全文获取类型
收费全文 | 1138篇 |
免费 | 89篇 |
国内免费 | 1篇 |
专业分类
电工技术 | 6篇 |
综合类 | 2篇 |
化学工业 | 252篇 |
金属工艺 | 25篇 |
机械仪表 | 31篇 |
建筑科学 | 38篇 |
矿业工程 | 4篇 |
能源动力 | 58篇 |
轻工业 | 89篇 |
水利工程 | 10篇 |
石油天然气 | 3篇 |
无线电 | 113篇 |
一般工业技术 | 259篇 |
冶金工业 | 72篇 |
原子能技术 | 11篇 |
自动化技术 | 255篇 |
出版年
2024年 | 1篇 |
2023年 | 20篇 |
2022年 | 25篇 |
2021年 | 51篇 |
2020年 | 43篇 |
2019年 | 34篇 |
2018年 | 46篇 |
2017年 | 47篇 |
2016年 | 55篇 |
2015年 | 41篇 |
2014年 | 71篇 |
2013年 | 78篇 |
2012年 | 91篇 |
2011年 | 119篇 |
2010年 | 68篇 |
2009年 | 59篇 |
2008年 | 62篇 |
2007年 | 60篇 |
2006年 | 44篇 |
2005年 | 35篇 |
2004年 | 25篇 |
2003年 | 21篇 |
2002年 | 14篇 |
2001年 | 6篇 |
2000年 | 13篇 |
1999年 | 13篇 |
1998年 | 19篇 |
1997年 | 10篇 |
1996年 | 11篇 |
1995年 | 4篇 |
1994年 | 4篇 |
1993年 | 1篇 |
1992年 | 4篇 |
1991年 | 3篇 |
1990年 | 1篇 |
1989年 | 2篇 |
1988年 | 4篇 |
1987年 | 2篇 |
1986年 | 5篇 |
1983年 | 1篇 |
1982年 | 1篇 |
1981年 | 1篇 |
1980年 | 1篇 |
1978年 | 1篇 |
1977年 | 6篇 |
1976年 | 1篇 |
1975年 | 1篇 |
1974年 | 1篇 |
1973年 | 1篇 |
1972年 | 1篇 |
排序方式: 共有1228条查询结果,搜索用时 15 毫秒
941.
Guillaume Bertello Pierre-Jean Arduin Fabio Boschetti Dion Weatherley 《New Generation Computing》2008,27(1):1-23
We apply the Computational Mechanics approach to the analysis of time-series representative of geophysical measurements. The
algorithm employed is the Causal-State Splitting Reconstruction (CSSR) algorithm. We address a number of data pre-processing
steps which are necessary when analysing complex time-series and specific to symbolised time-series analysis tools such as
CSSR. We cast the choice of input parameters for the CSSR algorithm and time-series symbolisation, into an optimisation problem,
with the aim of maximising the predictability of events of specific interest. Our approach is problem independent and can
be easily extended to other applications. This research highlights the challenges to be overcome when analysing complex time-series
using the Computational Mechanics approach. We also discuss further developments necessary to extend the approach to real
data applications.
相似文献
Fabio BoschettiEmail: |
942.
943.
This work focuses on the slip phenomenon at the fluid–solid interface accompanying Poiseuille flow of simple binary miscible fluids in a slit nanopore. To explore such flows, molecular dynamics simulations are used on Lennard–Jones binary mixtures composed of species of varying affinities with the walls. The results have shown that the apparent slip magnitude at the fluid–solid interface depends largely on the species that is dominant in contact with the walls. In addition, it has been shown that the velocity profiles of each species (of different “wettability”) does not superpose with the velocity profile of the mixture and such a result points out the limitations of the classical approaches based on a single momentum conservation equation to deal with mixtures flow in nanochannels. 相似文献
944.
There is nowadays a wide range of TCP/IP stack identification tools that allow to easily recognize the operating system of
foreseen targets. The object of this article is to show that fingerprint concealment and spoofing are uniformly possible against
different known fingerprinting tools. We present IpMorph, counter-recognition software implemented as a user-mode TCP/IP stack,
ensuring session monitoring and on the fly packets re-writing. We detail its operation and use against tools like Nmap, Xprobe2,
Ring2, SinFP and p0f, and we evaluate its efficiency thanks to a first technical implementation that already covers most of
our objectives. 相似文献
945.
People have now come to understand the risks associated with MS Office documents: whether those risks are caused by macros
or associated breaches. PDF documents on the contrary seem to be much more secure and reliable. This false sense of security
mainly comes from the fact that these documents appear to be static. The widespread use of Acrobat Reader is most likely also
accountable for this phenomenon to the detriment of software that modifies PDFs. As a consequence, PDF documents are perceived
as images rather than active documents. And as everyone knows, images are not dangerous, so PDFs aren’t either. In this article
we present the PDF language and its security model, and then the market leader of PDF software, Acrobat Reader. Finally, we
will show how this format can be used for malicious purposes. 相似文献
946.
Carole Lamonier Catherine Martin Jean Mazurelle Virginie Harl Denis Guillaume Edmond Payen 《Applied catalysis. B, Environmental》2007,70(1-4):548-556
This paper deals with the use of Anderson heteropolyanions as alternative starting materials to the ammonium heptamolybdate and cobalt nitrate for the preparation of hydrotreatment oxidic precursors. Ammonium and cobalt salts of molybdocobaltate anions were synthesized and impregnated on alumina. The evolution of these compounds along the different steps of preparation of the oxidic precursors has been followed using various physical techniques such as Raman, XAS and UV–vis spectroscopies. It has been shown that the nature of the surface oxomolybdenum phase strongly depends on the nature of the starting salt. After sulfidation under H2/H2S, the performances of these new catalysts have been evaluated in hydrodesulfuration of thiophene. It appears that the cobalt salt of the decamolybdocobaltate anion [Co2Mo10O38H4]6−, with a Co/Mo ratio equal to 0.5, allows us to improve the catalytic conversion by comparison to reference catalysts prepared with ammonium heptamolybdate and cobalt nitrate as starting materials. It has been shown that this improvement is due to the preservation of the heteropolyanionic structure up to the drying step. 相似文献
947.
948.
Guillaume Lavoué Author Vitae Florent Dupont Author Vitae Author Vitae 《Computer aided design》2005,37(10):975-987
This paper presents a new and efficient algorithm for the decomposition of 3D arbitrary triangle meshes and particularly optimized triangulated CAD meshes. The algorithm is based on the curvature tensor field analysis and presents two distinct complementary steps: a region based segmentation, which is an improvement of that presented by Lavoue et al. [Lavoue G, Dupont F, Baskurt A. Constant curvature region decomposition of 3D-meshes by a mixed approach vertex-triangle, J WSCG 2004;12(2):245-52] and which decomposes the object into near constant curvature patches, and a boundary rectification based on curvature tensor directions, which corrects boundaries by suppressing their artefacts or discontinuities. Experiments conducted on various models including both CAD and natural objects, show satisfactory results. Resulting segmented patches, by virtue of their properties (homogeneous curvature, clean boundaries) are particularly adapted to computer graphics tasks like parametric or subdivision surface fitting in an adaptive compression objective. 相似文献
949.
Benoit A. Aubert Guillaume Beaurivage Anne-Marie Croteau Suzanne Rivard 《Information Systems Frontiers》2008,10(2):129-143
IT outsourcing research has often been at the transaction level, focusing on the role of the characteristics of the IT activities
as the antecedents of outsourcing decisions. The present study extends past research efforts examining the relationships between
organizational level variables—in particular the business strategy—and the decision to outsource. Results show that prospectors
and analyzers are more aggressive in their use of outsourcing for IT operations. However, no differences between the behaviour
of the different strategic groups were found for maintenance activities, suggesting that these activities are too far from
the core of the organization to be influenced by strategic profile.
相似文献
Suzanne RivardEmail: |
950.
SweetWiki: A semantic wiki 总被引:1,自引:0,他引:1
Michel Buffa Fabien Gandon Guillaume Ereteo Peter Sander Catherine Faron 《Journal of Web Semantics》2008,6(1):84
Everyone agrees that user interactions and social networks are among the cornerstones of “Web 2.0”. Web 2.0 applications generally run in a web browser, propose dynamic content with rich user interfaces, offer means to easily add or edit content of the web site they belong to and present social network aspects. Well-known applications that have helped spread Web 2.0 are blogs, wikis, and image/video sharing sites; they have dramatically increased sharing and participation among web users. It is possible to build knowledge using tools that can help analyze users’ behavior behind the scenes: what they do, what they know, what they want. Tools that help share this knowledge across a network, and that can reason on that knowledge, will lead to users who can better use the knowledge available, i.e., to smarter users. Wikipedia, a wildly successful example of web technology, has helped knowledge-sharing between people by letting individuals freely create and modify its content. But Wikipedia is designed for people—today's software cannot understand and reason on Wikipedia's content. In parallel, the “semantic web”, a set of technologies that help knowledge-sharing across the web between different applications, is starting to gain attraction. Researchers have only recently started working on the concept of a “semantic wiki”, mixing the advantages of the wiki and the technologies of the semantic web. In this paper we will present a state-of-the-art of semantic wikis, and we will introduce SweetWiki, an example of an application reconciling two trends of the future web: a semantically augmented web and a web of social applications where every user is an active provider as well as a consumer of information. SweetWiki makes heavy use of semantic web concepts and languages, and demonstrates how the use of such paradigms can improve navigation, search, and usability. 相似文献