首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   2672篇
  免费   149篇
  国内免费   37篇
电工技术   55篇
综合类   3篇
化学工业   335篇
金属工艺   45篇
机械仪表   58篇
建筑科学   163篇
矿业工程   2篇
能源动力   68篇
轻工业   117篇
水利工程   6篇
石油天然气   4篇
武器工业   1篇
无线电   578篇
一般工业技术   469篇
冶金工业   439篇
原子能技术   19篇
自动化技术   496篇
  2023年   16篇
  2022年   21篇
  2021年   52篇
  2020年   29篇
  2019年   47篇
  2018年   79篇
  2017年   51篇
  2016年   40篇
  2015年   59篇
  2014年   68篇
  2013年   148篇
  2012年   78篇
  2011年   123篇
  2010年   114篇
  2009年   119篇
  2008年   148篇
  2007年   121篇
  2006年   103篇
  2005年   108篇
  2004年   96篇
  2003年   123篇
  2002年   65篇
  2001年   72篇
  2000年   77篇
  1999年   78篇
  1998年   170篇
  1997年   87篇
  1996年   71篇
  1995年   72篇
  1994年   43篇
  1993年   43篇
  1992年   34篇
  1991年   36篇
  1990年   42篇
  1989年   36篇
  1988年   32篇
  1987年   29篇
  1986年   14篇
  1985年   17篇
  1984年   9篇
  1983年   7篇
  1982年   12篇
  1981年   5篇
  1980年   10篇
  1979年   11篇
  1978年   6篇
  1977年   9篇
  1976年   11篇
  1973年   6篇
  1972年   3篇
排序方式: 共有2858条查询结果,搜索用时 15 毫秒
91.
Chanson  Samuel T.  Cheung  Tin-Wo 《World Wide Web》2001,4(4):235-253
The popularity of handheld mobile devices and deployment of the public key infrastructure in many parts of the world have led to the development of electronic commerce on mobile devices. For the current version of mobile phones, the main challenge is the limited computing capacity on these devices for PKI-based end-to-end secure transactions. This paper presents a new architecture and protocol for authentication and key exchange as well as the supporting infrastructure that is suitable for the mobile phone environment. The system requirements and our solutions in addressing these requirements in the restrictive environment are discussed. An evaluation of the system performance is also included. The system has been implemented and is supporting some real-life applications.  相似文献   
92.
In recent years, the number of peer-to-peer (P2P) applications has increased significantly. One important problem in many P2P applications is how to efficiently disseminate data from a single source to multiple receivers on the Internet. A successful model used for analyzing this problem is a graph consisting of nodes and edges, with a capacity assigned to each edge. In some situations however, it is inconvenient to use this model. To that end, we propose to study the problem of efficient data dissemination in a source constraint network. A source constraint network is modeled as a graph in which, the capacity is associated with a node, rather than an edge. The contributions of this paper include (a) a quantitative data dissemination in any source constraint network, (b) a set of topologies suitable for data dissemination in P2P networks, and (c) an architecture and implementation of a P2P system based on the proposed optimal topologies. We will present the experimental results of our P2P system deployed on PlanetLab nodes demonstrating that our approach achieves near optimal throughput while providing scalability, low delay and bandwidth fairness among peers.  相似文献   
93.
Cheung SS  Westwood DA  Knox MK 《Ergonomics》2007,50(2):275-288
Many contemporary workers are routinely exposed to mild cold stress, which may compromise mental function and lead to accidents. A study investigated the effect of mild body cooling of 1.0 degree C rectal temperature (Tre) on vigilance (i.e. sustained attention) and the orienting of spatial attention (i.e. spatially selective processing of visual information). Vigilance and spatial attention tests were administered to 14 healthy males and six females at four stages (pre-immersion, deltaTre = 0, -0.5 and - 1.0 degree C ) of a gradual, head-out immersion cooling session (18-25 deltaC water), and in four time-matched stages of a contrast session, in which participants sat in an empty tub and no cooling took place. In the spatial attention test, target discrimination times were similar for all stages of the contrast session, but increased significantly in the cooling phase upon immersion (deltaTre = 0 degrees C), with no further increases at deltaTre = -0.5 and - 1.0 degree C. Despite global response slowing, cooling did not affect the normal pattern of spatial orienting. In the vigilance test, the variability of detection time was adversely affected in the cooling but not the contrast trials: variability increased at immersion but did not increase further with additional cooling. These findings suggest that attentional impairments are more closely linked to the distracting effects of cold skin temperature than decreases in body core temperature.  相似文献   
94.
 The use of pressure sensors made of conductive polymers is common in biomechanical applications. Unfortunately, hysteresis, nonlinearity, non-repeatability and creep have a significant effect on the pressure readings when such conductive polymers are used. The objective of this paper is to explore the potential of a new flexible encapsulated micro electromechanical system (MEMS) pressure sensor system as an alternative for human interface pressure measurement. A prototype has been designed, fabricated, and characterized. Testing has shown that the proposed packaging approach shows very little degradation in the performance characteristics of the original MEMS pressure sensor. The much-needed characteristics of repeatability, linearity, low hysteresis, temperature independency are preserved. Thus the flexible encapsulated MEMS pressure sensor system is very promising and shows superiority over the commercially available conductive polymer film sensors for pressure measurement in biomechanical applications. Received: 1 December 1999/Accepted: 17 August 2000  相似文献   
95.
96.
The evidence framework applied to support vector machines   总被引:23,自引:0,他引:23  
We show that training of the support vector machine (SVM) can be interpreted as performing the level 1 inference of MacKay's evidence framework (1992). We further on show that levels 2 and 3 of the evidence framework can also be applied to SVMs. This integration allows automatic adjustment of the regularization parameter and the kernel parameter to their near-optimal values. Moreover, it opens up a wealth of Bayesian tools for use with SVMs. Performance of this method is evaluated on both synthetic and real-world data sets.  相似文献   
97.
98.
99.
Subsequent to our observation that the Tl- and Bi-based cuprate high-T c superconductors are built of superconductor-semiconductor arrays (P. C. W. Fung and W. Y. Kwok,J. Superconduct., this issue), we investigate in this paper the possibility ofT c enhancement arising from the effect of change of phonon spectrum and the effect of size quantization when one or more semiconductor blocks is attached to the basic superconductor in the unit cell.  相似文献   
100.
Fault-based test suite prioritization for specification-based testing   总被引:1,自引:0,他引:1  

Context

Existing test suite prioritization techniques usually rely on code coverage information or historical execution data that serve as indicators for estimating the fault-detecting ability of test cases. Such indicators are primarily empirical in nature and not theoretically driven; hence, they do not necessarily provide sound estimates. Also, these techniques are not applicable when the source code is not available or when the software is tested for the first time.

Objective

We propose and develop the novel notion of fault-based prioritization of test cases which directly utilizes the theoretical knowledge of their fault-detecting ability and the relationships among the test cases and the faults in the prescribed fault model, based on which the test cases are generated.

Method

We demonstrate our approach of fault-based prioritization by applying it to the testing of the implementation of logical expressions against their specifications. We then validate our proposal by an empirical study that evaluates the effectiveness of prioritization techniques using two different metrics.

Results

A theoretically guided fault-based prioritization technique generally outperforms other techniques under study, as assessed by two different metrics. Our empirical results also show that the technique helps to reveal all target faults by executing only about 72% of the prioritized test suite, thereby reducing the effort required in testing.

Conclusions

The fault-based prioritization approach is not only applicable to the instance empirically validated in this paper, but should also be adaptable to other fault-based testing strategies. We also envisage new research directions to be opened up by our work.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号