全文获取类型
收费全文 | 2247篇 |
免费 | 101篇 |
国内免费 | 5篇 |
专业分类
电工技术 | 27篇 |
综合类 | 17篇 |
化学工业 | 644篇 |
金属工艺 | 36篇 |
机械仪表 | 37篇 |
建筑科学 | 156篇 |
矿业工程 | 4篇 |
能源动力 | 37篇 |
轻工业 | 188篇 |
水利工程 | 13篇 |
石油天然气 | 3篇 |
无线电 | 160篇 |
一般工业技术 | 416篇 |
冶金工业 | 188篇 |
原子能技术 | 24篇 |
自动化技术 | 403篇 |
出版年
2023年 | 24篇 |
2022年 | 45篇 |
2021年 | 79篇 |
2020年 | 38篇 |
2019年 | 48篇 |
2018年 | 45篇 |
2017年 | 47篇 |
2016年 | 55篇 |
2015年 | 54篇 |
2014年 | 80篇 |
2013年 | 111篇 |
2012年 | 110篇 |
2011年 | 178篇 |
2010年 | 116篇 |
2009年 | 130篇 |
2008年 | 122篇 |
2007年 | 103篇 |
2006年 | 101篇 |
2005年 | 87篇 |
2004年 | 77篇 |
2003年 | 66篇 |
2002年 | 63篇 |
2001年 | 54篇 |
2000年 | 49篇 |
1999年 | 49篇 |
1998年 | 59篇 |
1997年 | 42篇 |
1996年 | 28篇 |
1995年 | 29篇 |
1994年 | 34篇 |
1993年 | 26篇 |
1992年 | 17篇 |
1991年 | 28篇 |
1990年 | 18篇 |
1989年 | 19篇 |
1988年 | 12篇 |
1987年 | 11篇 |
1986年 | 6篇 |
1985年 | 14篇 |
1984年 | 13篇 |
1983年 | 10篇 |
1981年 | 3篇 |
1980年 | 4篇 |
1979年 | 3篇 |
1978年 | 7篇 |
1977年 | 10篇 |
1976年 | 6篇 |
1969年 | 2篇 |
1967年 | 2篇 |
1931年 | 3篇 |
排序方式: 共有2353条查询结果,搜索用时 406 毫秒
51.
Vasileios Belagiannis Xinchao Wang Horesh Beny Ben Shitrit Kiyoshi Hashimoto Ralf Stauder Yoshimitsu Aoki Michael Kranzfelder Armin Schneider Pascal Fua Slobodan Ilic Hubertus Feussner Nassir Navab 《Machine Vision and Applications》2016,27(7):1035-1046
Multiple human pose estimation is an important yet challenging problem. In an operating room (OR) environment, the 3D body poses of surgeons and medical staff can provide important clues for surgical workflow analysis. For that purpose, we propose an algorithm for localizing and recovering body poses of multiple human in an OR environment under a multi-camera setup. Our model builds on 3D Pictorial Structures and 2D body part localization across all camera views, using convolutional neural networks (ConvNets). To evaluate our algorithm, we introduce a dataset captured in a real OR environment. Our dataset is unique, challenging and publicly available with annotated ground truths. Our proposed algorithm yields to promising pose estimation results on this dataset. 相似文献
52.
Christoph Bosshard Roland Bouffanais Michel Deville Ralf Gruber Jonas Latt 《Computers & Fluids》2011,44(1):1-8
In this paper, a comprehensive performance review of an MPI-based high-order three-dimensional spectral element method C++ toolbox is presented. The focus is put on the performance evaluation of several aspects with a particular emphasis on the parallel efficiency. The performance evaluation is analyzed with the help of a time prediction model based on a parameterization of the application and the hardware resources. Two tailor-made benchmark cases in computational fluid dynamics (CFD) are introduced and used to carry out this review, stressing the particular interest for clusters with up to thousands of cores. Some problems in the parallel implementation have been detected and corrected. The theoretical complexities with respect to the number of elements, to the polynomial degree, and to communication needs are correctly reproduced. It is concluded that this type of code has a nearly perfect speedup on machines with thousands of cores, and is ready to make the step to next-generation petaFLOP machines. 相似文献
53.
Ralf Steinmetz Author VitaeAndré KönigAuthor Vitae 《Performance Evaluation》2011,68(9):750-767
Recent developments in the area of decentralized and infrastructureless systems opened avenues for novel applications. Along with these new technologies, new questions regarding their operational bounds in terms of e.g. scalability and security arose. Due to the sparse presence of real-world decentralized and infrastructureless systems, new protocols and applications have to be scrutinized by means of simulation, in (small-scale) testbeds, and by analytical models. In this paper, we discuss challenges of evaluating security mechanisms for mobile ad hoc networks and peer-to-peer systems. We focus on harmonizing predictions of analytical models and results obtained from simulation studies and testbed experiments. 相似文献
54.
In the Horn theory based approach for cryptographic protocol analysis, cryptographic protocols and (Dolev?CYao) intruders are modeled by Horn theories and security analysis boils down to solving the derivation problem for Horn theories. This approach and the tools based on this approach, including ProVerif, have been very successful in the automatic analysis of cryptographic protocols. However, dealing with the algebraic properties of operators, such as the exclusive OR (XOR), which are frequently used in cryptographic protocols has been problematic. In particular, ProVerif cannot deal with XOR. In this paper, we show how to reduce the derivation problem for Horn theories with XOR to the XOR-free case. Our reduction works for an expressive class of Horn theories. A large class of intruder capabilities and protocols that employ the XOR operator can be modeled by these theories. Our reduction allows us to carry out protocol analysis using tools, such as ProVerif, that cannot deal with XOR, but are very efficient in the XOR-free case. We implemented our reduction and, in combination with ProVerif, used it for the fully automatic analysis of several protocols that employ the XOR operator. Among others, our analysis revealed a new attack on an IBM security module. 相似文献
55.
We describe a Prolog-based approach to the development of language processors (such as preprocessors, frontends, evaluators, tools for software modification and analysis). The design of the corresponding environment Laptob for prological language processing is outlined. Language processor definitions in Laptob are basically Prolog programs. The programs might contain grammars, that is, we consider logic grammars. The programs can be typed, and they can be higher-order. The adaptation and composition of the logic programs themselves is supported by meta-programming. The environment offers tool support for efficient scanning, testing, and application development based on a make-system. We report on recent and ongoing applications of the Prolog-based approach. 相似文献
56.
57.
We construct and analyze multigrid methods for discretized self-adjoint elliptic problems on triangular surfaces in ${\mathbb{R}^3}$ . The methods involve the same weights for restriction and prolongation as in the case of planar triangulations and therefore are easy to implement. We prove logarithmic bounds of the convergence rates with constants solely depending on the ellipticity, the smoothers and on the regularity of the triangles forming the triangular surface. Our theoretical results are illustrated by numerical computations. 相似文献
58.
59.
Hans-Robert Arndt 《Reliable Computing》2007,13(3):245-259
For the interval system of equations defined by [x] = [A][x] + [b] we derive necessary and sufficient criteria for the existence of solutions [x]. Furthermore we give necessary and sufficient criteria for the convergence of powers of [A]. In contrast to former results we treat complex interval arithmetics. 相似文献
60.
Ralf Zimmermann Toshihisa Osaki Rüdiger Schweiß Carsten Werner 《Microfluidics and nanofluidics》2006,2(5):367-379
Electrokinetic effects play an important role in microfluidics and nanofluidics. Although the related phenomena are often utilized to control fluid flow and sample transport in lab-on-a-chip devices, their dependency on the surface charges on the channel walls often remain enigmatic. This is mainly due to the lack of adequate experimental methods to analyse the electrical charging of solid/liquid interfaces of interest. To address this need, an experimental set-up—designated as microslit electrokinetic set-up (MES)—has been recently developed and applied for the investigation of charge formation processes at planar solid/liquid interfaces. The device permits to perform streaming potential and streaming current measurements across a rectangular streaming channel formed by two parallel sample carriers (20×10×3 mm3) at variable distance allowing for the determination of the surface conductivity. Utilizing the MES, charge characteristics can be determined for a wide variety of materials prepared as thin films on top of planar glass substrates. Streaming potential and streaming current data permit to investigate the mechanisms of charge formation while surface conductivity data provide information about mobile charge carriers located in different zones at the interface. The applicability of this advanced experimental approach is demonstrated with examples obtained for surfaces with different levels of complexity:
- Preferential ion adsorption onto unpolar fluoropolymer (Teflon® AF) films was characterized in simple electrolyte solutions; the results were quantitatively evaluated with respect to interfacial ion concentrations.
- Interrelation of charge density and conformation of grafted poly(L-glutamic acid layers) were unravelled from the determination of pH-depended variations of surface conductivity and layer thickness.
- The impact of spatial confinements of surface functional groups on their acid–base behaviour was studied with self-assembled monomolecular films of alkanethiols chemisorbed on gold.
- Charging of and ion mobility within poly(acrylic acid) (PAA) brushes prepared by a Langmuir–Blodgett technique were analysed at varied pH and ionic strength.
- Interfacial modes of adsorbed proteins were distinguished at two polymer surfaces with varied hydrophobicity/charge density.