全文获取类型
收费全文 | 14439篇 |
免费 | 1041篇 |
国内免费 | 908篇 |
专业分类
电工技术 | 897篇 |
技术理论 | 1篇 |
综合类 | 1664篇 |
化学工业 | 1112篇 |
金属工艺 | 290篇 |
机械仪表 | 742篇 |
建筑科学 | 544篇 |
矿业工程 | 394篇 |
能源动力 | 165篇 |
轻工业 | 433篇 |
水利工程 | 268篇 |
石油天然气 | 402篇 |
武器工业 | 75篇 |
无线电 | 1183篇 |
一般工业技术 | 385篇 |
冶金工业 | 315篇 |
原子能技术 | 83篇 |
自动化技术 | 7435篇 |
出版年
2024年 | 33篇 |
2023年 | 64篇 |
2022年 | 166篇 |
2021年 | 215篇 |
2020年 | 235篇 |
2019年 | 144篇 |
2018年 | 156篇 |
2017年 | 177篇 |
2016年 | 237篇 |
2015年 | 337篇 |
2014年 | 722篇 |
2013年 | 615篇 |
2012年 | 921篇 |
2011年 | 1001篇 |
2010年 | 834篇 |
2009年 | 802篇 |
2008年 | 1022篇 |
2007年 | 1169篇 |
2006年 | 1061篇 |
2005年 | 1096篇 |
2004年 | 1018篇 |
2003年 | 935篇 |
2002年 | 738篇 |
2001年 | 649篇 |
2000年 | 483篇 |
1999年 | 342篇 |
1998年 | 233篇 |
1997年 | 177篇 |
1996年 | 161篇 |
1995年 | 131篇 |
1994年 | 118篇 |
1993年 | 93篇 |
1992年 | 73篇 |
1991年 | 48篇 |
1990年 | 33篇 |
1989年 | 33篇 |
1988年 | 15篇 |
1987年 | 12篇 |
1986年 | 7篇 |
1985年 | 22篇 |
1984年 | 18篇 |
1983年 | 8篇 |
1982年 | 9篇 |
1981年 | 6篇 |
1980年 | 6篇 |
1979年 | 5篇 |
1978年 | 2篇 |
1976年 | 2篇 |
1965年 | 1篇 |
1959年 | 1篇 |
排序方式: 共有10000条查询结果,搜索用时 0 毫秒
61.
周戈 《电脑编程技巧与维护》2012,(10):40-41
比较了数据库及数据仓库,通过网上购物系统平台的研究,分析了两者在数据信息处理中的异同,从而达到让网上购物更加完善、更加便捷地为用户服务的目的。 相似文献
62.
设计了适合衢州职业技术学院固定资产日常管理工作的资产管理系统.对该系统作了需求分析和详细设计,采用了ASP.NET框架技术和SQL Server后台数据库相结合的设计方法.系统基本实现了资产的登记、审核、查询、变更、统计、打印报表、上报数据等功能,有效地解决了资产管理工作的数据混乱、不准确、处理流程不规范等问题,有效地提高了管理人员的工作效率. 相似文献
63.
中药复方数据挖掘研究是将我国丰富的中药信息资源和现代最新信息技术相结合的重要内容,它意味着基于中医理论,利用知识发现技术,对传统中药新药、中医组方理论及规律、中药作用机制、有效成分构效关系等多个方面进行全面、系统的研究。图作为一种经典的数据结构,被广泛用于复杂数据结构分析与建模。文章探讨了图建模技术并实现了中医方剂与图集的转换。 相似文献
64.
65.
66.
本文在对数字化校园中心共享数据库及公共数据交换平台的研究基础之上设计了一种综合查询服务平台架构及查询服务功能,同时分析了查询实现过程。 相似文献
67.
Register allocation for write activity minimization on non-volatile main memory for embedded systems
Yazhi Huang Author VitaeTiantian Liu Author Vitae Chun Jason XueAuthor Vitae 《Journal of Systems Architecture》2012,58(1):13-23
Non-volatile memories are good candidates for DRAM replacement as main memory in embedded systems and they have many desirable characteristics. Nevertheless, the disadvantages of non-volatile memory co-exist with its advantages. First, the lifetime of some of the non-volatile memories is limited by the number of erase operations. Second, read and write operations have asymmetric speed or power consumption in non-volatile memory. This paper focuses on the embedded systems using non-volatile memory as main memory. We propose register allocation technique with re-computation to reduce the number of store instructions. When non-volatile memory is applied as the main memory, reducing store instructions will reduce write activities on non-volatile memory. To re-compute the spills effectively during register allocation, a novel potential spill selection strategy is proposed. During this process, live range splitting is utilized to split certain long live ranges such that they are more likely to be assigned into registers. In addition, techniques for re-computation overhead reduction is proposed on systems with multiple functional units. With the proposed approach, the lifetime of non-volatile memory is extended accordingly. The experimental results demonstrate that the proposed technique can efficiently reduce the number of store instructions on systems with non-volatile memory by 33% on average. 相似文献
68.
Richard L. Venezky 《Computers and the Humanities》1988,22(4):285-291
The Dictionary of Old English computing systems have provided access since the 1970s to a database of approximately three million running words. These systems, designed for a variety of machines and written in a variety of languages, have until recently been planned with computing center billing algorithms in mind. With personal workstations emphasis has shifted to building more elegant user interfaces and to providing the entire DOE database to editors around the world. While the shift from sequential files to random access files and the provision of extensive development tools have changed some of the design process, error checking and protection of the database against accidental intrusion have remained as central issues.Richard L. Venezky is Unidel Professor of Educational Studies and professor of Computer and Information Sciences at the University of Delaware. He was formerly professor and chair of Computer Sciences at the University of Wisconsin. His research interests include writing systems, literacy, knowledge representation, and computer-assisted instruction. Among his recent publications are The Subtle Danger: Reflections on the Literacy Abilities of America's Young Adults (Princeton, NJ: ETS, 1987), and Steps Towards a Modern History of American Reading Instruction (Review of Research in Education, 1986, vol. 13, 129–70). 相似文献
69.
When a set of rules generates (conflicting) values for a virtual attribute of some tuple, the system must resolve the inconsistency and decide on a unique value that is assigned to that attribute. In most current systems, the conflict is resolved based on criteria that choose one of the rules in the conflicting set and use the value that it generated. There are several applications, however, where inconsistencies of the above form arise, whose semantics demand a different form of resolution. We propose a general framework for the study of the conflict resolution problem, and suggest a variety of resolution criteria, which collectively subsume all previously known solutions. With several new criteria being introduced, the semantics of several applications are captured more accurately than in the past. We discuss how conflict resolution criteria can be specified at the schema or the rule-module level. Finally, we suggest some implementation techniques based on rule indexing, which allow conflicts to be resolved efficiently at compile time, so that at run time only a single rule is processed.An earlier version of this work appeared under the title Conflict Resolution of Rules Assigning Values to Virtual Attributes inProceedings of the 1989 ACM-Sigmod Conference, Portland, OR, June 1989, pp. 205–214.Partially supported by the National Science Foundation under Grant IRI-9157368 (PYI Award) and by grants from DEC, HP, and AT&T.Partially supported by the National Science Foundation under Grant IRI-9057573 (PYI Award), IBM, DEC, and the University of Maryland Institute for Advanced Computer Studies (UMIACS). 相似文献
70.
自微软公司推出SQL Server关系数据库管理系统以来,其在越来越多的电子商务网站和企业信息平台中得以广泛使用。然而与之相关的信息安全问题也日益凸现和受到用户的密切关注。因此,为了保护SQL Server数据库避免来自各种途径的安全威胁,保障信息的安全,本文对其安全机制、安全策略和保障其安全的管理策略进行了探讨,提出了相应的解决措施和办法,以供参考。 相似文献