全文获取类型
收费全文 | 51269篇 |
免费 | 4608篇 |
国内免费 | 2096篇 |
专业分类
电工技术 | 2615篇 |
技术理论 | 3篇 |
综合类 | 2593篇 |
化学工业 | 9520篇 |
金属工艺 | 2882篇 |
机械仪表 | 3415篇 |
建筑科学 | 3182篇 |
矿业工程 | 1340篇 |
能源动力 | 1616篇 |
轻工业 | 3402篇 |
水利工程 | 692篇 |
石油天然气 | 2595篇 |
武器工业 | 347篇 |
无线电 | 6529篇 |
一般工业技术 | 7496篇 |
冶金工业 | 2719篇 |
原子能技术 | 549篇 |
自动化技术 | 6478篇 |
出版年
2024年 | 264篇 |
2023年 | 961篇 |
2022年 | 1650篇 |
2021年 | 2422篇 |
2020年 | 1799篇 |
2019年 | 1684篇 |
2018年 | 1790篇 |
2017年 | 1837篇 |
2016年 | 1750篇 |
2015年 | 2174篇 |
2014年 | 2663篇 |
2013年 | 3205篇 |
2012年 | 3272篇 |
2011年 | 3762篇 |
2010年 | 2972篇 |
2009年 | 2891篇 |
2008年 | 2892篇 |
2007年 | 2449篇 |
2006年 | 2572篇 |
2005年 | 2088篇 |
2004年 | 1539篇 |
2003年 | 1399篇 |
2002年 | 1293篇 |
2001年 | 1125篇 |
2000年 | 1062篇 |
1999年 | 1136篇 |
1998年 | 949篇 |
1997年 | 804篇 |
1996年 | 715篇 |
1995年 | 581篇 |
1994年 | 460篇 |
1993年 | 314篇 |
1992年 | 255篇 |
1991年 | 234篇 |
1990年 | 185篇 |
1989年 | 178篇 |
1988年 | 110篇 |
1987年 | 97篇 |
1986年 | 66篇 |
1985年 | 58篇 |
1984年 | 46篇 |
1983年 | 45篇 |
1982年 | 34篇 |
1981年 | 28篇 |
1980年 | 28篇 |
1979年 | 21篇 |
1978年 | 19篇 |
1977年 | 13篇 |
1976年 | 22篇 |
1973年 | 16篇 |
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
101.
This paper analyzes the execution behavior of “No Random Accesses” (NRA) and determines the depths to which each sorted file is scanned in growing phase and shrinking phase of NRA respectively. The analysis shows that NRA needs to maintain a large quantity of candidate tuples in growing phase on massive data. Based on the analysis, this paper proposes a novel top-k algorithm Top-K with Early Pruning (TKEP) which performs early pruning in growing phase. General rule and mathematical analysis for early pruning are presented in this paper. The theoretical analysis shows that early pruning can prune most of the candidate tuples. Although TKEP is an approximate method to obtain the top-k result, the probability for correctness is extremely high. Extensive experiments show that TKEP has a significant advantage over NRA. 相似文献
102.
Tich Phuoc Tran Thi Thanh Sang Nguyen Poshiang Tsai Xiaoying Kong 《Artificial Intelligence Review》2011,35(4):369-382
In the modern age of Internet connectivity, advanced information systems have accumulated huge volumes of data. Such fast
growing, tremendous amount of data, collected and stored in large databases has far exceeded our human ability to comprehend
without proper tools. There has been a great deal of research conducted to explore the potential applications of Machine Learning
technologies in Security Informatics. This article studies the Network Security Detection problems in which predictive models
are constructed to detect network security breaches such as spamming. Due to overwhelming volume of data, complexity and dynamics
of computer networks and evolving cyber threats, current security systems suffer limited performance with low detection accuracy
and high number of false alarms. To address such performance issues, a novel Machine Learning algorithm, namely Boosted Subspace
Probabilistic Neural Network (BSPNN), has been proposed which combines a Radial Basis Function Neural Network with an innovative
diversity-based ensemble learning framework. Extensive empirical analyses suggested that BSPNN achieved high detection accuracy
with relatively small computational complexity compared with other conventional detection methods. 相似文献
103.
104.
Kunsoo Han Robert J. Kauffman Barrie R. Nault 《Information Technology and Management》2008,9(3):181-200
Implementation and maintenance of interorganizational systems (IOS) require investments by all the participating firms. Compared
with intraorganizational systems, however, there are additional uncertainties and risks. This is because the benefits of IOS
investment depend not only on a firm’s own decisions, but also on those of its business partners. Without appropriate levels
of investment by all the firms participating in an IOS, they cannot reap the full benefits. Drawing upon the literature in
institutional economics, we examine IOS ownership as a means to induce value-maximizing noncontractible investments. We model
the impact of two factors derived from the theory of incomplete contracts and transaction cost economics: relative importance
of investments and specificity of investments. We apply the model to a vendor-managed inventory system (VMI) in a supply chain
setting. We show that when the specificity of investments is high, this is a more critical determinant of optimal ownership
structure than the relative importance of investments. As technologies used in IOS become increasingly redeployable and reusable,
and less specific, the relative importance of investments becomes a dominant factor. We also show that the bargaining mechanism—or
the agreed upon approach to splitting the incremental payoffs—that is used affects the relationship between these factors
in determining the optimal ownership structure of an IOS.
相似文献
Barrie R. NaultEmail: |
105.
A study on combined manual materials-handling tasks performed on floors under three friction levels was conducted. Eight male subjects participated in the study. The maximum acceptable weight of handling, including lifting, carrying for 3m, lowering, and walking 3m back at twice per minute was determined. The subject then performed the same tasks for 10 min. Heart rate, Vo2, energy efficiency, perceived sense of slip, and rating of perceived exertion for whole body strain were measured. The results showed that the effects of friction level on the maximum acceptable weights of handling, perceived sense of slip, Vo2, and energy efficiency were statistically significant (p相似文献
106.
The election problem in asynchronous distributed systems with bounded faulty processes 总被引:1,自引:1,他引:0
Sung Hoon Park 《The Journal of supercomputing》2007,41(1):89-104
Determining the “weakest” failure detectors is a central topic in solving many agreement problems such as Consensus, Non-Blocking
Atomic Commit and Election in asynchronous distributed systems. So far, this has been studied extensively for several such
fundamental problems. It is stated that Perfect Failure Detector P is the weakest failure detector to solve the Election problem with any number of faulty processes. In this paper, we introduce
Modal failure detector M and show that to solve Election, M is the weakest failure detector to solve election when the number of faulty processes is less than ⌈n/2⌉. We also show that it is strictly weaker than P.
相似文献
Sung Hoon ParkEmail: |
107.
本文从互连网发展的趋势入手,对路径模式发掘进行了研究。先简要介绍数据库发掘的概况及网上数据发掘的特点,后结合关联法和组合概率法,并以算法和实例详细对之进行分析。 相似文献
108.
Scalable parallel data mining for association rules 总被引:3,自引:0,他引:3
Eui-Hong Han Karypis G. Kumar V. 《Knowledge and Data Engineering, IEEE Transactions on》2000,12(3):337-352
The authors propose two new parallel formulations of the Apriori algorithm (R. Agrawal and R. Srikant, 1994) that is used for computing association rules. These new formulations, IDD and HD, address the shortcomings of two previously proposed parallel formulations CD and DD. Unlike the CD algorithm, the IDD algorithm partitions the candidate set intelligently among processors to efficiently parallelize the step of building the hash tree. The IDD algorithm also eliminates the redundant work inherent in DD, and requires substantially smaller communication overhead than DD. But IDD suffers from the added cost due to communication of transactions among processors. HD is a hybrid algorithm that combines the advantages of CD and DD. Experimental results on a 128-processor Cray T3E show that HD scales just as well as the CD algorithm with respect to the number of transactions, and scales as well as IDD with respect to increasing candidate set size 相似文献
109.
110.