全文获取类型
收费全文 | 588篇 |
免费 | 7篇 |
国内免费 | 1篇 |
专业分类
电工技术 | 10篇 |
化学工业 | 65篇 |
金属工艺 | 8篇 |
机械仪表 | 8篇 |
建筑科学 | 43篇 |
矿业工程 | 7篇 |
能源动力 | 21篇 |
轻工业 | 49篇 |
水利工程 | 3篇 |
石油天然气 | 1篇 |
无线电 | 61篇 |
一般工业技术 | 86篇 |
冶金工业 | 114篇 |
原子能技术 | 3篇 |
自动化技术 | 117篇 |
出版年
2023年 | 4篇 |
2022年 | 3篇 |
2021年 | 9篇 |
2020年 | 3篇 |
2019年 | 7篇 |
2018年 | 4篇 |
2017年 | 7篇 |
2016年 | 5篇 |
2015年 | 6篇 |
2014年 | 10篇 |
2013年 | 51篇 |
2012年 | 29篇 |
2011年 | 19篇 |
2010年 | 22篇 |
2009年 | 19篇 |
2008年 | 35篇 |
2007年 | 25篇 |
2006年 | 24篇 |
2005年 | 25篇 |
2004年 | 17篇 |
2003年 | 28篇 |
2002年 | 18篇 |
2001年 | 20篇 |
2000年 | 21篇 |
1999年 | 18篇 |
1998年 | 20篇 |
1997年 | 9篇 |
1996年 | 12篇 |
1995年 | 13篇 |
1994年 | 4篇 |
1993年 | 10篇 |
1992年 | 11篇 |
1991年 | 12篇 |
1990年 | 4篇 |
1989年 | 4篇 |
1988年 | 4篇 |
1986年 | 8篇 |
1985年 | 6篇 |
1984年 | 5篇 |
1981年 | 5篇 |
1979年 | 3篇 |
1977年 | 4篇 |
1974年 | 3篇 |
1941年 | 2篇 |
1940年 | 2篇 |
1909年 | 2篇 |
1906年 | 3篇 |
1904年 | 2篇 |
1902年 | 2篇 |
1898年 | 2篇 |
排序方式: 共有596条查询结果,搜索用时 15 毫秒
51.
52.
Ed Wehde 《Network Security》2000,2000(2):5
It looks like 2000 could be a big year for public key infrastructure (PKI). Five leading vendors this week announced the formation of the PKI Forum with the intention of moving the technology forward as an E-commerce enabler. 相似文献
53.
54.
Ed Blakey 《Natural computing》2011,10(4):1245-1259
Unconventional computers—which may, for example, exploit chemical/analogue/quantum phenomena in order to compute, rather than
electronically implementing discrete logic gates—are widely studied in both theoretical and practical contexts. One particular
motivation behind unconventional computation is the desire efficiently to solve classically difficult problems—we recall chemical-computer
attempts at solving
NP
-complete problems such as the Travelling Salesperson Problem—, with computational complexity theory offering the criteria
for judging this efficiency. However, care must be taken here; conventional (Turing-machine-style) complexity analysis is
not always appropriate for unconventional computers: new, non-standard computational resources, with correspondingly new complexity
measures, are often required. Accordingly, we discuss in the present paper various resources beyond merely time and space
(and, indeed, discuss various interpretations of the term ‘resource’ itself), advocating such resources’ consideration when
analysing the complexity of unconventional computers. We hope that this acts as a useful starting point for practitioners
of unconventional computing and computational complexity. 相似文献
55.
Ed Wehde 《Computer Fraud & Security》1999,1999(6):6
A pioneer of anti-spam software and E-mail programs has formed partnerships with a number of leading industry players to combat the growing problem of spam, or unsolicited E-mail. 相似文献
56.
Ed Wehde 《Computer Fraud & Security》1999,1999(3):7
A new disaster recovery initiative is just being launched in the US by 20 vendors. The vendors including Dell Computer, Hewlett-Packard, IBM and Sun Microsystems and led by Quantum Systems have launched Prove-IT to offer the small and medium-sized business continuity and archiving services. Prove-IT is aimed at companies with annual revenue between $50 million and $500 million. There are plans to expand the initiative to Europe, according to Margaret Pereira, spokesperson for Quantum, but she gave “six months to a year” as a time frame for when the programme may move overseas. 相似文献
57.
2003.3/下半月 www.eepw.com.cn电子产品世界本文给出一个简单、完整的传感器基测量系统设计,该系统是用测量两个光束隔断的时间来测量运动物体的速度。此设计包括显示和状态指示器、时间保持和控制功能所需的所有数字逻辑以及连接提供光感测功能的IR(红外)LED和光二极管所必须的模拟信号处理。系统测量经过时间范围是毫秒~分钟量级。本系统有4个主要的子系统(见图1):用户接口,传感器接口/接收器,计数器/显示逻辑和主机控制逻辑。用户接口由7位LED数字显示(显示经过时间)、几个状态LED和两个按钮开关(RESE… 相似文献
58.
Three studies were conducted to determine whether physical attractiveness (PAT) is related to subjective well-being (SWB). In the first study (N?=?221), unselected students were photographed and videotaped. In the second study (N?=?131), participants were selected on the basis of extremes in PAT, and in the third study (N?=?155), participants were preselected for extreme scores on SWB. Correlations between SWB and PAT varied from .03 to .33. In Study 1 the mean correlation between PAT and SWB was .13. When appearance enhancers (hair, clothing, and jewelry) were covered or removed in Studies 2 and 3, the correlation between PAT and SWB dropped, suggesting that part of the SWB–PAT relation might be due to happier people doing more to enhance their beauty. The impact of PAT on SWB may be mitigated by the fact that others agree on a target's PAT at only modest levels. It was found that self-perceptions of PAT were correlated with both one's objective PAT and one's SWB. (PsycINFO Database Record (c) 2010 APA, all rights reserved) 相似文献
59.
Process flight simulation tools can help managers understand the dynamics of new processes and technologies before they are introduced. This article tells how these exploratory tools can be used for IS project management, simple modeling of the software process, and modeling the dynamics of the IS organization in transition. 相似文献
60.
Ed Dawson Kapali Viswanathan Colin Boyd 《International Journal of Information Security》2002,1(3):189-202
Literally, the word compliance suggests conformity in fulfilling official requirements. This paper presents the results of
the analysis and design of a class of protocols called compliant cryptologic protocols (CCPs). The paper presents a notion
for compliance in cryptosystems that is conducive as a cryptologic goal. CCPs are employed in security systems used by at
least two mutually mistrusting sets of entities. The individuals in the sets of entities only trust the design of the security
system and any trusted third party the security system may include. Such a security system can be thought of as a broker between
the mistrusting sets of entities.
Published online: 15 November 2002 相似文献