全文获取类型
收费全文 | 2811篇 |
免费 | 175篇 |
国内免费 | 2篇 |
专业分类
电工技术 | 45篇 |
综合类 | 1篇 |
化学工业 | 652篇 |
金属工艺 | 52篇 |
机械仪表 | 75篇 |
建筑科学 | 66篇 |
矿业工程 | 7篇 |
能源动力 | 95篇 |
轻工业 | 363篇 |
水利工程 | 26篇 |
石油天然气 | 9篇 |
无线电 | 254篇 |
一般工业技术 | 442篇 |
冶金工业 | 380篇 |
原子能技术 | 27篇 |
自动化技术 | 494篇 |
出版年
2023年 | 22篇 |
2022年 | 73篇 |
2021年 | 99篇 |
2020年 | 58篇 |
2019年 | 74篇 |
2018年 | 82篇 |
2017年 | 85篇 |
2016年 | 83篇 |
2015年 | 88篇 |
2014年 | 107篇 |
2013年 | 199篇 |
2012年 | 158篇 |
2011年 | 185篇 |
2010年 | 136篇 |
2009年 | 137篇 |
2008年 | 116篇 |
2007年 | 102篇 |
2006年 | 98篇 |
2005年 | 80篇 |
2004年 | 82篇 |
2003年 | 64篇 |
2002年 | 61篇 |
2001年 | 47篇 |
2000年 | 37篇 |
1999年 | 33篇 |
1998年 | 103篇 |
1997年 | 70篇 |
1996年 | 58篇 |
1995年 | 46篇 |
1994年 | 29篇 |
1993年 | 40篇 |
1992年 | 25篇 |
1991年 | 21篇 |
1990年 | 23篇 |
1989年 | 15篇 |
1988年 | 18篇 |
1987年 | 15篇 |
1986年 | 12篇 |
1985年 | 18篇 |
1984年 | 21篇 |
1983年 | 15篇 |
1982年 | 16篇 |
1981年 | 18篇 |
1979年 | 9篇 |
1978年 | 8篇 |
1977年 | 9篇 |
1976年 | 19篇 |
1975年 | 8篇 |
1973年 | 7篇 |
1971年 | 8篇 |
排序方式: 共有2988条查询结果,搜索用时 15 毫秒
81.
On spiking neural P systems and partially blind counter machines 总被引:1,自引:0,他引:1
A k-output spiking neural P system (SNP) with output neurons, , generates a tuple of positive integers if, starting from the initial configuration, there is a sequence of steps such that during the computation,
each O
i
generates exactly two spikes aa (the times the pair aa are generated may be different for different output neurons) and the time interval between the first a and the second a is n
i
. After the output neurons generate their pairs of spikes, the system eventually halts. We give characterizations of sets
definable by partially blind multicounter machines in terms of k-output SNPs operating in a sequential mode. Slight variations of the models make them universal. 相似文献
82.
Authentication and authorization in many distributed systems rely on the use of cryptographic credentials that in most of
the cases have a defined lifetime. This feature mandates the use of mechanisms able to determine whether a particular credential
can be trusted at a given moment. This process is commonly named validation. Among available validation mechanisms, the Online Certificate Status Protocol (OCSP) stands out due to its ability to carry
near real time certificate status information. Despite its importance for security, OCSP faces considerable challenges in
the computational Grid (i.e. Proxy Certificate’s validation) that are being studied at the Global Grid Forum’s CA Operations
Work Group (CAOPS-WG). As members of this group, we have implemented an OCSP validation infrastructure for the Globus Toolkit
4, composed of the CertiVeR Validation Service and our Open GRid Ocsp (OGRO) client library, which introduced the Grid Validation Policy. This paper summarizes our experiences on that work and the results obtained up to now. Furthermore we introduce the prevalidation concept, a mechanism analogous to the Authorization Push-Model, capable of improving OCSP validation performance in Grids.
This paper also reports the results obtained with OGRO’s prevalidation rules for Grid Services as a proof of concept.
相似文献
Oscar MansoEmail: |
83.
Saroul L Figueiredo O Hersch RD 《IEEE transactions on visualization and computer graphics》2006,12(1):26-35
Curved cross-sections extracted from medical volume images are useful for analyzing nonplanar anatomic structures such as the aorta arch or the pelvis. For visualization and for performing distance measurements, extracted surface sections need to be adequately flattened. We present two different distance preserving surface flattening methods which preserve distances according to a user-specified center of interest and according to user-specified orientations. The first method flattens surface sections by preserving distances along surface curves located within planes having a user specified constant orientation. The second method flattens surfaces along curves located within radial planes crossing the center of interest. We study and compare the properties of the two flattening methods by analyzing their distortion maps. Thanks to a multiresolution approach, we provide surface flattening at interactive rates, allowing users to displace their focus point while visualizing the resulting flattened surface. These distance preserving flattening methods provide new means of inspecting curved cross-sections extracted from medical images. 相似文献
84.
Building the IBM 4758 secure coprocessor 总被引:1,自引:0,他引:1
Meeting the challenge of building a user-configurable secure coprocessor provided several lessons in hardware and software development and continues to spur further research. In developing the 4758, we met our major research security goals and provided the following features: (1) a lifetime-secure tamper-responding device, rather than one that is secure only between resets that deployment-specific security officers perform; (2) a secure booting process in which each layer progressively validates the next less-trusted layer, with hardware restricting access to its secrets before passing control to that layer; (3) an actual manufacturable product - a nontrivial accomplishment considering that we designed the device so that it does not have a personality until configured in the field; (4) the first FIPS 140-1 Level 4 validation, arguably the only general-purpose computational platform validated at this level so far; and (5) a multipurpose programmable device based on a 99-MHz 486 CPU internal environment, with a real operating system, a C language development environment and relatively high-speed cryptography 相似文献
85.
86.
A simple problem concerning evaluation of programs is shown to be nonelementary recursive. The problem is the following: Given an input-free programP (i.e. all variables are initially 0) without nested loops using only instructions of the formx ← 1, x ← x + y, \(x \leftarrow x\dot - y\) ,do x... end, doesP output 0? This problem has time complexity \(2^{2^{ {\mathinner{\mkern2mu\raise1pt\hbox{.}\mkern2mu \raise4pt\hbox{.}\mkern2mu\raise7pt\hbox{.}\mkern1mu}} ^2 } } \) }cn-levels for some constantc. Other results are presented which show how the complexity of the 0-evaluation problem changes when the nonlooping instructions are varied. For example, it is shown that 0-evaluation is PSPACE-complete even for the case when the nonlooping instructions are onlyx ← x + 1,if x = 0then y ←y \(y \leftarrow y\dot - 1\) . 相似文献
87.
Let be the class of real-time nondeterministic one-counter machines whose counters make at mostone reversal. Let 1 (respectively, 2) be the subclass consisting of machines whose only nondeterministic move is in the choice of when to reverse the counter (respectively, when to start using the counter). 1 and 2 are among the simplest known classes of machines for which the universe problem has been shown undecidable. (The universe problem for a class of machines is the problem of deciding if an arbitrary machine in the class accepts all its inputs.) Here, we show that the classes of languages accepted by machines in 1 and 2 are incomparable. Moreover, the union of the language classes is properly contained in the class defined by . We also, briefly, look at the closure properties of these machines.This research was supported in part by NSF Grant MCS78-01736. 相似文献
88.
Sean J. Barbeau Miguel A. Labrador Philip L. Winters Rafael Perez Nevine Labib Georggi 《Communications Magazine, IEEE》2006,44(11):156-163
The widespread use of cellular telephones and the availability of user-location information are facilitating the development of new personalized, location-based applications. However, as of today, most of these applications are unidirectional and text-based where the user subscribes and the system sends a text message when appropriate. This article describes a modular and general architecture that supports the development of interactive, multimedia, location-based applications, providing an extra level of service to the users. The flexibility of the architecture is demonstrated by presenting the wireless safety security system (Wi-Via) and other potential applications 相似文献
89.
A. Perez V. Dupuis J. Tuaillon‐Combes L. Bardotti B. Prevel E. Bernstein P. Mlinon L. Favre A. Hannour M. Jamet 《Advanced Engineering Materials》2005,7(6):475-485
This paper presents recent results on the preparation and characterization of original magnetic nanostructures from nanoclusters preformed in the gas phase. Magnetic binary‐clusters (i.e. Co‐Sm, Co‐Pt, Co‐Ag) with rather well controlled sizes, structures and compositions, are prepared in the gas phase using a combined laser vaporization‐rare gas condensation source and subsequently deposited at low energy (LECBD : Low Energy Cluster Beam Deposition) on various functionalized substrates to grow cluster‐assembled magnetic nanostructures exhibiting specific magnetic properties. Especially a high magnetic anisotropy and consequently a high magnetic blocking temperature compatible with future applications to high density memory devices and spin electronics are expected. In this context of applications, 2D‐organized arrays of functionalized binary‐cluster assembled dots are prepared by LECBD on FIB‐functionalized substrates (FIB: Focussed Ion Beam) with the ultimate objective to reach areal densities in the range of the Tbits/in2. 相似文献
90.
A new machine learning system is presented in this article. It is called INNER and induces classification rules from a set of training examples. The process followed by this system starts with the random selection of a subset of examples that are iteratively inflated in order to cover the surroundings provided that they are inhabited by examples of the same class, thus becoming rules that will be applied by means of a partial matching mechanism. The rules so obtained can be seen as clusters of examples and represent clear evidence to support explanations about their future classifications and may be used to build intelligent advisors. The whole algorithm can be seen as a set of elastic transformations of examples and rules and produces concise, accurate rule sets, as is experimentally demonstrated in the final section of the article. © 2003 Wiley Periodicals, Inc. 相似文献