全文获取类型
收费全文 | 38057篇 |
免费 | 1481篇 |
国内免费 | 61篇 |
专业分类
电工技术 | 390篇 |
综合类 | 31篇 |
化学工业 | 7509篇 |
金属工艺 | 766篇 |
机械仪表 | 794篇 |
建筑科学 | 2047篇 |
矿业工程 | 118篇 |
能源动力 | 1117篇 |
轻工业 | 3059篇 |
水利工程 | 437篇 |
石油天然气 | 120篇 |
武器工业 | 5篇 |
无线电 | 2641篇 |
一般工业技术 | 6334篇 |
冶金工业 | 7193篇 |
原子能技术 | 294篇 |
自动化技术 | 6744篇 |
出版年
2023年 | 205篇 |
2022年 | 356篇 |
2021年 | 695篇 |
2020年 | 474篇 |
2019年 | 626篇 |
2018年 | 799篇 |
2017年 | 714篇 |
2016年 | 841篇 |
2015年 | 769篇 |
2014年 | 1059篇 |
2013年 | 2489篇 |
2012年 | 1726篇 |
2011年 | 2144篇 |
2010年 | 1708篇 |
2009年 | 1595篇 |
2008年 | 1836篇 |
2007年 | 1829篇 |
2006年 | 1649篇 |
2005年 | 1484篇 |
2004年 | 1209篇 |
2003年 | 1161篇 |
2002年 | 1083篇 |
2001年 | 752篇 |
2000年 | 591篇 |
1999年 | 641篇 |
1998年 | 759篇 |
1997年 | 688篇 |
1996年 | 641篇 |
1995年 | 624篇 |
1994年 | 582篇 |
1993年 | 587篇 |
1992年 | 523篇 |
1991年 | 319篇 |
1990年 | 446篇 |
1989年 | 415篇 |
1988年 | 347篇 |
1987年 | 382篇 |
1986年 | 326篇 |
1985年 | 447篇 |
1984年 | 440篇 |
1983年 | 338篇 |
1982年 | 327篇 |
1981年 | 305篇 |
1980年 | 291篇 |
1979年 | 291篇 |
1978年 | 262篇 |
1977年 | 253篇 |
1976年 | 245篇 |
1975年 | 209篇 |
1974年 | 189篇 |
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
971.
We prove several decidability and undecidability results for ν-PN, an extension of P/T nets with pure name creation and name management. We give a simple proof of undecidability of reachability, by reducing reachability in nets with inhibitor arcs to it. Thus, the expressive power of ν-PN strictly surpasses that of P/T nets. We encode ν-PN into Petri Data Nets, so that coverability, termination and boundedness are decidable. Moreover, we obtain Ackermann-hardness results for all our decidable decision problems. Then we consider two properties, width-boundedness and depth-boundedness, that factorize boundedness. Width-boundedness has already been proven to be decidable. Here we prove that its complexity is also non-primitive recursive. Then we prove undecidability of depth-boundedness. Finally, we prove that the corresponding “place version” of all the boundedness problems is undecidable for ν-PN. These results carry over to Petri Data Nets. 相似文献
972.
Jesus Nuevo Luis M. Bergasa David F. Llorca Manuel Ocaña 《Image and vision computing》2011,29(4):209-218
This paper describes an active model with a robust texture model built on-line. The model uses one camera and it is able to operate without active illumination. The texture model is defined by a series of clusters, which are built in a video sequence using previously encountered samples. This model is used to search for the corresponding element in the following frames. An on-line clustering method, named leaderP is described and evaluated on an application of face tracking. A 20-point shape model is used. This model is built offline, and a robust fitting function is used to restrict the position of the points. Our proposal is to serve as one of the stages in a driver monitoring system. To test it, a new set of sequences of drivers recorded outdoors and in a realistic simulator has been compiled. Experimental results for typical outdoor driving scenarios, with frequent head movement, turns and occlusions are presented. Our approach is tested and compared with the Simultaneous Modeling and Tracking (SMAT) [1], and the recently presented Stacked Trimmed Active Shape Model (STASM) [2], and shows better results than SMAT and similar fitting error levels to STASM, with much faster execution times and improved robustness. 相似文献
973.
Bio-chemical networks are often modeled as systems of ordinary differential equations (ODEs). Such systems will not admit closed form solutions and hence numerical simulations will have to be used to perform analyses. However, the number of simulations required to carry out tasks such as parameter estimation can become very large. To get around this, we propose a discrete probabilistic approximation of the ODEs dynamics. We do so by discretizing the value and the time domain and assuming a distribution of initial states w.r.t. the discretization. Then we sample a representative set of initial states according to the assumed initial distribution and generate a corresponding set of trajectories through numerical simulations. Finally, using the structure of the signaling pathway we encode these trajectories compactly as a dynamic Bayesian network.This approximation of the signaling pathway dynamics has several advantages. First, the discretized nature of the approximation helps to bridge the gap between the accuracy of the results obtained by ODE simulation and the limited precision of experimental data used for model construction and verification. Second and more importantly, many interesting pathway properties can be analyzed efficiently through standard Bayesian inference techniques instead of resorting to a large number of ODE simulations. We have tested our method on ODE models of the EGF-NGF signaling pathway [1] and the segmentation clock pathway [2]. The results are very promising in terms of accuracy and efficiency. 相似文献
974.
975.
Friesz Terry L. Bernstein David Suo Z. Tobin Roger L. 《Networks and Spatial Economics》2001,1(3-4):319-347
This paper recasts the Friesz et al. (1993) measure theoretic model of dynamic network user equibrium as a controlled variational inequality problem involving Riemann integrals. This restatement is done to make the model and its foundations accessible to a wider audience by removing the need to have a background in functional analysis. Our exposition is dependent on previously unavailable necessary conditions for optimal control problems with state-dependent time lags. These necessary conditions, derived in an Appendix, are employed to show that a particular variational inequality control problem has solutions that are dynamic network user equilibria. Our analysis also shows that use of proper flow propagation constraints obviates the need to explicitly employ the arc exit time functions that have complicated numerical implementations of the Friesz et al. (1993) model heretofore. We close by describing the computational implications of numerically determining dynamic user equilibria from formulations based on state-dependent time lags. 相似文献
976.
Binding Virtual Environments to Toolkit Capabilities 总被引:1,自引:0,他引:1
There are many toolkits and development environments that aid the process of constructing virtual environment applications. Many of these development environments encourage customising a virtual environment's design while rapid prototyping within the confines of a toolkit's capabilities. Thus the choice of the technology and its associated support has been made independent of the end-use requirements of the final system. This can bias a virtual environment's design by implementation based constraints. We propose that an alternative approach is the consideration of virtual environment requirements in the context of an inspectable design model, to identify the requirements that a toolkit will need to support. In the context of an example, we present a selection of design requirements that we consider important for virtual environment design in general. We explore how these requirements might be mapped to different capabilities using Virtual Reality Modelling Language (VRML) as a concrete example of a platform technology. 相似文献
977.
David Herson 《Computer Fraud & Security》2001,2001(1):8-9
In my September and November contributions, I deviated slightly from my usual theme and examined several of the technical and procedural matters associated with Digital Signature technology. Of course, Digital Signature represents one of the less politically sensitive applications of cryptographic technology, although it is undoubtedly destined to become one of the most pervasive. 相似文献
978.
Jon David 《Network Security》2001,2001(10):13-15
The information available both as input to, and as output from, any given intrusion detection apparatus is a function of where it is placed in a network architecture. In particular, placing an intrusion detection apparatus on the inside (i.e. between one’s perimeter defenses and one’s inner operations) will yield significantly different results than placing that same apparatus on the outside (i.e. between one’s perimeter defenses and the rest of the world). This writing examines these differences. 相似文献
979.
Mauthe Andreas Garcia Francisco Hutchison David Yeadon Nicholas 《Multimedia Tools and Applications》2001,13(3):285-306
Multimedia group applications often operate in an environment where the various participants are located on systems and communication links with different capabilities. Mechanisms are required that ensure full-quality media for high-performance workstations but lower-quality media for playout at low-end systems. QoS filters have been proposed as a way to adapt QoS to the user specified level by changing the structure of a media stream in a well defined way. Resource reservation and QoS filter instantiation should be closely integrated since both represent one particular aspect of the provision of individualistic QoS for heterogeneous users in multipeer communications. The Internet reservation protocol RSVP is receiver oriented and allows each receiver to specify its resource requirements. However, no actual mechanisms are defined that adapt the data stream to the receiver specified QoS requirements.In this paper we present an enhanced version of RSVP (called RSVP++) that integrates resource reservation and QoS filter control. In order to achieve this integration we extend the RSVP functional model and define a new QoS service class. RSVP++ can coexist with common RSVP systems, thus, openness and interoperability of the system are ensured. 相似文献
980.
The refinement calculus is a well-established theory for formal development of imperative program code and is supported by a number of automated tools. Via a detailed case study, this article shows how refinement theory and tool support can be extended for a program with real-time constraints. The approach adapts a timed variant of the refinement calculus and makes corresponding enhancements to a theorem-prover based refinement tool. 相似文献