全文获取类型
收费全文 | 4225篇 |
免费 | 77篇 |
国内免费 | 4篇 |
专业分类
电工技术 | 45篇 |
综合类 | 4篇 |
化学工业 | 733篇 |
金属工艺 | 88篇 |
机械仪表 | 59篇 |
建筑科学 | 209篇 |
矿业工程 | 13篇 |
能源动力 | 135篇 |
轻工业 | 421篇 |
水利工程 | 27篇 |
石油天然气 | 10篇 |
无线电 | 339篇 |
一般工业技术 | 549篇 |
冶金工业 | 1217篇 |
原子能技术 | 36篇 |
自动化技术 | 421篇 |
出版年
2022年 | 25篇 |
2019年 | 44篇 |
2018年 | 31篇 |
2017年 | 42篇 |
2016年 | 59篇 |
2015年 | 42篇 |
2014年 | 53篇 |
2013年 | 190篇 |
2012年 | 106篇 |
2011年 | 141篇 |
2010年 | 114篇 |
2009年 | 116篇 |
2008年 | 125篇 |
2007年 | 123篇 |
2006年 | 114篇 |
2005年 | 124篇 |
2004年 | 96篇 |
2003年 | 98篇 |
2002年 | 103篇 |
2001年 | 71篇 |
2000年 | 75篇 |
1999年 | 89篇 |
1998年 | 232篇 |
1997年 | 181篇 |
1996年 | 114篇 |
1995年 | 99篇 |
1994年 | 110篇 |
1993年 | 90篇 |
1992年 | 61篇 |
1991年 | 58篇 |
1990年 | 69篇 |
1989年 | 53篇 |
1988年 | 57篇 |
1987年 | 44篇 |
1986年 | 57篇 |
1985年 | 74篇 |
1984年 | 73篇 |
1983年 | 65篇 |
1982年 | 67篇 |
1981年 | 71篇 |
1980年 | 58篇 |
1979年 | 49篇 |
1978年 | 40篇 |
1977年 | 77篇 |
1976年 | 92篇 |
1975年 | 65篇 |
1974年 | 37篇 |
1973年 | 45篇 |
1972年 | 43篇 |
1970年 | 33篇 |
排序方式: 共有4306条查询结果,搜索用时 15 毫秒
21.
David G.W. Birch 《Information Security Technical Report》2009,14(3):143-145
It is impossible to make any progress on the security vs. privacy debate, or move towards a political settlement around identity for the coming years, unless we develop a more modern notion of what identity is and how it should be addressed online. So long as we maintain an essentially “Victorian” view of the balance between security and privacy, founded on the central concept of identity as a card in a filing cabinet, then society cannot properly take advantage of technological developments. If it does, then security and privacy are no longer competing concerns that need to be balanced but simultaneous deliverables of an infrastructure founded in utility. 相似文献
22.
My early research was inspired by the mathematical semantics of Scott and Strachey. Two such topics, recounted in this paper, were the fixed-point analysis of pointer loops and the expressibility of a style of functional programming introduced by Barron and Strachey. 相似文献
23.
24.
25.
26.
27.
Streaks arise in computed tomograms for a variety of reasons, such as presence of high-contrast edges and objects, aliasing errors, patient movement, and use of very few views. The problem appears to be an inherent difficulty with all reconstruction methods, including backprojection (with convolution) and the algebraic reconstruction technique (ART). This paper presents the derivation and results of an ART-like algorithm (SPARTAF) oriented towards prevention of streaks via optimization of a cost function based on features of streaks, subject to the constraints of the given projection data. The object-dependent method employs pattern recognition of streaks and adaptive filtering during iterative reconstruction by ART. Results of experiments with a test pattern and of application of the method to reconstructive tomography from radiographic films are presented and the convergence properties demonstrated. 相似文献
28.
Discovery of context-specific ranking functions for effective information retrieval using genetic programming 总被引:1,自引:0,他引:1
Fan W. Gordon M.D. Pathak P. 《Knowledge and Data Engineering, IEEE Transactions on》2004,16(4):523-527
The Internet and corporate intranets have brought a lot of information. People usually resort to search engines to find required information. However, these systems tend to use only one fixed ranking strategy regardless of the contexts. This poses serious performance problems when characteristics of different users, queries, and text collections are taken into account. We argue that the ranking strategy should be context specific and we propose a , new systematic method that can automatically generate ranking strategies for different contexts based on genetic programming (GP). The new method was tested on TREC data and the results are very promising. 相似文献
29.
Sarah Gordon 《Network Security》2004,2004(6):17-18
Antivirus software tests are important when selecting antivirus software. However, there are many different tests, and interpreting the results can be challenging. Additionally, the needs of the corporate customer and home user differ, and it is important to understand these differences in order to evaluate antivirus software tests critically. 相似文献
30.
Gordon HR 《Applied optics》1985,24(23):4172