全文获取类型
收费全文 | 4398篇 |
免费 | 238篇 |
国内免费 | 9篇 |
专业分类
电工技术 | 70篇 |
综合类 | 3篇 |
化学工业 | 1174篇 |
金属工艺 | 99篇 |
机械仪表 | 78篇 |
建筑科学 | 182篇 |
矿业工程 | 5篇 |
能源动力 | 152篇 |
轻工业 | 348篇 |
水利工程 | 23篇 |
石油天然气 | 13篇 |
武器工业 | 1篇 |
无线电 | 533篇 |
一般工业技术 | 770篇 |
冶金工业 | 349篇 |
原子能技术 | 35篇 |
自动化技术 | 810篇 |
出版年
2023年 | 25篇 |
2022年 | 65篇 |
2021年 | 78篇 |
2020年 | 70篇 |
2019年 | 79篇 |
2018年 | 105篇 |
2017年 | 98篇 |
2016年 | 124篇 |
2015年 | 109篇 |
2014年 | 159篇 |
2013年 | 278篇 |
2012年 | 236篇 |
2011年 | 291篇 |
2010年 | 223篇 |
2009年 | 183篇 |
2008年 | 222篇 |
2007年 | 204篇 |
2006年 | 187篇 |
2005年 | 153篇 |
2004年 | 140篇 |
2003年 | 121篇 |
2002年 | 130篇 |
2001年 | 62篇 |
2000年 | 75篇 |
1999年 | 69篇 |
1998年 | 76篇 |
1997年 | 87篇 |
1996年 | 71篇 |
1995年 | 73篇 |
1994年 | 65篇 |
1993年 | 45篇 |
1992年 | 45篇 |
1991年 | 38篇 |
1990年 | 48篇 |
1989年 | 40篇 |
1988年 | 28篇 |
1987年 | 26篇 |
1986年 | 24篇 |
1985年 | 42篇 |
1984年 | 40篇 |
1983年 | 37篇 |
1982年 | 44篇 |
1981年 | 34篇 |
1980年 | 19篇 |
1979年 | 29篇 |
1978年 | 17篇 |
1977年 | 18篇 |
1976年 | 20篇 |
1974年 | 15篇 |
1970年 | 16篇 |
排序方式: 共有4645条查询结果,搜索用时 15 毫秒
91.
Andre Suslik Spritzer Jeremy Boy Pierre Dragicevic Jean‐Daniel Fekete Carla Maria Dal Sasso Freitas 《Computer Graphics Forum》2015,34(3):461-470
Node‐link infographics are visually very rich and can communicate messages effectively, but can be very difficult to create, often involving a painstaking and artisanal process. In this paper we present an investigation of node‐link visualizations for communication and how to better support their creation. We begin by breaking down these images into their basic elements and analyzing how they are created. We then present a set of techniques aimed at improving the creation workflow by bringing more flexibility and power to users, letting them manipulate all aspects of a node‐link diagram (layout, visual attributes, etc.) while taking into account the context in which it will appear. These techniques were implemented in a proof‐of‐concept prototype called GraphCoiffure, which was designed as an intermediary step between graph drawing/editing software and image authoring applications. We describe how GraphCoiffure improves the workflow and illustrate its benefits through practical examples. 相似文献
92.
Matrix models are ubiquitous for constraint problems. Many such problems have a matrix of variables $\mathcal{M}$ , with the same constraint C defined by a finite-state automaton $\mathcal{A}$ on each row of $\mathcal{M}$ and a global cardinality constraint $\mathit{gcc}$ on each column of $\mathcal{M}$ . We give two methods for deriving, by double counting, necessary conditions on the cardinality variables of the $\mathit{gcc}$ constraints from the automaton $\mathcal{A}$ . The first method yields linear necessary conditions and simple arithmetic constraints. The second method introduces the cardinality automaton, which abstracts the overall behaviour of all the row automata and can be encoded by a set of linear constraints. We also provide a domain consistency filtering algorithm for the conjunction of lexicographic ordering constraints between adjacent rows of $\mathcal{M}$ and (possibly different) automaton constraints on the rows. We evaluate the impact of our methods in terms of runtime and search effort on a large set of nurse rostering problem instances. 相似文献
93.
Each vulnerability scanner (VS) represents, identifies and classifies vulnerabilities in its own way, thus making the different scanners difficult to study and compare. Despite numerous efforts by researchers and organisations to solve the disparity in vulnerability names used in the different VSs, vulnerability categories have still not been standardised. This paper highlights the importance of having a standard vulnerability category set. It also outlines an approach towards achieving this goal by generating a standard set of vulnerability categories. A data-clustering algorithm that employs artificial intelligence is used for this purpose. The significance of this research results from having an intelligent technique that aids in the generation of standardised vulnerability categories in a relatively fast way. In addition, the technique is generic in the sense that it allows one to accommodate any VS currently known on the market to create such vulnerability categories. Another benefit is that the approach followed in this paper allows one to also compare various VSs currently available on the market. A prototype is presented to verify the concept. 相似文献
94.
Fabrice Rousselle Petrik Clarberg Luc Leblanc Victor Ostromoukhov Pierre Poulin 《The Visual computer》2008,24(7-9):465-474
We present an efficient method for importance sampling the product of multiple functions. Our algorithm computes a quick approximation of the product on the fly, based on hierarchical representations of the local maxima and averages of the individual terms. Samples are generated by exploiting the hierarchical properties of many low-discrepancy sequences, and thresholded against the estimated product. We evaluate direct illumination by sampling the triple product of environment map lighting, surface reflectance, and a visibility function estimated per pixel. Our results show considerable noise reduction compared to existing state-of-the-art methods using only the product of lighting and BRDF. 相似文献
95.
Search games are attractive for their correspondence with classical width parameters. For instance, the invisible search number (a.k.a. node search number) of a graph is equal to its pathwidth plus 1, and the visible search number of a graph is equal to its treewidth plus 1. The connected variants of these games ask for search strategies that are connected, i.e., at every step of the strategy, the searched part of the graph induces a connected subgraph. We focus on monotone search strategies, i.e., strategies for which every node is searched exactly once. The monotone connected visible search number of an n-node graph is at most O(logn) times its visible search number. First, we prove that this logarithmic bound is tight. Precisely, we prove that there is an infinite family of graphs for which the ratio monotone connected visible search number over visible search number is Ω(logn). Second, we prove that, as opposed to the non-connected variant of visible graph searching, “recontamination helps” for connected visible search. Precisely, we prove that, for any k4, there exists a graph with connected visible search number at most k, and monotone connected visible search number >k 相似文献
96.
This paper introduces time stream Pétri nets (Ts treamPn), a model for the formal specification of multimedia synchronization scenarios. This new model extends time Pétri nets to formally describe the timed behaviour of multimedia objects and streams in asynchronous distributed systems. The proposed approach uses time intervals to label the arcs exiting from the places of the net, and typed transitions to define different firing rules. This model allows a complete and accurate specification of synchronization constraints between multimedia streams and can be used at different levels of granularity. 相似文献
97.
Pierre Lescanne 《Formal Aspects of Computing》1995,7(1):77-90
We focus on termination proofs of rewrite systems, especially of rewrite systems containing associative and commutative operators. We prove their termination by elementary interpretations, more specifically, by functions defined by addition, multiplication and exponentiation. We discuss a method based on polynomial interpretations and propose an implementation of a mechanisation of the comparison of expressions built with polynomials and exponentials. 相似文献
98.
碳化硅(SiC)器件的新特性和移动应用的功率密度要求给功率器件的封装技术提出了新的挑战。现有功率器件的封装技术主要是在硅基的绝缘栅双极晶体管(Insulated Gate Bipolar Transistor,IGBT)和金属氧化物半导体场效应晶体管(Metal Oxide Semiconductor Field Effect Transistor,MOSFET)等基础上发展起来的,并一直都在演进,但这些渐进改良尚不足以充分发挥SiC器件的性能,因而封装技术需要革命性的进步。在简述现有封装技术及其演进的基础上,主要从功率模块的角度讨论了封装技术的发展方向。同时讨论了功率模块的新型叠层结构以及封装技术的离散化、高温化趋势,并对SiC器件封装技术的发展方向做出了综合评估。 相似文献
99.
Chapellier Paul Lavenus Pierre Le Traon Olivier Dulmet Bernard 《Microsystem Technologies》2022,28(6):1485-1496
Microsystem Technologies - This paper presents recent advances on two dimensional length-extension mode (2D-LEM) quartz resonators providing high quality (Q) factor on resonances at a few MHz. The... 相似文献
100.
M.T. Dlamini J.H.P. Eloff H.S. Venter M.M. Eloff 《International Transactions in Operational Research》2022,29(1):372-395
For businesses to benefit from the many opportunities of cloud computing, they must first address a number of security challenges, such as the potential leakage of confidential data to unintended third parties. An inter-VM (where VM is virtual machine) attack, also known as cross-VM attack, is one threat through which cloud-hosted confidential data could be leaked to unintended third parties. An inter-VM attack exploits vulnerabilities between co-resident guest VMs that share the same cloud infrastructure. In an attempt to stop such an attack, this paper uses the principles of logical analysis to model a solution that provides physical separation of VMs belonging to conflicting tenants based on their levels of conflict. The derived mathematical model is founded on scientific principles and implemented using four conflict-aware VM placement algorithms. The resultant algorithms consider a tenant's risk appetite and cost implications. The model offers guidance to VM placement and is validated using a proof of concept. A cloud simulation tool was used to test and evaluate the effectiveness and efficiency of the model. The findings reflect that the introduction of the proposed model introduced a time lag in the time it took to place VM instances. On top of this, it was also discovered that the number and size of the VM instances has an effect on the VM placement performance. The findings further illustrate that the conflict tolerance level of a VM has a direct impact on the time it took to place. 相似文献