首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   22672篇
  免费   3258篇
  国内免费   2070篇
电工技术   3117篇
技术理论   3篇
综合类   2392篇
化学工业   1900篇
金属工艺   906篇
机械仪表   2563篇
建筑科学   1398篇
矿业工程   673篇
能源动力   677篇
轻工业   613篇
水利工程   412篇
石油天然气   548篇
武器工业   259篇
无线电   3017篇
一般工业技术   1890篇
冶金工业   549篇
原子能技术   222篇
自动化技术   6861篇
  2024年   125篇
  2023年   342篇
  2022年   596篇
  2021年   718篇
  2020年   759篇
  2019年   665篇
  2018年   626篇
  2017年   879篇
  2016年   988篇
  2015年   1134篇
  2014年   1548篇
  2013年   1417篇
  2012年   1797篇
  2011年   1832篇
  2010年   1356篇
  2009年   1382篇
  2008年   1387篇
  2007年   1632篇
  2006年   1373篇
  2005年   1182篇
  2004年   1068篇
  2003年   869篇
  2002年   767篇
  2001年   646篇
  2000年   562篇
  1999年   407篇
  1998年   335篇
  1997年   278篇
  1996年   253篇
  1995年   216篇
  1994年   188篇
  1993年   135篇
  1992年   132篇
  1991年   68篇
  1990年   59篇
  1989年   66篇
  1988年   44篇
  1987年   37篇
  1986年   25篇
  1985年   23篇
  1984年   18篇
  1983年   12篇
  1982年   8篇
  1981年   6篇
  1980年   8篇
  1979年   8篇
  1977年   4篇
  1976年   4篇
  1975年   3篇
  1951年   3篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
41.
描述了二流量试井工艺的实现,从常规分析和双对数曲线拟合两上方面,给出了二流量试井的资料解释分析方法,分析认为二流量试井同样可以计算出正常关井测压力恢复(或压力降落)资料所解释的油藏及流体参数。这种试井方法不但可以减少因正常关井测压对产油量和注水量的影响,而且可以减缓因突然关、开井造成的套管变形或损坏。实践证明,该试井技术方法具有较好的经济效益和应用前景。  相似文献   
42.
A new evaluation model for SK combinator expressions is presented and used as a basis for the design of a novel processor. The resulting machine architecture resembles a dataflow ring, but executions are constrained to be fully lazy. An automatic dynamic load sharing mechanism for a distributed multiprocessor architecture is suggested, and initial simulation results are presented.  相似文献   
43.
Precise timing and asynchronous I/O are appealing features for many applications. Unix kernels provide such features on a per‐process basis, using signals to communicate asynchronous events to applications. Per‐process signals and timers are grossly inadequate for complex multithreaded applications that require per‐thread signals and timers that operate at finer granularity. To respond to this need, we present a scheme that integrates asynchronous (Unix) signals with user‐level threads, using the ARIADNE system as a platform. This is done with a view towards support for portable, multithreaded, and multiprotocol distributed applications, namely the CLAM (connectionless, lightweight, and multiway) communications library. In the same context, we propose the use of continuations as an efficient mechanism for reducing thread context‐switching and busy‐wait overheads in multithreaded protocols. Our proposal for integrating timers and signal‐handling mechanisms not only solves problems related to race conditions, but also offers an efficient and flexible interface for timing and signalling threads. Copyright © 2006 John Wiley & Sons, Ltd.  相似文献   
44.
The concept of combinatorial objects is formalized. It allows strict definition of a combinatorial optimization problem (COP). An efficient metaheuristic method to solve COPs (H-method) is considered. It includes stochastic local search algorithms as a built-in procedure. A parallel implementation of the H-method is set forth and analyzed. The results from a numerical experiment and solution of some well-known COPs on personal computers and on the SKIT cluster supercomputer are presented. The study was supported by INTAS (Project 06-1000017-8909). __________ Translated from Kibernetika i Sistemnyi Analiz, No. 6, pp. 70–79, November–December 2007.  相似文献   
45.
通过分析甲壳素纤维各项性能,将其引入山羊绒产品中,对双层织物的设计进行探讨,并经过纺纱和织物试制,提出了设计与生产中应注意的问题,开发出了具有永久抗菌性的表层为羊绒、里层为甲壳素与改性羊毛混纺的系列产品.  相似文献   
46.
双抽机组热-电负荷关系非常复杂,运行人员难于分配。介绍一种较精确的工况图画法,可以为电厂运行人员提供可靠的基础。  相似文献   
47.
A new method of classification for numerical stability of parallel algorithms is proposed based on the theoretical foundation of forward error analysis. It partitions the algorithms according to their asymptotic stability—a measure introduced to relate the limiting behavior of the stability to the size of the problem. Using this method, the stability aspect of the pipelined solution technique for first-order and second-order linear recurrences—the core of a tridiagonal linear equation solver—is studied. In particular, it shows that the pipelined solution method of the first-order linear recurrences has the same degree of stability as the commonly used sequential evaluation algorithms. The stability problems of sequential and pipelined solution methods of the second-order linear recurrences are also studied.  相似文献   
48.
本文讨论了纯扩散机制的光折变晶体用作单作用区的双相位共轭镜(DPCM)时的阈值耦合强度和允许的输入光强比范围,并与双作用区的情况进行比较后,给出了在输入光强比远离1的条件下,双相位共轭镜的正常工作的条件参数。  相似文献   
49.
A. Chin 《Algorithmica》1994,12(2-3):170-181
Consider the problem of efficiently simulating the shared-memory parallel random access machine (PRAM) model on massively parallel architectures with physically distributed memory. To prevent network congestion and memory bank contention, it may be advantageous to hash the shared memory address space. The decision on whether or not to use hashing depends on (1) the communication latency in the network and (2) the locality of memory accesses in the algorithm.We relate this decision directly to algorithmic issues by studying the complexity of hashing in the Block PRAM model of Aggarwal, Chandra, and Snir, a shared-memory model of parallel computation which accounts for communication locality. For this model, we exhibit a universal family of hash functions having optimal locality. The complexity of applying these hash functions to the shared address space of the Block PRAM (i.e., by permuting data elements) is asymptotically equivalent to the complexity of performing a square matrix transpose, and this result is best possible for all pairwise independent universal hash families. These complexity bounds provide theoretical evidence that hashing and randomized routing need not destroy communication locality, addressing an open question of Valiant.This work was started when the author was a student at Oxford University, supported by a National Science Foundation Graduate Fellowship and a Rhodes Scholarship. Any opinions, findings, conclusions, or recommendations expressed in this publication are those of the author and do not necessarily reflect the views of the National Science Foundation or the Rhodes Trust.  相似文献   
50.
广义de Bruijn多计算机互连网络   总被引:1,自引:0,他引:1  
朱福民 《计算机学报》1995,18(2):106-113
(d,m)de Bruijn多计算机系统互连网络限制网络的规模必须为d^m。本文把(d,m)de Bruijn网络推广到了任意顶点情形,提出了广义de Bruijn网络,研究了广义de Bruijn网络的自路由性质,设计了路由算法,研究了广义de Bruijn网络顶点度的性质和容错特性。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号