首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   6349篇
  免费   622篇
  国内免费   892篇
电工技术   48篇
技术理论   1篇
综合类   221篇
化学工业   737篇
金属工艺   267篇
机械仪表   117篇
建筑科学   165篇
矿业工程   107篇
能源动力   393篇
轻工业   138篇
水利工程   77篇
石油天然气   294篇
武器工业   31篇
无线电   1220篇
一般工业技术   1386篇
冶金工业   161篇
原子能技术   319篇
自动化技术   2181篇
  2024年   29篇
  2023年   152篇
  2022年   156篇
  2021年   219篇
  2020年   243篇
  2019年   233篇
  2018年   108篇
  2017年   224篇
  2016年   240篇
  2015年   247篇
  2014年   398篇
  2013年   563篇
  2012年   625篇
  2011年   604篇
  2010年   492篇
  2009年   486篇
  2008年   444篇
  2007年   489篇
  2006年   444篇
  2005年   240篇
  2004年   161篇
  2003年   145篇
  2002年   150篇
  2001年   112篇
  2000年   136篇
  1999年   95篇
  1998年   50篇
  1997年   32篇
  1996年   34篇
  1995年   36篇
  1994年   28篇
  1993年   35篇
  1992年   25篇
  1991年   9篇
  1990年   9篇
  1989年   11篇
  1988年   30篇
  1987年   44篇
  1986年   48篇
  1985年   8篇
  1984年   8篇
  1983年   3篇
  1981年   3篇
  1980年   5篇
  1979年   4篇
  1978年   1篇
  1977年   2篇
  1976年   3篇
排序方式: 共有7863条查询结果,搜索用时 15 毫秒
61.
提出了一个基于带有惩罚因子的阴性选择算法的恶意程序检测模型.该模型从指令频率和包含相应指令的文件频率两个角度出发,对指令进行了深入的趋向性分析,提取出了趋向于代表恶意程序的恶意程序指令库.利用这些指令,有序切分程序比特串,模型提取得到恶意程序候选特征库和合法程序类恶意程序特征库.在此基础上,文中提出了一种带有惩罚因子的阴性选择算法(negative selection algorithm with penalty factor,NSAPF),根据异体和自体的匹配情况,采用惩罚的方式,对恶意程序候选特征进行划分,组成了恶意程序检测特征库1(malware detection signature library 1,MDSL1)和恶意程序检测特征库2(MDSL2),以此作为检测可疑程序的二维参照物.综合可疑程序和MDSL1,MDSL2的匹配值,文中模型将可疑程序分类到合法程序和恶意程序.通过在阴性选择算法中引入惩罚因子C,摆脱了传统阴性选择算法中对自体和异体有害性定义的缺陷,继而关注程序代码本身的危险性,充分挖掘和调节了特征的表征性,既提高了模型的检测效果,又使模型可以满足用户对识别率和虚警率的不同要求.综合实验...  相似文献   
62.
Previously, we proposed that the dielectric layer of RF MEMS switch can be fabricated either on the transmission line, as traditional switches, or on the lower surface of the bridge. This paper presents a detailed comparison of the RF MEMS switches with different positions of dielectric layer. Through theoretically analyzing the physical model of fringing capacitance, it is revealed that different positions of dielectric layer can result in different switch capacitances. Therefore, the change of d...  相似文献   
63.
Due to the prevalence of peer departures, P2P storage systems need to constantly generate replicas for high durability. However, few existing systems are able to select the right replication rate that balances replication cost and durability, e.g., minimizing replication cost without threatening the durability target. In this paper, we propose a method called AutoProc to automate the replication process in P2P storage systems. AutoProc employs two key techniques to enable cost-effective replication: correct...  相似文献   
64.
Proof of retrievability (POR) is a technique for ensuring the integrity of data in outsourced storage services.In this paper,we address the construction of POR protocol on the standard model of interactive proof systems.We propose the first interactive POR scheme to prevent the fraudulence of prover and the leakage of verified data.We also give full proofs of soundness and zero-knowledge properties by constructing a polynomial-time rewindable knowledge extractor under the computational Diffie-Hellman assump...  相似文献   
65.
Deceptive voting behaviors of malicious users are known as the main reason of causing content pollution in Peer-to-Peer (P2P) content sharing systems. Due to the nature of P2P overlay network such as self-organization and anonymity, the existing methods on identifying deceptive votes are not effective, especially for collusive attackers. This paper presents Sorcery, a novel active challenge-response mechanism based on the notion that one side of interaction with the dominant information can detect whether the other side is telling a lie. To make each client obtain the dominant information, our approach introduces the social network to the P2P content sharing system; therefore, clients can establish the friend-relationships with the users who are either acquaintances in reality or those reliable online friends. Using the confidential voting histories of friends as own dominant information, the client challenges target content providers with the overlapping votes of both his friends and the target content provider, thus detecting whether the content provider is a deceptive user. Moreover, Sorcery provides the punishment mechanism which can reduce the impact brought by deceptive voting behaviors, and our work also discusses some key practical issues. The experimental results illustrate that Sorcery can effectively overcome the problem of deceptive voting behaviors in P2P content sharing systems, and work better than the existing reputation models.  相似文献   
66.
This paper investigates fast finite‐time control of nonlinear dynamics using terminal sliding‐mode (TSM) scheme. Some new norms of fast TSM strategies are proposed, and a faster convergence rate is established in comparison with the conventional fast TSM. A novel concept of nonsingular fast TSM, which is able to avoid the possible singularity during the control phase, is adopted in the robust high‐precision control of uncertain nonlinear systems. Numerical simulation on a two‐link rigid robot manipulator demonstrates the effectiveness of the proposed algorithm. Copyright © 2010 John Wiley & Sons, Ltd.  相似文献   
67.
There are many advanced techniques that can efficiently mine frequent itemsets using a minimum-support. However, the question that remains unanswered is whether the minimum-support can really help decision makers to make decisions. In this paper, we study four summary queries for frequent itemsets mining, namely, (1) finding a support-average of itemsets, (2) finding a support-quantile of itemsets, (3) finding the number of itemsets that greater/less than the support-average, i.e., an approximated distribution of itemsets, and (4) finding the relative frequency of an itemset (compared its frequency with that of other itemsets in the same dataset). With these queries, a decision maker will know whether an itemset in question is greater/less than the support-quantile; the distribution of itemsets; and the frequentness of an itemset. Processing these summary queries is challenging, because the minimum-support constraint cannot be used to prune infrequent itemsets. In this paper, we propose several simple yet effective approximation solutions. We conduct extensive experiments for evaluating our strategy, and illustrate that the proposed approaches can well model and capture the statistical parameters (summary queries) of itemsets in a database.  相似文献   
68.
The query rewriting plan generation over XML views has received wide attention recently. However, little work has been done on efficient evaluation of the query rewriting plans, which is not trivial since the plan may contain an exponential size of sub-plans. This paper investigates the reason for the potentially exponential number of sub-plans, and then proposes a new space-efficient form called ABCPlan (Plan with Automata Based Combinations) to equivalently represent the original query rewriting plan. ABCPlan contains a set of buckets containing suffix paths in the query tree and an automata to indicate the combination of the suffix paths from different buckets as valid query rewriting sub-plans. We also design an evaluation method called ABCScan, which constructs a unified evaluation tree for the ABCPlan and handles the evaluation tree in one scan of the XML view. In the evaluation, we introduce node existence automata to encode the structure of the sub-tree and convert the satisfaction of the ABCPlan into the intersection problem of deterministic finite automata. The experiments show that ABCPlan based method outperforms existing methods significantly in terms of scalability and efficiency.  相似文献   
69.
μ-Tree是直接建立在闪存之上的索引,它克服了传统B+树应用于闪存时引起的"游走树"现象,避免更新一页累及多页的现象.但μ-Tree也存在缺点:占用空间比传统B+树多.为克服μ-Tree存在的缺点,本文提出一套机制改进μ-Tree:k分法模型.在此模型中,我们分析了在给定扇出度F时,k值与总记录数n的关系,以及给定记录数n时,不同大小的索引记录项对k的影响;给出了确定k值的基本方法.实验结果表明,k比例划分可以有效地节省索引所占空间,空间节省最大达50%左右,平均可达39%.所提方法在空间资源受限的环境下具有良好的空间特性.  相似文献   
70.
A New Approach for Multi-Document Update Summarization   总被引:1,自引:1,他引:0       下载免费PDF全文
1958(2)
  • Manifold-ranking based topic-focused multi-document summarization 2007
  • An Introduction to Kolmogorov Complexity and Its Applications 1997
  • The use of MMR,diversity-based reranking for reordering documents and producing summaries 1998
  • Centroid-based summarization of multiple documents 2004(6)
  • A trainable document summarizer 1995
  • Impact of linguistic analysis on the semantic graph coverage and learning of document extracts 2005
  • Document summarization using conditional random fields 2007
  • Adasum:An adaptive model for summarization 2008
  • Lexpagerank:Prestige in multidocument text summarization 2004
  • Mihalcea R.Taran P Textrank-Bring order into texts 2004
  • Mihalcea R.Tarau P A language independent algorithm for single and multiple document summarization 2005
  • Wan X.Yang J.Xiao J Towards an iterative reinforcement approach for simultaneous document summarization and keyword extraction 2007
  • Wan X An exploration of document impact on graph-based multi-document summarization 2008
  • Bennett C H.Gács P.Li M.Vitányi P M,Zurek W H Information distance 1998(4)
  • Li M.Badger J H.Chen X.Kwong S,Kearney P,Zhang H An information-based sequence distance and its application to whole mitochondrial genome phylogeny 2001(2)
  • Li M.Chen X.Li X.Ma B Vitányi P M The similarity metric 2004(12)
  • Long C.Zhu X.Li M.Ma B Information shared by many objects 2008
  • Benedetto D.Caglioti E.Loreto V Language trees and zipping 2002(4)
  • Bennett C H.Li M.Ma B Chain letters and evolutionary histories 2003(6)
  • Cilibrasi R L.Vitányi P M The Google similarity distance 2007(3)
  • Zhang X.Hao Y.Zhu X.Li M Information distance from a question to an answer 2007
  • Ziv J.Lempel A A universal algorithm for sequential data compression 1977(3)
  • Lin C Y.Hovy E Automatic evaluation of summaries using n-gram co-occurrence statistics 2003
  • Nenkova A.Passonneau R.Mckeown K The pyramid method:Incorporating human content selection variation in summarization evaluation 2007(2)
  • >>更多...  相似文献   

    设为首页 | 免责声明 | 关于勤云 | 加入收藏

    Copyright©北京勤云科技发展有限公司  京ICP备09084417号