全文获取类型
收费全文 | 4899篇 |
免费 | 253篇 |
国内免费 | 235篇 |
专业分类
电工技术 | 124篇 |
综合类 | 285篇 |
化学工业 | 315篇 |
金属工艺 | 209篇 |
机械仪表 | 822篇 |
建筑科学 | 460篇 |
矿业工程 | 118篇 |
能源动力 | 170篇 |
轻工业 | 55篇 |
水利工程 | 84篇 |
石油天然气 | 66篇 |
武器工业 | 24篇 |
无线电 | 641篇 |
一般工业技术 | 401篇 |
冶金工业 | 155篇 |
原子能技术 | 96篇 |
自动化技术 | 1362篇 |
出版年
2023年 | 31篇 |
2022年 | 59篇 |
2021年 | 81篇 |
2020年 | 69篇 |
2019年 | 53篇 |
2018年 | 98篇 |
2017年 | 78篇 |
2016年 | 106篇 |
2015年 | 156篇 |
2014年 | 235篇 |
2013年 | 321篇 |
2012年 | 317篇 |
2011年 | 371篇 |
2010年 | 250篇 |
2009年 | 255篇 |
2008年 | 242篇 |
2007年 | 347篇 |
2006年 | 331篇 |
2005年 | 320篇 |
2004年 | 286篇 |
2003年 | 230篇 |
2002年 | 180篇 |
2001年 | 156篇 |
2000年 | 112篇 |
1999年 | 113篇 |
1998年 | 98篇 |
1997年 | 68篇 |
1996年 | 92篇 |
1995年 | 53篇 |
1994年 | 55篇 |
1993年 | 44篇 |
1992年 | 35篇 |
1991年 | 30篇 |
1990年 | 26篇 |
1989年 | 21篇 |
1988年 | 17篇 |
1987年 | 5篇 |
1986年 | 4篇 |
1985年 | 5篇 |
1984年 | 5篇 |
1983年 | 4篇 |
1982年 | 4篇 |
1981年 | 4篇 |
1980年 | 4篇 |
1979年 | 4篇 |
1977年 | 2篇 |
1976年 | 3篇 |
1964年 | 1篇 |
1955年 | 1篇 |
1954年 | 1篇 |
排序方式: 共有5387条查询结果,搜索用时 10 毫秒
51.
本文在描述了程序设计范型的特性之后,详细地介绍了代码组件的组合重用方法,提出并论述了代码组件的组合重用是一种新程序设计范型的观点.本文还详细地描述了这种新程序设计范型的特点,同时也指出了应当解决的一些课题. 相似文献
52.
53.
Subjective evaluation of software evolvability using code smells: An empirical study 总被引:2,自引:2,他引:0
This paper presents the results of an empirical study on the subjective evaluation of code smells that identify poorly evolvable
structures in software. We propose use of the term software evolvability to describe the ease of further developing a piece
of software and outline the research area based on four different viewpoints. Furthermore, we describe the differences between
human evaluations and automatic program analysis based on software evolvability metrics. The empirical component is based
on a case study in a Finnish software product company, in which we studied two topics. First, we looked at the effect of the
evaluator when subjectively evaluating the existence of smells in code modules. We found that the use of smells for code evaluation
purposes can be difficult due to conflicting perceptions of different evaluators. However, the demographics of the evaluators
partly explain the variation. Second, we applied selected source code metrics for identifying four smells and compared these
results to the subjective evaluations. The metrics based on automatic program analysis and the human-based smell evaluations
did not fully correlate. Based upon our results, we suggest that organizations should make decisions regarding software evolvability
improvement based on a combination of subjective evaluations and code metrics. Due to the limitations of the study we also
recognize the need for conducting more refined studies and experiments in the area of software evolvability.
相似文献
Casper LasseniusEmail: |
54.
Martin Schrepp 《Universal Access in the Information Society》2006,5(2):180-188
An efficient keyboard access to Web sites is highly important for many groups of disabled users. However, the current design of most Web sites makes the efficient keyboard navigation nearly impossible. This paper investigates the performance of the keyboard and mouse navigation in Web pages. The comparison is based on the theoretical arguments and on two small studies. The results show that the current amount of keyboard support in common Web sites is far from being sufficient. Typical problems concerning keyboard support in Web sites are discussed, along with possible solutions and the related constraints.
相似文献
Martin SchreppEmail: |
55.
Intelligent agents can play a pivotal role in providing both software systems and augmented interfaces, to individual users from all walks of life, to utilise the Internet 24 h a day, 7 days a week (24×7), including interaction with other users, over both wireless and broadband infrastructures. However, traditional approaches to user modelling are not adequate for this purpose, as they mainly account for a generic, approximate, idealised user. New user models are therefore required to be adaptable for each individual and flexible enough to represent the diversity of all users using information technology. Such models should be able to cover all aspects of an individual’s life—those aspects of most interest to the individual user themselves. This paper describes a novel intelligent agent architecture and methodology both called ShadowBoard, based on a complex user model drawn from analytical psychology. An equally novel software tool, called the DigitalFriend based on ShadowBoard, is also introduced. This paper illustrates how aspects of user cognition can be outsourced, using, for example, an internationalised book price quoting agent. The Locales Framework from Computer Supported Co-operative Work is then used to understand the problematic aspects of interaction involved in complex social spaces, identifying specific needs for technology intervention in such social spaces, and to understand how interactions amongst mobile users with different abilities might be technically assisted in such spaces. In this context, the single user-centred multi-agent technology demonstrated in the DigitalFriend is adapted to a multi-user system dubbed ShadowPlaces. The aim of ShadowPlaces is to outsource some of the interaction necessary, for a group of mobile individuals with different abilities to interact cooperatively and effectively in a social world, supported by wireless networks and backed by broadband Internet services. An overview of the user model, the architecture and methodology (ShadowBoard) and the resulting software tool (the DigitalFriend) is presented, and progress on ShadowPlaces—the multi-user version—is outlined.
相似文献
Connor GrahamEmail: |
56.
Paul F. Cleary Glenn Pierce Eileen M. Trauth 《Universal Access in the Information Society》2006,4(4):354-373
The purpose of this study is to explore the dynamics underlying disparities in Internet use among school age children in the
US. The analysis found that a broad range of demographic, geographic and economic factors significantly influence Internet
use among children. Significantly, the availability of household computing resources and adult Internet users in the household
were most important in explaining disparities in use among children. To expand universal Internet access, future public policy
should focus on providing support for in-home access; continued support for public access at out-of-home locations such as
schools, and providing technical support, training and expertise to school age children.
相似文献
Paul F. ClearyEmail: |
57.
Pei‐Chi Wu 《Software》2001,31(12):1125-1130
ISO 10646 Universal Character Set (UCS) is a 31‐bit coding architecture that covers symbols in most of the world's written languages. Identifiers in programming languages are usually defined by using alphanumeric characters of ASCII, which represent mainly English words. An approach for working around this deficiency is to encode multilingual identifiers into the alphanumeric range of ASCII. For case‐sensitive languages, an encoding that utilizes [0–9][A–Z][a–z] can be more space‐efficient for multilingual identifiers. This paper proposes a base62 transformation format of ISO 10646 called UTF‐62. The resulting string of UTF‐62 is within a [0–9][A–Z][a–z] range, a total of 62 base characters. UTF‐62 also preserves the lexicographic sorting order of UCS‐4. Copyright © 2001 John Wiley & Sons, Ltd. 相似文献
58.
Marc St-Hilaire John W. Chinneck Steven Chamberland Samuel Pierre 《Computers & Industrial Engineering》2012
The 3G universal mobile telecommunications system (UMTS) planning problem is combinatorially explosive and difficult to solve optimally, though solution methods exist for its three main subproblems (cell, access network, and core network planning). We previously formulated the entire problem as a single integrated mixed-integer linear program (MIP) and showed that only small instances of this global planning problem can be solved to optimality by a commercial MIP solver within a reasonable amount of time ( St-Hilaire, Chamberland, & Pierre, 2006). Heuristic methods are needed for larger instances. This paper provides the first complete formulation for the heuristic sequential method ( St-Hilaire, Chamberland, & Pierre, 2005) that re-partitions the global formulation into the three conventional subproblems and solves them in sequence using a MIP solver. This greatly improves the solution time, but at the expense of solution quality. We also develop a new hybrid heuristic that uses the results of the sequential method to generate constraints that provide tighter bounds for the global planning problem with the goal of reaching the provable optimum solution much more quickly. We empirically evaluate the speed and solution accuracy of four solution methods: (i) the direct MIP solution of the global planning problem, (ii) a local search heuristic applied to the global planning problem, (iii) the sequential method and (iv) the new hybrid method. The results show that the sequential method provides very good results in a fraction of the time needed for the direct MIP solution of the global problem, and that optimum results can be provided by the hybrid heuristic in greatly reduced time. 相似文献
59.
一体化标识网络安全性能测试 总被引:1,自引:0,他引:1
分析一体化标识网络对网络攻击的抵抗能力以及在网络安全方面的优势,并以ICMP Flood攻击为例,使用思博伦Test-Center测试仪对一体化网络和传统网络分别进行安全攻击测试,从而评估一体化网络的安全性能.测试结果显示,对于DDoS攻击,相比于传统网络较明显受到攻击的影响,一体化网络能有效抵御攻击,保护了核心网的安全性. 相似文献
60.
以大型销售MIS的数据安全问题为例,提出以终端ID号、钥匙盘ID号和终端用户样本指纹绑定为一体的身份认证方案。该方案采用软硬件协同工作方式,克服了传统身份认证模式或安全性能低,或运算成本高等缺陷,提高了认证效率,并保证了合法用户操作的唯一性和认证过程的不可抵赖性。提出的基于ECC与一维混沌加密算法优点相结合的混合加密方案,使基于互联网传送的数据安全性有了实质性提高。基于分治叠加法的大整数计算成果运用,克服了计算机精度域的限制,使密钥空间从理论上趋向于无穷大。试验结果表明,基于混合加密算法的数据安全方案具有良好的抗穷举攻击和抗差分攻击能力。该项研究为解决各类MIS的数据安全问题提供了重要策略,意义重大。 相似文献