全文获取类型
收费全文 | 1837篇 |
免费 | 90篇 |
国内免费 | 5篇 |
专业分类
电工技术 | 24篇 |
综合类 | 16篇 |
化学工业 | 564篇 |
金属工艺 | 30篇 |
机械仪表 | 31篇 |
建筑科学 | 138篇 |
矿业工程 | 3篇 |
能源动力 | 27篇 |
轻工业 | 169篇 |
水利工程 | 11篇 |
石油天然气 | 3篇 |
无线电 | 116篇 |
一般工业技术 | 373篇 |
冶金工业 | 65篇 |
原子能技术 | 16篇 |
自动化技术 | 346篇 |
出版年
2023年 | 27篇 |
2022年 | 49篇 |
2021年 | 65篇 |
2020年 | 36篇 |
2019年 | 46篇 |
2018年 | 43篇 |
2017年 | 41篇 |
2016年 | 51篇 |
2015年 | 47篇 |
2014年 | 73篇 |
2013年 | 97篇 |
2012年 | 89篇 |
2011年 | 157篇 |
2010年 | 99篇 |
2009年 | 111篇 |
2008年 | 102篇 |
2007年 | 84篇 |
2006年 | 85篇 |
2005年 | 73篇 |
2004年 | 68篇 |
2003年 | 53篇 |
2002年 | 51篇 |
2001年 | 44篇 |
2000年 | 42篇 |
1999年 | 41篇 |
1998年 | 27篇 |
1997年 | 27篇 |
1996年 | 17篇 |
1995年 | 20篇 |
1994年 | 26篇 |
1993年 | 14篇 |
1992年 | 10篇 |
1991年 | 23篇 |
1990年 | 13篇 |
1989年 | 14篇 |
1988年 | 7篇 |
1987年 | 6篇 |
1986年 | 4篇 |
1985年 | 6篇 |
1984年 | 10篇 |
1983年 | 8篇 |
1981年 | 2篇 |
1980年 | 2篇 |
1978年 | 4篇 |
1977年 | 4篇 |
1976年 | 2篇 |
1974年 | 2篇 |
1967年 | 2篇 |
1939年 | 1篇 |
1931年 | 3篇 |
排序方式: 共有1932条查询结果,搜索用时 0 毫秒
21.
Ralf Steinmetz Author VitaeAndré KönigAuthor Vitae 《Performance Evaluation》2011,68(9):750-767
Recent developments in the area of decentralized and infrastructureless systems opened avenues for novel applications. Along with these new technologies, new questions regarding their operational bounds in terms of e.g. scalability and security arose. Due to the sparse presence of real-world decentralized and infrastructureless systems, new protocols and applications have to be scrutinized by means of simulation, in (small-scale) testbeds, and by analytical models. In this paper, we discuss challenges of evaluating security mechanisms for mobile ad hoc networks and peer-to-peer systems. We focus on harmonizing predictions of analytical models and results obtained from simulation studies and testbed experiments. 相似文献
22.
In the Horn theory based approach for cryptographic protocol analysis, cryptographic protocols and (Dolev?CYao) intruders are modeled by Horn theories and security analysis boils down to solving the derivation problem for Horn theories. This approach and the tools based on this approach, including ProVerif, have been very successful in the automatic analysis of cryptographic protocols. However, dealing with the algebraic properties of operators, such as the exclusive OR (XOR), which are frequently used in cryptographic protocols has been problematic. In particular, ProVerif cannot deal with XOR. In this paper, we show how to reduce the derivation problem for Horn theories with XOR to the XOR-free case. Our reduction works for an expressive class of Horn theories. A large class of intruder capabilities and protocols that employ the XOR operator can be modeled by these theories. Our reduction allows us to carry out protocol analysis using tools, such as ProVerif, that cannot deal with XOR, but are very efficient in the XOR-free case. We implemented our reduction and, in combination with ProVerif, used it for the fully automatic analysis of several protocols that employ the XOR operator. Among others, our analysis revealed a new attack on an IBM security module. 相似文献
23.
We describe a Prolog-based approach to the development of language processors (such as preprocessors, frontends, evaluators, tools for software modification and analysis). The design of the corresponding environment Laptob for prological language processing is outlined. Language processor definitions in Laptob are basically Prolog programs. The programs might contain grammars, that is, we consider logic grammars. The programs can be typed, and they can be higher-order. The adaptation and composition of the logic programs themselves is supported by meta-programming. The environment offers tool support for efficient scanning, testing, and application development based on a make-system. We report on recent and ongoing applications of the Prolog-based approach. 相似文献
24.
25.
We construct and analyze multigrid methods for discretized self-adjoint elliptic problems on triangular surfaces in ${\mathbb{R}^3}$ . The methods involve the same weights for restriction and prolongation as in the case of planar triangulations and therefore are easy to implement. We prove logarithmic bounds of the convergence rates with constants solely depending on the ellipticity, the smoothers and on the regularity of the triangles forming the triangular surface. Our theoretical results are illustrated by numerical computations. 相似文献
26.
27.
Chen M Botchen RP Hashim RR Weiskopf D Ertl T Thornton IM 《IEEE transactions on visualization and computer graphics》2006,12(5):1093-1100
Video visualization is a computation process that extracts meaningful information from original video data sets and conveys the extracted information to users in appropriate visual representations. This paper presents a broad treatment of the subject, following a typical research pipeline involving concept formulation, system development, a path-finding user study, and a field trial with real application data. In particular, we have conducted a fundamental study on the visualization of motion events in videos. We have, for the first time, deployed flow visualization techniques in video visualization. We have compared the effectiveness of different abstract visual representations of videos. We have conducted a user study to examine whether users are able to learn to recognize visual signatures of motions, and to assist in the evaluation of different visualization techniques. We have applied our understanding and the developed techniques to a set of application video clips. Our study has demonstrated that video visualization is both technically feasible and cost-effective. It has provided the first set of evidence confirming that ordinary users can be accustomed to the visual features depicted in video visualizations, and can learn to recognize visual signatures of a variety of motion events. 相似文献
28.
Two operational formats namely mass customization and mass production can be implemented to satisfy customer preference-based demand. The mass customization system consists of two stages: the initial build-to-stock phase and the final customize-to-order phase. The mass production system has a single stage: building products with pre-determined specifications to stock. In each case, the company makes decisions on the number of initial product variants, product specifications, production quantities and product pricing. Under a uniform customer preference distribution, the optimal number of base-product variants resembles the well known economic order quantity solution, and the optimal product specifications are equally spaced. We characterize three possible benefits of mass customization: (i) the gained surplus from offering each customer her ideal product; (ii) extra revenue from price discrimination; and (iii) reduced costs due to risk pooling under stochastic demand. 相似文献
29.
Ralf KretzschmarAuthor VitaeNicolaos B. KarayiannisAuthor Vitae Hans RichnerAuthor Vitae 《Pattern recognition》2003,36(11):2699-2712
This paper presents the results of a study that relied on trainable neural network classifiers to identify and remove bird-contaminated data from wind measurements recorded by a 1290-MHz wind profiler. A wind profiler is a Doppler radar system measuring the three-dimensional wind field. Migrating birds crossing the radar beam can lead to erroneous wind observations. Bird removal was performed by training conventional feedforward neural networks (FFNNs) and quantum neural networks (QNNs) to identify and remove bird-contaminated data recorded by a 1290-MHz wind profiler. A series of experiments evaluated several sets of input features extracted from wind profiler data, various FFNNs and QNNs of different sizes, and criteria employed for identifying birds in wind profiler data. 相似文献
30.
Algorithms for Moving Objects Databases 总被引:8,自引:0,他引:8