全文获取类型
收费全文 | 6349篇 |
免费 | 622篇 |
国内免费 | 892篇 |
专业分类
电工技术 | 48篇 |
技术理论 | 1篇 |
综合类 | 221篇 |
化学工业 | 737篇 |
金属工艺 | 267篇 |
机械仪表 | 117篇 |
建筑科学 | 165篇 |
矿业工程 | 107篇 |
能源动力 | 393篇 |
轻工业 | 138篇 |
水利工程 | 77篇 |
石油天然气 | 294篇 |
武器工业 | 31篇 |
无线电 | 1220篇 |
一般工业技术 | 1386篇 |
冶金工业 | 161篇 |
原子能技术 | 319篇 |
自动化技术 | 2181篇 |
出版年
2024年 | 29篇 |
2023年 | 152篇 |
2022年 | 156篇 |
2021年 | 219篇 |
2020年 | 243篇 |
2019年 | 233篇 |
2018年 | 108篇 |
2017年 | 224篇 |
2016年 | 240篇 |
2015年 | 247篇 |
2014年 | 398篇 |
2013年 | 563篇 |
2012年 | 625篇 |
2011年 | 604篇 |
2010年 | 492篇 |
2009年 | 486篇 |
2008年 | 444篇 |
2007年 | 489篇 |
2006年 | 444篇 |
2005年 | 240篇 |
2004年 | 161篇 |
2003年 | 145篇 |
2002年 | 150篇 |
2001年 | 112篇 |
2000年 | 136篇 |
1999年 | 95篇 |
1998年 | 50篇 |
1997年 | 32篇 |
1996年 | 34篇 |
1995年 | 36篇 |
1994年 | 28篇 |
1993年 | 35篇 |
1992年 | 25篇 |
1991年 | 9篇 |
1990年 | 9篇 |
1989年 | 11篇 |
1988年 | 30篇 |
1987年 | 44篇 |
1986年 | 48篇 |
1985年 | 8篇 |
1984年 | 8篇 |
1983年 | 3篇 |
1981年 | 3篇 |
1980年 | 5篇 |
1979年 | 4篇 |
1978年 | 1篇 |
1977年 | 2篇 |
1976年 | 3篇 |
排序方式: 共有7863条查询结果,搜索用时 15 毫秒
61.
提出了一个基于带有惩罚因子的阴性选择算法的恶意程序检测模型.该模型从指令频率和包含相应指令的文件频率两个角度出发,对指令进行了深入的趋向性分析,提取出了趋向于代表恶意程序的恶意程序指令库.利用这些指令,有序切分程序比特串,模型提取得到恶意程序候选特征库和合法程序类恶意程序特征库.在此基础上,文中提出了一种带有惩罚因子的阴性选择算法(negative selection algorithm with penalty factor,NSAPF),根据异体和自体的匹配情况,采用惩罚的方式,对恶意程序候选特征进行划分,组成了恶意程序检测特征库1(malware detection signature library 1,MDSL1)和恶意程序检测特征库2(MDSL2),以此作为检测可疑程序的二维参照物.综合可疑程序和MDSL1,MDSL2的匹配值,文中模型将可疑程序分类到合法程序和恶意程序.通过在阴性选择算法中引入惩罚因子C,摆脱了传统阴性选择算法中对自体和异体有害性定义的缺陷,继而关注程序代码本身的危险性,充分挖掘和调节了特征的表征性,既提高了模型的检测效果,又使模型可以满足用户对识别率和虚警率的不同要求.综合实验... 相似文献
62.
CHEN KenLe & ZHANG JinWen National Key Laboratory of Micro/Nano Fabrication Technology 《中国科学:信息科学(英文版)》2011,(2)
63.
YANG Zhi & DAI YaFei Computer Science Department Peking University Beijing China 《中国科学:信息科学(英文版)》2011,(6)
Due to the prevalence of peer departures, P2P storage systems need to constantly generate replicas for high durability. However, few existing systems are able to select the right replication rate that balances replication cost and durability, e.g., minimizing replication cost without threatening the durability target. In this paper, we propose a method called AutoProc to automate the replication process in P2P storage systems. AutoProc employs two key techniques to enable cost-effective replication: correct... 相似文献
64.
AHN Gail-Joon 《中国科学:信息科学(英文版)》2011,(8):1608-1617
Proof of retrievability (POR) is a technique for ensuring the integrity of data in outsourced storage services.In this paper,we address the construction of POR protocol on the standard model of interactive proof systems.We propose the first interactive POR scheme to prevent the fraudulence of prover and the leakage of verified data.We also give full proofs of soundness and zero-knowledge properties by constructing a polynomial-time rewindable knowledge extractor under the computational Diffie-Hellman assump... 相似文献
65.
Ennan Zhai Huiping Sun Sihan Qing Zhong Chen 《Peer-to-Peer Networking and Applications》2011,4(2):178-191
Deceptive voting behaviors of malicious users are known as the main reason of causing content pollution in Peer-to-Peer (P2P)
content sharing systems. Due to the nature of P2P overlay network such as self-organization and anonymity, the existing methods
on identifying deceptive votes are not effective, especially for collusive attackers. This paper presents Sorcery, a novel
active challenge-response mechanism based on the notion that one side of interaction with the dominant information can detect
whether the other side is telling a lie. To make each client obtain the dominant information, our approach introduces the
social network to the P2P content sharing system; therefore, clients can establish the friend-relationships with the users
who are either acquaintances in reality or those reliable online friends. Using the confidential voting histories of friends
as own dominant information, the client challenges target content providers with the overlapping votes of both his friends
and the target content provider, thus detecting whether the content provider is a deceptive user. Moreover, Sorcery provides
the punishment mechanism which can reduce the impact brought by deceptive voting behaviors, and our work also discusses some
key practical issues. The experimental results illustrate that Sorcery can effectively overcome the problem of deceptive voting
behaviors in P2P content sharing systems, and work better than the existing reputation models. 相似文献
66.
This paper investigates fast finite‐time control of nonlinear dynamics using terminal sliding‐mode (TSM) scheme. Some new norms of fast TSM strategies are proposed, and a faster convergence rate is established in comparison with the conventional fast TSM. A novel concept of nonsingular fast TSM, which is able to avoid the possible singularity during the control phase, is adopted in the robust high‐precision control of uncertain nonlinear systems. Numerical simulation on a two‐link rigid robot manipulator demonstrates the effectiveness of the proposed algorithm. Copyright © 2010 John Wiley & Sons, Ltd. 相似文献
67.
There are many advanced techniques that can efficiently mine frequent itemsets using a minimum-support. However, the question that remains unanswered is whether the minimum-support can really help decision makers to make decisions. In this paper, we study four summary queries for frequent itemsets mining, namely, (1) finding a support-average of itemsets, (2) finding a support-quantile of itemsets, (3) finding the number of itemsets that greater/less than the support-average, i.e., an approximated distribution of itemsets, and (4) finding the relative frequency of an itemset (compared its frequency with that of other itemsets in the same dataset). With these queries, a decision maker will know whether an itemset in question is greater/less than the support-quantile; the distribution of itemsets; and the frequentness of an itemset. Processing these summary queries is challenging, because the minimum-support constraint cannot be used to prune infrequent itemsets. In this paper, we propose several simple yet effective approximation solutions. We conduct extensive experiments for evaluating our strategy, and illustrate that the proposed approaches can well model and capture the statistical parameters (summary queries) of itemsets in a database. 相似文献
68.
Jun Gao Author Vitae Jiaheng Lu Author Vitae Dongqing Yang Author Vitae 《Journal of Systems and Software》2010,83(6):1029-1038
The query rewriting plan generation over XML views has received wide attention recently. However, little work has been done on efficient evaluation of the query rewriting plans, which is not trivial since the plan may contain an exponential size of sub-plans. This paper investigates the reason for the potentially exponential number of sub-plans, and then proposes a new space-efficient form called ABCPlan (Plan with Automata Based Combinations) to equivalently represent the original query rewriting plan. ABCPlan contains a set of buckets containing suffix paths in the query tree and an automata to indicate the combination of the suffix paths from different buckets as valid query rewriting sub-plans. We also design an evaluation method called ABCScan, which constructs a unified evaluation tree for the ABCPlan and handles the evaluation tree in one scan of the XML view. In the evaluation, we introduce node existence automata to encode the structure of the sub-tree and convert the satisfaction of the ABCPlan into the intersection problem of deterministic finite automata. The experiments show that ABCPlan based method outperforms existing methods significantly in terms of scalability and efficiency. 相似文献
69.
μ-Tree是直接建立在闪存之上的索引,它克服了传统B+树应用于闪存时引起的"游走树"现象,避免更新一页累及多页的现象.但μ-Tree也存在缺点:占用空间比传统B+树多.为克服μ-Tree存在的缺点,本文提出一套机制改进μ-Tree:k分法模型.在此模型中,我们分析了在给定扇出度F时,k值与总记录数n的关系,以及给定记录数n时,不同大小的索引记录项对k的影响;给出了确定k值的基本方法.实验结果表明,k比例划分可以有效地节省索引所占空间,空间节省最大达50%左右,平均可达39%.所提方法在空间资源受限的环境下具有良好的空间特性. 相似文献
70.
1958(2)
Manifold-ranking based topic-focused multi-document summarization
2007
An Introduction to Kolmogorov Complexity and Its Applications
1997
The use of MMR,diversity-based reranking for reordering documents and producing summaries
1998
Centroid-based summarization of multiple documents
2004(6)
A trainable document summarizer
1995
Impact of linguistic analysis on the semantic graph coverage and learning of document extracts
2005
Document summarization using conditional random fields
2007
Adasum:An adaptive model for summarization
2008
Lexpagerank:Prestige in multidocument text summarization
2004
Mihalcea R.Taran P
Textrank-Bring order into texts
2004
Mihalcea R.Tarau P
A language independent algorithm for single and multiple document summarization
2005
Wan X.Yang J.Xiao J
Towards an iterative reinforcement approach for simultaneous document summarization and keyword extraction
2007
Wan X
An exploration of document impact on graph-based multi-document summarization
2008
Bennett C H.Gács P.Li M.Vitányi P M,Zurek W H
Information distance
1998(4)
Li M.Badger J H.Chen X.Kwong S,Kearney P,Zhang H
An information-based sequence distance and its application to whole mitochondrial genome phylogeny
2001(2)
Li M.Chen X.Li X.Ma B Vitányi P M
The similarity metric
2004(12)
Long C.Zhu X.Li M.Ma B
Information shared by many objects
2008
Benedetto D.Caglioti E.Loreto V
Language trees and zipping
2002(4)
Bennett C H.Li M.Ma B
Chain letters and evolutionary histories
2003(6)
Cilibrasi R L.Vitányi P M
The Google similarity distance
2007(3)
Zhang X.Hao Y.Zhu X.Li M
Information distance from a question to an answer
2007
Ziv J.Lempel A
A universal algorithm for sequential data compression
1977(3)
Lin C Y.Hovy E
Automatic evaluation of summaries using n-gram co-occurrence statistics
2003
Nenkova A.Passonneau R.Mckeown K
The pyramid method:Incorporating human content selection variation in summarization evaluation
2007(2)