 毫秒
41.
This paper presents the latest developments of the MadeIn 'Coop method for modelling the human-machine and human-human co-operation process, and an application of this method for the design of a more co-operative version of the C3I System CHEOPS. We first consider that the design of software systems for organizations is tied more and more to the perspective of compound Knowledge Production Systems that link humans and machines engaged in a co-operative problem solving process. After exposing the four principles upon which MadeIn 'Coop rests for modelling co-operation, we present an artificial problem solving dialogue between CHEOPS and its users. Consistent with the Group Cognitive Processes Theory framework, we propose a dialogue analysis according to two complimentary points of view: the Collective Problem Solving model, and the Coordination model. This analysis should help system designers to identify new system functionalities to assist problem solving.(C3I) Command Control Communication Intelligence Systems 相似文献
42.
43.
In the frequency allocation problem, we are given a mobile telephone network, whose geographical coverage area is divided
into cells, wherein phone calls are serviced by assigning frequencies to them so that no two calls emanating from the same
or neighboring cells are assigned the same frequency. The problem is to use the frequencies efficiently, i.e., minimize the
span of frequencies used. The frequency allocation problem can be regarded as a multicoloring problem on a weighted hexagonal
graph. In this paper, we give a 1-local asymptotic 4/3-competitive distributed algorithm for multicoloring a triangle-free
hexagonal graph, which is a special case of hexagonal graph. Based on this result, we then propose a 1-local asymptotic13/9-competitive
algorithm for multicoloring the (general-case) hexagonal graph, thereby improving the previous 1-local 3/2-competitive algorithm.
A preliminary version of this paper appeared in the Proceedings of the 13th Annual International Computing and Combinatorics
Conference (COCOON 2007), LNCS 4598, pp. 526–536.
Y. Zhang research was supported by European Regional Development Fund (ERDF).
F.Y.L. Chin research was supported by Hong Kong RGC Grant HKU-7113/07E.
H. Zhu research was supported by National Natural Science Fund (grant #60496321). 相似文献
44.
We propose a visualization based approach for digital signature authentication. Using our method, the speed and pressure aspects of a digital signature process can be clearly and intuitively conveyed to the user for digital signature authentication. Our design takes into account both the expressiveness and aesthetics of the derived visual patterns. With the visual aid provided by our method, digital signatures can be authenticated with better accuracy than using existing methods—even novices can examine the authenticity of a digital signature in most situations using our method. To validate the effectiveness of our method, we conducted a comprehensive user study which confirms positively the advantages of our approach. Our method can be employed as a new security enhancement measure for a range of business and legal applications in reality which involve digital signature authorization and authentication. 相似文献
45.
This article deals with a local improvement of domain decomposition methods for 2-dimensional elliptic problems for which
either the geometry or the domain decomposition presents conical singularities. After explaining the main results of the theoretical
analysis carried out in Chniti et al. (Calcolo 45, 2008), the numerical experiments presented in this article confirm the optimality properties of the new interface conditions. 相似文献
46.
This paper addresses the one-machine scheduling problem with earliness-tardiness penalties. We propose a new branch-and-bound
algorithm that can solve instances with up to 50 jobs and that can solve problems with even more general non-convex cost functions.
The algorithm is based on the combination of a Lagrangean relaxation of resource constraints and new dominance rules. 相似文献
47.
The field of systems biology has attracted the attention of biologists, engineers, mathematicians, physicists, chemists and others in an endeavour to create systems-level understanding of complex biological networks. In particular, systems engineering methods are finding unique opportunities in characterizing the rich behaviour exhibited by biological systems. In the same manner, these new classes of biological problems are motivating novel developments in theoretical systems approaches. Hence, the interface between systems and biology is of mutual benefit to both disciplines. 相似文献
48.
This study examined whether mothers' preoccupation with their own weight and eating was linked to daughters' restrained eating behavior. Participants included 173 non-Hispanic, White mother-daughter dyads, measured longitudinally when daughters were ages 5, 7, 9, and 11. Mothers who were preoccupied with their own weight and eating reported higher levels of restricting daughters' intake and encouraging daughters to lose weight over time. Mothers' encouragement of daughters' weight loss was linked to daughters' restrained eating behavior; this relationship was partially mediated by daughters' perception of maternal pressure to lose weight. These findings suggest that mothers' preoccupation with weight and eating, via attempts to influence daughters' weight and eating, may place daughters at risk for developing problematic eating behaviors. (PsycINFO Database Record (c) 2010 APA, all rights reserved) 相似文献
49.
For nearly 10 years now, the Internet Architecture Board (IAB) and Internet Engineering Task Force (IETF) have been telling us that the pool of available IP addresses will soon be exhausted, and that Internet growth will come to a grinding halt. They have heavily promoted their solution, IPv6, which the commercial world has all but ignored. It is now becoming clear that IP address exhaustion is years off, at best. The primary reason for this is network address translation (NAT), the rogue technology that allows almost unlimited address reuse. Despite NAT's nagging technical problems that limit IP connectivity and make peer-to-peer (P2P) applications difficult to deploy, the commercial world has universally embraced the technology even as the IAB and IETF actively discourage its use. 相似文献
50.
Local control strategies for groups of mobile autonomous agents 总被引:7,自引:0,他引:7
The problem of achieving a specified formation among a group of mobile autonomous agents by distributed control is studied. If convergence to a point is feasible, then more general formations are achievable too, so the focus is on convergence to a point (the agreement problem). Three formation strategies are studied and convergence is proved under certain conditions. Also, motivated by the question of whether collisions occur, formation evolution is studied. 相似文献