首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   580篇
  免费   7篇
电工技术   6篇
化学工业   79篇
金属工艺   37篇
机械仪表   28篇
建筑科学   5篇
矿业工程   1篇
能源动力   1篇
轻工业   24篇
水利工程   10篇
石油天然气   65篇
无线电   38篇
一般工业技术   110篇
冶金工业   103篇
原子能技术   36篇
自动化技术   44篇
  2022年   22篇
  2021年   6篇
  2020年   6篇
  2019年   14篇
  2018年   23篇
  2017年   15篇
  2016年   23篇
  2015年   7篇
  2014年   16篇
  2013年   21篇
  2012年   19篇
  2011年   19篇
  2010年   12篇
  2009年   16篇
  2008年   18篇
  2007年   17篇
  2006年   14篇
  2005年   7篇
  2004年   6篇
  2002年   11篇
  2001年   9篇
  1998年   20篇
  1997年   13篇
  1996年   13篇
  1995年   11篇
  1994年   6篇
  1990年   11篇
  1989年   6篇
  1988年   7篇
  1987年   7篇
  1986年   9篇
  1985年   6篇
  1984年   11篇
  1982年   7篇
  1981年   8篇
  1980年   6篇
  1979年   10篇
  1978年   9篇
  1977年   11篇
  1976年   8篇
  1975年   5篇
  1974年   13篇
  1973年   9篇
  1971年   7篇
  1970年   5篇
  1969年   5篇
  1968年   5篇
  1967年   7篇
  1966年   5篇
  1965年   6篇
排序方式: 共有587条查询结果,搜索用时 0 毫秒
31.
32.
33.
Knowledge and Information Systems - Mining frequent itemsets (FIs) from data streams is a challenging task due to the limited resources available w.r.t. the typically large size of the result and...  相似文献   
34.
35.
36.
Configuration Logic (CL) is a formal language that allows a network engineer to express constraints in terms of the actual parameters found in the configuration of network devices. We present an efficient algorithm that can automatically check a pool of devices for conformance to a set of CL constraints; moreover, this algorithm can point to the part of the configuration responsible for the error when a constraint is violated. Contrary to other validation approaches that require dumping the configuration of the whole network to a central location in order to be verified, we also present an algorithm that analyzes the correct formulas and greatly helps reduce the amount of data that need to be transferred to that central location, pushing as much of the evaluation of the formula locally on each device. The procedure is also backwards-compatible, in such a way that a device that does not (or only partially) supports a local evaluation may simply return a subset or all of its configuration. These capabilities have been integrated into a network management tool called ValidMaker.  相似文献   
37.
In 2007, the US National Institute for Standards and Technology (NIST) announced a call for the design of a new cryptographic hash algorithm in response to vulnerabilities like differential attacks identified in existing hash functions, such as MD5 and SHA-1. NIST received many submissions, 51 of which got accepted to the first round. 14 candidates were left in the second round, out of which five candidates have been recently chosen for the final round. An important criterion in the selection process is the SHA-3 hash function security. We identify two important classes of security arguments for the new designs: (1) the possible reductions of the hash function security to the security of its underlying building blocks and (2) arguments against differential attack on building blocks. In this paper, we compare the state of the art provable security reductions for the second round candidates and review arguments and bounds against classes of differential attacks. We discuss all the SHA-3 candidates at a high functional level, analyze, and summarize the security reduction results and bounds against differential attacks. Additionally, we generalize the well-known proof of collision resistance preservation, such that all SHA-3 candidates with a suffix-free padding are covered.  相似文献   
38.
A method of controlling anchoring energy of surface interaction of liquid crystal photoaligning substances is considered to enhance the liquid crystal display performances. An important parameter of the dye's molecular structure that determines the ratio of polar and azimuthal anchoring energy is the ability to form dimers. The values of dimerization thermodynamic potentials have been found. The probability of the formation of dye molecules dimers is evaluated. The bonds conjugation transfer via intermolecular hydrogen bond is revealed, and anisotropy of polarizability of the hydrogen bond is evaluated. The effect of dimerization on polar and azimuthal anchoring energy of liquid crystal — azo dye system — is shown.  相似文献   
39.
In pattern mining and association rule mining, there is a variety of algorithms for mining frequent closed itemsets (FCIs) and frequent generators (FGs), whereas a smaller part further involves the precedence relation between FCIs. The interplay of these three constructs and their joint computation have been studied within the formal concept analysis (FCA) field yet none of the proposed algorithms is scalable. In frequent pattern mining, at least one suite of efficient algorithms has been designed that exploits basically the same ideas and follows the same overall computational schema. Based on an in-depth analysis of the aforementioned interplay that is rooted in a fundamental duality from hypergraph theory, we propose a new schema that should enable for a more parsimonious computation. We exemplify the new schema in the design of Snow-Touch, a concrete FCI/FG/precedence miner that reuses an existing algorithm, Charm, for mining FCIs, and completes it with two original methods for mining FGs and precedence, respectively. The performance of Snow-Touch and of its closest competitor, Charm-L, were experimentally compared using a large variety of datasets. The outcome of the experimental study suggests that our method outperforms Charm-L on dense data while on sparse one the trend is reversed. Furthermore, we demonstrate the usefulness of our method and the new schema through an application to the analysis of a genome dataset. The initial results reported here confirm the capacity of the method to focus on significant associations.  相似文献   
40.
A new theory is proposed for quantum-mechanical multichannel scattering in a collinear three-body system. This simple problem is used to show that the principle of quantum determinism is generally violated and we are dealing with microirreversible quantum mechanics. Fundamental calculations of quantum (wave) chaos are presented for the first time for the elementary reaction Li+(FH)→(LiFH)*→LiF+H. Pis’ma Zh. Tekh. Fiz. 25, 12–22 (August 26, 1999)  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号