全文获取类型
收费全文 | 45513篇 |
免费 | 5237篇 |
国内免费 | 3439篇 |
专业分类
电工技术 | 3588篇 |
技术理论 | 8篇 |
综合类 | 6664篇 |
化学工业 | 3319篇 |
金属工艺 | 1138篇 |
机械仪表 | 2808篇 |
建筑科学 | 4411篇 |
矿业工程 | 1749篇 |
能源动力 | 1471篇 |
轻工业 | 1034篇 |
水利工程 | 1330篇 |
石油天然气 | 1593篇 |
武器工业 | 721篇 |
无线电 | 4365篇 |
一般工业技术 | 4981篇 |
冶金工业 | 2437篇 |
原子能技术 | 366篇 |
自动化技术 | 12206篇 |
出版年
2024年 | 211篇 |
2023年 | 773篇 |
2022年 | 1130篇 |
2021年 | 1397篇 |
2020年 | 1593篇 |
2019年 | 1407篇 |
2018年 | 1434篇 |
2017年 | 1587篇 |
2016年 | 1733篇 |
2015年 | 1836篇 |
2014年 | 2778篇 |
2013年 | 3101篇 |
2012年 | 3056篇 |
2011年 | 3403篇 |
2010年 | 2695篇 |
2009年 | 2805篇 |
2008年 | 2815篇 |
2007年 | 3001篇 |
2006年 | 2757篇 |
2005年 | 2359篇 |
2004年 | 1918篇 |
2003年 | 1581篇 |
2002年 | 1366篇 |
2001年 | 1122篇 |
2000年 | 929篇 |
1999年 | 805篇 |
1998年 | 632篇 |
1997年 | 544篇 |
1996年 | 472篇 |
1995年 | 446篇 |
1994年 | 358篇 |
1993年 | 318篇 |
1992年 | 298篇 |
1991年 | 199篇 |
1990年 | 172篇 |
1989年 | 186篇 |
1988年 | 135篇 |
1987年 | 73篇 |
1986年 | 96篇 |
1985年 | 72篇 |
1984年 | 68篇 |
1983年 | 52篇 |
1982年 | 56篇 |
1981年 | 43篇 |
1980年 | 33篇 |
1979年 | 31篇 |
1978年 | 29篇 |
1977年 | 26篇 |
1964年 | 28篇 |
1955年 | 35篇 |
排序方式: 共有10000条查询结果,搜索用时 140 毫秒
961.
Juan José Martín‐Romero Montserrat Gil‐Martínez Mario García‐Sanz 《国际强度与非线性控制杂志
》2009,19(17):1959-1971
》2009,19(17):1959-1971
This paper describes an analytical formulation to compute quantitative feedback theory (QFT) bounds in one‐degree‐of‐freedom feedback control problems. The new approach is based on envelope curves and shows that a QFT control specification can be expressed as a family of circumferences. Then, the controller bound is defined by the envelope curve of this family and can be obtained as an analytical function. This offers the possibility of studying the QFT bounds in an analytical way with several useful properties. Gridding methods are avoided, resulting in a lower computational effort procedure. The new formulation improves the accuracy of previous methods and allows the designer to calculate multivalued bounds. Copyright © 2009 John Wiley & Sons, Ltd. 相似文献
962.
We consider the problem of tracking a “smart” target. That is, a target that is aware it is being tracked and modifies its behaviour accordingly. To track such targets effectively it is necessary to modify the behaviour of the tracking sensor in response to the target. We consider that the best framework for such a problem is that of a mathematical game. In this paper, we consider an idealised version of this problem that illustrates some of the issues that can occur when attempting to track a smart target and the utility of a game theoretic framework. 相似文献
963.
Christiane Gresse von Wangenheim Marcello Thiry Djone Kochanski 《Empirical Software Engineering》2009,14(4):418-452
Software measurement is considered important in improving the software process. However, teaching software measurement remains
a challenging issue. Although, games and simulations are regarded powerful tools for learning, their learning effectiveness
is not rigorously established. This paper describes the results of an explorative study to investigate the learning effectiveness
of a game prototype on software measurement in order to make an initial judgment about its potential as an educational tool
as well as to analyze its appropriateness, engagement and strengths & weaknesses as guidance for further evolution. Within
the study, a series of experiments was conducted in parallel in three master courses in Brazil. Results of the study reveal
that the participants consider the content and structure of the game appropriate, but no indication for a significant difference
on learning effectiveness could be shown.
相似文献
Djone KochanskiEmail: |
964.
Yoram Bachrach Ariel Parnes Ariel D. Procaccia Jeffrey S. Rosenschein 《Autonomous Agents and Multi-Agent Systems》2009,19(2):153-172
Decentralized Reputation Systems have recently emerged as a prominent method of establishing trust among self-interested agents
in online environments. A key issue is the efficient aggregation of data in the system; several approaches have been proposed,
but they are plagued by major shortcomings. We put forward a novel, decentralized data management scheme grounded in gossip-based
algorithms. Rumor mongering is known to possess algorithmic advantages, and indeed, our framework inherits many of their salient
features: scalability, robustness, a global perspective, and simplicity. We demonstrate that our scheme motivates agents to
maintain a very high reputation, by showing that the higher an agent’s reputation is above the threshold set by its peers,
the more transactions it would be able to complete within a certain time unit. We analyze the relation between the amount
by which an agent’s average reputation exceeds the threshold and the time required to close a deal. This analysis is carried
out both theoretically, and empirically through a simulation system called GossipTrustSim. Finally, we show that our approach is inherently impervious to certain kinds of attacks.
A preliminary version of this article appeared in the proceedings of IJCAI 2007. 相似文献
965.
An important problem in agent verification is a lack of proper understanding of the relation between agent programs on the
one hand and agent logics on the other. Understanding this relation would help to establish that an agent programming language
is both conceptually well-founded and well-behaved, as well as yield a way to reason about agent programs by means of agent
logics. As a step toward bridging this gap, we study several issues that need to be resolved in order to establish a precise
mathematical relation between a modal agent logic and an agent programming language specified by means of an operational semantics. In this paper, we present an agent programming theory that provides both an agent programming language as well as a corresponding agent verification logic to verify agent programs.
The theory is developed in stages to show, first, how a modal semantics can be grounded in a state-based semantics, and, second, how denotational semantics can be used to define the mathematical relation connecting the logic and agent programming language. Additionally, it is
shown how to integrate declarative goals and add precompiled plans to the programming theory. In particular, we discuss the
use of the concept of higher-order goals in our theory. Other issues such as a complete axiomatization and the complexity
of decision procedures for the verification logic are not the focus of this paper and remain for future investigation.
Part of this research was carried out while the first author was affiliated with the Nijmegen Institute for Cognition and
Information, Radboud University Nijmegen. 相似文献
966.
N. Zaerpour M. Rabbani A. H. Gharehgozli R. Tavakkoli-Moghaddam 《Soft Computing - A Fusion of Foundations, Methodologies and Applications》2009,13(11):1035-1054
Manufacturing systems produce their products by making use of three main strategies: make-to-order, make-to-stock and hybrid
(combination of MTO and MTS strategies) systems. Hence, several products must be considered and partitioned in terms of many
different conflicting criteria, leading to a large set of subjective or ambiguous data. Thus, an effective evaluation approach
is essential to improve decision quality. In this paper a comprehensive decision, making structure is proposed to choose the
proper strategy for producing the products. It consists of a novel hybrid methodology, which combines analytical hierarchy
process (AHP) and technique for order performance by similarity to ideal solution (TOPSIS) for partitioning of products. In
this study, the rating of each alternative regarding different criteria (throughout the TOPSIS technique) is described by
means of linguistic variables. Furthermore, fuzzy AHP methodology is applied to determine the weights of evaluation criteria.
At the end, the effectiveness of the proposed model is demonstrated through a case study. 相似文献
967.
Collaborative technologies offer a range of new ways of supporting learning by enabling learners to share and exchange both
ideas and their own digital products. This paper considers how best to exploit these opportunities from the perspective of
learners’ needs. New technologies invariably excite a creative explosion of new ideas for ways of doing teaching and learning,
although the technologies themselves are rarely designed with teaching and learning in mind. To get the best from them for
education we need to start with the requirements of education, in terms of both learners’ and teachers’ needs. The argument
put forward in this paper is to use what we know about what it takes to learn, and build this into a pedagogical framework
with which to challenge digital technologies to deliver a genuinely enhanced learning experience. 相似文献
968.
Natheer Abu-Obeid Fuad K. Malkawi Khaled Nassar Basel Al-eideh 《Nexus Network Journal》2009,11(2):163-182
The main goal of this study is to apply a scientific quantitative approach to the investigation of contextual fit. This is
approached mathematically within the framework of cognitive science and research on categorization and prototypes. Two experiments
investigated two leading mathematical-cognitive approaches for explaining people’s judgment of contextual fit of a new building
with an architectural/urban context: prototype approach and feature frequency approach. The basic concept is that people represent
the built environment via architectural prototypes and/or frequencies of encountered architectural features. In the first
experiment, a group of twelve participants performed rank order tasks on artificially created architectural patterns, for
the purpose of psychological scaling. Perceptual distances among all patterns were mathematically determined. In the second
experiment, three groups of architectural patterns were constructed to represent assumed architectural contexts. The prototype
of each context was mathematically determined according to prototype cognitive model, and based on the distances calculated
in the first experiment. Fifty-six students participated in the main experiment, in which they rank ordered a group of fifteen
architectural patterns in terms of contextual fit to each of the three architectural contexts. Participants’ rank order data
of the fifteen patterns were regressed on both the perceptual distances from prototypes, and numbers of features shared with
each architectural context. Results indicated that both prototype and feature frequency approaches significantly accounted
for important portions of participants’ judgments. However, participants tended to prefer one approach to the other according
to context composition. Results have implications for both research on utilizing cognitive-mathematical models in architectural
research and on urban design guidelines and control. 相似文献
969.
970.
Jiangtao Li Ninghui Li XiaoFeng Wang Ting Yu 《International Journal of Information Security》2009,8(2):89-101
Trust management is an approach to scalable and flexible access control in decentralized systems. In trust management, a server
often needs to evaluate a chain of credentials submitted by a client; this requires the server to perform multiple expensive
digital signature verifications. In this paper, we study low-bandwidth Denial-of-Service (DoS) attacks that exploit the existence
of trust management systems to deplete server resources. Although the threat of DoS attacks has been studied for some application-level
protocols such as authentication protocols, we show that it is especially destructive for trust management systems. Exploiting
the delegation feature in trust management languages, an attacker can forge a long credential chain to force a server to consume
a large amount of computing resource. Using game theory as an analytic tool, we demonstrate that unprotected trust management
servers will easily fall prey to a witty attacker who moves smartly. We report our empirical study of existing trust management
systems, which manifests the gravity of this threat. We also propose a defense technique using credential caching, and show
that it is effective in the presence of intelligent attackers.
A preliminary version of this paper was presented at the Second IEEE International Conference on Security and Privacy in Communication
Networks, Baltimore, MD, USA, August 2006. 相似文献