全文获取类型
收费全文 | 8476篇 |
免费 | 431篇 |
国内免费 | 14篇 |
专业分类
电工技术 | 94篇 |
综合类 | 2篇 |
化学工业 | 2043篇 |
金属工艺 | 200篇 |
机械仪表 | 156篇 |
建筑科学 | 303篇 |
矿业工程 | 13篇 |
能源动力 | 271篇 |
轻工业 | 780篇 |
水利工程 | 78篇 |
石油天然气 | 28篇 |
武器工业 | 6篇 |
无线电 | 658篇 |
一般工业技术 | 1717篇 |
冶金工业 | 1070篇 |
原子能技术 | 46篇 |
自动化技术 | 1456篇 |
出版年
2023年 | 61篇 |
2022年 | 128篇 |
2021年 | 186篇 |
2020年 | 174篇 |
2019年 | 146篇 |
2018年 | 199篇 |
2017年 | 205篇 |
2016年 | 272篇 |
2015年 | 181篇 |
2014年 | 283篇 |
2013年 | 643篇 |
2012年 | 471篇 |
2011年 | 568篇 |
2010年 | 389篇 |
2009年 | 399篇 |
2008年 | 535篇 |
2007年 | 450篇 |
2006年 | 394篇 |
2005年 | 327篇 |
2004年 | 301篇 |
2003年 | 262篇 |
2002年 | 217篇 |
2001年 | 137篇 |
2000年 | 118篇 |
1999年 | 139篇 |
1998年 | 188篇 |
1997年 | 147篇 |
1996年 | 140篇 |
1995年 | 124篇 |
1994年 | 141篇 |
1993年 | 95篇 |
1992年 | 73篇 |
1991年 | 59篇 |
1990年 | 54篇 |
1989年 | 75篇 |
1988年 | 55篇 |
1987年 | 31篇 |
1986年 | 34篇 |
1985年 | 45篇 |
1984年 | 46篇 |
1983年 | 35篇 |
1982年 | 33篇 |
1981年 | 48篇 |
1980年 | 36篇 |
1979年 | 27篇 |
1978年 | 27篇 |
1977年 | 24篇 |
1976年 | 28篇 |
1974年 | 29篇 |
1973年 | 18篇 |
排序方式: 共有8921条查询结果,搜索用时 15 毫秒
71.
The timestamp problem captures a fundamental aspect of asynchronous distributed computing. It allows processes to label events
throughout the system with timestamps that provide information about the real-time ordering of those events. We consider the
space complexity of wait-free implementations of timestamps from shared read-write registers in a system of n processes. We prove an lower bound on the number of registers required. If the timestamps are elements of a nowhere dense set, for example the integers,
we prove a stronger, and tight, lower bound of n. However, if timestamps are not from a nowhere dense set, this bound can be beaten: we give an implementation that uses n − 1 (single-writer) registers. We also consider the special case of anonymous implementations, where processes are programmed
identically and do not have unique identifiers. In contrast to the general case, we prove anonymous timestamp implementations
require n registers. We also give an implementation to prove that this lower bound is tight. This is the first anonymous timestamp
implementation that uses a finite number of registers. 相似文献
72.
Studies have demonstrated that students prefer PowerPoint and respond favorably to classes when it is used. Few studies have addressed the physical structure of PowerPoint. In this study, students enrolled in several psychology classes on two campuses completed a 36 item questionnaire regarding their preferences for the use of PowerPoint in the classroom. Students preferred the use of key phrase outlines, pictures and graphs, slides to be built line by line, sounds from popular media or that support the pictures or graphics on the slide, color backgrounds, and to have the lights dimmed. It is recommended that professors pay attention to the physical aspects of PowerPoint slides and handouts to further enhance students’ educational experience. 相似文献
73.
Eric C.C. Tsang Chen Degang Daniel S. Yeung 《Computers & Mathematics with Applications》2008,56(1):279-289
The covering generalized rough sets are an improvement of traditional rough set model to deal with more complex practical problems which the traditional one cannot handle. It is well known that any generalization of traditional rough set theory should first have practical applied background and two important theoretical issues must be addressed. The first one is to present reasonable definitions of set approximations, and the second one is to develop reasonable algorithms for attributes reduct. The existing covering generalized rough sets, however, mainly pay attention to constructing approximation operators. The ideas of constructing lower approximations are similar but the ideas of constructing upper approximations are different and they all seem to be unreasonable. Furthermore, less effort has been put on the discussion of the applied background and the attributes reduct of covering generalized rough sets. In this paper we concentrate our discussion on the above two issues. We first discuss the applied background of covering generalized rough sets by proposing three kinds of datasets which the traditional rough sets cannot handle and improve the definition of upper approximation for covering generalized rough sets to make it more reasonable than the existing ones. Then we study the attributes reduct with covering generalized rough sets and present an algorithm by using discernibility matrix to compute all the attributes reducts with covering generalized rough sets. With these discussions we can set up a basic foundation of the covering generalized rough set theory and broaden its applications. 相似文献
74.
Eric Angel Evripidis Bampis Fanny Pascual Alex-Ariel Tchetgnia 《Journal of Scheduling》2009,12(5):437-445
We consider the problem of designing truthful mechanisms for scheduling n tasks on a set of m parallel related machines in order to minimize the makespan. In what follows, we consider that each task is owned by a selfish
agent. This is a variant of the KP-model introduced by Koutsoupias and Papadimitriou (Proc. of STACS 1999, pp. 404–413, 1999) (and of the CKN-model of Christodoulou et al. in Proc. of ICALP 2004, pp. 345–357, 2004) in which the agents cannot choose the machine on which their tasks will be executed. This is done by a centralized authority,
the scheduler. However, the agents may manipulate the scheduler by providing false information regarding the length of their
tasks. We introduce the notion of increasing algorithm and a simple reduction that transforms any increasing algorithm into
a truthful one. Furthermore, we show that some of the classical scheduling algorithms are indeed increasing: the LPT algorithm,
the PTAS of Graham (SIAM J. Appl. Math. 17(2):416–429, 1969) in the case of two machines, as well as a simple PTAS for the case of m machines, with m a fixed constant. Our results yield a randomized r(1+ε)-approximation algorithm where r is the ratio between the largest and the smallest speed of the related machines. Furthermore, by combining our approach with
the classical result of Shmoys et al. (SIAM J. Comput. 24(6):1313–1331, 1995), we obtain a randomized 2r(1+ε)-competitive algorithm. It has to be noticed that these results are obtained without payments, unlike most of the existing
works in the field of Mechanism Design. Finally, we show that if payments are allowed then our approach gives a (1+ε)-algorithm for the off-line case with related machines. 相似文献
75.
Practical Interdomain Routing Security 总被引:1,自引:0,他引:1
This article reviews risks and vulnerabilities in interdomain routing and best practices that can have near-term benefits for routing security. It includes examples of routing failures and common attacks on routers, and countermeasures to reduce router vulnerabilities. 相似文献
76.
Reza Samavi Eric Yu Thodoros Topaloglou 《Information Systems and E-Business Management》2009,7(2):171-198
Strategic reasoning about business models is an integral part of service design. In fast moving markets, businesses must be able to recognize and respond strategically to disruptive change. They have to answer questions such as: what are the threats and opportunities in emerging technologies and innovations? How should they target customer groups? Who are their real competitors? How will competitive battles take shape? In this paper we define a strategic modeling framework to help understand and analyze the goals, intentions, roles, and the rationale behind the strategic actions in a business environment. This understanding is necessary in order to improve existing or design new services. The key component of the framework is a strategic business model ontology for representing and analyzing business models and strategies, using the i* agent and goal oriented methodology as a basis. The ontology introduces a strategy layer which reasons about alternative strategies that are realized in the operational layer. The framework is evaluated using a retroactive example of disruptive technology in the telecommunication services sector from the literature. 相似文献
77.
Distance learning's interfaces—from corresponding through the postal service to the televised talking head—have traditionally been designed from the top down, supporting banking models of learning or, in writing instruction, current-traditional rhetoric pedagogies. Due to temporal and spatial constraints, these interface designs often support (or encourage) one-way communication from the instructor to the student. Students mostly interact with the instructor by asking questions or submitting work, and they tend to have little correspondence with other peers. These methods clearly privilege the instructor's knowledge and evaluation. Furthermore, these interface designs empower the instructor to gaze upon the students and assess them—often not as a corporeal body but as a corpus of texts. Thus, each interface adopted for distance learning sets up a power dynamic in which the capability to share the roles of creating knowledge is juxtaposed with the instructor's capability to normalize the students and reify their own authority through their gaze. In this article we examine the traditional classroom interface through the correspondence course interface, the simulated classroom interface, and the synchronous video interface to raise questions about the infrastructures of distance learning and their implications for student learning. 相似文献
78.
Inclined surfaces, where both the lifter and load are on the slope, may be encountered in a jobsite situation. The purpose of this study was to determine if facing up or down a sloped surface (10 degrees and 20 degrees ) would affect maximal acceptable weights of lift (MAWL) using a 10 min psychophysical approach with symmetric freestyle technique at 4 lifts/min. Seventeen healthy men and 18 women determined floor to knuckle height MAWL while facing uphill, downhill, and on a level surface. Motion capture was also performed to examine sagittal plane joint angles and foot placement relative to a milk crate. Slope did not alter MAWL (p>0.05) with the men lifting more than the women in every condition (p<0.001) (25 kg vs. 15 kg, respectively). Foot placement relative to the box was altered by slope such that both horizontal position behind and vertical position below the box increased as slope changed from the downhill to uphill conditions (both p<0.001). Forward torso lean as well as hip, knee, and ankle (plantar) flexion generally decreased as slope changed from the downhill to uphill conditions (all p<0.001). Torso and knee motion appeared to be protected compared to the other joints, changing the least. Though trends were the same in both sexes, interactions did exist in vertical foot position and hip angle (both p0.001). In conclusion, the body is highly adaptive to floor slope, maintaining MAWL at least in the short term. However, while slight technique differences exist between men and women, care should be taken by all when facing uphill due to the tendency to stand further from the load horizontally and when facing downhill due to increased torso lean. 相似文献
79.
新建工厂的无线技术应用已逐步获得认可,然而,还有一些过程工业对采用这项新技术或其它新的解决方案存有疑虑,主要担心多种无线技术互相之间可能存在射频干扰而影响主要通讯的可靠性,例如使用IEEE 802.11b/g和IEEE 802.15.4协议的无线电。因为两种无线电通讯采用的也是用于工业、科技和医疗的2.4GHz波段,业内人士曾 相似文献
80.
Norbert Kuhn Klaus Madlener Friedrich Otto 《Applicable Algebra in Engineering, Communication and Computing》1994,5(5):287-316
Algorithms for solving uniform decision problems for algebraic structures crucially depend on the chosen finite presentations for the structures under consideration. Rewriting techniques have been used very successfully to solve uniform decision problems, when the presentations considered involve finite, noetherian, and ()-confluent rewriting systems. Whenever the class of algebraic structures considered is closed under the operation of taking finitely generated substructures, then the algorithms for solving the uniform decision problems can be applied to the substructures as well. However, since these algorithms depend on the form of the presentations, this involves the task of constructing a presentation of a certain form for a substructure given a presentation of this form for the structure itself and a finite set of generating elements for the substructure.This problem, which has received a lot of attention in algebra, is here investigated from an algorithmic point of view. The structures considered are the following two classes of groups, which have been studied extensively before: the polycyclic groups and the context-free groups.Finitely generated context-free groups can be presented by finite, monadic, and -confluent string-rewriting systems. Due to their nice algorithmic properties these systems provide a way to effectively solve many decision problems for context-free groups. Since finitely generated subgroups of context-free groups are again contextfree, they can be presented in the same way. Here we describe a process that, from a finite, monadic, and -confluent string-rewriting system presenting a context-free groupG and a finite subsetU ofG, determines a presentation of this form for the subgroup U ofG that is generated byU. For finitely presented polycyclic groups we obtain an analogous result, when we use finite confluent PCP2-presentations to describe these groups.This work was performed while this author was visiting at the Fachbereich Informatik, Universität Kaiserslautern, during his sabbatical 1991/92 相似文献