全文获取类型
收费全文 | 9588篇 |
免费 | 391篇 |
国内免费 | 442篇 |
专业分类
电工技术 | 465篇 |
综合类 | 1057篇 |
化学工业 | 476篇 |
金属工艺 | 315篇 |
机械仪表 | 541篇 |
建筑科学 | 545篇 |
矿业工程 | 166篇 |
能源动力 | 453篇 |
轻工业 | 268篇 |
水利工程 | 50篇 |
石油天然气 | 107篇 |
武器工业 | 70篇 |
无线电 | 1489篇 |
一般工业技术 | 1020篇 |
冶金工业 | 294篇 |
原子能技术 | 88篇 |
自动化技术 | 3017篇 |
出版年
2024年 | 27篇 |
2023年 | 64篇 |
2022年 | 133篇 |
2021年 | 202篇 |
2020年 | 186篇 |
2019年 | 122篇 |
2018年 | 146篇 |
2017年 | 189篇 |
2016年 | 219篇 |
2015年 | 258篇 |
2014年 | 572篇 |
2013年 | 596篇 |
2012年 | 614篇 |
2011年 | 768篇 |
2010年 | 524篇 |
2009年 | 618篇 |
2008年 | 607篇 |
2007年 | 699篇 |
2006年 | 590篇 |
2005年 | 498篇 |
2004年 | 537篇 |
2003年 | 482篇 |
2002年 | 426篇 |
2001年 | 305篇 |
2000年 | 222篇 |
1999年 | 161篇 |
1998年 | 113篇 |
1997年 | 88篇 |
1996年 | 91篇 |
1995年 | 73篇 |
1994年 | 64篇 |
1993年 | 36篇 |
1992年 | 33篇 |
1991年 | 29篇 |
1990年 | 23篇 |
1989年 | 14篇 |
1988年 | 18篇 |
1987年 | 13篇 |
1986年 | 7篇 |
1985年 | 4篇 |
1984年 | 8篇 |
1983年 | 3篇 |
1981年 | 3篇 |
1979年 | 3篇 |
1971年 | 3篇 |
1965年 | 4篇 |
1963年 | 3篇 |
1961年 | 5篇 |
1959年 | 3篇 |
1954年 | 2篇 |
排序方式: 共有10000条查询结果,搜索用时 8 毫秒
61.
《Information Security Journal: A Global Perspective》2013,22(1):33-44
ABTRACT A process overload attack is an attack on a shared computer system in which a user repeatedly forks new processes and hence makes the system unusable for others. The specific problem we address is seen in an academic environment where student programs create unintentional process overload attacks in UNIX systems by careless coding. Instead of rebooting the system or manually examining and killing the processes, our approach to dealing with these attacks was to build a process load monitoring tool to detect and kill these processes automatically. This paper focuses on what we learned about the behaviors of different fork bombs, how we classified them based on their self-replicating capabilities, and our experience with detecting, killing and cleaning these unwanted processes. 相似文献
62.
Abstract In this paper, we identify processes associated with “Tactical IT-Business Alignment”, illustrate four types of alignment states resulting from “strategic” and “tactical” alignment levels, and propose alignment-related managerial actions appropriate for each type. Our results are based on about 45 hours of interviews with about 30 senior, middle and junior managers from IS and other functions, and from company records, in an investigation of four organizations. 相似文献
63.
Johnny Jiung-Yee Lee Taylor Randall Paul Jen-Hwa Hu Anne Wu 《Information Systems Management》2013,30(4):340-352
Prior research has documented that IT investment increases market returns. Economic theories predict such returns to be recognized in accounting profitability; this relationship remains ambiguous in prior literature. We reexamine the relationship between IT investment and firm profitability. Our approach is unique in that we examine complementarities between distinct IT components. We document that a firm’s investments in IT components exhibit different impacts on its profitability conditional on the level of investments in complementary components. 相似文献
64.
The specifics of business intelligence systems compared to operational IS motivate the necessity to research the business intelligence systems acceptance determinants separately. The authors followed an exploratory approach in order to conceptualize a business intelligence acceptance model. Their findings show that in the Business Intelligence Systems context, there is a significant emphasis on organizational factors, such as result demonstrability, social influence, and facilitating conditions with sufficient resources that help build an adequate information culture all substantially influencing the effective acceptance of business intelligence systems. 相似文献
65.
Johnny Jiung-Yee Lee 《Information Systems Management》2013,30(4):364-371
Abstract This paper focuses on developing economic theory on the interrelation between information technology investment components. Three functional forms to model the joint effects between components of investment on firm accounting profitability are identified and empirically tested. The results suggest that the complementarities between components of IT investment can be best modeled by using the multiplicative functional forms, providing a framework to model the joint effects of different factors that impact firm profitability. 相似文献
66.
智慧城市建设如火如荼地开展,作为民生类代表应用的智慧安居成为各地智慧城市建设的重点.本文从智慧安居内涵和需求评估入手,重点对智慧安居解决方案、关键成功要素以及实施建议展开讨论,以期给智慧安居实施提供参考借鉴. 相似文献
67.
基于移动互联网的特点对电信业务支撑系统进行研究,通过分析业务支撑系统的业务模型和功能,阐述了移动互联网对电信业务支撑系统带来的影响以及应对措施。 相似文献
68.
论述了如何正确选择电子元器件和正确使用电子元器件对电子装置可靠性的影响,同时也论述了正确布线提高系统可靠性问题及电子装置箱体设计应考虑的问题。 相似文献
69.
70.
移动平台的下载业务是除消息类业务外另一类重要的移动增值数据服务,对下载过程的有效管理和控制是该业务稳定运营的前提。下载数据的完整性是下载业务的核心内容。描述了移动平台下载业务内容完整性校验方案。提出了Merkle树在移动平台内容完整性校验上的实现策略,该策略通过缩短校验值在网络传输中的大小,来有效减少完整性校验的代价。理论分析与工程项目证明,该机制具有较高的安全连通性和较低的网络延迟。 相似文献