全文获取类型
收费全文 | 80758篇 |
免费 | 2262篇 |
国内免费 | 244篇 |
专业分类
电工技术 | 901篇 |
综合类 | 657篇 |
化学工业 | 12524篇 |
金属工艺 | 1406篇 |
机械仪表 | 1652篇 |
建筑科学 | 2840篇 |
矿业工程 | 509篇 |
能源动力 | 1518篇 |
轻工业 | 5231篇 |
水利工程 | 1039篇 |
石油天然气 | 170篇 |
武器工业 | 9篇 |
无线电 | 4330篇 |
一般工业技术 | 9795篇 |
冶金工业 | 27990篇 |
原子能技术 | 485篇 |
自动化技术 | 12208篇 |
出版年
2023年 | 416篇 |
2022年 | 608篇 |
2021年 | 884篇 |
2020年 | 518篇 |
2019年 | 724篇 |
2018年 | 1281篇 |
2017年 | 1409篇 |
2016年 | 1939篇 |
2015年 | 1568篇 |
2014年 | 1529篇 |
2013年 | 2957篇 |
2012年 | 3848篇 |
2011年 | 4573篇 |
2010年 | 2395篇 |
2009年 | 2386篇 |
2008年 | 2454篇 |
2007年 | 2432篇 |
2006年 | 2187篇 |
2005年 | 4737篇 |
2004年 | 3703篇 |
2003年 | 3159篇 |
2002年 | 1910篇 |
2001年 | 1456篇 |
2000年 | 835篇 |
1999年 | 1223篇 |
1998年 | 6742篇 |
1997年 | 4388篇 |
1996年 | 3071篇 |
1995年 | 2037篇 |
1994年 | 1610篇 |
1993年 | 1625篇 |
1992年 | 758篇 |
1991年 | 600篇 |
1990年 | 725篇 |
1989年 | 672篇 |
1988年 | 624篇 |
1987年 | 594篇 |
1986年 | 523篇 |
1985年 | 605篇 |
1984年 | 505篇 |
1983年 | 421篇 |
1982年 | 458篇 |
1981年 | 484篇 |
1980年 | 491篇 |
1979年 | 364篇 |
1978年 | 378篇 |
1977年 | 867篇 |
1976年 | 1560篇 |
1975年 | 324篇 |
1973年 | 244篇 |
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
951.
Qian?LiEmail author Wenjia?Niu Gang?Li Endong?Tong Yue?Hu Ping?Liu Li?Guo 《Journal of Network and Systems Management》2015,23(3):474-501
With the motivation of seamlessly extending wireless sensor networks to the external environment, service-oriented architecture comes up as a promising solution. However, as sensor nodes are failure prone, this consequently renders the whole wireless sensor network to seriously faulty. When a particular node is faulty, the service on it should be migrated into those substitute sensor nodes that are in a normal status. Currently, two kinds of approaches exist to identify the substitute sensor nodes: the most common approach is to prepare redundancy nodes, though the involved tasks such as maintaining redundancy nodes, i.e., relocating the new node, lead to an extra burden on the wireless sensor networks. More recently, other approaches without using redundancy nodes are emerging, and they merely select the substitute nodes in a sensor node’s perspective i.e., migrating the service of faulty node to it’s nearest sensor node, though usually neglecting the requirements of the application level. Even a few work consider the need of the application level, they perform at packets granularity and don’t fit well at service granularity. In this paper, we aim to remove these limitations in the wireless sensor network with the service-oriented architecture. Instead of deploying redundancy nodes, the proposed mechanism replaces the faulty sensor node with consideration of the similarity on the application level, as well as on the sensor level. On the application level, we apply the Bloom Filter for its high efficiency and low space costs. While on the sensor level, we design an objective solution via the coefficient of a variation as an evaluation for choosing the substitute on the sensor level. 相似文献
952.
Do?Yeon?Kim Guozhong?Li Seong?Taek?Park Mi?Hyun?KoEmail author 《Journal in Computer Virology》2016,12(3):151-161
This paper analyzed the effects of security risk factors fit for cloud computing paradigm on the acceptance of enterprise cloud service with intent to illuminate the factors for vitalizing the adoption of corporate cloud services in the future. The acceptance intention was set as a dependent variable. Independent variables were set in reference to the technology acceptance theory. Security risks were categorized into compliance risk, information leakage risk, troubleshooting risk and service discontinuation risk to design a model for analysis. 相似文献
953.
954.
Jian-hua?DaiEmail author Hu?Hu Guo-jie?Zheng Qing-hua?Hu Hui-feng?Han Hong?Shi 《浙江大学学报:C卷英文版》2016,17(9):919-928
Interval-valued data appear as a way to represent the uncertainty affecting the observed values. Dealing with interval-valued information systems is helpful to generalize the applications of rough set theory. Attribute reduction is a key issue in analysis of interval-valued data. Existing attribute reduction methods for single-valued data are unsuitable for interval-valued data. So far, there have been few studies on attribute reduction methods for interval-valued data. In this paper, we propose a framework for attribute reduction in interval-valued data from the viewpoint of information theory. Some information theory concepts, including entropy, conditional entropy, and joint entropy, are given in interval-valued information systems. Based on these concepts, we provide an information theory view for attribute reduction in interval-valued information systems. Consequently, attribute reduction algorithms are proposed. Experiments show that the proposed framework is effective for attribute reduction in interval-valued information systems. 相似文献
955.
Lamia?Sadeg-BelkacemEmail author Zineb?Habbas Wassila?Aggoune-Mtalaa 《Frontiers of Computer Science》2016,10(6):1012-1025
This paper proposes Adaptive Genetic Algorithms Guided by structural knowledges coming from decomposition methods, for solving PCSPs. The family of algorithms called AGAGD_x_y is designed to be doubly generic, meaning that any decomposition method and different heuristics for the genetic operators can be considered. To validate the approach, the decomposition algorithm due to Newman was used and several crossover operators based on structural knowledge such as the cluster, separator and the cut were tested. The experimental results obtained on the most challenging Minimum Interference-FAP problems of CALMA instances are very promising and lead to interesting perspectives to be explored in the future. 相似文献
956.
957.
Cheng?Zheng Weiming?ShenEmail author Hamada?H.?Ghenniwa 《Service Oriented Computing and Applications》2016,10(1):19-34
Service discovery has been a very active research field attracting many researchers around the world. Most of the previous research efforts on service discovery have been based on the ternary classification of participant roles in web services, including service providers, brokers, and consumers. This classification is insufficient because it fails to make a difference between application developers and end users who both belong to service consumers. As a result, application developers usually take the responsibility of seeking services while end users who ultimately use the application are ignored. In order to address this issue, this paper presents an Intents-based approach for dynamic service discovery. The proposed approach is motivated from two industrial protocols: Android Intents and web Intents. It improves the two protocols by a generic model from the aspects of architecture, intent messages and their resolving process, Intents services, and user agents. It classifies the implicit intents into authoritative and naïve intents and is compatible with the current web service triangular architecture. This paper also illustrates a way of creating Intents services from SOAP and REST web services and presents two cases to demonstrate some benefits of the proposed approach. 相似文献
958.
959.
Mohamed?Lamine?KerdoudiEmail author Chouki?Tibermacine Salah?Sadou 《Service Oriented Computing and Applications》2016,10(4):437-463
Web applications are nowadays prevalent software systems in our everyday’s life. A lot of these applications have been developed for end users only. Thus, they are not designed by considering future extensions that would be developed by third parties. One possible and interesting solution for opening these applications for such kind of extension development is to create and deploy Web services starting from these applications. In this paper, we present a method and a tool for semiautomatically creating Web service implementations from applications having Web interfaces. The proposed method generates operations that are published in Web services for each functionality provided by a Web application. In addition, it generates new operations starting from Web interfaces. Our approach goes further in the creation of services by generating executable orchestrations, as BPEL processes, starting from navigations in the Web interfaces of these applications and by providing BPMN choreography specifications starting from the collaborations between the generated Web services. We implemented and experimented our solution in the migration of three real-world Web applications toward Web service-oriented systems. 相似文献
960.
Computational Visual Media - The retrieval of non-rigid 3D shapes is an important task. A common technique is to simplify this problem to a rigid shape retrieval task by producing a... 相似文献