全文获取类型
收费全文 | 1980篇 |
免费 | 7篇 |
国内免费 | 1篇 |
专业分类
电工技术 | 9篇 |
综合类 | 1篇 |
化学工业 | 218篇 |
金属工艺 | 6篇 |
机械仪表 | 21篇 |
建筑科学 | 43篇 |
矿业工程 | 2篇 |
能源动力 | 14篇 |
轻工业 | 68篇 |
水利工程 | 6篇 |
无线电 | 96篇 |
一般工业技术 | 152篇 |
冶金工业 | 1292篇 |
原子能技术 | 6篇 |
自动化技术 | 54篇 |
出版年
2021年 | 7篇 |
2020年 | 8篇 |
2019年 | 9篇 |
2018年 | 6篇 |
2017年 | 10篇 |
2016年 | 7篇 |
2015年 | 7篇 |
2014年 | 10篇 |
2013年 | 49篇 |
2012年 | 13篇 |
2011年 | 27篇 |
2010年 | 25篇 |
2009年 | 22篇 |
2008年 | 19篇 |
2007年 | 22篇 |
2006年 | 30篇 |
2005年 | 16篇 |
2004年 | 23篇 |
2003年 | 23篇 |
2002年 | 17篇 |
2001年 | 15篇 |
2000年 | 21篇 |
1999年 | 49篇 |
1998年 | 367篇 |
1997年 | 206篇 |
1996年 | 130篇 |
1995年 | 93篇 |
1994年 | 94篇 |
1993年 | 86篇 |
1992年 | 21篇 |
1991年 | 34篇 |
1990年 | 31篇 |
1989年 | 26篇 |
1988年 | 31篇 |
1987年 | 28篇 |
1986年 | 29篇 |
1985年 | 27篇 |
1984年 | 14篇 |
1983年 | 17篇 |
1982年 | 28篇 |
1981年 | 29篇 |
1980年 | 24篇 |
1979年 | 13篇 |
1978年 | 14篇 |
1977年 | 40篇 |
1976年 | 79篇 |
1975年 | 17篇 |
1974年 | 6篇 |
1973年 | 8篇 |
1970年 | 7篇 |
排序方式: 共有1988条查询结果,搜索用时 15 毫秒
61.
Adve V.S. Bagrodia R. Browne J.C. Deelman E. Dube A. Houstis E.N. Rice J.R. Sakellariou R. Sundaram-Stukel D.J. Teller P.J. Vernon M.K. 《IEEE transactions on pattern analysis and machine intelligence》2000,26(11):1027-1048
The POEMS project is creating an environment for end-to-end performance modeling of complex parallel and distributed systems, spanning the domains of application software, runtime and operating system software, and hardware architecture. Toward this end, the POEMS framework supports composition of component models from these different domains into an end-to-end system model. This composition can be specified using a generalized graph model of a parallel system, together with interface specifications that carry information about component behaviors and evaluation methods. The POEMS Specification Language compiler will generate an end-to-end system model automatically from such a specification. The components of the target system may be modeled using different modeling paradigms and at various levels of detail. Therefore, evaluation of a POEMS end-to-end system model may require a variety of evaluation tools including specialized equation solvers, queuing network solvers, and discrete event simulators. A single application representation based on static and dynamic task graphs serves as a common workload representation for all these modeling approaches. Sophisticated parallelizing compiler techniques allow this representation to be generated automatically for a given parallel program. POEMS includes a library of predefined analytical and simulation component models of the different domains and a knowledge base that describes performance properties of widely used algorithms. The paper provides an overview of the POEMS methodology and illustrates several of its key components. The modeling capabilities are demonstrated by predicting the performance of alternative configurations of Sweep3D, a benchmark for evaluating wavefront application technologies and high-performance, parallel architectures. 相似文献
62.
Cybercrime and cybercriminal activities continue to impact communities as the steady growth of electronic information systems enables more online business. The collective views of sixty-six computer users and organizations, that have an exposure to cybercrime, were analyzed using concept analysis and mapping techniques in order to identify the major issues and areas of concern, and provide useful advice. The findings of the study show that a range of computing stakeholders have genuine concerns about the frequency of information security breaches and malware incursions (including the emergence of dangerous security and detection avoiding malware), the need for e-security awareness and education, the roles played by law and law enforcement, and the installation of current security software and systems. While not necessarily criminal in nature, some stakeholders also expressed deep concerns over the use of computers for cyberbullying, particularly where younger and school aged users are involved. The government’s future directions and recommendations for the technical and administrative management of cybercriminal activity were generally observed to be consistent with stakeholder concerns, with some users also taking practical steps to reduce cybercrime risks. 相似文献
63.
Garfinkel R. Gopal R.D. Nunez M. Rice D.O. 《IEEE transactions on systems, man, and cybernetics. Part A, Systems and humans : a publication of the IEEE Systems, Man, and Cybernetics Society》2006,36(3):461-471
Technological advances in the collection, storage, and analysis of data have increased the ease with which businesses can make profitable use of information about individuals. Some of this information is private, and individuals are simultaneously becoming more aware of the value of the information and how the loss of control over this information impacts their personal privacy. As a partial solution to these concerns, this paper presents a mechanism that serves two purposes. The first enables the use of private, numerical data in the answering of queries while simultaneously providing a security feature that protects the data owners from a loss of privacy that could result from an unauthorized access. The second develops a compensation model for the use of the data that allows individuals to dynamically redefine their security requirements. The compensation model is built on the information-security mechanism to create the foundation of a market for private information. This paper illustrates how compensation models like the one presented here could be used in a self-regulating market for private information. Additionally, the compensation component of an intermediated market for private information is developed and extensively analyzed. Finally, this paper provides insights and draws several important conclusions on markets for private information. 相似文献
64.
A selectionist theory states that violence by males toward male peers originally served specific functions and violence to female peers served others. Differences in self-reported victimization and perpetration in studies of 1,452 high school students were hypothesized. In Study 1, male-to-male aggression was reported to be more prevalent than male-to-female aggression. For male-to-male aggression, perpetrator reports agreed with or exceeded victim reports, and victims were more often strangers than close friends. In contrast, for male-to-female aggression, there were consistently fewer reports from perpetrators than from victims, and victims were less often strangers than girlfriends. Study 2 obtained similar findings for reported frequency, number of victims and perpetrators, and sexual aggression. Study 3 showed that girls' aggression contrasted with that by boys with respect to intra- versus intersex aggression and perpetrator–victim agreement. (PsycINFO Database Record (c) 2010 APA, all rights reserved) 相似文献
65.
Alouani A.T. Xia P. Rice T.R. Blair W.D. 《Automatic Control, IEEE Transactions on》1993,38(8):1279-1283
Sufficient conditions for the optimality of a two-stage state estimator in the presence of random bias are derived. Under an algebraic constraint on the correlation between the state and bias process noises, the optimal estimate of the system state can be obtained as a linear combination of the output of the first stage (a bias-free filter) and the second stage (a bias filter). Because the algebraic constraint is restrictive in practice, the results indirectly indicate that for most practical systems the proposed solution to the two-stage estimation problem will be suboptimal 相似文献
66.
67.
Abstract— A first-generation fatigue crack growth model has been developed which realistically models the patterns of subsurface shells and detail fracture crack growth that are commonly observed in railroad rails. (These types of defects are further described in the Introduction.) The key assumptions upon which the model is based are reviewed and the input data on railroad rail residual stresses and wheel-induced stresses are described. Examples of the predicted growth patterns for shells and detail fractures are shown and compared to actually observed growth patterns. Apparent deficiencies in the model are discussed and probable avenues for improvement in the accuracy of the crack growth life estimates are identified. 相似文献
68.
This paper presents some observations that were made during a series of tests on round downdraft kilns fired with a single stoker, and shows the economies that can be expected with this method of firing and the disadvantages that must be overcome. 相似文献
69.
70.
The dissolved component of the apparent silver complexation capacity was determined for Susquehanna and Chenango River water samples collected over a 3-month period in the vicinity of Binghamton, New York. Silver ion activities detected by the Ag+/S2? ion selective electrode during potentiometric titration of the river water with AgNO3 were lower than Ag+ activities calculated with an inorganic equilibrium speciation model. The maximum difference in Ag+ activity, which ranged from 1.5 × 10?8 to 8.4 × 10?8, was attributed to the presence of a constituent or constituents in the river water which strongly bind Ag, perhaps dissolved organic matter and/or colloidal material. Variation in apparent complexation capacity between river water samples was explained by different concentrations of the ligands complexing Ag. A tentative extrapolation of the dissolved Ag speciation to Ag concentrations in natural river water suggested that most of the Ag would be complexed by Cl? and an unidentified constituent or constituents. 相似文献