全文获取类型
收费全文 | 38321篇 |
免费 | 2655篇 |
国内免费 | 1537篇 |
专业分类
电工技术 | 1856篇 |
技术理论 | 1篇 |
综合类 | 2265篇 |
化学工业 | 5044篇 |
金属工艺 | 2158篇 |
机械仪表 | 1858篇 |
建筑科学 | 2362篇 |
矿业工程 | 782篇 |
能源动力 | 814篇 |
轻工业 | 1921篇 |
水利工程 | 597篇 |
石油天然气 | 1389篇 |
武器工业 | 272篇 |
无线电 | 3440篇 |
一般工业技术 | 3444篇 |
冶金工业 | 1261篇 |
原子能技术 | 344篇 |
自动化技术 | 12705篇 |
出版年
2024年 | 96篇 |
2023年 | 381篇 |
2022年 | 599篇 |
2021年 | 985篇 |
2020年 | 714篇 |
2019年 | 702篇 |
2018年 | 740篇 |
2017年 | 763篇 |
2016年 | 683篇 |
2015年 | 1057篇 |
2014年 | 1427篇 |
2013年 | 1639篇 |
2012年 | 2457篇 |
2011年 | 4869篇 |
2010年 | 2808篇 |
2009年 | 2750篇 |
2008年 | 2295篇 |
2007年 | 2166篇 |
2006年 | 2198篇 |
2005年 | 2001篇 |
2004年 | 1625篇 |
2003年 | 1762篇 |
2002年 | 1702篇 |
2001年 | 1226篇 |
2000年 | 795篇 |
1999年 | 822篇 |
1998年 | 647篇 |
1997年 | 478篇 |
1996年 | 462篇 |
1995年 | 394篇 |
1994年 | 281篇 |
1993年 | 242篇 |
1992年 | 185篇 |
1991年 | 116篇 |
1990年 | 101篇 |
1989年 | 83篇 |
1988年 | 72篇 |
1987年 | 42篇 |
1986年 | 22篇 |
1985年 | 24篇 |
1984年 | 35篇 |
1983年 | 19篇 |
1982年 | 16篇 |
1981年 | 13篇 |
1980年 | 12篇 |
1979年 | 3篇 |
1978年 | 1篇 |
1951年 | 3篇 |
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
961.
962.
Ching-Wen Chen Author Vitae Chuan-Chi Weng Author Vitae 《Journal of Systems and Software》2010,83(8):1373-1386
The transmission bandwidth between two nodes in mobile ad hoc networks is important in terms of power consumption. However, the bandwidth between two nodes is always treated the same, regardless of what the distance is between the two nodes. If a node equips a GPS device to determine the distance between two nodes, the hardware cost and the power consumption increase. In this paper, we propose using a bandwidth-based power-aware routing protocol with signal detection instead of using GPS devices to determine the distance. In our proposed routing protocol, we use the received signal variation to predict the transmission bandwidth and the lifetime of a link. Accordingly, the possible amount of data that can be transmitted and the remaining power of nodes in the path after data transmission can be predicted. By predicting the possible amount of data that can be transmitted and the remaining power of nodes after data transmission, we can design a bandwidth-based power-aware routing protocol that has power efficiency and that prolongs network lifetime. In our simulation, we compare our proposed routing protocol with two signal-based routing protocols, SSA and ABR, and a power-aware routing protocol, MMBCR, in terms of the throughput, the average transmission bandwidth, the number of rerouting paths, the path lifetime, the power consumed when a byte is transmitted, and the network lifetime (the ratio of active nodes). 相似文献
963.
J. White Author Vitae D. Benavides Author Vitae 《Journal of Systems and Software》2010,83(7):1094-1107
Software product-lines (SPLs) are software platforms that can be readily reconfigured for different project requirements. A key part of an SPL is a model that captures the rules for reconfiguring the software. SPLs commonly use feature models to capture SPL configuration rules. Each SPL configuration is represented as a selection of features from the feature model. Invalid SPL configurations can be created due to feature conflicts introduced via staged or parallel configuration or changes to the constraints in a feature model. When invalid configurations are created, a method is needed to automate the diagnosis of the errors and repair the feature selections.This paper provides two contributions to research on automated configuration of SPLs. First, it shows how configurations and feature models can be transformed into constraint satisfaction problems to automatically diagnose errors and repair invalid feature selections. Second, it presents empirical results from diagnosing configuration errors in feature models ranging in size from 100 to 5,000 features. The results of our experiments show that our CSP-based diagnostic technique can scale up to models with thousands of features. 相似文献
964.
Robert Lagerström Author Vitae Pontus Johnson Author VitaeAuthor Vitae 《Journal of Systems and Software》2010,83(8):1387-1403
Enterprise architecture (EA) models can be used in order to increase the general understanding of enterprise systems and to perform various kinds of analysis. This paper presents instantiated architectural models based on a metamodel for enterprise systems modifiability analysis, i.e. for assessing the cost of making changes to enterprise-wide systems. The instantiated architectural models detailed are based on 21 software change projects conducted at four large Nordic companies. Probabilistic relational models (PRMs) are used for formalizing the EA analysis approach. PRMs enable the combination of regular entity-relationship modeling aspects with means to perform enterprise architecture analysis under uncertainty. The modifiability metamodel employed in the analysis is validated with survey and workshop data (in total 110 experts were surveyed) and with the data collected in the 21 software change projects. Validation indicates that the modifiability metamodel contains the appropriate set of elements. It also indicates that the metamodel produces estimates within a 75% accuracy in 87% of the time and has a mean accuracy of 88% (when considering projects of 2000 man-hours or more). 相似文献
965.
Tzung-Her Chen Author Vitae Jyun-Ci Huang Author Vitae 《Journal of Systems and Software》2010,83(5):861-867
When utilizing services over public networks, a remote user authentication mechanism forms a first line of defense by rejecting illegal logins from unauthorized users. On-line applications over the Internet such as E-learning, on-line games, etc. are ever more common; remote user participation via networks plays a vital role in security and should be guaranteed. Without this countermeasure, malicious users are likely to enable agents to communicate with remote on-line systems. While existing remote user authentication schemes rarely address this issue, this paper highlights the problem of guaranteeing remote user participation. This proposed user authentication scheme benefits from combining CAPTCHA techniques and visual secret sharing to ensure deliberate human interaction. This scheme provides mutual authentication and is secure against certain known attacks, as well as low in computation cost. 相似文献
966.
A. Prayati Author Vitae Ch. Antonopoulos Author Vitae T. Stoyanova Author Vitae C. Koulamas Author Vitae 《Journal of Systems and Software》2010,83(8):1355-1363
Substantial characteristics of wireless sensor networks, such as autonomy and miniature size, are achieved at the expense of restricted energy resources. Optimal resource management is thus among the most important challenges in WSNs development and its success requires accurate and practical models based on detailed insight concerning the factors contributing to the overall power consumption of a WSN mote. To achieve such awareness, that will enable models development, appropriate measuring test-beds and methodologies are needed, facilitating reliable and accurate power consumption measurements of critical functionalities.To cover the need for energy models that precisely define the power consumption behavior of WSN hardware platforms, this paper contributes with a measuring methodology including three steps: the design and implementation of a measuring system for a wide range of power consumption thresholds, the identification, isolation and measurement of elementary functionalities of a WSN platform with respect to their contribution to the overall mote power consumption, and the extraction of valuable conclusions based on the respective measurements resulting in the composition of a practical, yet accurate power consumption model. 相似文献
967.
Jun Gao Author Vitae Jiaheng Lu Author Vitae Dongqing Yang Author Vitae 《Journal of Systems and Software》2010,83(6):1029-1038
The query rewriting plan generation over XML views has received wide attention recently. However, little work has been done on efficient evaluation of the query rewriting plans, which is not trivial since the plan may contain an exponential size of sub-plans. This paper investigates the reason for the potentially exponential number of sub-plans, and then proposes a new space-efficient form called ABCPlan (Plan with Automata Based Combinations) to equivalently represent the original query rewriting plan. ABCPlan contains a set of buckets containing suffix paths in the query tree and an automata to indicate the combination of the suffix paths from different buckets as valid query rewriting sub-plans. We also design an evaluation method called ABCScan, which constructs a unified evaluation tree for the ABCPlan and handles the evaluation tree in one scan of the XML view. In the evaluation, we introduce node existence automata to encode the structure of the sub-tree and convert the satisfaction of the ABCPlan into the intersection problem of deterministic finite automata. The experiments show that ABCPlan based method outperforms existing methods significantly in terms of scalability and efficiency. 相似文献
968.
Abbas Nayebi Author Vitae Hamid Sarbazi-Azad Author Vitae Gunnar Karlsson Author Vitae 《Journal of Systems and Software》2010,83(8):1310-1317
This paper investigates a class of mobile wireless sensor networks that are unconnected most of the times; we refer to them as delay-tolerant wireless sensor networks (DTWSN). These networks inherit their characteristics from both delay tolerant networks (DTN) and traditional wireless sensor networks. After introducing DTWSNs, three main problems in the design space of these networks are discussed: routing, data gathering, and neighbor discovery. A general protocol is proposed for DTWSNs based on opportunistic broadcasting in delay-tolerant networks with radio device on-off periods. Three performance measures are defined in the study: the energy for sending queries to ask for data from possible neighbors (querying energy), data transfer energy, and absorption time (delay). A simple yet accurate approximation for the data-transfer energy is proposed. An analytic model is provided to evaluate the querying energy per contact (epc). Simulation results for the data propagation delay show that the querying energy per contact measure obtained from the analytic model is proportional to the product of the querying energy and the delay. A practical rule of thumb for an optimal query interval in terms of delay and energy is derived from different parts of the study. 相似文献
969.
970.
本文利用m+n阶Sylvester矩阵的位移结构并在假设该矩阵的所有顺序主子矩阵可逆的条件下给出了求解Sylvester矩阵的逆的一种快速算法.该算法所需计算量为O(m+n)~2,而高斯-约当消去法所需计算量为O(m+n)~3.最后通过数值算例说明了算法的有效性. 相似文献