全文获取类型
收费全文 | 105296篇 |
免费 | 1732篇 |
国内免费 | 487篇 |
专业分类
电工技术 | 1041篇 |
综合类 | 2353篇 |
化学工业 | 16343篇 |
金属工艺 | 5192篇 |
机械仪表 | 3454篇 |
建筑科学 | 3831篇 |
矿业工程 | 718篇 |
能源动力 | 1772篇 |
轻工业 | 5651篇 |
水利工程 | 1439篇 |
石油天然气 | 397篇 |
武器工业 | 1篇 |
无线电 | 10629篇 |
一般工业技术 | 20199篇 |
冶金工业 | 5320篇 |
原子能技术 | 390篇 |
自动化技术 | 28785篇 |
出版年
2023年 | 152篇 |
2022年 | 308篇 |
2021年 | 534篇 |
2020年 | 314篇 |
2019年 | 330篇 |
2018年 | 14806篇 |
2017年 | 13679篇 |
2016年 | 10378篇 |
2015年 | 1074篇 |
2014年 | 903篇 |
2013年 | 1685篇 |
2012年 | 4173篇 |
2011年 | 10766篇 |
2010年 | 9237篇 |
2009年 | 6492篇 |
2008年 | 7905篇 |
2007年 | 8752篇 |
2006年 | 1043篇 |
2005年 | 2044篇 |
2004年 | 1876篇 |
2003年 | 1835篇 |
2002年 | 1179篇 |
2001年 | 484篇 |
2000年 | 545篇 |
1999年 | 464篇 |
1998年 | 458篇 |
1997年 | 397篇 |
1996年 | 383篇 |
1995年 | 302篇 |
1994年 | 311篇 |
1993年 | 305篇 |
1992年 | 260篇 |
1991年 | 234篇 |
1990年 | 201篇 |
1989年 | 230篇 |
1988年 | 193篇 |
1987年 | 177篇 |
1986年 | 174篇 |
1985年 | 239篇 |
1984年 | 214篇 |
1983年 | 184篇 |
1982年 | 168篇 |
1981年 | 195篇 |
1980年 | 130篇 |
1979年 | 147篇 |
1978年 | 143篇 |
1977年 | 127篇 |
1976年 | 138篇 |
1975年 | 120篇 |
1974年 | 105篇 |
排序方式: 共有10000条查询结果,搜索用时 0 毫秒
991.
Sebastian Klenk Jürgen Dippon Peter Fritz Gunther Heidemann 《Information Systems Frontiers》2009,11(4):391-403
Medical data mining is currently actively pursued in computer science and statistical research but not in medical practice.
The reasons therefore lie in the difficulties of handling and statistically analyzing medical data. We have developed a system
that allows practitioners in the field to interactively analyze their data without assistance of statisticians or data mining
experts. In the course of this paper we will introduce data mining of medical data and show how this can be achieved for survival
data. We will demonstrate how to solve common problems of interactive survival analysis by presenting the Online Clinical
Data Mining (OCDM) system. Thereby the main focus is on similarity based queries, a new method to select similar cases based
on their covariables and the influence of these on their survival. 相似文献
992.
This work considers non-terminating scheduling problems in which a system of multiple resources serves clients having variable
needs. The system has m identical resources and n clients; in each time slot each resource may serve at most one client; in each such slot t each client γ has a rate, a real number ρ
γ
(t), that specifies his needs in this slot. The rates satisfy the restriction ∑
γ
ρ
γ
(t)≤m for any slot t. Except of this restriction, the rates can vary in arbitrary fashion. (This contrasts most prior works in this area in which
the rates of the clients are constant.) The schedule is required to be smooth as follows: a schedule is Δ
-smooth if for all time intervals I the absolute difference between the amount of service received by each client γ to his nominal needs of ∑
t∈I
ρ
γ
(t) is less than Δ. Our objective are online schedulers that produce Δ-smooth schedules where Δ is a small constant which is independent of m and n. Our paper constructs such schedulers; these are the first online Δ-smooth schedulers, with a constant Δ, for clients with arbitrarily variable rates in a single or multiple resource system. Furthermore, the paper also considers
a non-concurrent environment in which there is an additional restriction that each client is served at most once in each time slot; it presents
the first online smooth schedulers for variable rates under this restriction.
The above non-concurrent restriction is crucial in some applications (e.g., CPU scheduling). It has been pointed out that
this restriction “adds a surprising amount of difficulty” to the scheduling problem. However, this observation was never formalized
and, of course, was never proved. Our paper formalizes and proves some aspects of this observation.
Another contribution of this paper is the introduction of a complete information, two player game called the analog-digital confinement game. In such a game pebbles are located on the real line; the two players, the analog player and the digital player, take alternating turns and each one, in his turn, moves some of the pebbles; the digital player moves the pebbles backwards
by discrete distances while the analog player moves the pebbles forward by analog distances; the aim of the analog player
is to cause one pebble (or more) to escape a pre-defined real interval while the aim of the digital player is to confine the
pebbles into the interval. We demonstrate that this game is a convenient framework to study the general question of how to
approximate an analog process by a digital one. All the above scheduling results are established via this game. In this derivation,
the pebbles represent the clients, the analog player generates the needs of the clients and the digital player generates the
schedule.
Dedicated to the memory of Professor Shimon Even for his inspiration and encouragement 相似文献
993.
Degree-Optimal Routing for P2P Systems 总被引:1,自引:0,他引:1
Giovanni Chiola Gennaro Cordasco Luisa Gargano Mikael Hammar Alberto Negro Vittorio Scarano 《Theory of Computing Systems》2009,45(1):43-63
We define a family of Distributed Hash Table systems whose aim is to combine the routing efficiency of randomized networks—e.g.
optimal average path length O(log 2
n/δlog δ) with δ degree—with the programmability and startup efficiency of a uniform overlay—that is, a deterministic system in which the overlay network is transitive and greedy routing is optimal. It is known that Ω(log n) is a lower bound on the average path length for uniform overlays with O(log n) degree (Xu et al., IEEE J. Sel. Areas Commun. 22(1), 151–163, 2004).
Our work is inspired by neighbor-of-neighbor (NoN) routing, a recently introduced variation of greedy routing that allows us to achieve optimal average path length in randomized networks. The advantage of our proposal is that of allowing
the NoN technique to be implemented without adding any overhead to the corresponding deterministic network.
We propose a family of networks parameterized with a positive integer c which measures the amount of randomness that is used. By varying the value c, the system goes from the deterministic case (c=1) to an “almost uniform” system. Increasing c to relatively low values allows for routing with asymptotically optimal average path length while retaining most of the advantages
of a uniform system, such as easy programmability and quick bootstrap of the nodes entering the system.
We also provide a matching lower bound for the average path length of the routing schemes for any c.
This work was partially supported by the Italian FIRB project “WEB-MINDS” (Wide-scalE, Broadband MIddleware for Network Distributed
Services), . 相似文献
994.
A Randomized Algorithm for Online Unit Clustering 总被引:1,自引:0,他引:1
In this paper, we consider the online version of the following problem: partition a set of input points into subsets, each enclosable by a unit ball, so as to minimize the number of subsets used. In the one-dimensional case, we show that surprisingly the naïve upper bound of 2 on the competitive ratio can be beaten: we present a new randomized 15/8-competitive online algorithm. We also provide some lower bounds and an extension to higher dimensions. 相似文献
995.
996.
Katalin Friedl Gábor Ivanyos Miklos Santha Yves F. Verhoeven 《Theory of Computing Systems》2009,45(3):629-646
We present several results on the complexity of various forms of Sperner’s Lemma in the black-box model of computing. We give
a deterministic algorithm for Sperner problems over pseudo-manifolds of arbitrary dimension. The query complexity of our algorithm
is linear in the separation number of the skeleton graph of the manifold and the size of its boundary. As a corollary we get
an
deterministic query algorithm for the black-box version of the problem 2D-SPERNER, a well studied member of Papadimitriou’s complexity class PPAD. This upper bound matches the
deterministic lower bound of Crescenzi and Silvestri. The tightness of this bound was not known before. In another result
we prove for the same problem an
lower bound for its probabilistic, and an
lower bound for its quantum query complexity, showing that all these measures are polynomially related.
Research supported by the European Commission IST Integrated Project Qubit Application (QAP) 015848, the OTKA grants T42559
and T46234, and by the ANR Blanc AlgoQP grant of the French Research Ministry. 相似文献
997.
Ronen Gradwohl Moni Naor Benny Pinkas Guy N. Rothblum 《Theory of Computing Systems》2009,44(2):245-268
We consider cryptographic and physical zero-knowledge proof schemes for Sudoku, a popular combinatorial puzzle. We discuss
methods that allow one party, the prover, to convince another party, the verifier, that the prover has solved a Sudoku puzzle,
without revealing the solution to the verifier. The question of interest is how a prover can show: (i) that there is a solution
to the given puzzle, and (ii) that he knows the solution, while not giving away any information about the solution to the
verifier.
In this paper we consider several protocols that achieve these goals. Broadly speaking, the protocols are either cryptographic
or physical. By a cryptographic protocol we mean one in the usual model found in the foundations of cryptography literature.
In this model, two machines exchange messages, and the security of the protocol relies on computational hardness. By a physical
protocol we mean one that is implementable by humans using common objects, and preferably without the aid of computers. In
particular, our physical protocols utilize items such as scratch-off cards, similar to those used in lotteries, or even just
simple playing cards.
The cryptographic protocols are direct and efficient, and do not involve a reduction to other problems. The physical protocols
are meant to be understood by “lay-people” and implementable without the use of computers.
Research of R. Gradwohl was supported by US-Israel Binational Science Foundation Grant 2002246.
Research of M. Naor was supported in part by a grant from the Israel Science Foundation.
Research of B. Pinkas was supported in part by the Israel Science Foundation (grant number 860/06).
Research of G.N. Rothblum was supported by NSF grant CNS-0430450 and NSF grant CFF-0635297. 相似文献
998.
If you want to transform your business and cause a dramatic improvement for the enterprise, you'll need to start by truly transforming your IT life cycle. It's easy to believe that IT is truly reinventing itself by hiring new people, installing new tools, or preaching a new methodology. However, providing transformational leadership starts with the leadership itself along with the development of the three core competencies of strategy, solutions, and implementation. Your job in IT leadership is to develop all three competencies in your organization by cultivating the necessary skills and techniques, and then to cause each of them to happen continuously and concurrently. When these changes become the organization's new habits, you're on the path to true transformation. 相似文献
999.
1000.
Hybrid systems are heterogeneous systems characterised by the interaction of discrete and continuous dynamics. We present a trajectory-based algebraic model for describing hybrid systems; the trajectories used are closely related to streams. The algebra is based on left quantales and left semirings and provides a new application for these algebraic structures. We show that hybrid automata, which are probably the standard tool for describing hybrid systems, can conveniently be embedded into our algebra. Moreover we point out some important advantages of the algebraic approach. In particular, we show how to handle Zeno effects, which are excluded by most other authors. The development of the theory is illustrated by a running example and a larger case study. 相似文献