全文获取类型
收费全文 | 580篇 |
免费 | 7篇 |
专业分类
电工技术 | 6篇 |
化学工业 | 79篇 |
金属工艺 | 37篇 |
机械仪表 | 28篇 |
建筑科学 | 5篇 |
矿业工程 | 1篇 |
能源动力 | 1篇 |
轻工业 | 24篇 |
水利工程 | 10篇 |
石油天然气 | 65篇 |
无线电 | 38篇 |
一般工业技术 | 110篇 |
冶金工业 | 103篇 |
原子能技术 | 36篇 |
自动化技术 | 44篇 |
出版年
2022年 | 22篇 |
2021年 | 6篇 |
2020年 | 6篇 |
2019年 | 14篇 |
2018年 | 23篇 |
2017年 | 15篇 |
2016年 | 23篇 |
2015年 | 7篇 |
2014年 | 16篇 |
2013年 | 21篇 |
2012年 | 19篇 |
2011年 | 19篇 |
2010年 | 12篇 |
2009年 | 16篇 |
2008年 | 18篇 |
2007年 | 17篇 |
2006年 | 14篇 |
2005年 | 7篇 |
2004年 | 6篇 |
2002年 | 11篇 |
2001年 | 9篇 |
1998年 | 20篇 |
1997年 | 13篇 |
1996年 | 13篇 |
1995年 | 11篇 |
1994年 | 6篇 |
1990年 | 11篇 |
1989年 | 6篇 |
1988年 | 7篇 |
1987年 | 7篇 |
1986年 | 9篇 |
1985年 | 6篇 |
1984年 | 11篇 |
1982年 | 7篇 |
1981年 | 8篇 |
1980年 | 6篇 |
1979年 | 10篇 |
1978年 | 9篇 |
1977年 | 11篇 |
1976年 | 8篇 |
1975年 | 5篇 |
1974年 | 13篇 |
1973年 | 9篇 |
1971年 | 7篇 |
1970年 | 5篇 |
1969年 | 5篇 |
1968年 | 5篇 |
1967年 | 7篇 |
1966年 | 5篇 |
1965年 | 6篇 |
排序方式: 共有587条查询结果,搜索用时 0 毫秒
31.
32.
33.
Martin Tomas Valtchev Petko Roux Louis-Romain 《Knowledge and Information Systems》2023,65(8):3295-3335
Knowledge and Information Systems - Mining frequent itemsets (FIs) from data streams is a challenging task due to the limited resources available w.r.t. the typically large size of the result and... 相似文献
34.
35.
36.
Éric Lunaud Ngoupé Clément Parisot Sylvan Stoesel Petko Valtchev Roger Villemaire Omar Cherkaoui Pierre Boucher Sylvain Hallé 《Journal of Network and Systems Management》2017,25(1):180-209
Configuration Logic (CL) is a formal language that allows a network engineer to express constraints in terms of the actual parameters found in the configuration of network devices. We present an efficient algorithm that can automatically check a pool of devices for conformance to a set of CL constraints; moreover, this algorithm can point to the part of the configuration responsible for the error when a constraint is violated. Contrary to other validation approaches that require dumping the configuration of the whole network to a central location in order to be verified, we also present an algorithm that analyzes the correct formulas and greatly helps reduce the amount of data that need to be transferred to that central location, pushing as much of the evaluation of the formula locally on each device. The procedure is also backwards-compatible, in such a way that a device that does not (or only partially) supports a local evaluation may simply return a subset or all of its configuration. These capabilities have been integrated into a network management tool called ValidMaker. 相似文献
37.
Elena Andreeva Andrey Bogdanov Bart Mennink Bart Preneel Christian Rechberger 《International Journal of Information Security》2012,11(2):103-120
In 2007, the US National Institute for Standards and Technology (NIST) announced a call for the design of a new cryptographic
hash algorithm in response to vulnerabilities like differential attacks identified in existing hash functions, such as MD5
and SHA-1. NIST received many submissions, 51 of which got accepted to the first round. 14 candidates were left in the second
round, out of which five candidates have been recently chosen for the final round. An important criterion in the selection
process is the SHA-3 hash function security. We identify two important classes of security arguments for the new designs:
(1) the possible reductions of the hash function security to the security of its underlying building blocks and (2) arguments
against differential attack on building blocks. In this paper, we compare the state of the art provable security reductions
for the second round candidates and review arguments and bounds against classes of differential attacks. We discuss all the
SHA-3 candidates at a high functional level, analyze, and summarize the security reduction results and bounds against differential
attacks. Additionally, we generalize the well-known proof of collision resistance preservation, such that all SHA-3 candidates
with a suffix-free padding are covered. 相似文献
38.
Natalya N. Barabanova Victor V. Belyaev Dmitriy L. Bogdanov Vladimir G. Chigrinov Artem K. Dadivanyan Artem P. Nazarov Olga V. Noah 《Journal of the Society for Information Display》2015,23(10):486-490
A method of controlling anchoring energy of surface interaction of liquid crystal photoaligning substances is considered to enhance the liquid crystal display performances. An important parameter of the dye's molecular structure that determines the ratio of polar and azimuthal anchoring energy is the ability to form dimers. The values of dimerization thermodynamic potentials have been found. The probability of the formation of dye molecules dimers is evaluated. The bonds conjugation transfer via intermolecular hydrogen bond is revealed, and anisotropy of polarizability of the hydrogen bond is evaluated. The effect of dimerization on polar and azimuthal anchoring energy of liquid crystal — azo dye system — is shown. 相似文献
39.
Laszlo Szathmary Petko Valtchev Amedeo Napoli Robert Godin Alix Boc Vladimir Makarenkov 《Annals of Mathematics and Artificial Intelligence》2014,70(1-2):81-105
In pattern mining and association rule mining, there is a variety of algorithms for mining frequent closed itemsets (FCIs) and frequent generators (FGs), whereas a smaller part further involves the precedence relation between FCIs. The interplay of these three constructs and their joint computation have been studied within the formal concept analysis (FCA) field yet none of the proposed algorithms is scalable. In frequent pattern mining, at least one suite of efficient algorithms has been designed that exploits basically the same ideas and follows the same overall computational schema. Based on an in-depth analysis of the aforementioned interplay that is rooted in a fundamental duality from hypergraph theory, we propose a new schema that should enable for a more parsimonious computation. We exemplify the new schema in the design of Snow-Touch, a concrete FCI/FG/precedence miner that reuses an existing algorithm, Charm, for mining FCIs, and completes it with two original methods for mining FGs and precedence, respectively. The performance of Snow-Touch and of its closest competitor, Charm-L, were experimentally compared using a large variety of datasets. The outcome of the experimental study suggests that our method outperforms Charm-L on dense data while on sparse one the trend is reversed. Furthermore, we demonstrate the usefulness of our method and the new schema through an application to the analysis of a genome dataset. The initial results reported here confirm the capacity of the method to focus on significant associations. 相似文献
40.
A new theory is proposed for quantum-mechanical multichannel scattering in a collinear three-body system. This simple problem
is used to show that the principle of quantum determinism is generally violated and we are dealing with microirreversible
quantum mechanics. Fundamental calculations of quantum (wave) chaos are presented for the first time for the elementary reaction
Li+(FH)→(LiFH)*→LiF+H.
Pis’ma Zh. Tekh. Fiz. 25, 12–22 (August 26, 1999) 相似文献