全文获取类型
收费全文 | 18139篇 |
免费 | 470篇 |
国内免费 | 18篇 |
专业分类
电工技术 | 238篇 |
综合类 | 9篇 |
化学工业 | 3587篇 |
金属工艺 | 282篇 |
机械仪表 | 312篇 |
建筑科学 | 1100篇 |
矿业工程 | 109篇 |
能源动力 | 505篇 |
轻工业 | 1386篇 |
水利工程 | 158篇 |
石油天然气 | 194篇 |
武器工业 | 1篇 |
无线电 | 1075篇 |
一般工业技术 | 2886篇 |
冶金工业 | 4177篇 |
原子能技术 | 162篇 |
自动化技术 | 2446篇 |
出版年
2022年 | 139篇 |
2021年 | 215篇 |
2020年 | 172篇 |
2019年 | 224篇 |
2018年 | 267篇 |
2017年 | 261篇 |
2016年 | 319篇 |
2015年 | 239篇 |
2014年 | 380篇 |
2013年 | 1101篇 |
2012年 | 664篇 |
2011年 | 870篇 |
2010年 | 675篇 |
2009年 | 665篇 |
2008年 | 858篇 |
2007年 | 871篇 |
2006年 | 686篇 |
2005年 | 722篇 |
2004年 | 559篇 |
2003年 | 572篇 |
2002年 | 510篇 |
2001年 | 330篇 |
2000年 | 301篇 |
1999年 | 305篇 |
1998年 | 315篇 |
1997年 | 305篇 |
1996年 | 299篇 |
1995年 | 335篇 |
1994年 | 270篇 |
1993年 | 304篇 |
1992年 | 274篇 |
1991年 | 165篇 |
1990年 | 237篇 |
1989年 | 284篇 |
1988年 | 205篇 |
1987年 | 216篇 |
1986年 | 211篇 |
1985年 | 265篇 |
1984年 | 259篇 |
1983年 | 229篇 |
1982年 | 218篇 |
1981年 | 214篇 |
1980年 | 172篇 |
1979年 | 187篇 |
1978年 | 177篇 |
1977年 | 177篇 |
1976年 | 147篇 |
1975年 | 178篇 |
1974年 | 165篇 |
1973年 | 133篇 |
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
81.
The mobile agent is a fundamental building block of the mobile computing paradigm. In mobile agent security, oblivious transfer
(OT) from a trusted party can be used to protect the agent’s privacy and the hosts’ privacy. In this paper, we introduce a
new cryptographic primitive called Verifiable Distributed Oblivious Transfer (VDOT), which allows us to replace a single trusted party with a group of threshold trusted servers. The design of VDOT uses a novel
technique called consistency verification of encrypted secret shares. VDOT protects the privacy of both the sender and the receiver against malicious attacks of the servers. We also show the
design of a system to apply VDOT to protect the privacy of mobile agents. Our design partitions an agent into the general
portion and the security-sensitive portion. We also implement the key components of our system. As far as we know, this is
the first effort to implement a system that protects the privacy of mobile agents. Our preliminary evaluation shows that protecting
mobile agents not only is possible, but also can be implemented efficiently.
This work was supported in part by the DoD University Research Initiative (URI) program administered by the Office of Naval
Research under grant N00014-01-1-0795. Sheng Zhong was supported by ONR grant N00014-01-1-0795 and NSF grants ANI-0207399
and CCR-TC-0208972. Yang Richard Yang was supported in part by NSF grant ANI-0207399. A preliminary version of this paper
was presented at the DialM-POMC Joint Workshop on Foundations of Mobile Computing in 2003.
Sheng Zhong received his Ph.D. in computer science from Yale University in the year of 2004. He holds an assistant professor position
at SUNY Buffalo and is currently on leave for postdoctoral research at the Center for Discrete Mathematics and Theoretical
Computer Science (DIMACS). His research interests, on the practical side, are security and incentives in data mining, databases,
and wireless networks. On the theoretical side, he is interested in cryptography and game theory.
Yang Richard Yang is an Assistant Professor of Computer Science at Yale University. His research interests include computer networks, mobile
computing, wireless networking, sensor networks, and network security. He leads the LAboratory of Networked Systems (LANS)
at Yale. His recent awards include a Schlumberger Fellowship and a CAREER Award from the National Science Foundation. He received
his B.E. degree from Tsinghua University (1993), and his M.S. and Ph.D. degrees from the University of Texas at Austin (1998
and 2001). 相似文献
82.
Thailand has recently introduced net metering legislation that provides streamlined procedures for small renewable energy generators to connect to the grid, and guarantees both a market and good prices. The new laws create income opportunities for rural communities based on locally produced, clean, renewable energy supplies and offer significant potential to reduce Thailand's dependence on imported oil and coal. Chris Greacen, Chuenchom Sangarasri Greacen and Rich Plevin report. 相似文献
83.
Makarand Hastak Amir Mirmiran Richard Miller Ronak Shah Reid Castrodale 《Canadian Metallurgical Quarterly》2003,8(5):267-272
Precast bridges are often constructed as single span for dead load, but continuous for live load. A diaphragm connection is provided for negative moment continuity. However, the connection may also be subjected to positive moments due to time-dependent effects. Because these moments may be large enough to damage the diaphragm or even the girders, a positive moment connection is often provided. This paper reports on a study to determine the types of positive moment connections used across the country and to identify potential problems with these types of connections. A questionnaire survey was conducted to assess the state of practice for precast prestressed concrete bridges made continuous. The survey provides valuable information on this type of bridge and updates a previous survey on this subject. 相似文献
84.
85.
Richard Ennals 《AI & Society》1997,11(1-2):155-165
This article introduces the theme of the special issue, linking current concerns in European social and industrial relations
policy with the research traditions covered byAI & Society. Human centredness, skill and technology, and the central importance of education and learning are emphasised as we build
new development coalitions. 相似文献
86.
87.
ABSTRACT Several investigators have developed hierarchically structured maximal covering location problems, especially for hierarchies with two levels such as clinics and hospitals: Moore and ReVelle developed and applied a hierarchical covering model to a medical service delivery problem in Houduras; and Church and Falon developed two alternate model forms of hierarchical covering that were applied to a medical services planning, problem in Colombia. In this paper, we proposed a hybrid formulation that encompasses all three of these previous models and which allows for the trade-off of up of four different objectives. This new model formulation is also an improvement in that it has a significantly more efficient and compact structure, even while encompassing a more complete location problem, of which the three previous works are special cases. Example solutions are given for two different data sels involving regions in Colombia and Uganda. In addition, two further model formulations of a closely related nature are presented without computational results. 相似文献
88.
The United States has historically excelled in the design of products, processes and new technologies. Capitalizing on this historical strength to teach applied mathematics and science has many positive implications on education. First, engineering design can be used as a vehicle for addressing deficiencies in mathematics and science education. Second, as achievement in mathematics and science is enhanced, a greater number of students at an earlier age will be exposed to technical career opportunities. Third, enhancing elementary and secondary curricula with engineering design can attract underrepresented populations, such as minorities and females, to engineering as a profession. This paper describes a new and innovative engineering design curriculum, under development in the Austin Independent School District (AISD) in Austin, TX. The philosophic goals upon which the curriculum is based include: integrating the design problem-solving process into elementary schools, demonstrating the relationship of technical concepts to daily life, availing teachers with instructional strategies for teaching applied (as opposed to purely theoretical) science and mathematics, and teaching teamwork skills that are so greatly needed in industry and everyday life. Based on these goals, kindergarten, first grade, and second grade engineering design lessons have been piloted in AISD, in conjunction with a University of Texas program for teacher enhancement and preparation. 相似文献
89.
90.