全文获取类型
收费全文 | 6814篇 |
免费 | 132篇 |
国内免费 | 1篇 |
专业分类
电工技术 | 60篇 |
综合类 | 3篇 |
化学工业 | 959篇 |
金属工艺 | 51篇 |
机械仪表 | 55篇 |
建筑科学 | 324篇 |
矿业工程 | 86篇 |
能源动力 | 104篇 |
轻工业 | 613篇 |
水利工程 | 61篇 |
石油天然气 | 11篇 |
无线电 | 356篇 |
一般工业技术 | 790篇 |
冶金工业 | 2781篇 |
原子能技术 | 19篇 |
自动化技术 | 674篇 |
出版年
2022年 | 43篇 |
2021年 | 78篇 |
2020年 | 45篇 |
2019年 | 55篇 |
2018年 | 64篇 |
2017年 | 81篇 |
2016年 | 94篇 |
2015年 | 70篇 |
2014年 | 81篇 |
2013年 | 290篇 |
2012年 | 194篇 |
2011年 | 253篇 |
2010年 | 212篇 |
2009年 | 216篇 |
2008年 | 280篇 |
2007年 | 275篇 |
2006年 | 201篇 |
2005年 | 232篇 |
2004年 | 175篇 |
2003年 | 213篇 |
2002年 | 188篇 |
2001年 | 147篇 |
2000年 | 130篇 |
1999年 | 156篇 |
1998年 | 376篇 |
1997年 | 232篇 |
1996年 | 232篇 |
1995年 | 162篇 |
1994年 | 170篇 |
1993年 | 201篇 |
1992年 | 155篇 |
1991年 | 83篇 |
1990年 | 140篇 |
1989年 | 122篇 |
1988年 | 110篇 |
1987年 | 112篇 |
1986年 | 108篇 |
1985年 | 110篇 |
1984年 | 87篇 |
1983年 | 69篇 |
1982年 | 68篇 |
1981年 | 75篇 |
1980年 | 51篇 |
1979年 | 80篇 |
1978年 | 47篇 |
1977年 | 59篇 |
1976年 | 83篇 |
1975年 | 36篇 |
1974年 | 33篇 |
1973年 | 45篇 |
排序方式: 共有6947条查询结果,搜索用时 15 毫秒
101.
Many network applications requires access to most up-to-date information. An update event makes the corresponding cached data item obsolete, and cache hits due to obsolete data items become simply useless to those applications. Frequently accessed but infrequently updated data items should get higher preference while caching, and infrequently accessed but frequently updated items should have lower preference. Such items may not be cached at all or should be evicted from the cache to accommodate items with higher preference. In wireless networks, remote data access is typically more expensive than in wired networks. Hence, an efficient caching scheme considers both data access and update patterns can better reduce data transmissions in wireless networks. In this paper, we propose a step-wise optimal update-based replacement policy, called the Update-based Step-wise Optimal (USO) policy, for wireless data networks to optimize transmission cost by increasing effective hit ratio. Our cache replacement policy is based on the idea of giving preference to frequently accessed but infrequently updated data, and is supported by an analytical model with quantitative analysis. We also present results from our extensive simulations. We demonstrate that (1) the analytical model is validated by the simulation results and (2) the proposed scheme outperforms the Least Frequently Used (LFU) scheme in terms of effective hit ratio and communication cost. 相似文献
102.
Susan S. Gray Barbara J. Loud Carole P. Sokolowski 《Canadian Journal of Science, Mathematics, & Technology Education》2013,13(2):59-72
Abstract The ability to use and interpret algebraic variables as generalized numbers and changing quantities is fundamental to the learning of calculus. This study considers the use of variables in these advanced ways as a component of algebraic thinking. College introductory calculus students' (n = 174) written responses to algebra problems requiring the use and interpretation of variables as changing quantities were examined for evidence of algebraic and arithmetic thinking. A framework was developed to describe and categorize examples of algebraic, transitional, and arithmetic thinking reflected in these students' uses of variables. The extent to which students' responses showed evidence of algebraic or arithmetic thinking was quantified and related to their course grades. Only one third of the responses of these entering calculus students were identified as representative of algebraic thinking. This study extends previous research by showing that evidence of algebraic thinking in students' work was positively related to successful performance in calculus. 相似文献
103.
Estimation of Defects Based on Defect Decay Model: ED^{3}M 总被引:1,自引:0,他引:1
Haider S.W. Cangussu J.W. Cooper K.M.L. Dantu R. 《IEEE transactions on pattern analysis and machine intelligence》2008,34(3):336-356
An accurate prediction of the number of defects in a software product during system testing contributes not only to the management of the system testing process but also to the estimation of the product's required maintenance. Here, a new approach called ED3M is presented that computes an estimate of the total number of defects in an ongoing testing process. ED3M is based on estimation theory. Unlike many existing approaches the technique presented here does not depend on historical data from previous projects or any assumptions about the requirements and/or testers' productivity. It is a completely automated approach that relies only on the data collected during an ongoing testing process. This is a key advantage of the ED3M approach, as it makes it widely applicable in different testing environments. Here, the ED3M approach has been evaluated using five data sets from large industrial projects and two data sets from the literature. In addition, a performance analysis has been conducted using simulated data sets to explore its behavior using different models for the input data. The results are very promising; they indicate the ED3M approach provides accurate estimates with as fast or better convergence time in comparison to well-known alternative techniques, while only using defect data as the input. 相似文献
104.
Liu S Kang K Tarel JP Cooper DB 《IEEE transactions on pattern analysis and machine intelligence》2008,30(1):131-146
In this paper, the duality in differential form is developed between a 3D primal surface and its dual manifold formed by the surface's tangent planes, i.e., each tangent plane of the primal surface is represented as a four-dimensional vector which constitutes a point on the dual manifold. The iterated dual theorem shows that each tangent plane of the dual manifold corresponds to a point on the original 3D surface, i.e., the dual of the dual goes back to the primal. This theorem can be directly used to reconstruct 3D surface from image edges by estimating the dual manifold from these edges. In this paper we further develop the work in our original conference papers resulting in the robust differential dual operator. We argue that the operator makes good use of the information available in the image data, by using both points of intensity discontinuity and their edge directions; we provide a simple physical interpretation of what the abstract algorithm is actually estimating and why it makes sense in terms of estimation accuracy; our algorithm operates on all edges in the images, including silhouette edges, self occlusion edges, and texture edges, without distinguishing their types (thus resulting in improved accuracy and handling locally concave surface estimation if texture edges are present); the algorithm automatically handles various degeneracies; and the algorithm incorporates new methodologies for implementing the required operations such as appropriately relating edges in pairs of images, evaluating and using the algorithm's sensitivity to noise to determine the accuracy of an estimated 3D point. Experiments with both synthetic and real images demonstrate that the operator is accurate, robust to degeneracies and noise, and general for reconstructing free-form objects from occluding edges and texture edges detected in calibrated images or video sequences. 相似文献
105.
Software developers often need to understand a large body of unfamiliar code with little or no documentation, no experts to consult, and little time to do it. A post appeared in January 2008 on Slashdot, a technology news Web site, asking for tools and techniques that could help. This article analyzes 301 often passionate and sometimes articulate responses to this query, including the themes and the associated tool recommendations. The most common suggestions were to use a code navigation tool, use a design recovery tool, use a debugger to step through the code, create a runtime trace, use problem-based learning, ask people for help, study the code from top down, and print out all the code. This analysis presents an intriguing snapshot of how software developers in industry go about comprehending big code. 相似文献
106.
Asimov’s “three laws of robotics” and machine metaethics 总被引:1,自引:1,他引:0
Susan Leigh Anderson 《AI & Society》2008,22(4):477-493
Using Asimov’s “Bicentennial Man” as a springboard, a number of metaethical issues concerning the emerging field of machine
ethics are discussed. Although the ultimate goal of machine ethics is to create autonomous ethical machines, this presents
a number of challenges. A good way to begin the task of making ethics computable is to create a program that enables a machine
to act an ethical advisor to human beings. This project, unlike creating an autonomous ethical machine, will not require that
we make a judgment about the ethical status of the machine itself, a judgment that will be particularly difficult to make.
Finally, it is argued that Asimov’s “three laws of robotics” are an unsatisfactory basis for machine ethics, regardless of
the status of the machine.
相似文献
Susan Leigh AndersonEmail: |
107.
There is an increasing use of computer media for negotiations. However, the use of computer-mediated channels increases the hostile expressions of emotion, termed flaming. Although researchers agree that flaming has important effects on negotiation, predictions concerning these effects are inconsistent, suggesting a need for further investigation. We address this need by extending current flaming and negotiation research in two ways. First, we identify two different types of flaming: that which is motivated by perceptions concerning the negotiating opponent (e.g., he/she is unfair) and that which is motivated by perceptions concerning the negotiating context (e.g., the communication channel is too slow). Second, we differentiate between the effects of flaming on the concession behaviors of the flame sender and the flame recipient, and the effects of these behaviors on negotiated agreement. Via a laboratory study, we demonstrate that flames directed at the negotiation opponent slightly decrease the likelihood of reaching an agreement, and when an agreement is reached, it result in outcomes significantly favoring the flame recipient rather than the flame sender. In contrast, flames directed at the negotiation context significantly increase the likelihood of agreement, although outcomes still favor the flame recipient over the flame sender. These results suggest that flame senders are generally worse off than flame recipients, which provides an important basis for the strategic use of flaming in negotiations. 相似文献
108.
Triangulation is the means by which an alternate perspective is used to validate, challenge or extend existing findings. It
is frequently used when the field of study is difficult, demanding or contentious and presence research meets all of these
criteria. We distinguish between the use of hard and soft triangulation—the former emphasising the challenging of findings,
the latter being more confirmatory in character. Having reviewed a substantial number of presence papers, we conclude that
strong triangulation is not widely used while soft triangulation is routinely employed. We demonstrate the usefulness of hard
triangulation by contrasting an ontological analysis of in-ness with an empirical study of (computer) game playing. We conclude that presence research would be well served by the wider
use of hard triangulation and for the reporting of anomalous and ill-fitting results.
相似文献
Susan TurnerEmail: |
109.
Straub C Pazdrak K Young TW Stafford SJ Wu Z Wiktorowicz JE Haag AM English RD Soman KV Kurosky A 《Proteomics. Clinical applications》2009,3(10):1151-1173
Eosinophils (EOSs) are granular leukocytes that have significant roles in many inflammatory and immunoregulatory responses, especially asthma and allergic diseases. We have undertaken a fairly comprehensive proteomic analysis of purified peripheral blood EOSs from normal human donors primarily employing 2‐DE with protein spot identification by MALDI‐MS. Protein subfractionation methods employed included IEF (Zoom® Fractionator) and subcellular fractionation using differential protein solubilization. We have identified 3141 proteins, which had Mascot expectation scores of 10?3 or less. Of these 426 were unique and non‐redundant of which 231 were novel proteins not previously reported to occur in EOSs. Ingenuity Pathway Analysis showed that some 70% of the non‐redundant proteins could be subdivided into categories that are clearly related to currently known EOS biological activities. Cytoskeletal and associated proteins predominated among the proteins identified. Extensive protein posttranslational modifications were evident, many of which have not been previously reported that reflected the dynamic character of the EOS. This data set of eosinophilic proteins will prove valuable in comparative studies of disease versus normal states and for studies of gender differences and polymorphic variation among individuals. 相似文献
110.
The paper discusses a series of driving trials that were conducted to investigate postural stability of disabled drivers and to assess the effectiveness of a representative sample of support aids. Twenty-three disabled drivers with varying levels of physical disability and seven non disabled drivers participated in the study. The test car was equipped with transducers to measure vehicle velocity and acceleration (longitudinal and lateral), steering wheel movement and torque, and the bracing forces exerted by the driver on the steering wheel. Video cameras were installed to record postural support strategies and displacement of the driver and to record deviation of the car from the specified path. Subjective data regarding driver attitudes and acceptance were also collected through the administration of questionnaires. Findings from the study showed that support aids significantly improved driving performance and reduced physical exertion to maintain an upright driving position for disabled drivers. However, ergonomics design aspects regarding the ease of use and acceptance of the support aids by the end users were identified as obstacles to their sustained use in everyday driving. 相似文献