全文获取类型
收费全文 | 5681篇 |
免费 | 400篇 |
国内免费 | 11篇 |
专业分类
电工技术 | 110篇 |
综合类 | 9篇 |
化学工业 | 1626篇 |
金属工艺 | 80篇 |
机械仪表 | 167篇 |
建筑科学 | 218篇 |
矿业工程 | 5篇 |
能源动力 | 189篇 |
轻工业 | 584篇 |
水利工程 | 42篇 |
石油天然气 | 23篇 |
无线电 | 450篇 |
一般工业技术 | 936篇 |
冶金工业 | 281篇 |
原子能技术 | 30篇 |
自动化技术 | 1342篇 |
出版年
2024年 | 7篇 |
2023年 | 86篇 |
2022年 | 250篇 |
2021年 | 326篇 |
2020年 | 176篇 |
2019年 | 203篇 |
2018年 | 208篇 |
2017年 | 208篇 |
2016年 | 253篇 |
2015年 | 215篇 |
2014年 | 274篇 |
2013年 | 455篇 |
2012年 | 398篇 |
2011年 | 454篇 |
2010年 | 341篇 |
2009年 | 337篇 |
2008年 | 295篇 |
2007年 | 262篇 |
2006年 | 220篇 |
2005年 | 157篇 |
2004年 | 124篇 |
2003年 | 95篇 |
2002年 | 91篇 |
2001年 | 66篇 |
2000年 | 58篇 |
1999年 | 58篇 |
1998年 | 84篇 |
1997年 | 69篇 |
1996年 | 54篇 |
1995年 | 27篇 |
1994年 | 39篇 |
1993年 | 29篇 |
1992年 | 13篇 |
1991年 | 11篇 |
1990年 | 13篇 |
1989年 | 10篇 |
1988年 | 6篇 |
1987年 | 16篇 |
1985年 | 14篇 |
1984年 | 8篇 |
1983年 | 18篇 |
1982年 | 8篇 |
1981年 | 4篇 |
1980年 | 8篇 |
1979年 | 9篇 |
1978年 | 7篇 |
1977年 | 10篇 |
1976年 | 3篇 |
1973年 | 3篇 |
1971年 | 3篇 |
排序方式: 共有6092条查询结果,搜索用时 31 毫秒
101.
In this paper, we introduce a two‐layered approach addressing the problem of creating believable mesh‐based skin deformation. For each frame, the skin is first deformed with a classic linear blend skinning approach, which usually leads to unsightly artefacts such as the well‐known candy‐wrapper effect and volume loss. Then we enforce some geometric constraints which displace the positions of the vertices to mimic the behaviour of the skin and achieve effects like volume preservation and jiggling. We allow the artist to control the amount of jiggling and the area of the skin affected by it. The geometric constraints are solved using a position‐based dynamics (PBDs) schema. We employ a graph colouring algorithm for parallelizing the computation of the constraints. Being based on PBDs guarantees efficiency and real‐time performances while enduring robustness and unconditional stability. We demonstrate the visual quality and the performance of our approach with a variety of skeleton‐driven soft body characters. 相似文献
102.
103.
Batch sequencing and cooperation 总被引:1,自引:0,他引:1
Game theoretic analysis of sequencing situations has been restricted to manufacturing systems which consist of machines that can process only one job at a time. However, in many manufacturing systems, operations are carried out by batch machines which can simultaneously process multiple jobs. This paper aims to extend the game theoretical approach to the cost allocation problems arising from sequencing situations on systems that consist of batch machines. To analyze the allocation problem at hand, it focusses on the existence of core elements, convexity, and the Shapley value. 相似文献
104.
Urban sensing is an emerging application field for Wireless Sensor Networks (WSNs), where a number of static sensors is sparsely deployed in an urban area to collect environmental information. Data sensed by each sensor are, then, opportunistically transmitted to Mobile Nodes (MNs) that happen to be in contact. In the considered scenario, communications between MNs and sensors require paradigms with a minimal synchronization between devices, extremely fast and energy efficient, especially at the sensor side. To deal with the above issues, in [1] we proposed a hybrid protocol for data delivery from sensors to MNs, named Hybrid Adaptive Interleaved Data Protocol (HI). By combining Erasure Coding (EC) with an Automatic Repeat reQuest (ARQ) scheme, the proposed protocol maximizes the reliability of communications while minimizing the energy consumed by sensors. In this paper, we present an in-depth analysis of the HI performance. We provide an analytical evaluation by defining a flexible model to derive the probability of data delivery and exploiting it to investigate the performance over a wide range of parameters. Moreover, we perform an experimental study to evaluate the HI effectiveness on real sensor platforms. Specifically, we analyze the impact of resource constraints imposed by sensors on data delivery and provide a careful characterization of its actual consumption of resources. 相似文献
105.
Elena Baralis Andrea Bianco Tania Cerquitelli Luca Chiaraviglio Marco Mellia 《Computer Networks》2013,57(17):3300-3315
Internet measured data collected via passive measurement are analyzed to obtain localization information on nodes by clustering (i.e., grouping together) nodes that exhibit similar network path properties. Since traditional clustering algorithms fail to correctly identify clusters of homogeneous nodes, we propose the NetCluster novel framework, suited to analyze Internet measurement datasets. We show that the proposed framework correctly analyzes synthetically generated traces. Finally, we apply it to real traces collected at the access link of Politecnico di Torino campus LAN and discuss the network characteristics as seen at the vantage point. 相似文献
106.
Marco Riccardi Roberto Di Pietro Marta Palanques Jorge Aguilà Vila 《Computer Networks》2013,57(2):422-435
Malware is one of the main threats to the Internet security in general, and to commercial transactions in particular. However, given the high level of sophistication reached by malware (e.g. usage of encrypted payload and obfuscation techniques), malware detection tools and techniques still call for effective and efficient solutions. In this paper, we address a specific, dreadful, and widely diffused financial malware: Zeus.The contributions of this paper are manifold: first, we propose a technique to break the encrypted malware communications, extracting the keystream used to encrypt such communications; second, we provide a generalization of the proposed keystream extraction technique. Further, we propose Cronus, an IDS that specifically targets Zeus malware. The implementation of Cronus has been experimentally tested on a production network, and its high quality performance and effectiveness are discussed. Finally, we highlight some principles underlying malware—and Zeus in particular—that could pave the way for further investigation in this field. 相似文献
107.
Adrian Hernandez-Becerril Mariko Nakano-Miyatake Marco Ramirez-Tachiquin Hector Perez-Meana 《通讯和计算机》2013,(5):649-660
Recently, a multisecret sharing scheme for secret color images among a set of users was proposed, which allows that each participant to share secret color images with the rest of participants in such way that all of them can recover all secret color images only if all participants pool their shares. In this work a parallel implementation of the cellular automata-based multisecret sharing scheme is proposed, in which the technology of CUDA (Compute Unified Device Architecture) is used in parallelization, taking advantage that each cell of cellular automata can be processed independently. The processing time of the proposed scheme is analyzed and it is proved that the proposed parallel algorithm using the CUDA structure is more than 12 times faster than the conventional sequential algorithm. This reduction of temporal complexity allows the practical use of the secret sharing scheme in many information security fields. 相似文献
108.
109.
Current advancements in pervasive technologies allow users to create and share an increasing amount of whereabouts data. Thus, some rich datasets on human mobility are becoming available on the web. In this paper we extracted approximately 790,000 mobility traces from a web-based repository of GPS tracks—the Nokia Sports Tracker Service. Using data mining mechanisms, we show that this data can be analyzed to uncover daily routines and interesting schemes in the use of public spaces. We first show that our approach supports large-scale analysis of people’s whereabouts by comparing behavioral patterns across cities. Then, using Kernel Density Estimation, we present a mechanism to identify popular sport areas in individual cities. This kind of analysis allows us to highlight human-centered geographies that can support a wide range of applications ranging from location-based services to urban planning. 相似文献
110.
Marco Domenichini Ranjana Sahai Piero Castrataro Roberto Valsecchi Claudio Tonelli Francesco Greco Paolo Dario 《Microfluidics and nanofluidics》2013,15(6):753-762
The development of multilayer soft lithography methodology has seen polydimethysiloxane (PDMS) as the preferred material for the fabrication of microfluidic devices. However, the functionality of these PDMS microfluidic chips is often limited by the poor chemical resistance of PDMS to certain solvents. Here, we propose the use of a photocurable perfluoropolyether (PFPE), specifically FOMBLIN® MD40 PFPE, as a candidate material to provide a solvent-resistant buffer layer to make the device substantially impervious to chemically induced swelling. We first carried out a systematic study of the solvent resistance properties of FOMBLIN® MD40 PFPE as compared with PDMS. The comparison presented here demonstrates the superiority of FOMBLIN® MD40 PFPE over PDMS in this regard; moreover, the results permitted to categorize solvents in four different groups depending on their swelling ratio. We then present a step-by-step recipe for a novel fabrication process that uses multilayer lithography to construct a comprehensive solvent-resistant device with fluid and control channels integrated with a valve structure and also permitting easy establishment of outside connections. 相似文献