首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   2811篇
  免费   175篇
  国内免费   2篇
电工技术   45篇
综合类   1篇
化学工业   652篇
金属工艺   52篇
机械仪表   75篇
建筑科学   66篇
矿业工程   7篇
能源动力   95篇
轻工业   363篇
水利工程   26篇
石油天然气   9篇
无线电   254篇
一般工业技术   442篇
冶金工业   380篇
原子能技术   27篇
自动化技术   494篇
  2023年   22篇
  2022年   73篇
  2021年   99篇
  2020年   58篇
  2019年   74篇
  2018年   82篇
  2017年   85篇
  2016年   83篇
  2015年   88篇
  2014年   107篇
  2013年   199篇
  2012年   158篇
  2011年   185篇
  2010年   136篇
  2009年   137篇
  2008年   116篇
  2007年   102篇
  2006年   98篇
  2005年   80篇
  2004年   82篇
  2003年   64篇
  2002年   61篇
  2001年   47篇
  2000年   37篇
  1999年   33篇
  1998年   103篇
  1997年   70篇
  1996年   58篇
  1995年   46篇
  1994年   29篇
  1993年   40篇
  1992年   25篇
  1991年   21篇
  1990年   23篇
  1989年   15篇
  1988年   18篇
  1987年   15篇
  1986年   12篇
  1985年   18篇
  1984年   21篇
  1983年   15篇
  1982年   16篇
  1981年   18篇
  1979年   9篇
  1978年   8篇
  1977年   9篇
  1976年   19篇
  1975年   8篇
  1973年   7篇
  1971年   8篇
排序方式: 共有2988条查询结果,搜索用时 15 毫秒
81.
On spiking neural P systems and partially blind counter machines   总被引:1,自引:0,他引:1  
A k-output spiking neural P system (SNP) with output neurons, , generates a tuple of positive integers if, starting from the initial configuration, there is a sequence of steps such that during the computation, each O i generates exactly two spikes aa (the times the pair aa are generated may be different for different output neurons) and the time interval between the first a and the second a is n i . After the output neurons generate their pairs of spikes, the system eventually halts. We give characterizations of sets definable by partially blind multicounter machines in terms of k-output SNPs operating in a sequential mode. Slight variations of the models make them universal.  相似文献   
82.
Authentication and authorization in many distributed systems rely on the use of cryptographic credentials that in most of the cases have a defined lifetime. This feature mandates the use of mechanisms able to determine whether a particular credential can be trusted at a given moment. This process is commonly named validation. Among available validation mechanisms, the Online Certificate Status Protocol (OCSP) stands out due to its ability to carry near real time certificate status information. Despite its importance for security, OCSP faces considerable challenges in the computational Grid (i.e. Proxy Certificate’s validation) that are being studied at the Global Grid Forum’s CA Operations Work Group (CAOPS-WG). As members of this group, we have implemented an OCSP validation infrastructure for the Globus Toolkit 4, composed of the CertiVeR Validation Service and our Open GRid Ocsp (OGRO) client library, which introduced the Grid Validation Policy. This paper summarizes our experiences on that work and the results obtained up to now. Furthermore we introduce the prevalidation concept, a mechanism analogous to the Authorization Push-Model, capable of improving OCSP validation performance in Grids. This paper also reports the results obtained with OGRO’s prevalidation rules for Grid Services as a proof of concept.
Oscar MansoEmail:
  相似文献   
83.
Curved cross-sections extracted from medical volume images are useful for analyzing nonplanar anatomic structures such as the aorta arch or the pelvis. For visualization and for performing distance measurements, extracted surface sections need to be adequately flattened. We present two different distance preserving surface flattening methods which preserve distances according to a user-specified center of interest and according to user-specified orientations. The first method flattens surface sections by preserving distances along surface curves located within planes having a user specified constant orientation. The second method flattens surfaces along curves located within radial planes crossing the center of interest. We study and compare the properties of the two flattening methods by analyzing their distortion maps. Thanks to a multiresolution approach, we provide surface flattening at interactive rates, allowing users to displace their focus point while visualizing the resulting flattened surface. These distance preserving flattening methods provide new means of inspecting curved cross-sections extracted from medical images.  相似文献   
84.
Building the IBM 4758 secure coprocessor   总被引:1,自引:0,他引:1  
Meeting the challenge of building a user-configurable secure coprocessor provided several lessons in hardware and software development and continues to spur further research. In developing the 4758, we met our major research security goals and provided the following features: (1) a lifetime-secure tamper-responding device, rather than one that is secure only between resets that deployment-specific security officers perform; (2) a secure booting process in which each layer progressively validates the next less-trusted layer, with hardware restricting access to its secrets before passing control to that layer; (3) an actual manufacturable product - a nontrivial accomplishment considering that we designed the device so that it does not have a personality until configured in the field; (4) the first FIPS 140-1 Level 4 validation, arguably the only general-purpose computational platform validated at this level so far; and (5) a multipurpose programmable device based on a 99-MHz 486 CPU internal environment, with a real operating system, a C language development environment and relatively high-speed cryptography  相似文献   
85.
86.
A simple problem concerning evaluation of programs is shown to be nonelementary recursive. The problem is the following: Given an input-free programP (i.e. all variables are initially 0) without nested loops using only instructions of the formx ← 1, x ← x + y, \(x \leftarrow x\dot - y\) ,do x... end, doesP output 0? This problem has time complexity \(2^{2^{ {\mathinner{\mkern2mu\raise1pt\hbox{.}\mkern2mu \raise4pt\hbox{.}\mkern2mu\raise7pt\hbox{.}\mkern1mu}} ^2 } } \) }cn-levels for some constantc. Other results are presented which show how the complexity of the 0-evaluation problem changes when the nonlooping instructions are varied. For example, it is shown that 0-evaluation is PSPACE-complete even for the case when the nonlooping instructions are onlyx ← x + 1,if x = 0then yy \(y \leftarrow y\dot - 1\) .  相似文献   
87.
Let be the class of real-time nondeterministic one-counter machines whose counters make at mostone reversal. Let 1 (respectively, 2) be the subclass consisting of machines whose only nondeterministic move is in the choice of when to reverse the counter (respectively, when to start using the counter). 1 and 2 are among the simplest known classes of machines for which the universe problem has been shown undecidable. (The universe problem for a class of machines is the problem of deciding if an arbitrary machine in the class accepts all its inputs.) Here, we show that the classes of languages accepted by machines in 1 and 2 are incomparable. Moreover, the union of the language classes is properly contained in the class defined by . We also, briefly, look at the closure properties of these machines.This research was supported in part by NSF Grant MCS78-01736.  相似文献   
88.
The widespread use of cellular telephones and the availability of user-location information are facilitating the development of new personalized, location-based applications. However, as of today, most of these applications are unidirectional and text-based where the user subscribes and the system sends a text message when appropriate. This article describes a modular and general architecture that supports the development of interactive, multimedia, location-based applications, providing an extra level of service to the users. The flexibility of the architecture is demonstrated by presenting the wireless safety security system (Wi-Via) and other potential applications  相似文献   
89.
This paper presents recent results on the preparation and characterization of original magnetic nanostructures from nanoclusters preformed in the gas phase. Magnetic binary‐clusters (i.e. Co‐Sm, Co‐Pt, Co‐Ag) with rather well controlled sizes, structures and compositions, are prepared in the gas phase using a combined laser vaporization‐rare gas condensation source and subsequently deposited at low energy (LECBD : Low Energy Cluster Beam Deposition) on various functionalized substrates to grow cluster‐assembled magnetic nanostructures exhibiting specific magnetic properties. Especially a high magnetic anisotropy and consequently a high magnetic blocking temperature compatible with future applications to high density memory devices and spin electronics are expected. In this context of applications, 2D‐organized arrays of functionalized binary‐cluster assembled dots are prepared by LECBD on FIB‐functionalized substrates (FIB: Focussed Ion Beam) with the ultimate objective to reach areal densities in the range of the Tbits/in2.  相似文献   
90.
A new machine learning system is presented in this article. It is called INNER and induces classification rules from a set of training examples. The process followed by this system starts with the random selection of a subset of examples that are iteratively inflated in order to cover the surroundings provided that they are inhabited by examples of the same class, thus becoming rules that will be applied by means of a partial matching mechanism. The rules so obtained can be seen as clusters of examples and represent clear evidence to support explanations about their future classifications and may be used to build intelligent advisors. The whole algorithm can be seen as a set of elastic transformations of examples and rules and produces concise, accurate rule sets, as is experimentally demonstrated in the final section of the article. © 2003 Wiley Periodicals, Inc.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号