首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   8368篇
  免费   480篇
  国内免费   8篇
电工技术   114篇
综合类   23篇
化学工业   2189篇
金属工艺   244篇
机械仪表   147篇
建筑科学   591篇
矿业工程   98篇
能源动力   282篇
轻工业   592篇
水利工程   50篇
石油天然气   20篇
武器工业   1篇
无线电   662篇
一般工业技术   1728篇
冶金工业   468篇
原子能技术   48篇
自动化技术   1599篇
  2024年   15篇
  2023年   117篇
  2022年   208篇
  2021年   329篇
  2020年   199篇
  2019年   210篇
  2018年   231篇
  2017年   267篇
  2016年   351篇
  2015年   293篇
  2014年   377篇
  2013年   596篇
  2012年   533篇
  2011年   717篇
  2010年   507篇
  2009年   475篇
  2008年   485篇
  2007年   424篇
  2006年   379篇
  2005年   304篇
  2004年   252篇
  2003年   186篇
  2002年   165篇
  2001年   102篇
  2000年   96篇
  1999年   114篇
  1998年   124篇
  1997年   96篇
  1996年   86篇
  1995年   51篇
  1994年   60篇
  1993年   37篇
  1992年   47篇
  1991年   26篇
  1990年   39篇
  1989年   23篇
  1988年   28篇
  1987年   27篇
  1986年   23篇
  1985年   20篇
  1984年   29篇
  1983年   17篇
  1982年   18篇
  1981年   16篇
  1980年   20篇
  1978年   12篇
  1977年   17篇
  1976年   27篇
  1975年   13篇
  1969年   11篇
排序方式: 共有8856条查询结果,搜索用时 15 毫秒
121.
Making changes to software systems can prove costly and it remains a challenge to understand the factors that affect the costs of software evolution. This study sought to identify such factors by investigating the effort expended by developers to perform 336 change tasks in two different software organizations. We quantitatively analyzed data from version control systems and change trackers to identify factors that correlated with change effort. In-depth interviews with the developers about a subset of the change tasks further refined the analysis. Two central quantitative results found that dispersion of changed code and volatility of the requirements for the change task correlated with change effort. The analysis of the qualitative interviews pointed to two important, underlying cost drivers: Difficulties in comprehending dispersed code and difficulties in anticipating side effects of changes. This study demonstrates a novel method for combining qualitative and quantitative analysis to assess cost drivers of software evolution. Given our findings, we propose improvements to practices and development tools to manage and reduce the costs.  相似文献   
122.
Der Einsatz von Informationstechnologie (IT) in Organisationen bietet viele M?glichkeiten des Missbrauchs. Besch?ftigte k?nnen sich die besonderen Eigenschaften der IT zunutze machen, um sich etwa in gesch?ftssch?digender Weise Vorteile zu verschaffen. Gleichzeitig erm?glicht IT aber auch, verbotene Handlungen aufzuspüren und zu belegen (IT-Forensik). Der Beitrag beschreibt die technische Praxis von IT-forensischen Analysen und geht auf damit verbundene rechtliche Fragestellungen ein.  相似文献   
123.
The Cu-Sn-Ti ternary system has been studied via experiments and thermodynamic modelling. In the experimental section, the composition of the alloys was selected based on the preliminary calculations and available literature data. Metallography, scanning electron microscopy and electron probe microanalysis were employed to analyse alloy samples prepared by arc-melting after annealing at 800 °C for 760 h. Solid phase relations at 800 °C were established. In contrast to earlier reports, the CuSn3Ti5 phase was interpreted as a binary intermetallic compound (Sn3Ti5) with extended Cu solubility. In the modelling section, three binary sub-systems were critically evaluated and updated according to the new experimental data and theoretical calculations reported in literature. According to their crystal structures and homogeneity ranges, appropriate sublattice models were proposed for SnTi3,SnTi2,Sn3Ti5 and Sn5Ti6. A set of self-consistent thermodynamic parameters for the Cu-Sn-Ti ternary system was obtained by considering the present experimental results and reported experimental information. The calculated results compare with the available experimental data to validate the present thermodynamic assessment.  相似文献   
124.
The IEEE 802.21 standard facilitates media independent handovers by providing higher layer mobility management functions with common service primitives for all technologies. Right after the base specification was published, several voices rose up in the working group advocating to broaden the scope of IEEE 802.21 beyond handovers. This paper aims at updating the reader with the main challenges and functionalities required to create a Media Independence Service Layer, through the analysis of scenarios which are being discussed within the working group: 1) Wireless Coexistence, and 2) Heterogeneous Wireless Multihop Backhaul Networks.  相似文献   
125.
126.
The input-state linear horizon (ISLH) for a nonlinear discrete-time system is defined as the smallest number of time steps it takes the system input to appear nonlinearly in the state variable. In this paper, we employ the latter concept and show that the class of constraint admissible N-step affine state-feedback policies is equivalent to the associated class of constraint admissible disturbance-feedback policies, provided that N is less than the system’s ISLH. The result generalizes a recent result in [Goulart, P. J., Kerrigan, E. C., Maciejowski, J. M. (2006). Optimization over state feedback policies for robust control with constraints. Automatica, 42(4), 523-533] and is significant because it enables one: (i) to determine a constraint admissible state-feedback policy by employing well-known convex optimization techniques; and (ii) to guarantee robust recursive feasibility of a class of model predictive control (MPC) policies by imposing a suitable terminal constraint. In particular, we propose an input-to-state stabilizing MPC policy for a class of nonlinear systems with bounded disturbance inputs and mixed polytopic constraints on the state and the control input. At each time step, the proposed MPC policy requires the solution of a single convex quadratic programme parameterized by the current system state.  相似文献   
127.
This paper presents a product dynamic model and design for X solution (DFX) developed in C++ with the OpenCASCADE geometric kernel, allowing the designer not only to get feedback on the viability of his design choices but also to collect data for process and task planning, maintenance and end-of-life strategy planning. The implemented method evaluates automatically both the efficiency factors and the incompatibilities between development characteristics in order to optimize the design of the product for multiple domains. The framework of this DFX solution, based on the product data structure, consists of imposing integration constraints concerning the development process during the entire design product process. In this paper, simple assemblies are used as brief examples to demonstrate the application of the proposed integrated design solution, its effectiveness to improve the design for X and collecting useful data for entire lifecycle duration. The method developed has been formalized with the NIAM model.  相似文献   
128.
This paper presents an implementation of the watermarking method proposed by Venkatesan et al. in their paper [R. Venkatesan, V. Vazirani, S. Sinha, A graph theoretic approach to software watermarking, in: Fourth International Information Hiding Workshop, Pittsburgh, PA, 2001]. An executable program is marked by the addition of code for which the topology of the control-flow graph encodes a watermark. We discuss issues that were identified during construction of an actual implementation that operates on Java bytecode. We present two algorithms for splitting a watermark number into a redundant set of pieces and an algorithm for turning a watermark number into a control-flow graph. We measure the size and time overhead of watermarking, and evaluate the algorithm against a variety of attacks.  相似文献   
129.
130.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号