首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   2756篇
  免费   142篇
  国内免费   113篇
电工技术   186篇
技术理论   1篇
综合类   451篇
化学工业   160篇
金属工艺   62篇
机械仪表   93篇
建筑科学   480篇
矿业工程   122篇
能源动力   25篇
轻工业   115篇
水利工程   66篇
石油天然气   70篇
武器工业   9篇
无线电   158篇
一般工业技术   115篇
冶金工业   224篇
原子能技术   6篇
自动化技术   668篇
  2024年   6篇
  2023年   12篇
  2022年   43篇
  2021年   34篇
  2020年   36篇
  2019年   31篇
  2018年   23篇
  2017年   27篇
  2016年   38篇
  2015年   44篇
  2014年   126篇
  2013年   105篇
  2012年   180篇
  2011年   156篇
  2010年   147篇
  2009年   219篇
  2008年   177篇
  2007年   323篇
  2006年   172篇
  2005年   174篇
  2004年   136篇
  2003年   140篇
  2002年   137篇
  2001年   112篇
  2000年   93篇
  1999年   68篇
  1998年   43篇
  1997年   27篇
  1996年   38篇
  1995年   20篇
  1994年   17篇
  1993年   23篇
  1992年   11篇
  1991年   6篇
  1990年   3篇
  1989年   11篇
  1988年   12篇
  1987年   5篇
  1986年   4篇
  1985年   4篇
  1984年   2篇
  1982年   2篇
  1978年   2篇
  1975年   2篇
  1962年   2篇
  1960年   1篇
  1959年   1篇
  1958年   1篇
  1957年   2篇
  1955年   1篇
排序方式: 共有3011条查询结果,搜索用时 0 毫秒
151.
In order to solve the problems of secure access and deduplication to the shared file in the cloud environment,a novel notion called proof of shared ownership (PoSW) was formalized,and a formal definition of the PoSW was given.Furthermore,a PoSW scheme and an enhanced version of that were proposed.In the PoSW scheme,secure shared file dispersal,convergent encryption and secret sharing algorithm were employed to transform the shared file realize the sharing and authorization for the shared file,and then a novel challenge-response protocol was proposed to achieve the proof of shared ownership and the foundation for the secure deduplication of the shared file was provided.An enhanced PoSW scheme was designed to improve the availability and reliability for different kinds of the shared files by introducing the multi-cloud server providers and using the strategies of both data duplication and secret file dispersal.Security analysis and performance evaluation show the security and efficiency of the proposed scheme.  相似文献   
152.
On a new formal proof model for RFID location privacy   总被引:2,自引:0,他引:2  
We discuss a recently proposed formal proof model for RFID location privacy. We show that protocols which intuitively and in several other models are considered not to be location private, are provably location private in this model. Conversely, we also show that protocols which obviously are location private, are not considered location private in this model.Specifically, we prove a protocol in which every tag transmits the same constant message to not be location private in the proposed model. Then we prove a protocol in which a tag's identity is transmitted in clear text to be weakly location private in the model.  相似文献   
153.
The authors examined the relative criterion-related validity of knowledge structure coherence and two accuracy-based indices (closeness and correlation) as well as the utility of using a combination of knowledge structure indices in the prediction of skill acquisition and transfer. Findings from an aggregation of 5 independent samples (N = 958) whose participants underwent training on a complex computer simulation indicated that coherence and the accuracy-based indices yielded comparable zero-order predictive validities. Support for the incremental validity of using a combination of indices was mixed; the most, albeit small, gain came in pairing coherence and closeness when predicting transfer. After controlling for baseline skill, general mental ability, and declarative knowledge, only coherence explained a statistically significant amount of unique variance in transfer. Overall, the results suggested that the different indices largely overlap in their representation of knowledge organization, but that coherence better reflects adaptable aspects of knowledge organization important to skill transfer. (PsycINFO Database Record (c) 2010 APA, all rights reserved)  相似文献   
154.
徐金豪 《山西建筑》2009,35(18):122-123
介绍了蒸压加气混凝土砌块的材料特性及作用机理,并详细阐述了蒸压加气混凝土砌块干法施工的工艺流程和操作要点,结合具体工程实例,得出蒸压加气混凝土砌块性能优越,干法施工成套技术先进,有着广阔的发展应用前景。  相似文献   
155.
王旭  白树山 《电线电缆》2001,(4):29-29,36
通过分析矿用电缆新老标准的异同 ,介绍了矿用电缆的发展及其新的要求。  相似文献   
156.
用直径φ130mm的镗杆镗削油缸孔,在较小的切削深度切削时仍产生颤振,这严重地限制了产品质量和生产率的提高。针对这一情况,作者测量了有关参数,设计出具有阻尼动力减振器的大直径镗杆,设计时考虑了以往人们为简化问题而忽略的主系统阻尼,并以动柔度负实部为目标。由SD—375动态分析仪等设备对切削试验测信号进行分析、处理,其结果验证了理论的正确性,并反映出明显的减振效果  相似文献   
157.
This paper presents aut, a modern Automath checker. It is a straightforward re-implementation of the Zandleven Automath checker from the seventies. It was implemented about five years ago, in the programming language C. It accepts both the AUT-68 and AUT-QE dialects of Automath. This program was written to restore a damaged version of Jutting's translation of Landau's Grundlagen. Some notable features: It is fast. On a 1 GHz machine it will check the full Jutting formalization (736 K of nonwhitespace Automath source) in 0.6 seconds. Its implementation of -terms does not use named variables or de Bruijn indices (the two common approaches) but instead uses a graph representation. In this representation variables are represented by pointers to a binder. The program can compile an Automath text into one big Automath single line-style -term. It outputs such a term using de Bruijn indices. (These -terms cannot be checked by modern systems like Coq or Agda, because the -typed -calculi of de Bruijn are different from the -typed -calculi of modern type theory.)The source of aut is freely available on the Web at the address .  相似文献   
158.
This paper presents the design, the implementation, and experiments of the integration of syntactic, conditional possibly associative-commutative term rewriting into proof assistants based on constructive type theory. Our approach is called external because it consists in performing term rewriting in a specific and efficient environment and checking the computations later in a proof assistant. Two typical systems are considered in this work: ELAN, based on the rewriting calculus, as the term rewriting-based environment, and Coq, based on the calculus of inductive constructions as the proof assistant. We first formalize the proof terms for deduction by rewriting and strategies in ELAN using the rewriting calculus with explicit substitutions. We then show how these proof terms can soundly be translated into Coq syntax where they can be directly type checked. For the method to be applicable for rewriting modulo associativity and commutativity, we provide an effective method to prove equalities modulo these axioms in Coq using ELAN. These results have been integrated into an ELAN-based rewriting tactic in Coq.  相似文献   
159.
We work with an extension of Resolution, called Res(2), that allows clauses with conjunctions of two literals. In this system there are rules to introduce and eliminate such conjunctions. We prove that the weak pigeonhole principle PHPcnn and random unsatisfiable CNF formulas require exponential-size proofs in this system. This is the strongest system beyond Resolution for which such lower bounds are known. As a consequence to the result about the weak pigeonhole principle, Res(log) is exponentially more powerful than Res(2). Also we prove that Resolution cannot polynomially simulate Res(2) and that Res(2) does not have feasible monotone interpolation solving an open problem posed by Krají ek.  相似文献   
160.
计算机程序设计课程是高等院校计算机专业的专业必修课,但在编程的学习中,很少有学生觉得编程容易。本文通过对此问题的思考分析发现,存在诸多的影响因素。这其中有课程本身固有的一些因素,更与编程参与者的教与学的方式、经验、态度等密切相关。针对此问题,本文提出一些有效的教学手段与学习方法,并提出了课程建设的一些思路。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号