全文获取类型
收费全文 | 7907篇 |
免费 | 618篇 |
国内免费 | 246篇 |
专业分类
电工技术 | 458篇 |
技术理论 | 1篇 |
综合类 | 541篇 |
化学工业 | 1310篇 |
金属工艺 | 364篇 |
机械仪表 | 436篇 |
建筑科学 | 540篇 |
矿业工程 | 220篇 |
能源动力 | 220篇 |
轻工业 | 713篇 |
水利工程 | 141篇 |
石油天然气 | 482篇 |
武器工业 | 57篇 |
无线电 | 712篇 |
一般工业技术 | 940篇 |
冶金工业 | 635篇 |
原子能技术 | 51篇 |
自动化技术 | 950篇 |
出版年
2024年 | 30篇 |
2023年 | 123篇 |
2022年 | 199篇 |
2021年 | 293篇 |
2020年 | 212篇 |
2019年 | 192篇 |
2018年 | 242篇 |
2017年 | 257篇 |
2016年 | 234篇 |
2015年 | 284篇 |
2014年 | 394篇 |
2013年 | 494篇 |
2012年 | 501篇 |
2011年 | 553篇 |
2010年 | 446篇 |
2009年 | 405篇 |
2008年 | 428篇 |
2007年 | 409篇 |
2006年 | 429篇 |
2005年 | 315篇 |
2004年 | 237篇 |
2003年 | 216篇 |
2002年 | 198篇 |
2001年 | 207篇 |
2000年 | 173篇 |
1999年 | 193篇 |
1998年 | 269篇 |
1997年 | 194篇 |
1996年 | 137篇 |
1995年 | 117篇 |
1994年 | 95篇 |
1993年 | 62篇 |
1992年 | 39篇 |
1991年 | 30篇 |
1990年 | 23篇 |
1989年 | 23篇 |
1988年 | 22篇 |
1987年 | 13篇 |
1986年 | 10篇 |
1985年 | 8篇 |
1984年 | 4篇 |
1983年 | 10篇 |
1982年 | 9篇 |
1980年 | 3篇 |
1979年 | 5篇 |
1978年 | 3篇 |
1977年 | 10篇 |
1976年 | 11篇 |
1975年 | 2篇 |
1974年 | 3篇 |
排序方式: 共有8771条查询结果,搜索用时 5 毫秒
51.
Multi-agent technologies have been widely employed for the development of web-based systems, including web-based e-markets, web-based grid computing, e-governments and service-oriented software systems. In these service-oriented systems, service provider agents and service consumer agents are autonomous and rational entities, which can enter and leave the environments freely. For simplicity, we use terms ‘provider’ and ‘consumer’ to represent this two types of agents. How to select the most suitable service providers according to a service request from a consumer in such an open environment is a very challenging issue. In this paper, we propose an innovative trust model, called the GTrust model, for service group selection in general service-oriented environments. In the GTrust model, the trust evaluation for a service group is based on the functionality coverage of the group, the dependency relationships among individual services in the group, the ratings of individual services on the attributes of the service request and a similarity measurement of the extent to which reference reports can reflect the service request in terms of the priority distribution of attributes. The experimental results and analysis demonstrate the good performance of the GTrust model on the service group selection in service-oriented environments. 相似文献
52.
53.
以云南省滇中引水工程某段软岩引水隧洞建立实体模型,应用三维显式有限差分法程序FLAC3D对其施工开挖过程进行三维数值模拟。计算结果表明,软岩隧洞受到开挖面的空间约束效应,围岩应力逐步释放,相应围岩位移也逐渐增加;在横断面上,拱顶围岩沉降位移沿竖直径向的空间效应主要影响范围在3倍洞径(3D)左右,而拱腰围岩水平位移和拱底隆起位移在1.5D左右;掌子面向前推进过程中,掌子面的空间效应逐渐消失,拱顶、拱底位移在施工开挖面后方约2.5D~3D处趋于稳定,拱腰位移在约2D左右趋于稳定,围岩变形收敛:软岩隧洞需要及时施作初期支护,以提高围岩自承能力,限制位移的增长速度。 相似文献
54.
Juan Pedro Muñoz-Gea Josemaria Malgosa-Sanahuja Pilar Manzanares-Lopez 《Peer-to-Peer Networking and Applications》2013,6(3):340-360
Recently, a new peer-assisted architecture to build content delivery systems has been presented. This architecture is based on the use of the storage capacity of end-users’ set-top boxes (STBs), connected in a peer-to-peer (P2P) manner in order to help the content servers in the delivery process. In these systems, the contents are usually split into a set of smaller pieces, called sub-streams, which are randomly injected at the STBs. The present paper is focused on Video on Demand (VoD) streaming and it is assumed that the STB-based content delivery system is deployed over the global Internet, where the clients are distributed over different ISP networks. In this scenario, three different strategies are studied for increasing the percentage of data uploaded by peers, in order to offload the content servers as much as possible. First of all, a new mechanism is presented which determines which sub-stream has to be placed at which STB by a Non-Linear Programming (NLP) formulation. A different strategy for reducing the content server load is to take advantage of the available bandwidth in the different ISP networks. In this sense, two new mechanisms for forwarding the VoD requests to different ISP networks are presented. Finally, the present paper also shows that in some situations the available uplink bandwidth is associated with STBs that do not have the required sub-streams. Regarding this concern, a new mechanism has been designed that dynamically re-allocates some streams, which are being transmitted from specific STBs, to different STBs, in order to find the necessary resources to start new streaming sessions. 相似文献
55.
The pixel labeling problems in computer vision are often formulated as energy minimization tasks. Algorithms such as graph cuts and belief propagation are prominent; however, they are only applicable for specific energy forms. For general optimization, Markov Chain Monte Carlo (MCMC) based simulated annealing can estimate the minima states very slowly.This paper presents a sampling paradigm for faster optimization. First, in contrast to previous MCMCs, the role of detailed balance constraint is eliminated. The reversible Markov chain jumps are essential for sampling an arbitrary posterior distribution, but they are not essential for optimization tasks. This allows a computationally simple window cluster sample. Second, the proposal states are generated from combined sets of local minima which achieve a substantial increase in speed compared to uniformly labeled cluster proposals. Third, under the coarse-to-fine strategy, the maximum window size variable is incorporated along with the temperature variable during simulated annealing. The proposed window annealing is experimentally shown to be many times faster and capable of finding lower energy compared to the previous Gibbs and Swendsen-Wang cut (SW-cut) sampler. In addition, the proposed method is compared with other deterministic algorithms like graph cut, belief propagation, and spectral method in their own specific energy forms. Window annealing displays competitive performance in all domains. 相似文献
56.
Carlos Gañán Jose L. Muñoz Oscar Esparza Jorge Mata-Díaz Juan Hernández-Serrano Juanjo Alins 《Journal of Network and Computer Applications》2013,36(5):1337-1351
Vehicular Ad Hoc Networks (VANETs) require mechanisms to authenticate messages, identify valid vehicles, and remove misbehaving vehicles. A public key infrastructure (PKI) can be used to provide these functionalities using digital certificates. However, if a vehicle is no longer trusted, its certificates have to be revoked and this status information has to be made available to other vehicles as soon as possible. In this paper, we propose a collaborative certificate status checking mechanism called COACH to efficiently distribute certificate revocation information in VANETs. In COACH, we embed a hash tree in each standard Certificate Revocation List (CRL). This dual structure is called extended-CRL. A node possessing an extended-CRL can respond to certificate status requests without having to send the complete CRL. Instead, the node can send a short response (less than 1 kB) that fits in a single UDP message. Obviously, the substructures included in the short responses are authenticated. This means that any node possessing an extended-CRL can produce short responses that can be authenticated (including Road Side Units or intermediate vehicles). We also propose an extension to the COACH mechanism called EvCOACH that is more efficient than COACH in scenarios with relatively low revocation rates per CRL validity period. To build EvCOACH, we embed an additional hash chain in the extended-CRL. Finally, by conducting a detailed performance evaluation, COACH and EvCOACH are proved to be reliable, efficient, and scalable. 相似文献
57.
Shams Qazi Raad Raad Yi Mu Willy Susilo 《Journal of Network and Computer Applications》2013,36(2):582-592
A wormhole attack is one of the hardest problems to detect whereas it can be easily implanted in any type of wireless ad hoc network. A wormhole attack can easily be launched by the attacker without having knowledge of the network or compromising any legitimate nodes. Most existing solutions either require special hardware devices or make strong assumptions in order to detect wormhole attacks which limit the usability of these solutions. In this paper, we present a security enhancement to dynamic source routing (DSR) protocol against wormhole attacks for ad hoc networks which relies on calculation of round trip time (RTT). Our protocol secures DSR against a wormhole attack in ad hoc networks for multirate transmissions. We also consider the processing and queuing delays of each participating node in the calculation of RTTs between neighbors which to date has not been addressed in the existing literature. This work provides two test cases that show that not taking multirate transmission into consideration results in miss identifying a wormhole attack. 相似文献
58.
Esteban J. Palomo Enrique Domínguez Rafael M. Luque-Baena José Muñoz 《Neural Processing Letters》2013,37(1):69-87
Both image compression based on color quantization and image segmentation are two typical tasks in the field of image processing. Several techniques based on splitting algorithms or cluster analyses have been proposed in the literature. Self-organizing maps have been also applied to these problems, although with some limitations due to the fixed network architecture and the lack of representation in hierarchical relations among data. In this paper, both problems are addressed using growing hierarchical self-organizing models. An advantage of these models is due to the hierarchical architecture, which is more flexible in the adaptation process to input data, reflecting inherent hierarchical relations among data. Comparative results are provided for image compression and image segmentation. Experimental results show that the proposed approach is promising for image processing, and the powerful of the hierarchical information provided by the proposed model. 相似文献
59.
软件体系结构是软件工程中的一个新兴的领域,它与软件工程技术的发展有着相当密切的关系,本文从软件工程技术的发展谈到了软件体系构建的必然性,并且在文章的最后对软件工程的发展现状和未来前景做出了总结. 相似文献
60.