全文获取类型
收费全文 | 52175篇 |
免费 | 7634篇 |
国内免费 | 5858篇 |
专业分类
电工技术 | 5718篇 |
技术理论 | 1篇 |
综合类 | 6574篇 |
化学工业 | 3647篇 |
金属工艺 | 1911篇 |
机械仪表 | 5273篇 |
建筑科学 | 5381篇 |
矿业工程 | 1823篇 |
能源动力 | 1511篇 |
轻工业 | 929篇 |
水利工程 | 1914篇 |
石油天然气 | 1380篇 |
武器工业 | 1038篇 |
无线电 | 4850篇 |
一般工业技术 | 5895篇 |
冶金工业 | 1155篇 |
原子能技术 | 209篇 |
自动化技术 | 16458篇 |
出版年
2024年 | 312篇 |
2023年 | 899篇 |
2022年 | 1574篇 |
2021年 | 1738篇 |
2020年 | 1960篇 |
2019年 | 1605篇 |
2018年 | 1636篇 |
2017年 | 1994篇 |
2016年 | 2360篇 |
2015年 | 2470篇 |
2014年 | 3407篇 |
2013年 | 3822篇 |
2012年 | 4311篇 |
2011年 | 4179篇 |
2010年 | 3316篇 |
2009年 | 3418篇 |
2008年 | 3377篇 |
2007年 | 3931篇 |
2006年 | 3366篇 |
2005年 | 2833篇 |
2004年 | 2248篇 |
2003年 | 1845篇 |
2002年 | 1514篇 |
2001年 | 1336篇 |
2000年 | 1166篇 |
1999年 | 930篇 |
1998年 | 744篇 |
1997年 | 649篇 |
1996年 | 511篇 |
1995年 | 452篇 |
1994年 | 382篇 |
1993年 | 282篇 |
1992年 | 229篇 |
1991年 | 184篇 |
1990年 | 148篇 |
1989年 | 148篇 |
1988年 | 88篇 |
1987年 | 44篇 |
1986年 | 34篇 |
1985年 | 35篇 |
1984年 | 45篇 |
1983年 | 28篇 |
1982年 | 20篇 |
1981年 | 12篇 |
1980年 | 24篇 |
1979年 | 20篇 |
1978年 | 6篇 |
1977年 | 5篇 |
1975年 | 5篇 |
1955年 | 4篇 |
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
991.
《Information Security Journal: A Global Perspective》2013,22(6):346-352
ABSTRACT Software security helps in identifying and managing risks. One of the effective ways to identify software vulnerabilities is to analyze its code. Code analysis (Chess & West, 2007) helps in catching common coding mistakes such as buffer overflow, unused variables, memory leaks, and various race conditions, which in turn optimizes computer programs, both in storage and computation aspects. Software developers use either open source tools or commercial tools for verification and validation of software. Without proper validation of a software/system using some standard guidelines, potential attackers can find ways to exploit vulnerabilities and bugs and then can gain control over a system, if they are successful. In this paper, we discuss some of the open source static code analysis and dynamic analysis tools, their merits, and limitations with respect to some target codes that contain possible threats. We consider C/C++ and Java programming languages for our experiments. For static code analyzers, we consider Flawfinder, Splint, and Cppcheck; PMD, Findbugs, and Valgrind for dynamic code analysis, and its plug-in, Memcheck, to perform dynamic analysis on executables. We provide our observations in a comparison table, highlighting these tools strengths and weaknesses. 相似文献
992.
For many years, computer systems have emerged; they now occupy an important place in our daily lives. The growing needs and ever increasing use of computer systems have made application development more and more complicated, The complexity of these applications poses problems such as reuse, installation, administration and evolution of applications. The development of applications is related to the evolution of paradigms and approaches to developing them. This paper presents different approaches and paradigms of development starting with the procedural approach, coming up for service, through the component and object-oriented approaches. Also, for each of the approaches we determine the advantages and limitations. 相似文献
993.
《Journal of Systems Architecture》2013,59(7):372-375
Schedulability analysis has been widely studied to provide offline timing guarantees for a set of real-time tasks. The so-called limited carry-in technique, which can be orthogonally incorporated into many different multi-core schedulability analysis methods, was originally introduced for Earliest Deadline First (EDF) scheduling to derive a tighter bound on the amount of interference of carry-in jobs at the expense of investigating a pseudo-polynomial number of intervals. This technique has been later adapted for Fixed-Priority (FP) scheduling to obtain the carry-in bound efficiently by examining only one interval, leading to a significant improvement in multi-core schedulability analysis. However, such a successful result has not yet been transferred to any other non-FP scheduling algorithms. Motivated by this, this paper presents a generic limited carry-in technique that is applicable to any work-conserving algorithms. Specifically, this paper derives a carry-in bound in an algorithm-independent manner and demonstrates how to apply the bound to existing non-FP schedulability analysis methods for better schedulability. 相似文献
994.
995.
采用随机有限断层法生成最大可信地震 总被引:2,自引:0,他引:2
本文依据基于地震学理论合成地震动的随机方法和能够细致描述震源复杂性的有限断层模型,采用随机有限断层法直接生成最大可信地震。重点比较了随机有限断层法的静拐角频率和动拐角频率理论,开发基于静拐角频率方法的Fortran程序SFFMSIM,作为对比,引进了动拐角频率程序EXSIM。选用1994年Northridge地震数据检验本文采用的随机有限断层模拟方法和程序。最后以大岗山水电站工程为例,采用随机有限断层法生成磨西断裂发震时工程场址可能产生的最大可信地震的加速度时程曲线。结果显示:随机有限断层法合成时程的放大系数谱均值与80条基岩记录平均谱的一致性较好。预测震源位错分布形式未知的地震时,动拐角频率和静拐角频率方法的模拟结果有差异。 相似文献
996.
997.
998.
亭子口重力坝坝基岩层近于水平,分布有各类软弱夹层。为科学评价其坝体结构抗震安全性与地震动力抗滑稳定性,采用黏弹性人工边界模拟地基辐射阻尼效应,以有厚度接触单元模拟坝基软弱夹层,对亭子口重力坝的表孔坝段进行了三维有限元时程动力分析。计算结果表明,在水工抗震规范谱人工地震波作用下,大坝上下游表面产生了明显的动应力响应,但动静叠加后,坝体竖直向在地震过程中没有出现拉应力;以泥化夹层JS2-1-2为底滑面的滑动模式为大坝深层动力抗滑稳定的控制工况,设置齿槽后大坝动力深层抗滑稳定性显著提高,大坝在地震过程中不会发生整体失稳。 相似文献
999.
1000.