首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   4864349篇
  免费   318153篇
  国内免费   185304篇
电工技术   261239篇
技术理论   125篇
综合类   265677篇
化学工业   711365篇
金属工艺   232326篇
机械仪表   259689篇
建筑科学   273448篇
矿业工程   114430篇
能源动力   136125篇
轻工业   403360篇
水利工程   100741篇
石油天然气   144495篇
武器工业   35722篇
无线电   520209篇
一般工业技术   592232篇
冶金工业   571718篇
原子能技术   63955篇
自动化技术   680950篇
  2024年   14711篇
  2023年   45907篇
  2022年   107757篇
  2021年   147080篇
  2020年   107615篇
  2019年   87440篇
  2018年   104686篇
  2017年   116748篇
  2016年   107425篇
  2015年   129329篇
  2014年   175904篇
  2013年   275640篇
  2012年   282539篇
  2011年   321387篇
  2010年   288012篇
  2009年   288043篇
  2008年   294724篇
  2007年   286085篇
  2006年   259642篇
  2005年   216837篇
  2004年   154885篇
  2003年   119184篇
  2002年   111661篇
  2001年   102490篇
  2000年   99336篇
  1999年   82031篇
  1998年   143289篇
  1997年   101251篇
  1996年   85757篇
  1995年   67198篇
  1994年   58473篇
  1993年   50179篇
  1992年   33470篇
  1991年   30211篇
  1990年   29994篇
  1989年   29050篇
  1988年   26916篇
  1987年   24530篇
  1986年   23824篇
  1985年   25566篇
  1984年   22184篇
  1983年   20374篇
  1982年   19193篇
  1981年   19547篇
  1980年   18784篇
  1979年   16829篇
  1978年   16241篇
  1977年   22922篇
  1976年   33658篇
  1975年   14038篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
991.
全球入侵防护和安全风险管理解决方案领先供应商McAfee公司7月5日在华宣布,将正式启用中文名称“迈克菲”。同期还宣布在深圳成立的移动技术研究实验室已投入使用,为包括摩托罗拉在内的移动设备开发安全解决方案。此外迈克菲还与中国联通、百度、软通科技和华擎科技四家中国企业结盟,共同为中国的消费者提供安全产品。纵观McAfee的中国区战略,可以说是品牌加固、科研深化与结盟广泛全线推进。迈克菲寓意双重也许启用一个中文名称本身并不是一件值得大惊小怪的事,但从McAfee董事会主席兼CEO GeorgeSamenuk先生亲临北京别具匠心的新闻发…  相似文献   
992.
在探讨了Web查询服务的典型模型后,论文阐述了服务器端会话追踪机制的实现方式,设计了基于服务器端会话追踪的Web查询服务的典型解决方案。该设计方案可以较为安全地保存和维护客户的上下文信息,可靠地跟踪用户查询所处的状态,有效地实现有状态的Web查询服务。  相似文献   
993.
Efficient multicast search under delay and bandwidth constraints   总被引:1,自引:0,他引:1  
The issue of a multicast search for a group of users is discussed in this study. Given the condition that the search is over only after all the users in the group are found, this problem is called the Conference Call Search (CCS) problem. The goal is to design efficient CCS strategies under delay and bandwidth constraints. While the problem of tracking a single user has been addressed by many studies, to the best of our knowledge, this study is one of the first attempts to reduce the search cost for multiple users. Moreover, as oppose to the single user tracking, for which one can always reduce the expected search delay by increasing the expected search cost, for a multicast search the dependency between the delay and the search cost is more complicated, as demonstrated in this study. We identify the key factors affecting the search efficiency, and the dependency between them and the search delay. Our analysis shows that under tight bandwidth constraints, the CCS problem is NP-hard. We therefore propose a search method that is not optimal, but has a low computational complexity. In addition, the proposed strategy yields a low search delay as well as a low search cost. The performance of the proposed search strategy is superior to the implementation of an optimal single user search on a group of users. Amotz Bar-Noy received the B.Sc. degree in 1981 in Mathematics and Computer Science and the Ph.D. degree in 1987 in Computer Science, both from the Hebrew University, Israel. From October 1987 to September 1989 he was a post-doc fellow in Stanford University, California. From October 1989 to August 1996 he was a Research Staff Member with IBM T. J. Watson Research Center, New York. From February 1995 to September 2001 he was an associate Professor with the Electrical Engineering-Systems department of Tel Aviv University, Israel. From September 1999 to December 2001 he was with AT research labs in New Jersey. Since February 2002 he is a Professor with the Computer and Information Science Department of Brooklyn College - CUNY, Brooklyn New York. Zohar Naor received the Ph.D. degree in Computer Science from Tel Aviv University, Tel Aviv, Israel, in 2000. Since 2003 he is with the University of Haifa, Israel. His areas of interests include wireless networks, resource management of computer networks, mobility, search strategies, and multiple access protocols.  相似文献   
994.
网络安全事件的关联分析方法的比较研究   总被引:2,自引:0,他引:2  
随着当前攻击手段和技术的日益复杂化,一次入侵事件往往需要多个步骤才能完成,这些步骤都是彼此相关的。但是传统的入侵检测集中于检测底层的入侵或异常,所检测到的结果也仅仅是一次完整入侵的一部分,所以不能将不同的报警结合起来以发现入侵的逻辑步骤或者入侵背后的攻击策略。关联分析技术将不同分析器上产生的报警进行融合与关联分析,极大地减少了报警的数量,降低了入侵检测的误报率,并且适当的减少了入侵检测的漏报率。文中在对网络安全事件关联分析方法的系统结构进行分析后,着重介绍了当前比较流行的几种网络安全事件关联分析方法,最后对各种方法进行了比较研究。  相似文献   
995.
基于ISO/IEC17799标准建立了一个综合的信息系统风险分析框架,并运用模糊多准则决策(FMCDM)方法计算信息安全风险,根据风险等级矩阵(RLM)对信息资产风险进行级别划分,最终建立评估信息资产相关风险的完整模型。  相似文献   
996.
信息系统灾难恢复能力评估方法研究   总被引:1,自引:0,他引:1  
论文提出了一种信息系统灾难恢复能力评估方法:信息资产分析方法、本地灾难恢复和远程灾难恢复等级的划分方法,并在此基础上,利用AHP层次分析法,构建了一套灾难恢复能力评估指标体系。该方法可以使评估结果具有更好的针对性和全面性。  相似文献   
997.
This work considers the problem of increasing the performance of the ciphers based on Data-Dependent (DD) operations (DDO) for VLSI implementations. New minimum size primitives are proposed to design DDOs. Using advanced DDOs instead of DD permutations (DDP) in the DDP-based iterative ciphers Cobra-H64 and Cobra-H128 the number of rounds has been significantly reduced yielding enhancement of the “performance per cost” value and retaining security at the level of indistinguishability from a random transformation. To obtain further enhancement of this parameter a new crypto-scheme based on the advanced DDOs is proposed. The FPGA implementation of the proposed crypto-scheme achieves higher throughput value and minimizes the allocated resources than the conventional designs. Design of the DDO boxes of different orders is considered and their ASIC implementation is estimated.  相似文献   
998.
Uplink scheduling in wireless systems is gaining importance due to arising uplink intensive data services (ftp, image uploads etc.), which could be hampered by the currently in-built asymmetry in favor of the downlink. In this work, we propose and study algorithms for efficient uplink packet-data scheduling in a CDMA cell. The algorithms attempt to maximize system throughput under transmit power limitations on the mobiles assuming instantaneous knowledge of user queues and channels. However no channel statistics or traffic characterization is necessary. Apart from increasing throughput, the algorithms also improve fairness of service among users, hence reducing chances of buffer overflows for poorly located users. The major observation arising from our analysis is that it is advantageous on the uplink to schedule “strong” users one-at-a-time, and “weak” users in larger groups. This contrasts with the downlink where one-at-a-time transmission for all users has shown to be the preferred mode in much previous work. Based on the optimal schedules, we propose less complex and more practical approximate methods, both of which offer significant performance improvement compared to one-at-a-time transmission, and the widely acclaimed Proportional Fair (PF) algorithm, in simulations. When queue content cannot be fed back, we propose a simple modification of PF, Uplink PF (UPF), that offers similar improvement. Hereafter, we refer to users with low recieved power at the base even when transmitting at peak transmit power as “weak” users, and the strongly recieved users at the base as “strong” users. Krishnan Kumaran is currently a member of the Complex Systems Modeling section in the Corporate Strategic Research of ExxonMobil Corp., Clinton, NJ. Formerly, he was a Member of Technical Staff in the Mathematics of Networks and Systems Research Department at Bell Labs in Murray Hill, NJ, where his research interests were in modeling, analysis and simulation of design, resource management and scheduling issues in telecommunication networks. Lijun Qian is an assistant professor in the Department of Electrical Engineering at Prairie View A&M University. He received his B.S. from Tsinghua University in Beijing, M.S. from Technion-Israel Institute of Technology, and Ph.D. from WINLAB, Rutgers University, all in electrical engineering. Before joining PVAMU, he was a researcher at Networks and Systems Research Department of Bell Labs in Murray Hill, NJ. His major research interests are in wireless communications and networking technologies, especially in radio resource management, protocol design, TCP/RLP optimization and MPLS traffic engineering.  相似文献   
999.
基于混合智能的多Agent个性化信息推荐   总被引:1,自引:0,他引:1  
徐嘉莉  付平 《信息技术》2006,30(9):83-87
在基于Agent的个性化网页推荐中,目前主要有两种过滤方法:基于内容的过滤和基于多Agent合作的过滤。在分析了单独使用这两种方法存在的不足之后,提出了基于改进蚁群算法的聚类分析建立用户模型的算法,并给出了结合两种方法优点的用户模型主动学习算法,最后给出了个性化信息推荐模型及相关算法。  相似文献   
1000.
介绍现代开关电源行业仿真工作的意义和现状,以及专用仿真软件包SIM etrix/SIMPLIS的优点和不足。通过实例给出SIMPLIS环境中集成电路控制芯片的建模过程,并就其中的关键技术予以简单讨论。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号