全文获取类型
收费全文 | 3898篇 |
免费 | 97篇 |
国内免费 | 3篇 |
专业分类
电工技术 | 40篇 |
综合类 | 20篇 |
化学工业 | 1014篇 |
金属工艺 | 59篇 |
机械仪表 | 64篇 |
建筑科学 | 192篇 |
矿业工程 | 11篇 |
能源动力 | 70篇 |
轻工业 | 281篇 |
水利工程 | 19篇 |
石油天然气 | 6篇 |
无线电 | 232篇 |
一般工业技术 | 594篇 |
冶金工业 | 831篇 |
原子能技术 | 32篇 |
自动化技术 | 533篇 |
出版年
2021年 | 29篇 |
2019年 | 39篇 |
2018年 | 41篇 |
2017年 | 42篇 |
2016年 | 55篇 |
2015年 | 66篇 |
2014年 | 83篇 |
2013年 | 152篇 |
2012年 | 138篇 |
2011年 | 164篇 |
2010年 | 146篇 |
2009年 | 147篇 |
2008年 | 160篇 |
2007年 | 149篇 |
2006年 | 129篇 |
2005年 | 121篇 |
2004年 | 112篇 |
2003年 | 81篇 |
2002年 | 79篇 |
2001年 | 91篇 |
2000年 | 81篇 |
1999年 | 100篇 |
1998年 | 207篇 |
1997年 | 128篇 |
1996年 | 106篇 |
1995年 | 89篇 |
1994年 | 78篇 |
1993年 | 66篇 |
1992年 | 64篇 |
1991年 | 65篇 |
1990年 | 66篇 |
1989年 | 74篇 |
1988年 | 57篇 |
1987年 | 58篇 |
1986年 | 36篇 |
1985年 | 37篇 |
1984年 | 35篇 |
1983年 | 39篇 |
1982年 | 36篇 |
1981年 | 34篇 |
1980年 | 42篇 |
1979年 | 30篇 |
1978年 | 43篇 |
1977年 | 38篇 |
1976年 | 62篇 |
1975年 | 41篇 |
1974年 | 39篇 |
1973年 | 40篇 |
1971年 | 21篇 |
1970年 | 22篇 |
排序方式: 共有3998条查询结果,搜索用时 13 毫秒
261.
Axel Schairer Serge Autexier Dieter Hutter 《Electronic Notes in Theoretical Computer Science》2001,58(2)
In interactive theorem proving, tactics and tacticals have been introduced to automate proof search. In this scenario, user interaction traditionally is restricted to the mode in which the user decides which tactic to apply on the top-level, without being able to interact with the tactic once it has begun running.We propose a technique to allow the implementation of derivational analogy in tactical theorem proving. Instead of replaying tactics including backtracked dead ends our framework makes choice points in tactics explicit and thus avoids dead ends when reusing tactics. Additionally users can override choices a tactic has made or add additional steps to a derivation without terminating the tactic. The technique depends on an efficient replay of tactic executions without repeating search that the original computation may have involved. 相似文献
262.
Charles W. Fox Ben Mitchinson Martin J. Pearson Anthony G. Pipe Tony J. Prescott 《Autonomous Robots》2009,26(4):223-239
Actuated artificial whiskers modeled on rat macrovibrissae can provide effective tactile sensor systems for autonomous robots.
This article focuses on texture classification using artificial whiskers and addresses a limitation of previous studies, namely,
their use of whisker deflection signals obtained under relatively constrained experimental conditions. Here we consider the
classification of signals obtained from a whiskered robot required to explore different surface textures from a range of orientations
and distances. This procedure resulted in a variety of deflection signals for any given texture. Using a standard Gaussian
classifier we show, using both hand-picked features and ones derived from studies of rat vibrissal processing, that a robust
rough-smooth discrimination is achievable without any knowledge of how the whisker interacts with the investigated object.
On the other hand, finer discriminations appear to require knowledge of the target’s relative position and/or of the manner
in which the whisker contact its surface.
Electronic Supplementary Material The online version of this article () contains supplementary material, which is available to authorized users.
相似文献
Anthony G. Pipe |
263.
Frédéric Havet Martin Klazar Jan Kratochvíl Dieter Kratsch Mathieu Liedloff 《Algorithmica》2011,59(2):169-194
The notion of distance constrained graph labelings, motivated by the Frequency Assignment Problem, reads as follows: A mapping
from the vertex set of a graph G=(V,E) into an interval of integers {0,…,k} is an L(2,1)-labeling of G of span k if any two adjacent vertices are mapped onto integers that are at least 2 apart, and every two vertices with a common neighbor
are mapped onto distinct integers. It is known that for any fixed k≥4, deciding the existence of such a labeling is an NP-complete problem. We present exact exponential time algorithms that
are faster than the naive O
*((k+1)
n
) algorithm that would try all possible mappings. The improvement is best seen in the first NP-complete case of k=4, where the running time of our algorithm is O(1.3006
n
). Furthermore we show that dynamic programming can be used to establish an O(3.8730
n
) algorithm to compute an optimal L(2,1)-labeling. 相似文献
264.
Juan Carlos Lopez Pimentel Raul Monroy Dieter Hutter 《Electronic Notes in Theoretical Computer Science》2007,174(4):117
The verification of security protocols has attracted a lot of interest in the formal methods community, yielding two main verification approaches: i) state exploration, e.g. FDR [Gavin Lowe. Breaking and fixing the needham-schroeder public-key protocol using FDR. In TACAs'96: Proceedings of the Second International Workshop on Tools and Algorithms for Construction and Analysis of Systems, pages 147–166, London, UK, 1996. Springer-Verlag] and OFMC [A.D. Basin, S. Mödersheim, and L. Viganò. An on-the-fly model-checker for security protocol analysis. In D. Gollmann and E. Snekkenes, editors, ESORICS'03: 8th European Symposium on Research in Computer Security, number 2808 in Lecture Notes in Computer Science, pages 253–270, Gjøvik, Norway, 2003. Springer-Verlag]; and ii) theorem proving, e.g. the Isabelle inductive method [Lawrence C. Paulson. The inductive approach to verifying cryptographic protocols. Journal in Computer Security, 6(1-2):85–128, 1998] and Coral [G. Steel, A. Bundy, and M. Maidl. Attacking the asokan-ginzboorg protocol for key distribution in an ad-hoc bluetooth network using coral. In H. König, M. Heiner, and A. Wolisz, editors, IFIP TC6 /WG 6.1: Proceedings of 23rd IFIP International Conference on Formal Techniques for Networked and Distributed Systems, volume 2767, pages 1–10, Berlin, Germany, 2003. FORTE 2003 (work in progress papers)]. Complementing formal methods, Abadi and Needham's principles aim to guide the design of security protocols in order to make them simple and, hopefully, correct [M. Abadi and R. Needham. Prudent engineering practice for cryptographic protocols. IEEE Transactions on Software Engineering, 22(1):6–15, 1996]. We are interested in a problem related to verification but far less explored: the correction of faulty security protocols. Experience has shown that the analysis of counterexamples or failed proof attempts often holds the key to the completion of proofs and for the correction of a faulty model. In this paper, we introduce a method for patching faulty security protocols that are susceptible to an interleaving-replay attack. Our method makes use of Abadi and Needham's principles for the prudent engineering practice for cryptographic protocols in order to guide the location of the fault in a protocol as well as the proposition of candidate patches. We have run a test on our method with encouraging results. The test set includes 21 faulty security protocols borrowed from the Clark-Jacob library [J. Clark and J. Jacob. A survey of authentication protocol literature: Version 1.0. Technical report, Department of Computer Science, University of York, November 1997. A complete specification of the Clark-Jacob library in CAPSL is available at http://www.cs.sri.com/millen/capsl/]. 相似文献
265.
Mark Dokter Jozef Hladky Mathias Parger Dieter Schmalstieg Hans‐Peter Seidel Markus Steinberger 《Computer Graphics Forum》2019,38(2):93-103
In this paper, we introduce the CPatch, a curved primitive that can be used to construct arbitrary vector graphics. A CPatch is a generalization of a 2D polygon: Any number of curves up to a cubic degree bound a primitive. We show that a CPatch can be rasterized efficiently in a hierarchical manner on the GPU, locally discarding irrelevant portions of the curves. Our rasterizer is fast and scalable, works on all patches in parallel, and does not require any approximations. We show a parallel implementation of our rasterizer, which naturally supports all kinds of color spaces, blending and super‐sampling. Additionally, we show how vector graphics input can efficiently be converted to a CPatch representation, solving challenges like patch self intersections and false inside‐outside classification. Results indicate that our approach is faster than the state‐of‐the‐art, more flexible and could potentially be implemented in hardware. 相似文献
266.
267.
Inne Crèvecoeur Dieter Rondas Chantal Mathieu Lut Overbergh 《Proteomics. Clinical applications》2015,9(7-8):755-766
Pancreatic beta-cells have a crucial role in the regulation of blood glucose homeostasis by the production and secretion of insulin. In type 1 diabetes (T1D), an autoimmune reaction against the beta-cells together with the presence of inflammatory cytokines and ROS in the islets leads to beta-cell dysfunction and death. This review gives an overview of proteomic studies that lead to better understanding of beta-cell functioning in T1D. Protein profiling of isolated islets and beta-cell lines in health and T1D contributed to the unraveling of pathways involved in cytokine-induced cell death. In addition, by studying the serological proteome of T1D patients, new biomarkers and beta-cell autoantigens were discovered, which may improve screening tests and follow-up of T1D development. Interestingly, an important role for PTMs was demonstrated in the generation of beta-cell autoantigens. To conclude, proteomic techniques are of indispensable value to improve the knowledge on beta-cell function in T1D and the search toward therapeutic targets. 相似文献
268.
269.
270.
Most augmented reality (AR) applications are primarily concerned with letting a user browse a 3D virtual world registered with the real world. More advanced AR interfaces let the user interact with the mixed environment, but the virtual part is typically rather finite and deterministic. In contrast, autonomous behavior is often desirable in ubiquitous computing (Ubicomp), which requires the computers embedded into the environment to adapt to context and situation without explicit user intervention. We present an AR framework that is enhanced by typical Ubicomp features by dynamically and proactively exploiting previously unknown applications and hardware devices, and adapting the appearance of the user interface to persistently stored and accumulated user preferences. Our framework explores proactive computing, multi‐user interface adaptation, and user interface migration. We employ mobile and autonomous agents embodied by real and virtual objects as an interface and interaction metaphor, where agent bodies are able to opportunistically migrate between multiple AR applications and computing platforms to best match the needs of the current application context. We present two pilot applications to illustrate design concepts. Copyright © 2007 John Wiley & Sons, Ltd. 相似文献