首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   4899篇
  免费   253篇
  国内免费   235篇
电工技术   124篇
综合类   285篇
化学工业   315篇
金属工艺   209篇
机械仪表   822篇
建筑科学   460篇
矿业工程   118篇
能源动力   170篇
轻工业   55篇
水利工程   84篇
石油天然气   66篇
武器工业   24篇
无线电   641篇
一般工业技术   401篇
冶金工业   155篇
原子能技术   96篇
自动化技术   1362篇
  2023年   31篇
  2022年   59篇
  2021年   81篇
  2020年   69篇
  2019年   53篇
  2018年   98篇
  2017年   78篇
  2016年   106篇
  2015年   156篇
  2014年   235篇
  2013年   321篇
  2012年   317篇
  2011年   371篇
  2010年   250篇
  2009年   255篇
  2008年   242篇
  2007年   347篇
  2006年   331篇
  2005年   320篇
  2004年   286篇
  2003年   230篇
  2002年   180篇
  2001年   156篇
  2000年   112篇
  1999年   113篇
  1998年   98篇
  1997年   68篇
  1996年   92篇
  1995年   53篇
  1994年   55篇
  1993年   44篇
  1992年   35篇
  1991年   30篇
  1990年   26篇
  1989年   21篇
  1988年   17篇
  1987年   5篇
  1986年   4篇
  1985年   5篇
  1984年   5篇
  1983年   4篇
  1982年   4篇
  1981年   4篇
  1980年   4篇
  1979年   4篇
  1977年   2篇
  1976年   3篇
  1964年   1篇
  1955年   1篇
  1954年   1篇
排序方式: 共有5387条查询结果,搜索用时 10 毫秒
51.
本文在描述了程序设计范型的特性之后,详细地介绍了代码组件的组合重用方法,提出并论述了代码组件的组合重用是一种新程序设计范型的观点.本文还详细地描述了这种新程序设计范型的特点,同时也指出了应当解决的一些课题.  相似文献   
52.
分析缓冲区溢出及其溢出植入代码的组成结构,指出相应的防御措施;通过分析溢出和植入代码的组成结构,给出缓冲区溢出的一般规律和溢出攻击植入代码的结构特征;最后讨论如何根据溢出规律和植入代码的结构特征,采取有效措施来防御缓冲区溢出攻击。  相似文献   
53.
This paper presents the results of an empirical study on the subjective evaluation of code smells that identify poorly evolvable structures in software. We propose use of the term software evolvability to describe the ease of further developing a piece of software and outline the research area based on four different viewpoints. Furthermore, we describe the differences between human evaluations and automatic program analysis based on software evolvability metrics. The empirical component is based on a case study in a Finnish software product company, in which we studied two topics. First, we looked at the effect of the evaluator when subjectively evaluating the existence of smells in code modules. We found that the use of smells for code evaluation purposes can be difficult due to conflicting perceptions of different evaluators. However, the demographics of the evaluators partly explain the variation. Second, we applied selected source code metrics for identifying four smells and compared these results to the subjective evaluations. The metrics based on automatic program analysis and the human-based smell evaluations did not fully correlate. Based upon our results, we suggest that organizations should make decisions regarding software evolvability improvement based on a combination of subjective evaluations and code metrics. Due to the limitations of the study we also recognize the need for conducting more refined studies and experiments in the area of software evolvability.
Casper LasseniusEmail:
  相似文献   
54.
An efficient keyboard access to Web sites is highly important for many groups of disabled users. However, the current design of most Web sites makes the efficient keyboard navigation nearly impossible. This paper investigates the performance of the keyboard and mouse navigation in Web pages. The comparison is based on the theoretical arguments and on two small studies. The results show that the current amount of keyboard support in common Web sites is far from being sufficient. Typical problems concerning keyboard support in Web sites are discussed, along with possible solutions and the related constraints.
Martin SchreppEmail:
  相似文献   
55.
Intelligent agents can play a pivotal role in providing both software systems and augmented interfaces, to individual users from all walks of life, to utilise the Internet 24 h a day, 7 days a week (24×7), including interaction with other users, over both wireless and broadband infrastructures. However, traditional approaches to user modelling are not adequate for this purpose, as they mainly account for a generic, approximate, idealised user. New user models are therefore required to be adaptable for each individual and flexible enough to represent the diversity of all users using information technology. Such models should be able to cover all aspects of an individual’s life—those aspects of most interest to the individual user themselves. This paper describes a novel intelligent agent architecture and methodology both called ShadowBoard, based on a complex user model drawn from analytical psychology. An equally novel software tool, called the DigitalFriend based on ShadowBoard, is also introduced. This paper illustrates how aspects of user cognition can be outsourced, using, for example, an internationalised book price quoting agent. The Locales Framework from Computer Supported Co-operative Work is then used to understand the problematic aspects of interaction involved in complex social spaces, identifying specific needs for technology intervention in such social spaces, and to understand how interactions amongst mobile users with different abilities might be technically assisted in such spaces. In this context, the single user-centred multi-agent technology demonstrated in the DigitalFriend is adapted to a multi-user system dubbed ShadowPlaces. The aim of ShadowPlaces is to outsource some of the interaction necessary, for a group of mobile individuals with different abilities to interact cooperatively and effectively in a social world, supported by wireless networks and backed by broadband Internet services. An overview of the user model, the architecture and methodology (ShadowBoard) and the resulting software tool (the DigitalFriend) is presented, and progress on ShadowPlaces—the multi-user version—is outlined.
Connor GrahamEmail:
  相似文献   
56.
The purpose of this study is to explore the dynamics underlying disparities in Internet use among school age children in the US. The analysis found that a broad range of demographic, geographic and economic factors significantly influence Internet use among children. Significantly, the availability of household computing resources and adult Internet users in the household were most important in explaining disparities in use among children. To expand universal Internet access, future public policy should focus on providing support for in-home access; continued support for public access at out-of-home locations such as schools, and providing technical support, training and expertise to school age children.
Paul F. ClearyEmail:
  相似文献   
57.
Pei‐Chi Wu 《Software》2001,31(12):1125-1130
ISO 10646 Universal Character Set (UCS) is a 31‐bit coding architecture that covers symbols in most of the world's written languages. Identifiers in programming languages are usually defined by using alphanumeric characters of ASCII, which represent mainly English words. An approach for working around this deficiency is to encode multilingual identifiers into the alphanumeric range of ASCII. For case‐sensitive languages, an encoding that utilizes [0–9][A–Z][a–z] can be more space‐efficient for multilingual identifiers. This paper proposes a base62 transformation format of ISO 10646 called UTF‐62. The resulting string of UTF‐62 is within a [0–9][A–Z][a–z] range, a total of 62 base characters. UTF‐62 also preserves the lexicographic sorting order of UCS‐4. Copyright © 2001 John Wiley & Sons, Ltd.  相似文献   
58.
The 3G universal mobile telecommunications system (UMTS) planning problem is combinatorially explosive and difficult to solve optimally, though solution methods exist for its three main subproblems (cell, access network, and core network planning). We previously formulated the entire problem as a single integrated mixed-integer linear program (MIP) and showed that only small instances of this global planning problem can be solved to optimality by a commercial MIP solver within a reasonable amount of time ( St-Hilaire, Chamberland, & Pierre, 2006). Heuristic methods are needed for larger instances. This paper provides the first complete formulation for the heuristic sequential method ( St-Hilaire, Chamberland, & Pierre, 2005) that re-partitions the global formulation into the three conventional subproblems and solves them in sequence using a MIP solver. This greatly improves the solution time, but at the expense of solution quality. We also develop a new hybrid heuristic that uses the results of the sequential method to generate constraints that provide tighter bounds for the global planning problem with the goal of reaching the provable optimum solution much more quickly. We empirically evaluate the speed and solution accuracy of four solution methods: (i) the direct MIP solution of the global planning problem, (ii) a local search heuristic applied to the global planning problem, (iii) the sequential method and (iv) the new hybrid method. The results show that the sequential method provides very good results in a fraction of the time needed for the direct MIP solution of the global problem, and that optimum results can be provided by the hybrid heuristic in greatly reduced time.  相似文献   
59.
一体化标识网络安全性能测试   总被引:1,自引:0,他引:1  
分析一体化标识网络对网络攻击的抵抗能力以及在网络安全方面的优势,并以ICMP Flood攻击为例,使用思博伦Test-Center测试仪对一体化网络和传统网络分别进行安全攻击测试,从而评估一体化网络的安全性能.测试结果显示,对于DDoS攻击,相比于传统网络较明显受到攻击的影响,一体化网络能有效抵御攻击,保护了核心网的安全性.  相似文献   
60.
以大型销售MIS的数据安全问题为例,提出以终端ID号、钥匙盘ID号和终端用户样本指纹绑定为一体的身份认证方案。该方案采用软硬件协同工作方式,克服了传统身份认证模式或安全性能低,或运算成本高等缺陷,提高了认证效率,并保证了合法用户操作的唯一性和认证过程的不可抵赖性。提出的基于ECC与一维混沌加密算法优点相结合的混合加密方案,使基于互联网传送的数据安全性有了实质性提高。基于分治叠加法的大整数计算成果运用,克服了计算机精度域的限制,使密钥空间从理论上趋向于无穷大。试验结果表明,基于混合加密算法的数据安全方案具有良好的抗穷举攻击和抗差分攻击能力。该项研究为解决各类MIS的数据安全问题提供了重要策略,意义重大。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号