全文获取类型
收费全文 | 3484篇 |
免费 | 88篇 |
国内免费 | 6篇 |
专业分类
电工技术 | 26篇 |
综合类 | 6篇 |
化学工业 | 522篇 |
金属工艺 | 29篇 |
机械仪表 | 42篇 |
建筑科学 | 121篇 |
矿业工程 | 32篇 |
能源动力 | 37篇 |
轻工业 | 167篇 |
水利工程 | 30篇 |
石油天然气 | 4篇 |
无线电 | 140篇 |
一般工业技术 | 316篇 |
冶金工业 | 1591篇 |
原子能技术 | 5篇 |
自动化技术 | 510篇 |
出版年
2023年 | 23篇 |
2022年 | 43篇 |
2021年 | 60篇 |
2020年 | 28篇 |
2019年 | 26篇 |
2018年 | 59篇 |
2017年 | 51篇 |
2016年 | 79篇 |
2015年 | 70篇 |
2014年 | 80篇 |
2013年 | 102篇 |
2012年 | 110篇 |
2011年 | 135篇 |
2010年 | 78篇 |
2009年 | 116篇 |
2008年 | 107篇 |
2007年 | 90篇 |
2006年 | 102篇 |
2005年 | 70篇 |
2004年 | 67篇 |
2003年 | 50篇 |
2002年 | 53篇 |
2001年 | 31篇 |
2000年 | 29篇 |
1999年 | 79篇 |
1998年 | 480篇 |
1997年 | 270篇 |
1996年 | 207篇 |
1995年 | 148篇 |
1994年 | 106篇 |
1993年 | 100篇 |
1992年 | 22篇 |
1991年 | 27篇 |
1990年 | 31篇 |
1989年 | 28篇 |
1988年 | 34篇 |
1987年 | 30篇 |
1986年 | 16篇 |
1985年 | 25篇 |
1984年 | 12篇 |
1983年 | 15篇 |
1982年 | 12篇 |
1981年 | 14篇 |
1980年 | 23篇 |
1979年 | 9篇 |
1978年 | 16篇 |
1977年 | 50篇 |
1976年 | 98篇 |
1975年 | 13篇 |
1971年 | 6篇 |
排序方式: 共有3578条查询结果,搜索用时 312 毫秒
61.
62.
Katharina Kormann Martin Kronbichler Bernhard Müller 《Journal of scientific computing》2012,50(1):167-197
A new way of deriving strictly stable high order difference operators for partial differential equations (PDE) is demonstrated
for the 1D convection diffusion equation with variable coefficients. The derivation is based on a diffusion term in conservative,
i.e. self-adjoint, form. Fourth order accurate difference operators are constructed by mass lumping Galerkin finite element
methods so that an explicit method is achieved. The analysis of the operators is confirmed by numerical tests. The operators
can be extended to multi dimensions, as we demonstrate for a 2D example. The discretizations are also relevant for the Navier–Stokes
equations and other initial boundary value problems that involve up to second derivatives with variable coefficients. 相似文献
63.
Around 1960, Dijkstra, Floyd and Warshall published papers on algorithms for solving single-source and all-sources shortest path problems, respectively. These algorithms, nowadays named after their inventors, are well known and well established. This paper sheds an algebraic light on these algorithms. We combine the shortest path problems with Kleene algebra, also known as Conway’s regular algebra. This view yields a purely algebraic version of Dijkstra’s shortest path algorithm and the one by Floyd/Warshall. Moreover, the algebraic abstraction yields applications of these algorithms to structures different from graphs and pinpoints the mathematical requirements on the underlying cost algebra that ensure their correctness. 相似文献
64.
Grammer Karl; Fink Bernhard; M?ller Anders P.; Manning John T. 《Canadian Metallurgical Quarterly》2005,131(5):658
Evolutionary behavioral biology suggests that certain characteristics of the human face and body are important for mate preferences and are therefore subject to sexual selection. J. Weeden and J. Sabini (see record 2005-11504-001) identify a number of weaknesses in the association between traits' attractiveness and health. In contrast, the authors argue that (a) studies on preferences for physical characteristics that rely on 1 trait permit only limited interpretation, (b) limitations placed on J. Weeden and J. Sabini's review exclude important associations, (c) there are misconceptions in their treatment of some traits, and (d) their selected literature provides an inaccurate picture regarding effect size. The authors suggest that future research in this field should seek conceptual and methodological constancy in trait selection and in the evaluation of attractiveness- and health-related traits. (PsycINFO Database Record (c) 2010 APA, all rights reserved) 相似文献
65.
Over the past few years, XML (Extensible Markup Language) has become the standard for data and document interchange between distributed systems. With the continuing proliferation of the Internet, XML has also become a key technology for transactional e-business. A large percentage of Internet interactions, however, involves searching through documents, Web pages, databases, and other information resources. This article explores some of the ways XML can improve these types of searches. It focuses particularly on searches through legacy databases and on the changes you can make to your legacy systems to effectively exploit XML. 相似文献
66.
Extracting Interpretable Fuzzy Rules from RBF Networks 总被引:4,自引:0,他引:4
Radial basis function networks and fuzzy rule systems are functionally equivalent under some mild conditions. Therefore, the learning algorithms developed in the field of artificial neural networks can be used to adapt the parameters of fuzzy systems. Unfortunately, after the neural network learning, the structure of the original fuzzy system is changed and interpretability, which is considered to be one of the most important features of fuzzy systems, is usually impaired. This Letter discusses the differences between RBF networks and interpretable fuzzy systems. Based on these discussions, a method for extracting interpretable fuzzy rules from RBF networks is suggested. Simulation examples are given to embody the idea of this paper. 相似文献
67.
Mutation Testing in the Refinement Calculus 总被引:2,自引:0,他引:2
Bernhard K. Aichernig 《Formal Aspects of Computing》2003,15(2-3):280-295
This article discusses mutation testing strategies in the context of refinement. Here, a novel generalisation of mutation testing techniques is presented to be applied to contracts ranging from formal specifications to programs. It is demonstrated that refinement and its dual abstraction are the key notions leading to a precise and yet simple theory of mutation testing. The refinement calculus of Back and von Wright is used to express concepts like contracts, useful mutations, test cases and test coverage. 相似文献
68.
Bernhard Klinger 《Computing》1997,59(3):223-236
We investigate quasi-Monte Carlo integration for functions on thes-dimensional unit cube having point singularities. Error bounds are proved and the theoretical results are verified by computations
using Halton, Sobol’ and Niederreiter sequences.
Supported by the Austrian Science Foundation (Project 10223-PHY). 相似文献
69.
In a vehicle tracking system computers aboard moving vehicles determine periodically their geographical position and transmit it to a control center. This paper presents a commercial vehicle tracking system as an example of a distributed real-time system with mobile components and focuses on the issue of clock synchronization. The mobile components of the system obtain highly accurate timing information from the Global Positioning System which is used to synchronize their local clocks to UTC world time. Thus a tight clock synchronization is achieved without imposing additional load on the communication channels of the system. 相似文献
70.
Marc Rennhard Sandro Rafaeli Laurent Mathy Bernhard Plattner David Hutchison 《Electronic Commerce Research》2004,4(1-2):83-111
The lack of privacy is one of the main reasons that limits trust in e-commerce. Current e-commerce practice enforces a customer to disclose her identity to the e-shop and the use of credit cards makes it straightforward for an e-shop to know the real identity of its customers. Although there are some payment systems based on untraceable tokens, they are not as widely used as credit cards. Furthermore, even without buying anything, a customer is already disclosing some information about who or where she may be by just connecting to the e-shop's web server and leaving behind an IP-address. In this paper, we present novel components that enable secure pseudonymous e-commerce. On the one hand, these components allow a customer to browse through an e-shop, select goods, and pay the goods with her credit card such that neither the e-shop operator nor the credit card issuer nor an eavesdropper is able to get any information about the customer's identity. On the other hand, it is guaranteed that none of the involved parties is able to act dishonestly during the credit card payment. Such a system could greatly enhance trust in e-commerce since it overcomes the customers' privacy concerns. 相似文献