全文获取类型
收费全文 | 38833篇 |
免费 | 4366篇 |
国内免费 | 2707篇 |
专业分类
电工技术 | 2780篇 |
技术理论 | 6篇 |
综合类 | 3545篇 |
化学工业 | 1007篇 |
金属工艺 | 164篇 |
机械仪表 | 876篇 |
建筑科学 | 8945篇 |
矿业工程 | 633篇 |
能源动力 | 440篇 |
轻工业 | 453篇 |
水利工程 | 481篇 |
石油天然气 | 343篇 |
武器工业 | 503篇 |
无线电 | 6605篇 |
一般工业技术 | 897篇 |
冶金工业 | 393篇 |
原子能技术 | 74篇 |
自动化技术 | 17761篇 |
出版年
2024年 | 204篇 |
2023年 | 669篇 |
2022年 | 1106篇 |
2021年 | 1351篇 |
2020年 | 1412篇 |
2019年 | 1027篇 |
2018年 | 766篇 |
2017年 | 896篇 |
2016年 | 951篇 |
2015年 | 1198篇 |
2014年 | 3109篇 |
2013年 | 2342篇 |
2012年 | 3169篇 |
2011年 | 3496篇 |
2010年 | 2631篇 |
2009年 | 2834篇 |
2008年 | 2925篇 |
2007年 | 3163篇 |
2006年 | 2651篇 |
2005年 | 2249篇 |
2004年 | 1826篇 |
2003年 | 1554篇 |
2002年 | 1017篇 |
2001年 | 771篇 |
2000年 | 636篇 |
1999年 | 430篇 |
1998年 | 253篇 |
1997年 | 175篇 |
1996年 | 137篇 |
1995年 | 130篇 |
1994年 | 108篇 |
1993年 | 84篇 |
1992年 | 87篇 |
1991年 | 76篇 |
1990年 | 58篇 |
1989年 | 51篇 |
1988年 | 54篇 |
1987年 | 29篇 |
1986年 | 37篇 |
1985年 | 57篇 |
1984年 | 54篇 |
1983年 | 26篇 |
1982年 | 22篇 |
1981年 | 11篇 |
1980年 | 6篇 |
1979年 | 11篇 |
1965年 | 5篇 |
1964年 | 5篇 |
1962年 | 6篇 |
1955年 | 7篇 |
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
141.
针对近几年安阳市城区规模的不断扩大和安东新区的开发启动以及房地产市场的迅速发展,根据相关标准,结合安阳市城市发展的实际需要,提出了安阳市民用建筑有线电视管道工程设计及施工规范。 相似文献
142.
143.
A new evaluation model for SK combinator expressions is presented and used as a basis for the design of a novel processor. The resulting machine architecture resembles a dataflow ring, but executions are constrained to be fully lazy. An automatic dynamic load sharing mechanism for a distributed multiprocessor architecture is suggested, and initial simulation results are presented. 相似文献
144.
Chih-Hung Wang Author Vitae Chih-Heng Yin Author Vitae Author Vitae 《Computers & Electrical Engineering》2006,32(5):364-375
The most efficient approach to a fair exchange is to use an off-line trusted third party (TTP for short) who gets involved only when a dispute between two parties occurs. However, exchanged secrets that are not protected properly may be exposed to the TTP when one of these two parties asks the TTP to mediate the dispute. The first work to protect exchanged secrets from TTP’s misuse was proposed by Franklin and Reiter in 1997. They provided an on-line semi-trusted third party instead of an off-line third party for a fair exchange. Their schemes forced the TTP to take part in the protocol for all the cases, and thus, deemed to be impractical.The present paper, introduces several models, including single and multiple TTPs, to focus the attention not only on security properties, but also on reliability functions. In the single TTP mode, our new scheme can protect the exchanged data through an efficient exchange protocol, whereas in the multiple TTP mode, we proposed an approach to balance the security level with the reliability of the system. 相似文献
145.
《Information Systems Management》2007,24(4):305-310
Most organizations have measures to protect their network infrastructure from intruders. With the growth AND AVAILABILITY of wireless, some intruders now are aiming their attacks there. The potential for damage from these types of attacks is significant due to their nature. However, there is another type of wireless attack on organizational resources that also poses a significant vulnerability. That is electromagnetic radiation, also called radio frequency emissions (RFE), from unprotected systems and networks. 相似文献
146.
《Information Systems Management》2007,24(4):281-287
This study presents results of a survey of self-proclaimed computer hackers about their perceptions in regards to illegal hacking. Results show that hackers continue to engage in illegal hacking activities despite the perception of severe judicial punishment. A closer look shows that hackers perceive a high utility value from hacking, little informal sanctions, and a low likelihood of punishment. These perceptions coupled with a high level of moral disengagement partially explain the hacker's illegal behavior. 相似文献
147.
This paper deals with the issues of development and implementation of a real-time NURBS interpolator for a six-axis robot. Using an open-architecture controller system as a testbed, a real-time NURBS curve interpolator was developed, implemented and tested. Sample runs were conducted with the resulting trajectories measured in real-time during robot motion. The resulting trajectories are analyzed, discussed and compared with those from a commonly used point-to-point approximation technique. The real-time NURBS curve interpolator's feasibility, advantages and related issues are also discussed. 相似文献
148.
Christoph Minnameier 《Information Processing Letters》2007,103(3):105-111
Interaction systems are a formal model for component-based systems. Combining components via connectors to form more complex systems may give rise to deadlock situations. We present here a polynomial time reduction from 3-SAT to the question whether an interaction system contains deadlocks. 相似文献
149.
A whole‐program MATLAB to C translation system is presented. The paper outlines the motivation for the problem, discusses the system's architecture, its features and limitations. The translator's operation is explained using an example input program. Details are given on how the system implements and specializes some of the language's built‐in primitives. Finally, the paper reports measurements evaluating the execution time and memory usage of the translated sources, and the compilation time required for the translations. Copyright © 2006 John Wiley & Sons, Ltd. 相似文献
150.