首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   11868篇
  免费   613篇
  国内免费   2篇
电工技术   228篇
综合类   40篇
化学工业   2293篇
金属工艺   329篇
机械仪表   243篇
建筑科学   549篇
矿业工程   54篇
能源动力   132篇
轻工业   1765篇
水利工程   83篇
石油天然气   19篇
无线电   817篇
一般工业技术   2893篇
冶金工业   1450篇
原子能技术   85篇
自动化技术   1503篇
  2023年   135篇
  2022年   72篇
  2021年   208篇
  2020年   168篇
  2019年   147篇
  2018年   352篇
  2017年   369篇
  2016年   409篇
  2015年   302篇
  2014年   396篇
  2013年   704篇
  2012年   525篇
  2011年   635篇
  2010年   474篇
  2009年   493篇
  2008年   585篇
  2007年   514篇
  2006年   383篇
  2005年   322篇
  2004年   267篇
  2003年   269篇
  2002年   255篇
  2001年   226篇
  2000年   180篇
  1999年   176篇
  1998年   478篇
  1997年   297篇
  1996年   269篇
  1995年   166篇
  1994年   172篇
  1993年   141篇
  1992年   77篇
  1991年   91篇
  1990年   69篇
  1989年   87篇
  1988年   54篇
  1987年   73篇
  1986年   69篇
  1985年   141篇
  1984年   95篇
  1983年   79篇
  1982年   85篇
  1981年   64篇
  1980年   62篇
  1979年   66篇
  1978年   61篇
  1977年   62篇
  1976年   113篇
  1974年   51篇
  1973年   54篇
排序方式: 共有10000条查询结果,搜索用时 12 毫秒
81.
Current software and systems engineering tools provide only basic trace features, and as a result users are often compelled to construct non-trivial traceability queries using generic query languages such as SQL. In this paper, we present an alternative approach which defines traceability strategies for a project using UML class diagrams and then constructs trace queries as constraints upon subsets of the model. The visual trace modeling language (VTML) allows users to model a broad range of trace queries while hiding underlying technical details and data structures. The viability and expressiveness of VTML for use in a real project are demonstrated through modeling a broadly representative set of queries for a web-based health-care system. It is then evaluated through an experiment with human users to assess the readability and writability of VTML queries in comparison to generic SQL queries. We found that users read and constructed traceability queries considerably faster using VTML than using SQL. Furthermore, visually constructed traceability queries were substantially more correct compared to the same queries constructed with SQL.  相似文献   
82.
83.
Hyvärinen A 《Neural computation》2008,20(12):3087-3110
In signal restoration by Bayesian inference, one typically uses a parametric model of the prior distribution of the signal. Here, we consider how the parameters of a prior model should be estimated from observations of uncorrupted signals. A lot of recent work has implicitly assumed that maximum likelihood estimation is the optimal estimation method. Our results imply that this is not the case. We first obtain an objective function that approximates the error occurred in signal restoration due to an imperfect prior model. Next, we show that in an important special case (small gaussian noise), the error is the same as the score-matching objective function, which was previously proposed as an alternative for likelihood based on purely computational considerations. Our analysis thus shows that score matching combines computational simplicity with statistical optimality in signal restoration, providing a viable alternative to maximum likelihood methods. We also show how the method leads to a new intuitive and geometric interpretation of structure inherent in probability distributions.  相似文献   
84.
An important aspect of the development of electromagnetic microactuators is the search for suitable materials as well as the development of the respective deposition and patterning processes. Within the Collaborative Research Center 516 “Design and Fabrication of Active Microsystems”, it is the task of the subproject B1 “fabrication of magnetic thin films for electromagnetic microactuators” to perform these investigations. The materials of interest can be divided into two groups: hard magnetic materials and soft magnetic materials. Materials with optimized properties and fabrication processes have been developed within both groups. An example is Samarium–Cobalt (SmCo), which can either be deposited using magnetron sputtering as Sm2Co17 with a very high energy product or in the SmCo5 phase using gas flow sputtering with very high deposition rates. In the area of soft magnetic materials, investigations on Nickel-Iron (NiFe) especially NiFe81/19 were followed by the evaluation of NiFe45/55, which features a higher saturation flux density B s and relative permeability μ r. Furthermore, current investigations focus on Cobalt-Iron (CoFe) and its further increased saturation flux density B s and relative permeability μ r. Current tasks include the stabilization of the fabrication processes to achieve good material properties (i.e. electroplating of CoFe) or a shortening (e.g. by using heated substrates during deposition) by using process alternative not used so far. Another topic is the integration into fabrication processes, i.e. the investigation of process stability and compatibility.  相似文献   
85.
Due to size effects the mechanical behavior of micro-components with dimensions in the range of some 100 μm and structure details of about 10 μm differs markedly from those of larger components. This is a crucial aspect for the design of micro-components for applications where demands for high strength are critical. The present study, which was performed in the frame of the Collaborative Research Centre 499 (SFB 499), approaches this issue by investigating the relationship between production process, microstructure and the mechanical properties of micro-specimens made from zirconia using two different feedstocks. The specimens were produced by a sintering process. The sintering temperature was varied between 1,300 and 1,500°C. Mechanical and tribological behavior of the specimens was determined by three-point bending tests as well as static and sliding friction tests, respectively. Properties derived from these tests were then correlated to the surface states in the specimens such as porosity, edge radius and roughness. The strength of the micro-specimens was found to be significantly influenced by these surface features. Whilst low porosity alone is not sufficient for high strength, notch effects resulting from pores as well as surface roughness can lower the strength. With increasing edge radius the strength of the material also increases. The porosity, edge radius and surface roughness were mathematically correlated with the strength to allow for a forecast. Within the SFB 499 feedstocks with specific properties were designed and reliable processes were developed to guarantee desirable surface roughness and porosity in the specimens. A characteristic bending strength of about 2,000 MPa is realizable in the micro-specimens within a good statistical reliability. The tribological tests revealed that the wear properties of the zirconia micro-components are strongly dependent on the quality of the feedstock.  相似文献   
86.
Defects discovered during the testing phase in software projects need to be removed before the software is shipped to the customers. The removal of defects can constitute a significant amount of effort in a project and project managers are faced with a decision whether to continue development or shift some resources to cope with defect removal. The goal of this research is to improve the practice of project management by providing a method for predicting the number of defects reported into the defect database in the project. In this paper we present a method for predicting the number of defects reported into the defect database in a large software project on a weekly basis. The method is based on using project progress data, in particular the information about the test progress, to predict defect inflow in the next three coming weeks. The results show that the prediction accuracy of our models is up to 72% (mean magnitude of relative error for predictions of 1 week in advance is 28%) when used in ongoing large software projects. The method is intended to support project managers in more accurate adjusting resources in the project, since they are notified in advance about the potentially large effort needed to correct defects.  相似文献   
87.
In directed model checking, the traversal of the state space is guided by an estimate of the distance from the current state to the nearest error state. This paper presents a distance-preserving abstraction for concurrent systems that allows one to compute an interesting estimate of the error distance without hitting the state explosion problem. Our experiments show a dramatic reduction both in the number of states explored by the model checker and in the total runtime.  相似文献   
88.
To improve the tarnished reputation of WLAN security, the new IEEE 802.11i standard provides means for mutual user authentication and assures confidentiality of user data. However, the IEEE 802.11 link-layer is still highly vulnerable to a plethora of simple, yet effective attacks which further jeopardize the already fragile security of wireless communications.Some of these vulnerabilities are related to limited hardware capabilities of access points and their abuse may result in serious degradation of control over the wireless connection, which, especially in the case of broadcast communication, allows for client hijacking attacks. Although these issues are known and their impact is expected to be less prevalent on modern equipment, this work demonstrates the opposite. In our experimental analysis, we tested frequently used access points, and by forcing them to operate on their performance limits, we identified significant operational anomalies and demonstrated their impact on security by implementing a novel version of the Man-In-The-Middle attack, to which we refer as the Muzzle attack.Secondly, this work describes DiscoSec, a solution for “patching” WLANs against a variety of such link-layer attacks. DiscoSec provides DoS-resilient key exchange, an efficient frame authentication, and a performance-oriented implementation. By means of extensive real-world measurements DiscoSec is evaluated, showing that even on very resource-limited devices the network throughput is decreased by only 22% compared to the throughput without any authentication, and by 6% on more performance-capable hardware. To demonstrate its effectiveness, DiscoSec is available as an open-source IEEE 802.11 device driver utilizing well-established cryptographic primitives provided by the Linux Crypto API and OpenSSL library.  相似文献   
89.
Zusammenfassung  Im Zeitalter der Informationstechnologie und der umfassenden Vernetzung vieler Systeme ben?tigt ein Dieb weder eine Brechstange noch muss er im Schutze der Dunkelheit vorgehen. Vielmehr kann er über das Internet, oder lokale Netzwerke, kommen und gehen wann er will, ohne sich der Gefahr einer Entdeckung und Verhaftung auszusetzen. In vielen F?llen ist ein solcher Einbrecher l?ngst über alle Berge, bevor seine Tat überhaupt bemerkt wird. Trotzdem hinterl?sst er Spuren — deren Aufspürung und Analyse die Aufgabe des Computer-Forensikers ist. Zur Unterstützung dieser Arbeit existiert eine Vielzahl an Open-Source-Werkzeugen, die es durchaus mit ihrer kommerziellen Konkurrenz aufnehmen k?nnen.  相似文献   
90.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号