全文获取类型
收费全文 | 3996篇 |
免费 | 219篇 |
国内免费 | 5篇 |
专业分类
电工技术 | 39篇 |
综合类 | 3篇 |
化学工业 | 1045篇 |
金属工艺 | 86篇 |
机械仪表 | 93篇 |
建筑科学 | 130篇 |
矿业工程 | 37篇 |
能源动力 | 170篇 |
轻工业 | 591篇 |
水利工程 | 38篇 |
石油天然气 | 10篇 |
无线电 | 287篇 |
一般工业技术 | 564篇 |
冶金工业 | 454篇 |
原子能技术 | 37篇 |
自动化技术 | 636篇 |
出版年
2024年 | 12篇 |
2023年 | 47篇 |
2022年 | 127篇 |
2021年 | 182篇 |
2020年 | 123篇 |
2019年 | 105篇 |
2018年 | 139篇 |
2017年 | 132篇 |
2016年 | 142篇 |
2015年 | 100篇 |
2014年 | 184篇 |
2013年 | 271篇 |
2012年 | 250篇 |
2011年 | 273篇 |
2010年 | 200篇 |
2009年 | 185篇 |
2008年 | 212篇 |
2007年 | 165篇 |
2006年 | 116篇 |
2005年 | 102篇 |
2004年 | 81篇 |
2003年 | 66篇 |
2002年 | 67篇 |
2001年 | 59篇 |
2000年 | 52篇 |
1999年 | 53篇 |
1998年 | 95篇 |
1997年 | 66篇 |
1996年 | 62篇 |
1995年 | 56篇 |
1994年 | 33篇 |
1993年 | 45篇 |
1992年 | 23篇 |
1991年 | 29篇 |
1990年 | 18篇 |
1989年 | 17篇 |
1988年 | 17篇 |
1987年 | 16篇 |
1986年 | 14篇 |
1985年 | 20篇 |
1984年 | 16篇 |
1983年 | 14篇 |
1982年 | 22篇 |
1981年 | 16篇 |
1980年 | 12篇 |
1979年 | 13篇 |
1977年 | 17篇 |
1976年 | 11篇 |
1972年 | 11篇 |
1943年 | 21篇 |
排序方式: 共有4220条查询结果,搜索用时 46 毫秒
1.
Bruno Apolloni 《Cybernetics and Systems Analysis》1991,27(2):215-225
Two kinds of heuristics, fixed time and cut time, are proposed in order to use the running time available in solving 0–1 knapsack problems profitably.Translated from Kibernetika, No. 2, pp. 44–52, March–April, 1991. 相似文献
2.
3.
Sandra Aparecida de Assis Pedro Fernandes Bruno Sommer Ferreira Joaquim MS Cabral Olga Maria Mascarenhas Faria Oliveira 《Journal of chemical technology and biotechnology (Oxford, Oxfordshire : 1986)》2004,79(3):277-280
A partially purified extract of pectinmethylesterase (PME) from acerola fruit was immobilized on various supports: glass, celite, chrysotile, agarose, concanavalin A Sepharose 4B, egg shell, polyacrylamide and gelatin. In addition, reticulation with glutaraldehyde was assessed, as well as the use of gelatin in the presence of celite, glass and silica. The highest immobilization yields were obtained when the pectinmethylesterase was immobilized in concanavalin A Sepharose 4B (81.7%) and in gelatin‐water (78.0%). Copyright © 2004 Society of Chemical Industry 相似文献
4.
Bruno Buchmayr 《国际钢铁研究》1992,63(10):446-446
5.
We deal with a complex game between Alice and Bob where each contender’s probability of victory grows monotonically by unknown amounts with the resources employed. For a fixed effort on Alice’s part, Bob increases his resources on the basis of the results for each round (victory, tie or defeat) with the aim of reducing the probability of defeat to below a given threshold. We read this goal in terms of computing a confidence interval for the probability of losing and realize that the moves in some contests may bring in an indeterminacy trap: in certain games Bob cannot simultaneously have both a low probability-of-defeat measure and a narrow confidence interval. We use the inferential mechanism called twisting argument to compute the above interval on the basis of two joint statistics. Careful use of such statistics allows us to avoid indeterminacy. 相似文献
6.
Using physical memorabilia as opportunities to move into collocated digital photo-sharing 总被引:2,自引:0,他引:2
Michael Nunes Saul Greenberg Carman Neustaedter 《International journal of human-computer studies》2009,67(12):1087-1111
The uptake of digital photos vs. print photos has altered the practice of photo-sharing. Print photos are easy to share within the home, but much harder to share outside of it. The opposite is true of digital photos. People easily share digital photos outside the home, e.g., to family and friends by e-mail gift-giving, and to social networks and the broader public by web publishing. Yet within the home, collocated digital photo-sharing is harder, primarily because digital photos are typically stored on personal accounts in desktop computers located in home offices. This leads to several consequences. (1) The invisibility of digital photos implies few opportunities for serendipitous photo-sharing. (2) Access control and navigation issues inhibit family members from retrieving photo collections. (3) Photo viewing is compromised as digital photos are displayed on small screens in an uncomfortable viewing setting.To mitigate some of these difficulties, we explore how physical memorabilia collected by family members can create opportunities that encourage social and collocated digital photo-sharing. First, we studied (via contextual interviews with 20 households) how families currently practice photo-sharing and how they keep memorabilia. We identified classes of memorabilia that can serve as memory triggers to family events, trips, and times when people took photos. Second, we designed Souvenirs, a photo-viewing system that exploits memorabilia as a social instrument. Using Souvenirs, a family member can meaningfully associate physical memorabilia with particular photo-sets. Later, any family member can begin their story-telling with others through the physical memento, and then enrich the story by displaying its associated photos simply by moving the memento close to the home's large-format television screen. Third, we re-examined our design premises by evoking household reactions to an early version of Souvenirs. Based on these interviews, we redesigned Souvenirs to better reflect the preferences and real practices of photo and memorabilia use in the home. 相似文献
7.
This paper presents Latency-Energy Minimization Medium Access (LEMMA), a new TDMA-based MAC protocol for Wireless Sensor Networks (WSNs), specially suited to extend the lifetime of networks supporting alarm-driven, delay-sensitive applications characterized by convergecast traffic patterns and sporadic traffic generation. Its cascading time-slot assignment scheme conciliates low end-to-end latency with a low duty-cycle, while supporting multi-sink WSN topologies. Unlike most of the current solutions, LEMMA’s time-slot allocation protocol makes decisions based on the interference actually experienced by the nodes, instead of following the simple but potentially ineffective n-hop approach. Simulation results are presented to demonstrate the ineffectiveness of the n-hop time-slot allocation in comparison with LEMMA, as well as to evaluate the performance of LEMMA against L-MAC, T-MAC and Low Power Listening. The results show that under the target scenario conditions, LEMMA presents lower interference between assigned time-slots and lower end-to-end latency, while matching its best contender in terms of energy-efficiency. 相似文献
8.
Programming and Computer Software - A method for calculating the location of all types of level lines of a real polynomial on the real plane is proposed. To this end, the critical points and... 相似文献
9.
10.
Bruno Salvy 《Theoretical computer science》2011,412(35):4469-4470