全文获取类型
收费全文 | 2224篇 |
免费 | 64篇 |
国内免费 | 2篇 |
专业分类
电工技术 | 21篇 |
综合类 | 19篇 |
化学工业 | 823篇 |
金属工艺 | 36篇 |
机械仪表 | 35篇 |
建筑科学 | 136篇 |
矿业工程 | 4篇 |
能源动力 | 52篇 |
轻工业 | 111篇 |
水利工程 | 4篇 |
石油天然气 | 3篇 |
无线电 | 87篇 |
一般工业技术 | 410篇 |
冶金工业 | 254篇 |
原子能技术 | 24篇 |
自动化技术 | 271篇 |
出版年
2021年 | 22篇 |
2019年 | 30篇 |
2018年 | 26篇 |
2017年 | 23篇 |
2016年 | 40篇 |
2015年 | 49篇 |
2014年 | 58篇 |
2013年 | 87篇 |
2012年 | 100篇 |
2011年 | 103篇 |
2010年 | 90篇 |
2009年 | 85篇 |
2008年 | 103篇 |
2007年 | 87篇 |
2006年 | 78篇 |
2005年 | 68篇 |
2004年 | 68篇 |
2003年 | 45篇 |
2002年 | 53篇 |
2001年 | 53篇 |
2000年 | 49篇 |
1999年 | 56篇 |
1998年 | 48篇 |
1997年 | 38篇 |
1996年 | 40篇 |
1995年 | 39篇 |
1994年 | 35篇 |
1993年 | 23篇 |
1992年 | 36篇 |
1991年 | 40篇 |
1990年 | 32篇 |
1989年 | 47篇 |
1988年 | 27篇 |
1987年 | 31篇 |
1986年 | 17篇 |
1985年 | 18篇 |
1984年 | 19篇 |
1983年 | 27篇 |
1982年 | 25篇 |
1981年 | 22篇 |
1980年 | 24篇 |
1979年 | 20篇 |
1978年 | 35篇 |
1977年 | 27篇 |
1976年 | 25篇 |
1975年 | 31篇 |
1974年 | 33篇 |
1973年 | 32篇 |
1971年 | 17篇 |
1970年 | 21篇 |
排序方式: 共有2290条查询结果,搜索用时 11 毫秒
141.
Axel Schairer Serge Autexier Dieter Hutter 《Electronic Notes in Theoretical Computer Science》2001,58(2)
In interactive theorem proving, tactics and tacticals have been introduced to automate proof search. In this scenario, user interaction traditionally is restricted to the mode in which the user decides which tactic to apply on the top-level, without being able to interact with the tactic once it has begun running.We propose a technique to allow the implementation of derivational analogy in tactical theorem proving. Instead of replaying tactics including backtracked dead ends our framework makes choice points in tactics explicit and thus avoids dead ends when reusing tactics. Additionally users can override choices a tactic has made or add additional steps to a derivation without terminating the tactic. The technique depends on an efficient replay of tactic executions without repeating search that the original computation may have involved. 相似文献
142.
Frédéric Havet Martin Klazar Jan Kratochvíl Dieter Kratsch Mathieu Liedloff 《Algorithmica》2011,59(2):169-194
The notion of distance constrained graph labelings, motivated by the Frequency Assignment Problem, reads as follows: A mapping
from the vertex set of a graph G=(V,E) into an interval of integers {0,…,k} is an L(2,1)-labeling of G of span k if any two adjacent vertices are mapped onto integers that are at least 2 apart, and every two vertices with a common neighbor
are mapped onto distinct integers. It is known that for any fixed k≥4, deciding the existence of such a labeling is an NP-complete problem. We present exact exponential time algorithms that
are faster than the naive O
*((k+1)
n
) algorithm that would try all possible mappings. The improvement is best seen in the first NP-complete case of k=4, where the running time of our algorithm is O(1.3006
n
). Furthermore we show that dynamic programming can be used to establish an O(3.8730
n
) algorithm to compute an optimal L(2,1)-labeling. 相似文献
143.
Juan Carlos Lopez Pimentel Raul Monroy Dieter Hutter 《Electronic Notes in Theoretical Computer Science》2007,174(4):117
The verification of security protocols has attracted a lot of interest in the formal methods community, yielding two main verification approaches: i) state exploration, e.g. FDR [Gavin Lowe. Breaking and fixing the needham-schroeder public-key protocol using FDR. In TACAs'96: Proceedings of the Second International Workshop on Tools and Algorithms for Construction and Analysis of Systems, pages 147–166, London, UK, 1996. Springer-Verlag] and OFMC [A.D. Basin, S. Mödersheim, and L. Viganò. An on-the-fly model-checker for security protocol analysis. In D. Gollmann and E. Snekkenes, editors, ESORICS'03: 8th European Symposium on Research in Computer Security, number 2808 in Lecture Notes in Computer Science, pages 253–270, Gjøvik, Norway, 2003. Springer-Verlag]; and ii) theorem proving, e.g. the Isabelle inductive method [Lawrence C. Paulson. The inductive approach to verifying cryptographic protocols. Journal in Computer Security, 6(1-2):85–128, 1998] and Coral [G. Steel, A. Bundy, and M. Maidl. Attacking the asokan-ginzboorg protocol for key distribution in an ad-hoc bluetooth network using coral. In H. König, M. Heiner, and A. Wolisz, editors, IFIP TC6 /WG 6.1: Proceedings of 23rd IFIP International Conference on Formal Techniques for Networked and Distributed Systems, volume 2767, pages 1–10, Berlin, Germany, 2003. FORTE 2003 (work in progress papers)]. Complementing formal methods, Abadi and Needham's principles aim to guide the design of security protocols in order to make them simple and, hopefully, correct [M. Abadi and R. Needham. Prudent engineering practice for cryptographic protocols. IEEE Transactions on Software Engineering, 22(1):6–15, 1996]. We are interested in a problem related to verification but far less explored: the correction of faulty security protocols. Experience has shown that the analysis of counterexamples or failed proof attempts often holds the key to the completion of proofs and for the correction of a faulty model. In this paper, we introduce a method for patching faulty security protocols that are susceptible to an interleaving-replay attack. Our method makes use of Abadi and Needham's principles for the prudent engineering practice for cryptographic protocols in order to guide the location of the fault in a protocol as well as the proposition of candidate patches. We have run a test on our method with encouraging results. The test set includes 21 faulty security protocols borrowed from the Clark-Jacob library [J. Clark and J. Jacob. A survey of authentication protocol literature: Version 1.0. Technical report, Department of Computer Science, University of York, November 1997. A complete specification of the Clark-Jacob library in CAPSL is available at http://www.cs.sri.com/millen/capsl/]. 相似文献
144.
Mark Dokter Jozef Hladky Mathias Parger Dieter Schmalstieg Hans‐Peter Seidel Markus Steinberger 《Computer Graphics Forum》2019,38(2):93-103
In this paper, we introduce the CPatch, a curved primitive that can be used to construct arbitrary vector graphics. A CPatch is a generalization of a 2D polygon: Any number of curves up to a cubic degree bound a primitive. We show that a CPatch can be rasterized efficiently in a hierarchical manner on the GPU, locally discarding irrelevant portions of the curves. Our rasterizer is fast and scalable, works on all patches in parallel, and does not require any approximations. We show a parallel implementation of our rasterizer, which naturally supports all kinds of color spaces, blending and super‐sampling. Additionally, we show how vector graphics input can efficiently be converted to a CPatch representation, solving challenges like patch self intersections and false inside‐outside classification. Results indicate that our approach is faster than the state‐of‐the‐art, more flexible and could potentially be implemented in hardware. 相似文献
145.
146.
Inne Crèvecoeur Dieter Rondas Chantal Mathieu Lut Overbergh 《Proteomics. Clinical applications》2015,9(7-8):755-766
Pancreatic beta-cells have a crucial role in the regulation of blood glucose homeostasis by the production and secretion of insulin. In type 1 diabetes (T1D), an autoimmune reaction against the beta-cells together with the presence of inflammatory cytokines and ROS in the islets leads to beta-cell dysfunction and death. This review gives an overview of proteomic studies that lead to better understanding of beta-cell functioning in T1D. Protein profiling of isolated islets and beta-cell lines in health and T1D contributed to the unraveling of pathways involved in cytokine-induced cell death. In addition, by studying the serological proteome of T1D patients, new biomarkers and beta-cell autoantigens were discovered, which may improve screening tests and follow-up of T1D development. Interestingly, an important role for PTMs was demonstrated in the generation of beta-cell autoantigens. To conclude, proteomic techniques are of indispensable value to improve the knowledge on beta-cell function in T1D and the search toward therapeutic targets. 相似文献
147.
148.
Most augmented reality (AR) applications are primarily concerned with letting a user browse a 3D virtual world registered with the real world. More advanced AR interfaces let the user interact with the mixed environment, but the virtual part is typically rather finite and deterministic. In contrast, autonomous behavior is often desirable in ubiquitous computing (Ubicomp), which requires the computers embedded into the environment to adapt to context and situation without explicit user intervention. We present an AR framework that is enhanced by typical Ubicomp features by dynamically and proactively exploiting previously unknown applications and hardware devices, and adapting the appearance of the user interface to persistently stored and accumulated user preferences. Our framework explores proactive computing, multi‐user interface adaptation, and user interface migration. We employ mobile and autonomous agents embodied by real and virtual objects as an interface and interaction metaphor, where agent bodies are able to opportunistically migrate between multiple AR applications and computing platforms to best match the needs of the current application context. We present two pilot applications to illustrate design concepts. Copyright © 2007 John Wiley & Sons, Ltd. 相似文献
149.
Jonathan P. Caulkins Dieter Grass Gustav Feichtinger Gernot Tragler 《Computers & Operations Research》2008
This paper deals dynamically with the question of how recruitment to terror organizations is influenced by counter-terror operations. This is done within an optimal control model, where the key state is the (relative) number of terrorists and the key controls are two types of counter-terror tactics, one (“water”) that does not and one (“fire”) that does provoke recruitment of new terrorists. The model is nonlinear and does not admit analytical solutions, but an efficient numerical implementation of Pontryagin's minimum principle allows for solution with base case parameters and considerable sensitivity analysis. Generally, this model yields two different steady states, one where the terror organization is nearly eradicated and one with a high number of terrorists. Whereas water strategies are used at almost any time, it can be optimal not to use fire strategies if the number of terrorists is below a certain threshold. 相似文献
150.
Fedor V. Fomin Fabrizio Grandoni Dieter Kratsch Daniel Lokshtanov Saket Saurabh 《Algorithmica》2013,65(3):584-604
Given an n-node edge-weighted graph and a subset of k terminal nodes, the NP-hard (weighted) Steiner tree problem is to compute a minimum-weight tree which spans the terminals. All the known algorithms for this problem which improve on trivial O(1.62 n )-time enumeration are based on dynamic programming, and require exponential space. Motivated by the fact that exponential-space algorithms are typically impractical, in this paper we address the problem of designing faster polynomial-space algorithms. Our first contribution is a simple O((27/4) k n O(logk))-time polynomial-space algorithm for the problem. This algorithm is based on a variant of the classical tree-separator theorem: every Steiner tree has a node whose removal partitions the tree in two forests, containing at most 2k/3 terminals each. Exploiting separators of logarithmic size which evenly partition the terminals, we are able to reduce the running time to $O(4^{k}n^{O(\log^{2} k)})$ . This improves on trivial enumeration for roughly k<n/3, which covers most of the cases of practical interest. Combining the latter algorithm (for small k) with trivial enumeration (for large k) we obtain a O(1.59 n )-time polynomial-space algorithm for the weighted Steiner tree problem. As a second contribution of this paper, we present a O(1.55 n )-time polynomial-space algorithm for the cardinality version of the problem, where all edge weights are one. This result is based on a improved branching strategy. The refined branching is based on a charging mechanism which shows that, for large values of k, convenient local configurations of terminals and non-terminals exist. The analysis of the algorithm relies on the Measure & Conquer approach: the non-standard measure used here is a linear combination of the number of nodes and number of non-terminals. Using a recent result in Nederlof (International colloquium on automata, languages and programming (ICALP), pp. 713–725, 2009), the running time can be reduced to O(1.36 n ). The previous best algorithm for the cardinality case runs in O(1.42 n ) time and exponential space. 相似文献