全文获取类型
收费全文 | 11868篇 |
免费 | 613篇 |
国内免费 | 2篇 |
专业分类
电工技术 | 228篇 |
综合类 | 40篇 |
化学工业 | 2293篇 |
金属工艺 | 329篇 |
机械仪表 | 243篇 |
建筑科学 | 549篇 |
矿业工程 | 54篇 |
能源动力 | 132篇 |
轻工业 | 1765篇 |
水利工程 | 83篇 |
石油天然气 | 19篇 |
无线电 | 817篇 |
一般工业技术 | 2893篇 |
冶金工业 | 1450篇 |
原子能技术 | 85篇 |
自动化技术 | 1503篇 |
出版年
2023年 | 135篇 |
2022年 | 72篇 |
2021年 | 208篇 |
2020年 | 168篇 |
2019年 | 147篇 |
2018年 | 352篇 |
2017年 | 369篇 |
2016年 | 409篇 |
2015年 | 302篇 |
2014年 | 396篇 |
2013年 | 704篇 |
2012年 | 525篇 |
2011年 | 635篇 |
2010年 | 474篇 |
2009年 | 493篇 |
2008年 | 585篇 |
2007年 | 514篇 |
2006年 | 383篇 |
2005年 | 322篇 |
2004年 | 267篇 |
2003年 | 269篇 |
2002年 | 255篇 |
2001年 | 226篇 |
2000年 | 180篇 |
1999年 | 176篇 |
1998年 | 478篇 |
1997年 | 297篇 |
1996年 | 269篇 |
1995年 | 166篇 |
1994年 | 172篇 |
1993年 | 141篇 |
1992年 | 77篇 |
1991年 | 91篇 |
1990年 | 69篇 |
1989年 | 87篇 |
1988年 | 54篇 |
1987年 | 73篇 |
1986年 | 69篇 |
1985年 | 141篇 |
1984年 | 95篇 |
1983年 | 79篇 |
1982年 | 85篇 |
1981年 | 64篇 |
1980年 | 62篇 |
1979年 | 66篇 |
1978年 | 61篇 |
1977年 | 62篇 |
1976年 | 113篇 |
1974年 | 51篇 |
1973年 | 54篇 |
排序方式: 共有10000条查询结果,搜索用时 12 毫秒
81.
Current software and systems engineering tools provide only basic trace features, and as a result users are often compelled to construct non-trivial traceability queries using generic query languages such as SQL. In this paper, we present an alternative approach which defines traceability strategies for a project using UML class diagrams and then constructs trace queries as constraints upon subsets of the model. The visual trace modeling language (VTML) allows users to model a broad range of trace queries while hiding underlying technical details and data structures. The viability and expressiveness of VTML for use in a real project are demonstrated through modeling a broadly representative set of queries for a web-based health-care system. It is then evaluated through an experiment with human users to assess the readability and writability of VTML queries in comparison to generic SQL queries. We found that users read and constructed traceability queries considerably faster using VTML than using SQL. Furthermore, visually constructed traceability queries were substantially more correct compared to the same queries constructed with SQL. 相似文献
82.
83.
Hyvärinen A 《Neural computation》2008,20(12):3087-3110
In signal restoration by Bayesian inference, one typically uses a parametric model of the prior distribution of the signal. Here, we consider how the parameters of a prior model should be estimated from observations of uncorrupted signals. A lot of recent work has implicitly assumed that maximum likelihood estimation is the optimal estimation method. Our results imply that this is not the case. We first obtain an objective function that approximates the error occurred in signal restoration due to an imperfect prior model. Next, we show that in an important special case (small gaussian noise), the error is the same as the score-matching objective function, which was previously proposed as an alternative for likelihood based on purely computational considerations. Our analysis thus shows that score matching combines computational simplicity with statistical optimality in signal restoration, providing a viable alternative to maximum likelihood methods. We also show how the method leads to a new intuitive and geometric interpretation of structure inherent in probability distributions. 相似文献
84.
M. Bedenbecker R. Bandorf G. Bräuer H. Lüthje H. H. Gatzen 《Microsystem Technologies》2008,14(12):1949-1954
An important aspect of the development of electromagnetic microactuators is the search for suitable materials as well as the
development of the respective deposition and patterning processes. Within the Collaborative Research Center 516 “Design and
Fabrication of Active Microsystems”, it is the task of the subproject B1 “fabrication of magnetic thin films for electromagnetic
microactuators” to perform these investigations. The materials of interest can be divided into two groups: hard magnetic materials
and soft magnetic materials. Materials with optimized properties and fabrication processes have been developed within both
groups. An example is Samarium–Cobalt (SmCo), which can either be deposited using magnetron sputtering as Sm2Co17 with a very high energy product or in the SmCo5 phase using gas flow sputtering with very high deposition rates. In the area of soft magnetic materials, investigations on
Nickel-Iron (NiFe) especially NiFe81/19 were followed by the evaluation of NiFe45/55, which features a higher saturation flux
density B
s and relative permeability μ
r. Furthermore, current investigations focus on Cobalt-Iron (CoFe) and its further increased saturation flux density B
s and relative permeability μ
r. Current tasks include the stabilization of the fabrication processes to achieve good material properties (i.e. electroplating
of CoFe) or a shortening (e.g. by using heated substrates during deposition) by using process alternative not used so far.
Another topic is the integration into fabrication processes, i.e. the investigation of process stability and compatibility. 相似文献
85.
J. Rögner B. Okolo S. Kurzenhäuser M. Müller W. Bauer H.-J. Ritzhaupt-Kleissl E. Kerscher V. Schulze 《Microsystem Technologies》2008,14(12):1831-1837
Due to size effects the mechanical behavior of micro-components with dimensions in the range of some 100 μm and structure
details of about 10 μm differs markedly from those of larger components. This is a crucial aspect for the design of micro-components
for applications where demands for high strength are critical. The present study, which was performed in the frame of the
Collaborative Research Centre 499 (SFB 499), approaches this issue by investigating the relationship between production process,
microstructure and the mechanical properties of micro-specimens made from zirconia using two different feedstocks. The specimens
were produced by a sintering process. The sintering temperature was varied between 1,300 and 1,500°C. Mechanical and tribological
behavior of the specimens was determined by three-point bending tests as well as static and sliding friction tests, respectively.
Properties derived from these tests were then correlated to the surface states in the specimens such as porosity, edge radius
and roughness. The strength of the micro-specimens was found to be significantly influenced by these surface features. Whilst
low porosity alone is not sufficient for high strength, notch effects resulting from pores as well as surface roughness can
lower the strength. With increasing edge radius the strength of the material also increases. The porosity, edge radius and
surface roughness were mathematically correlated with the strength to allow for a forecast. Within the SFB 499 feedstocks
with specific properties were designed and reliable processes were developed to guarantee desirable surface roughness and
porosity in the specimens. A characteristic bending strength of about 2,000 MPa is realizable in the micro-specimens within
a good statistical reliability. The tribological tests revealed that the wear properties of the zirconia micro-components
are strongly dependent on the quality of the feedstock. 相似文献
86.
Predicting weekly defect inflow in large software projects based on project planning and test status
Defects discovered during the testing phase in software projects need to be removed before the software is shipped to the customers. The removal of defects can constitute a significant amount of effort in a project and project managers are faced with a decision whether to continue development or shift some resources to cope with defect removal. The goal of this research is to improve the practice of project management by providing a method for predicting the number of defects reported into the defect database in the project. In this paper we present a method for predicting the number of defects reported into the defect database in a large software project on a weekly basis. The method is based on using project progress data, in particular the information about the test progress, to predict defect inflow in the next three coming weeks. The results show that the prediction accuracy of our models is up to 72% (mean magnitude of relative error for predictions of 1 week in advance is 28%) when used in ongoing large software projects. The method is intended to support project managers in more accurate adjusting resources in the project, since they are notified in advance about the potentially large effort needed to correct defects. 相似文献
87.
Klaus Dräger Bernd Finkbeiner Andreas Podelski 《International Journal on Software Tools for Technology Transfer (STTT)》2009,11(1):27-37
In directed model checking, the traversal of the state space is guided by an estimate of the distance from the current state
to the nearest error state. This paper presents a distance-preserving abstraction for concurrent systems that allows one to compute an interesting estimate of the error distance without hitting the state
explosion problem. Our experiments show a dramatic reduction both in the number of states explored by the model checker and
in the total runtime. 相似文献
88.
Ivan Martinovic Paul Pichota Matthias Wilhelm Frank A. Zdarsky Jens B. Schmitt 《Pervasive and Mobile Computing》2009,5(5):510-525
To improve the tarnished reputation of WLAN security, the new IEEE 802.11i standard provides means for mutual user authentication and assures confidentiality of user data. However, the IEEE 802.11 link-layer is still highly vulnerable to a plethora of simple, yet effective attacks which further jeopardize the already fragile security of wireless communications.Some of these vulnerabilities are related to limited hardware capabilities of access points and their abuse may result in serious degradation of control over the wireless connection, which, especially in the case of broadcast communication, allows for client hijacking attacks. Although these issues are known and their impact is expected to be less prevalent on modern equipment, this work demonstrates the opposite. In our experimental analysis, we tested frequently used access points, and by forcing them to operate on their performance limits, we identified significant operational anomalies and demonstrated their impact on security by implementing a novel version of the Man-In-The-Middle attack, to which we refer as the Muzzle attack.Secondly, this work describes DiscoSec, a solution for “patching” WLANs against a variety of such link-layer attacks. DiscoSec provides DoS-resilient key exchange, an efficient frame authentication, and a performance-oriented implementation. By means of extensive real-world measurements DiscoSec is evaluated, showing that even on very resource-limited devices the network throughput is decreased by only 22% compared to the throughput without any authentication, and by 6% on more performance-capable hardware. To demonstrate its effectiveness, DiscoSec is available as an open-source IEEE 802.11 device driver utilizing well-established cryptographic primitives provided by the Linux Crypto API and OpenSSL library. 相似文献
89.
Wilhelm Dolle 《Datenschutz und Datensicherheit - DuD》2009,33(3):183-188
Zusammenfassung Im Zeitalter der Informationstechnologie und der umfassenden Vernetzung vieler Systeme ben?tigt ein Dieb weder eine Brechstange
noch muss er im Schutze der Dunkelheit vorgehen. Vielmehr kann er über das Internet, oder lokale Netzwerke, kommen und gehen
wann er will, ohne sich der Gefahr einer Entdeckung und Verhaftung auszusetzen. In vielen F?llen ist ein solcher Einbrecher
l?ngst über alle Berge, bevor seine Tat überhaupt bemerkt wird. Trotzdem hinterl?sst er Spuren — deren Aufspürung und Analyse
die Aufgabe des Computer-Forensikers ist. Zur Unterstützung dieser Arbeit existiert eine Vielzahl an Open-Source-Werkzeugen,
die es durchaus mit ihrer kommerziellen Konkurrenz aufnehmen k?nnen. 相似文献
90.