全文获取类型
收费全文 | 2756篇 |
免费 | 142篇 |
国内免费 | 113篇 |
专业分类
电工技术 | 186篇 |
技术理论 | 1篇 |
综合类 | 451篇 |
化学工业 | 160篇 |
金属工艺 | 62篇 |
机械仪表 | 93篇 |
建筑科学 | 480篇 |
矿业工程 | 122篇 |
能源动力 | 25篇 |
轻工业 | 115篇 |
水利工程 | 66篇 |
石油天然气 | 70篇 |
武器工业 | 9篇 |
无线电 | 158篇 |
一般工业技术 | 115篇 |
冶金工业 | 224篇 |
原子能技术 | 6篇 |
自动化技术 | 668篇 |
出版年
2024年 | 6篇 |
2023年 | 12篇 |
2022年 | 43篇 |
2021年 | 34篇 |
2020年 | 36篇 |
2019年 | 31篇 |
2018年 | 23篇 |
2017年 | 27篇 |
2016年 | 38篇 |
2015年 | 44篇 |
2014年 | 126篇 |
2013年 | 105篇 |
2012年 | 180篇 |
2011年 | 156篇 |
2010年 | 147篇 |
2009年 | 219篇 |
2008年 | 177篇 |
2007年 | 323篇 |
2006年 | 172篇 |
2005年 | 174篇 |
2004年 | 136篇 |
2003年 | 140篇 |
2002年 | 137篇 |
2001年 | 112篇 |
2000年 | 93篇 |
1999年 | 68篇 |
1998年 | 43篇 |
1997年 | 27篇 |
1996年 | 38篇 |
1995年 | 20篇 |
1994年 | 17篇 |
1993年 | 23篇 |
1992年 | 11篇 |
1991年 | 6篇 |
1990年 | 3篇 |
1989年 | 11篇 |
1988年 | 12篇 |
1987年 | 5篇 |
1986年 | 4篇 |
1985年 | 4篇 |
1984年 | 2篇 |
1982年 | 2篇 |
1978年 | 2篇 |
1975年 | 2篇 |
1962年 | 2篇 |
1960年 | 1篇 |
1959年 | 1篇 |
1958年 | 1篇 |
1957年 | 2篇 |
1955年 | 1篇 |
排序方式: 共有3011条查询结果,搜索用时 0 毫秒
151.
In order to solve the problems of secure access and deduplication to the shared file in the cloud environment,a novel notion called proof of shared ownership (PoSW) was formalized,and a formal definition of the PoSW was given.Furthermore,a PoSW scheme and an enhanced version of that were proposed.In the PoSW scheme,secure shared file dispersal,convergent encryption and secret sharing algorithm were employed to transform the shared file realize the sharing and authorization for the shared file,and then a novel challenge-response protocol was proposed to achieve the proof of shared ownership and the foundation for the secure deduplication of the shared file was provided.An enhanced PoSW scheme was designed to improve the availability and reliability for different kinds of the shared files by introducing the multi-cloud server providers and using the strategies of both data duplication and secret file dispersal.Security analysis and performance evaluation show the security and efficiency of the proposed scheme. 相似文献
152.
On a new formal proof model for RFID location privacy 总被引:2,自引:0,他引:2
We discuss a recently proposed formal proof model for RFID location privacy. We show that protocols which intuitively and in several other models are considered not to be location private, are provably location private in this model. Conversely, we also show that protocols which obviously are location private, are not considered location private in this model.Specifically, we prove a protocol in which every tag transmits the same constant message to not be location private in the proposed model. Then we prove a protocol in which a tag's identity is transmitted in clear text to be weakly location private in the model. 相似文献
153.
Schuelke Matthew J.; Day Eric Anthony; McEntire Lauren E.; Boatman Paul R.; Boatman Jazmine Espejo; Kowollik Vanessa; Wang Xiaoqian 《Canadian Metallurgical Quarterly》2009,94(4):1076
The authors examined the relative criterion-related validity of knowledge structure coherence and two accuracy-based indices (closeness and correlation) as well as the utility of using a combination of knowledge structure indices in the prediction of skill acquisition and transfer. Findings from an aggregation of 5 independent samples (N = 958) whose participants underwent training on a complex computer simulation indicated that coherence and the accuracy-based indices yielded comparable zero-order predictive validities. Support for the incremental validity of using a combination of indices was mixed; the most, albeit small, gain came in pairing coherence and closeness when predicting transfer. After controlling for baseline skill, general mental ability, and declarative knowledge, only coherence explained a statistically significant amount of unique variance in transfer. Overall, the results suggested that the different indices largely overlap in their representation of knowledge organization, but that coherence better reflects adaptable aspects of knowledge organization important to skill transfer. (PsycINFO Database Record (c) 2010 APA, all rights reserved) 相似文献
154.
介绍了蒸压加气混凝土砌块的材料特性及作用机理,并详细阐述了蒸压加气混凝土砌块干法施工的工艺流程和操作要点,结合具体工程实例,得出蒸压加气混凝土砌块性能优越,干法施工成套技术先进,有着广阔的发展应用前景。 相似文献
155.
156.
用直径φ130mm的镗杆镗削油缸孔,在较小的切削深度切削时仍产生颤振,这严重地限制了产品质量和生产率的提高。针对这一情况,作者测量了有关参数,设计出具有阻尼动力减振器的大直径镗杆,设计时考虑了以往人们为简化问题而忽略的主系统阻尼,并以动柔度负实部为目标。由SD—375动态分析仪等设备对切削试验测信号进行分析、处理,其结果验证了理论的正确性,并反映出明显的减振效果 相似文献
157.
Freek Wiedijk 《Journal of Automated Reasoning》2002,29(3-4):365-387
This paper presents aut, a modern Automath checker. It is a straightforward re-implementation of the Zandleven Automath checker from the seventies. It was implemented about five years ago, in the programming language C. It accepts both the AUT-68 and AUT-QE dialects of Automath. This program was written to restore a damaged version of Jutting's translation of Landau's Grundlagen. Some notable features: It is fast. On a 1 GHz machine it will check the full Jutting formalization (736 K of nonwhitespace Automath source) in 0.6 seconds. Its implementation of -terms does not use named variables or de Bruijn indices (the two common approaches) but instead uses a graph representation. In this representation variables are represented by pointers to a binder. The program can compile an Automath text into one big Automath single line-style -term. It outputs such a term using de Bruijn indices. (These -terms cannot be checked by modern systems like Coq or Agda, because the -typed -calculi of de Bruijn are different from the -typed -calculi of modern type theory.)The source of aut is freely available on the Web at the address . 相似文献
158.
Quang Huy Nguyen Claude Kirchner Hélène Kirchner 《Journal of Automated Reasoning》2002,29(3-4):309-336
This paper presents the design, the implementation, and experiments of the integration of syntactic, conditional possibly associative-commutative term rewriting into proof assistants based on constructive type theory. Our approach is called external because it consists in performing term rewriting in a specific and efficient environment and checking the computations later in a proof assistant. Two typical systems are considered in this work: ELAN, based on the rewriting calculus, as the term rewriting-based environment, and Coq, based on the calculus of inductive constructions as the proof assistant. We first formalize the proof terms for deduction by rewriting and strategies in ELAN using the rewriting calculus with explicit substitutions. We then show how these proof terms can soundly be translated into Coq syntax where they can be directly type checked. For the method to be applicable for rewriting modulo associativity and commutativity, we provide an effective method to prove equalities modulo these axioms in Coq using ELAN. These results have been integrated into an ELAN-based rewriting tactic in Coq. 相似文献
159.
We work with an extension of Resolution, called Res(2), that allows clauses with conjunctions of two literals. In this system there are rules to introduce and eliminate such conjunctions. We prove that the weak pigeonhole principle PHPcnn and random unsatisfiable CNF formulas require exponential-size proofs in this system. This is the strongest system beyond Resolution for which such lower bounds are known. As a consequence to the result about the weak pigeonhole principle, Res(log) is exponentially more powerful than Res(2). Also we prove that Resolution cannot polynomially simulate Res(2) and that Res(2) does not have feasible monotone interpolation solving an open problem posed by Krají
ek. 相似文献
160.
计算机程序设计课程是高等院校计算机专业的专业必修课,但在编程的学习中,很少有学生觉得编程容易。本文通过对此问题的思考分析发现,存在诸多的影响因素。这其中有课程本身固有的一些因素,更与编程参与者的教与学的方式、经验、态度等密切相关。针对此问题,本文提出一些有效的教学手段与学习方法,并提出了课程建设的一些思路。 相似文献