全文获取类型
收费全文 | 1792篇 |
免费 | 120篇 |
国内免费 | 90篇 |
专业分类
电工技术 | 63篇 |
综合类 | 128篇 |
化学工业 | 121篇 |
金属工艺 | 26篇 |
机械仪表 | 93篇 |
建筑科学 | 38篇 |
矿业工程 | 15篇 |
能源动力 | 10篇 |
轻工业 | 30篇 |
水利工程 | 9篇 |
石油天然气 | 17篇 |
武器工业 | 3篇 |
无线电 | 465篇 |
一般工业技术 | 56篇 |
冶金工业 | 43篇 |
原子能技术 | 3篇 |
自动化技术 | 882篇 |
出版年
2025年 | 8篇 |
2024年 | 12篇 |
2023年 | 10篇 |
2022年 | 23篇 |
2021年 | 21篇 |
2020年 | 33篇 |
2019年 | 23篇 |
2018年 | 22篇 |
2017年 | 23篇 |
2016年 | 36篇 |
2015年 | 43篇 |
2014年 | 92篇 |
2013年 | 80篇 |
2012年 | 99篇 |
2011年 | 128篇 |
2010年 | 126篇 |
2009年 | 106篇 |
2008年 | 112篇 |
2007年 | 151篇 |
2006年 | 138篇 |
2005年 | 131篇 |
2004年 | 120篇 |
2003年 | 86篇 |
2002年 | 82篇 |
2001年 | 53篇 |
2000年 | 34篇 |
1999年 | 29篇 |
1998年 | 30篇 |
1997年 | 14篇 |
1996年 | 25篇 |
1995年 | 17篇 |
1994年 | 16篇 |
1993年 | 8篇 |
1992年 | 7篇 |
1991年 | 12篇 |
1990年 | 6篇 |
1989年 | 6篇 |
1988年 | 5篇 |
1987年 | 5篇 |
1985年 | 2篇 |
1984年 | 3篇 |
1982年 | 4篇 |
1981年 | 2篇 |
1980年 | 4篇 |
1979年 | 2篇 |
1978年 | 4篇 |
1973年 | 2篇 |
1965年 | 1篇 |
1963年 | 1篇 |
1961年 | 1篇 |
排序方式: 共有2002条查询结果,搜索用时 15 毫秒
11.
12.
In many applications, wireless ad-hoc networks are formed by devices belonging to independent users. Therefore, a challenging
problem is how to provide incentives to stimulate cooperation. In this paper, we study ad-hoc games—the routing and packet forwarding games in wireless ad-hoc networks. Unlike previous work which focuses either on routing
or on forwarding, this paper investigates both routing and forwarding. We first uncover an impossibility result—there does
not exist a protocol such that following the protocol to always forward others' traffic is a dominant action. Then we define a novel solution concept called cooperation-optimal protocols. We present Corsac, a cooperation-optimal protocol which consists of a routing protocol and a forwarding protocol. The routing
protocol of Corsac integrates VCG with a novel cryptographic technique to address the challenge in wireless ad-hoc networks
that a link’s cost (i.e., its type) is determined by two nodes together. Corsac also applies efficient cryptographic techniques to design a forwarding protocol
to enforce the routing decision, such that fulfilling the routing decision is the optimal action of each node in the sense that it brings the maximum utility to the node. We evaluate our protocols using simulations.
Our evaluations demonstrate that our protocols provide incentives for nodes to forward packets. Additionally, we discuss the
challenging issues in designing incentive-compatible protocols in ad hoc networks.
Part of this paper appeared in a conference version [49]. Sheng Zhong was supported in part by NSF grants ANI-0207399 and
CNS-0524030. Yang Richard Yang was supported in part by NSF grants ANI-0207399, ANI-0238038, and CNS-0435201. This work was
partly done while Sheng Zhong was at Yale University; Yanbin Liu was at University of Texas at Austin.
Sheng Zhong is an assistant professor in the State University of New York at Buffalo. He received his PhD (2004) from Yale University
and his ME (1999), BS (1996) from Nanjing University, China, all in computer science. His research interests include economic
incentives and privacy protection, particularly incentive and privacy problems in mobile computing and data mining.
Li Erran Li received his B.E. in Automatic Control from Beijing Polytechnic University in 1993, his M.E. in Pattern Recognition from
the Institute of Automation, Chinese Academy of Sciences, in 1996, and his Ph.D. in Computer Science from Cornell University
in 2001 where Joseph Y. Halpern was his advisor. He is presently a member of the Networking Research Center in Bell Labs.
His research interests are in networking with a focus on wireless networking and mobile computing. He has served as a program
committee member for several conferences including ACM MobiCom, ACM MobiHoc, IEEE INFOCOM and IEEE ICNP. He is a guest editor
for JSAC special issue on Non-Cooperative Behavior in Networking. He has published over 30 papers.
Yanbin Liu received her B.E. degree in Computer Science and Technology from Tsinghua University (1993), Beijing, China, in 1993, and
her M.S. degree in Computer Science from the University of Texas at Austin (1998), where is a Ph.D. candidate. Since 2006,
he has been with IBM TJ Watson Research Center, Hawthorne, NY. Her research interests are in real-time systems, grid computing,
mobile computing, and computer networks.
Yang Richard Yang received his B.E. degree in Computer Science and Technology from Tsinghua University, Beijing, China, in 1993, and his M.S.
and Ph.D. degrees in Computer Science from the University of Texas at Austin in 1998 and 2001, respectively. Since 2001, he
has been with the Department of Computer Science, Yale University, New Haven, CT, where currently he is an Associate Professor.
His current research interests are in computer networks, mobile computing, and sensor networks. He leads the Laboratory of
Networked Systems (LANS) at Yale University. 相似文献
13.
14.
为了将烟包由包装机出口高度提升到高架通道高度,通常采用爬坡通道输送烟包,但该方式存在着压轮易损坏烟包头部等问题。为此设计了烟包输送气流提升装置,通过压缩机提供高压空气进入导风架内,在风道中形成稳定气流加速提升烟包到高架通道。ZB45包装机实际应用表明,气流提升装置能够顺利地将烟包吹送到指定高度,且对烟包外观没有损坏,且提升速度快,结构简单。 相似文献
15.
热熔型道路反光标志涂料 总被引:2,自引:0,他引:2
介绍了一种热熔型道路反光椟示涂料的制备过程、经测试,它具有优良的耐久、快干和反光性能,其主要性能指标达到或超过日本JIS_K-5665同类涂料的工业标准。 相似文献
16.
Steven C. Peterson 《Journal of chemical ecology》1988,14(3):815-824
Chemical trail marking and following by gregarious caterpillars,Malacosoma neustria L. (Lepidoptera: Lasiocampidae), was studied in the laboratory. As in other species ofMalacosoma, larvae deposit a trail pheromone from a sternal secretory site when searching the host for food. Larvae in the vanguard of foraging columns establish chemical trails as they explore new territory. Marking behavior diminishes as successive unfed foragers utilize the trail. These exploratory trails are subsequently overmarked by fed larvae returning to the tent. Other foragers follow the trails of fed larvae in preference to trails of unfed larvae. Thus, like the eastern tent caterpillar,M. americanum, successful foragers ofM. neustria recruit colony-mates to feeding sites. The chemical activity of both recruitment and exploratory trails degrades slowly, suggesting that the trail pheromone ofM. neustria is a nonvolatile substance. Caterpillars ofM. neustria readily follow the nonvolatile trail pheromone which has been identified fromM. americanum, 5-cholestane-3,24-dione. 相似文献
17.
18.
对连接条零件进行了冲压工艺分析 ,介绍了实现该零件冲压工艺的冲孔、落料、压字复合模结构 ,并分析了模具工作过程及压字凸模的结构。 相似文献
19.
In this work a glass ceramic substrate was processed by focusing a laser beam inside the said material. The crystal phase within the amorphous matrix provides mechanical properties to the glass ceramic substrate in such a way that dots can be patterned inside the fore-mentioned material without producing any cracks. These marks are made up of crystals, the growth of which has been induced by the laser beam. These inner structures can modify the optical, thermal and mechanical properties of the glass ceramic substrate.A Q-switched Nd:YAG laser at its fundamental wavelength of 1064 nm with pulsewidths in the nanosecond range has been used.Morphology, composition, microstructure, mechanical and thermal properties of the processed material are described. 相似文献
20.
The crystallography of martensite formed in 0.2C-2.0Mn-1.5Si-0.6Cr steel was studied using the electron backscattered diffraction(EBSD) technique.The results showed that the observed orientation relationship(OR) was closer to that of Nishiyama-Wassermann(N-W) than Kurdjumov-Sachs.The martensite consisted of parallel laths forming morphological packets.Typically,there were three different lath orientations in a morphological packet consisting of three specific N-W OR variants sharing the same {111} austenite plane.A packet of martensite laths with a common {111} austenite plane was termed a crystallographic packet.Generally,the crystallographic packet size corresponded to the morphological packet size,but occasionally the morphological packet was found to consist of two or more crystallographic packets.Therefore,the crystallographic packet size appeared to be finer than the morphological packet size.The relative orientation between the variants in crystallographic packets was found to be near 60 /<110>,which explains the strong peak observed near 60 in the grain boundary misorientation distribution.Martensite also contained a high fraction of boundaries with a misorientation in the range 2.5-8.Typically these boundaries were found to be located inside the martensite laths forming sub-laths. 相似文献