全文获取类型
收费全文 | 1923篇 |
免费 | 263篇 |
国内免费 | 288篇 |
专业分类
电工技术 | 18篇 |
综合类 | 319篇 |
化学工业 | 103篇 |
金属工艺 | 4篇 |
机械仪表 | 27篇 |
建筑科学 | 177篇 |
矿业工程 | 3篇 |
能源动力 | 5篇 |
轻工业 | 61篇 |
水利工程 | 4篇 |
石油天然气 | 5篇 |
武器工业 | 3篇 |
无线电 | 128篇 |
一般工业技术 | 78篇 |
冶金工业 | 46篇 |
原子能技术 | 1篇 |
自动化技术 | 1492篇 |
出版年
2024年 | 7篇 |
2023年 | 28篇 |
2022年 | 36篇 |
2021年 | 41篇 |
2020年 | 41篇 |
2019年 | 22篇 |
2018年 | 40篇 |
2017年 | 45篇 |
2016年 | 43篇 |
2015年 | 60篇 |
2014年 | 90篇 |
2013年 | 112篇 |
2012年 | 149篇 |
2011年 | 138篇 |
2010年 | 134篇 |
2009年 | 135篇 |
2008年 | 161篇 |
2007年 | 168篇 |
2006年 | 143篇 |
2005年 | 143篇 |
2004年 | 94篇 |
2003年 | 84篇 |
2002年 | 101篇 |
2001年 | 78篇 |
2000年 | 48篇 |
1999年 | 57篇 |
1998年 | 41篇 |
1997年 | 29篇 |
1996年 | 30篇 |
1995年 | 35篇 |
1994年 | 24篇 |
1993年 | 14篇 |
1992年 | 22篇 |
1991年 | 5篇 |
1990年 | 7篇 |
1989年 | 7篇 |
1988年 | 4篇 |
1986年 | 2篇 |
1985年 | 9篇 |
1984年 | 7篇 |
1983年 | 2篇 |
1982年 | 5篇 |
1981年 | 3篇 |
1980年 | 4篇 |
1979年 | 5篇 |
1978年 | 2篇 |
1977年 | 5篇 |
1976年 | 4篇 |
1975年 | 2篇 |
1973年 | 3篇 |
排序方式: 共有2474条查询结果,搜索用时 31 毫秒
91.
在研究传统的发布/订阅消息中间件系统的基础之上,结合Gossip协议的特点来研究发布/订阅消息中间件,最后运用形式化方法,通过PRISM仿真工具,对仿真的模型进行形式化分析.实验结果表明,发布/订阅消息中间件系统的实时性受消息产生速度的影响,在各个订阅者订阅相同消息和不同消息两种情况之下网络特性展现不同的变化,但最终都是随着消息产生速度的增加而减小.可靠性随着消息产生速度的增加而减小,并且订阅者的接收缓存越大可靠性越高,但增幅率会越来越小.该实验模型和实验方法对于发布/订阅消息中间件系统的研究,以及在现实环境中配置系统的相关参数有一定的帮助. 相似文献
92.
葛琳 《徐州工程学院学报》2006,21(8):103-104
多媒体在高等数学教学中的作用一直以来倍受争议。本文从学习兴趣、数学美、数学建模以及留有思维空间等几个方面对多媒体在高等数学教学中的作用做一个初步的探讨。 相似文献
93.
迟英楠 《平顶山工学院学报》2006,15(5):1-3
随着我国城市的日益繁荣,城市形象成为令人关注的文化资本。为了改善形象,促进经济发展,城市设计作为城市规划与建筑设计衔接的重要阶段,也日趋成熟。但是,目前的设计似乎都存在重形式、轻本质的现象。本文从文化与美两个角度,结合实际案例阐述设计的本质,以求对城市设计的实践有所裨益。 相似文献
94.
研究在安全协议仅使用数据完整性算法时,形式化分析方法中形式化攻击者能力描述的计算可靠性,首先假设计算性攻击者的能力超过形式化攻击者的能力,然后构造攻击实验,进而论证攻击实验中计算攻击者的输出与签名算法或密钥杂凑函数的安全定义相矛盾。因此得出计算性攻击者所能生成的消息均属于形式化攻击者所能生成的消息闭集这一结论,基于该结论,可以构建或者改进形式化分析系统,使其具有计算可靠性。 相似文献
95.
This study extends the literature on eating disorder symptomatology by testing, based on extant literature on objectification theory (B. L. Fredrickson & T. Roberts, 1997) and the role of sociocultural standards of beauty (e.g., L. J. Heinberg, J. K. Thompson, & S. Stormer, 1995), a model that examines (a) links of reported sexual objectification experiences to eating disorder-related variables and (b) the mediating roles of body surveillance, body shame, and internalization of sociocultural standards of beauty. Consistent with hypotheses, with a sample of 221 young women, support was found for a model in which (a) internalization of sociocultural standards of beauty mediated the links of sexual objectification experiences to body surveillance, body shame, and eating disorder symptoms, (b) body surveillance was an additional mediator of the link of reported sexual objectification experiences to body shame, and (c) body shame mediated the links of internalization and body surveillance to disordered eating. (PsycINFO Database Record (c) 2010 APA, all rights reserved) 相似文献
96.
97.
Characterizing Grids: Attributes, Definitions, and Formalisms 总被引:11,自引:0,他引:11
Grid systems and technologies have evolved over nearly a decade; yet, there is still no widely accepted definition for Grids. In particular, the essential attributes that distinguish Grids from other distributed computing environments have not been articulated. Most approaches to definition adopt a static view and consider only the properties and components of, or the applications supported by, Grids. The definition proposed in this paper is based on the runtime semantics of distributed systems. Rather than attempt to simply compare static characteristics of Grids and other distributed computing environments, this paper analyzes operational differences, from the viewpoint of an application executing in both environments. Our definition is expressed formally as an Abstract State Machine that facilitates the analysis of existing Grid systems or the design of new ones with rigor and precision. This new, semantical approach proposes an alternative to the currently accepted models for determining whether or not a distributed system is a Grid. 相似文献
98.
99.
This paper is concerned with methods for refinement of specifications written using a combination of Object-Z and CSP. Such a combination has proved to be a suitable vehicle for specifying complex systems which involve state and behaviour, and several proposals exist for integrating these two languages. The basis of the integration in this paper is a semantics of Object-Z classes identical to CSP processes. This allows classes specified in Object-Z to be combined using CSP operators. It has been shown that this semantic model allows state-based refinement relations to be used on the Object-Z components in an integrated Object-Z/CSP specification. However, the current refinement methodology does not allow the structure of a specification to be changed in a refinement, whereas a full methodology would, for example, allow concurrency to be introduced during the development life-cycle. In this paper, we tackle these concerns and discuss refinements of specifications written using Object-Z and CSP where we change the structure of the specification when performing the refinement. In particular, we develop a set of structural simulation rules which allow single components to be refined to more complex specifications involving CSP operators. The soundness of these rules is verified against the common semantic model and they are illustrated via a number of examples. 相似文献
100.
Magdy S. Abadir Kenneth L. Albin John Havlicek Narayanan Krishnamurthy Andrew K. Martin 《Formal Methods in System Design》2003,22(2):117-123
Formal tools are either too labor intensive or are completely impractical for industrial-size problems. This paper describes two formal verification tools used within Motorola, Versys2 and CBV, that challenge this assertion. The two tools are being used in current design verification flows and have shown that it is possible to seamlessly integrate formal tools into existing design flows. 相似文献