全文获取类型
收费全文 | 956篇 |
免费 | 57篇 |
国内免费 | 3篇 |
专业分类
电工技术 | 15篇 |
综合类 | 3篇 |
化学工业 | 215篇 |
金属工艺 | 19篇 |
机械仪表 | 13篇 |
建筑科学 | 49篇 |
矿业工程 | 36篇 |
能源动力 | 25篇 |
轻工业 | 54篇 |
水利工程 | 22篇 |
无线电 | 50篇 |
一般工业技术 | 167篇 |
冶金工业 | 266篇 |
原子能技术 | 3篇 |
自动化技术 | 79篇 |
出版年
2023年 | 12篇 |
2022年 | 10篇 |
2021年 | 29篇 |
2020年 | 17篇 |
2019年 | 17篇 |
2018年 | 27篇 |
2017年 | 25篇 |
2016年 | 25篇 |
2015年 | 30篇 |
2014年 | 32篇 |
2013年 | 47篇 |
2012年 | 45篇 |
2011年 | 63篇 |
2010年 | 48篇 |
2009年 | 35篇 |
2008年 | 41篇 |
2007年 | 45篇 |
2006年 | 40篇 |
2005年 | 32篇 |
2004年 | 24篇 |
2003年 | 26篇 |
2002年 | 7篇 |
2001年 | 8篇 |
2000年 | 11篇 |
1999年 | 13篇 |
1998年 | 75篇 |
1997年 | 35篇 |
1996年 | 31篇 |
1995年 | 18篇 |
1994年 | 18篇 |
1993年 | 16篇 |
1992年 | 6篇 |
1991年 | 14篇 |
1990年 | 10篇 |
1989年 | 5篇 |
1988年 | 7篇 |
1987年 | 10篇 |
1986年 | 11篇 |
1985年 | 4篇 |
1983年 | 4篇 |
1982年 | 2篇 |
1981年 | 4篇 |
1980年 | 4篇 |
1977年 | 2篇 |
1976年 | 8篇 |
1970年 | 5篇 |
1928年 | 1篇 |
1921年 | 2篇 |
1920年 | 4篇 |
1913年 | 1篇 |
排序方式: 共有1016条查询结果,搜索用时 328 毫秒
21.
In this study, three asset management strategies were compared with respect to their efficiency to reduce flood risk. Data from call centres at two municipalities were used to quantify urban flood risks associated with three causes of urban flooding: gully pot blockage, sewer pipe blockage and sewer overloading. The efficiency of three flood reduction strategies was assessed based on their effect on the causes contributing to flood risk. The sensitivity of the results to uncertainty in the data source, citizens' calls, was analysed through incorporation of uncertainty ranges taken from customer complaint literature. Based on the available data it could be shown that increasing gully pot blockage is the most efficient action to reduce flood risk, given data uncertainty. If differences between cause incidences are large, as in the presented case study, call data are sufficient to decide how flood risk can be most efficiently reduced. According to the results of this analysis, enlargement of sewer pipes is not an efficient strategy to reduce flood risk, because flood risk associated with sewer overloading is small compared to other failure mechanisms. 相似文献
22.
We present a complete mechanized proof of the result in homological algebra known as basic perturbation lemma. The proof has
been carried out in the proof assistant Isabelle, more concretely, in the implementation of higher-order logic (HOL) available
in the system. We report on the difficulties found when dealing with abstract algebra in HOL, and also on the ongoing stages
of our project to give a certified version of some of the algorithms present in the Kenzo symbolic computation system.
J. Aransay was partially supported by Ministerio de Educación y Ciencia, MTM2006/06513, and by Gobierno de La Rioja ANGI2005/19
and J. Rubio was partially supported by Ministerio de Educación y Ciencia, MTM2006/06513, and by Gobierno de La Rioja ANGI2005/19. 相似文献
23.
Marco Bakera Tiziana Margaria Clemens D. Renner Bernhard Steffen 《Innovations in Systems and Software Engineering》2009,5(3):211-228
We show on a case study from an autonomous aerospace context how to apply a game-based model-checking approach as a powerful
technique for the verification, diagnosis, and adaptation of system behaviors based on temporal properties. This work is part
of our contribution within the SHADOWS project, where we provide a number of enabling technologies for model-driven self-healing.
We propose here to use GEAR, a game-based model checker, as a user-friendly tool that can offer automatic proofs of critical
properties of such systems. Although it is a model checker for the full modal μ-calculus, it also supports derived, more user-oriented logics. With GEAR, designers and engineers can interactively investigate
automatically generated winning strategies for the games, by this way exploring the connection between the property, the system,
and the proof.
This work has been partially supported by the European Union Specific Targeted Research Project SHADOWS (IST-2006-35157), exploring a Self-Healing Approach to Designing cOmplex softWare Systems. The project’s web page is at .
This article is an extended version of Renner et al. [18] presented at ISoLA 2007, Poitiers, December 2007. 相似文献
24.
Development of Highly Functional Biomaterials by Decoupling and Recombining Material Properties
下载免费PDF全文
![点击此处可从《Advanced materials (Deerfield Beach, Fla.)》网站下载免费的PDF全文](/ch/ext_images/free.gif)
25.
Antony Jan Benjamin A. Reeves Yoeri van de Burgt Garrett J. Hayes Bruce M. Clemens 《Advanced Engineering Materials》2018,20(1)
26.
Web spam denotes the manipulation of web pages with the sole intent to raise their position in search engine rankings. Since
a better position in the rankings directly and positively affects the number of visits to a site, attackers use different
techniques to boost their pages to higher ranks. In the best case, web spam pages are a nuisance that provide undeserved advertisement
revenues to the page owners. In the worst case, these pages pose a threat to Internet users by hosting malicious content and
launching drive-by attacks against unsuspecting victims. When successful, these drive-by attacks then install malware on the
victims’ machines. In this paper, we introduce an approach to detect web spam pages in the list of results that are returned
by a search engine. In a first step, we determine the importance of different page features to the ranking in search engine
results. Based on this information, we develop a classification technique that uses important features to successfully distinguish
spam sites from legitimate entries. By removing spam sites from the results, more slots are available to links that point
to pages with useful content. Additionally, and more importantly, the threat posed by malicious web sites can be mitigated,
reducing the risk for users to get infected by malicious code that spreads via drive-by attacks. 相似文献
27.
Koordination in Service Value Networks 总被引:1,自引:1,他引:0
Benjamin Blau Clemens van Dinther Tobias Conte Yongchun Xu Christof Weinhardt 《WIRTSCHAFTSINFORMATIK》2009,51(5):398-413
The fundamental paradigm shift from traditional value chains to agile service value networks implies new economic and organizational challenges. As coordination mechanisms, auctions have proven to perform quite well in situations where intangible and heterogeneous goods are traded. Nevertheless, traditional approaches in the area of multidimensional combinatorial auctions are not quite suitable to enable the trade of composite services. A flawless service execution and therefore the requester’s valuation highly depends on the accurate sequence of the functional parts of the composition, meaning that in contrary to service bundles, composite services only generate value through a valid order of their components. The authors present an abstract model as a formalization of service value networks. The model comprehends a graph-based mechanism implementation to allocate multidimensional service offers within the network, to impose penalties for non-performance and to determine prices for complex services. The mechanism and the bidding language support various types of QoS attributes and their (semantic) aggregation. It is analytically shown that this variant is incentive compatible with respect to all dimensions of the service offer (quality and price). Based on these results, the authors numerically analyze strategic behavior of participating service providers regarding possible collusion strategies. 相似文献
28.
Real-time scheduling for energy harvesting sensor nodes 总被引:1,自引:1,他引:0
Energy harvesting has recently emerged as a feasible option to increase the operating time of sensor networks. If each node
of the network, however, is powered by a fluctuating energy source, common power management solutions have to be reconceived.
This holds in particular if real-time responsiveness of a given application has to be guaranteed. Task scheduling at the single
nodes should account for the properties of the energy source, capacity of the energy storage as well as deadlines of the single
tasks. We show that conventional scheduling algorithms (like e.g. EDF) are not suitable for this scenario. Based on this motivation,
we have constructed optimal scheduling algorithms that jointly handle constraints from both energy and time domain. Further
we present an admittance test that decides for arbitrary task sets, whether they can be scheduled without deadline violations.
To this end, we introduce the concept of energy variability characterization curves (EVCC) which nicely captures the dynamics
of various energy sources. Simulation results show that our algorithms allow significant reductions of the battery size compared
to Earliest Deadline First scheduling.
相似文献
Clemens MoserEmail: |
29.
This paper assesses the influence of (differential) settlement on sewer system functioning. Based on historical data of the vertical position of sewer invert levels, tilt measurements and in-sewer inspection videos, settlement and settlement related influences are analyzed for a case study area in Amsterdam. The average settlement rate of this system was 4 mm/year. Given this settlement rate, it is shown that settlement significantly influences sewer system functioning within the lifetime of a sewer (system). 相似文献
30.
Peter Lassig Hermann-Josef Lamberti Prof. Dr. Clemens Jochum 《WIRTSCHAFTSINFORMATIK》2003,45(2):147-156
Scoring and double-sided due diligence processes employed with vendor selection for IT infrastructure outsourcing Outsourcing opens the procurement of semi-finished products from business partners that are able to provide the respective processes in the required quality but at lower prices, e. g. because of bundling effects and specialization advantages. In particular, services that are not based on core-processes of an enterprise are well-suited for outsourcing. The evaluation of IT service outsourcing is difficult, because of its strategic position in enterprises. Against this background, this article describes a method to select a suitable vendor for IT infrastructure outsourcing employing scoring and double-sided due diligence processes. Our findings are based on experiences when selecting the vendor for outsourcing the European Information Technology Infrastructure (IT/I) area of the Deutsche Bank AG. 相似文献