首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   71669篇
  免费   3932篇
  国内免费   2776篇
电工技术   5640篇
技术理论   19篇
综合类   8117篇
化学工业   2399篇
金属工艺   837篇
机械仪表   2986篇
建筑科学   13169篇
矿业工程   3051篇
能源动力   1895篇
轻工业   1873篇
水利工程   4248篇
石油天然气   1766篇
武器工业   304篇
无线电   6082篇
一般工业技术   3546篇
冶金工业   4999篇
原子能技术   456篇
自动化技术   16990篇
  2024年   114篇
  2023年   479篇
  2022年   986篇
  2021年   1368篇
  2020年   1523篇
  2019年   1070篇
  2018年   992篇
  2017年   1348篇
  2016年   1719篇
  2015年   1940篇
  2014年   5903篇
  2013年   4698篇
  2012年   5269篇
  2011年   5643篇
  2010年   4385篇
  2009年   4683篇
  2008年   4690篇
  2007年   5659篇
  2006年   4859篇
  2005年   4121篇
  2004年   3550篇
  2003年   3157篇
  2002年   2489篇
  2001年   1815篇
  2000年   1402篇
  1999年   1047篇
  1998年   718篇
  1997年   536篇
  1996年   423篇
  1995年   360篇
  1994年   267篇
  1993年   198篇
  1992年   134篇
  1991年   106篇
  1990年   68篇
  1989年   94篇
  1988年   72篇
  1987年   35篇
  1986年   68篇
  1985年   73篇
  1984年   74篇
  1983年   82篇
  1982年   24篇
  1981年   19篇
  1980年   11篇
  1979年   13篇
  1977年   14篇
  1961年   7篇
  1960年   7篇
  1959年   9篇
排序方式: 共有10000条查询结果,搜索用时 0 毫秒
911.
随着越来越多多点投递应用的出现,由于Internet本身固有的异构性,分层多点投递将在Internet上得到广泛应用,这样,网络就面临着如何高效支持分层多点投递的问题,为了解决这一问题,给出一种支持分层多点投递的主动队列管理机制LMRED,其贡献主要有两点:(1)提出一种识别Internet中分层多点投递会话的机制,这是实现LMRED的基础;(2)对RED进行改进(改进后的RED称为LMRED),在报文随机丢弃的基础上实现优先级丢弃机制和预丢弃机制,LMRED具有公平性,稳定性和快速响应网络拥塞等特点,可以更好地适应分层多点投递的要求,并最终改善应用性能。  相似文献   
912.
基于C/S的工程数据库管理系统中事务管理子系统的设计   总被引:2,自引:0,他引:2  
廖国琼  李陶深 《计算机工程》2001,27(10):34-35,76
事务管理是分布式工程数据库管理系统中核心部分。介绍自行研制的基于C/S的工程数据库管理系统中事务管理子系统设计,包括其实现结构、原理以及功能模块设计。  相似文献   
913.
知识获取技术及其在网络智能故障诊断中的应用   总被引:3,自引:0,他引:3  
基于遗传算法提出了一种新型的机器学习方法,它利用遗传算法的全局寻优手段,为解决知识获取这一瓶颈问题另辟捷径。论述了该方法的原理及其实现过程,并且给出了网络故障诊断应用实例,证明了它的有效性。  相似文献   
914.
过程建模的Petri网模型   总被引:1,自引:0,他引:1  
工作流管理的问题由于广泛存在于计算机应用的许多方面而迅速得到发展。本文介绍了一个以扩展的Petri网作为建模工具、以消息队列作为执行机制实现的过程管理的原型系统。该模型描述了活动的并发执行和依赖关系、活动激发的条件、事件顺序及文档管理等信息。执行该模型,在分布、异构、自治的环境中可自动监视、管理和调度工作任务,为业务过程重组、业务过程自动化提供了有力的支持。  相似文献   
915.
916.
Real-time scheduling for energy harvesting sensor nodes   总被引:1,自引:1,他引:0  
Energy harvesting has recently emerged as a feasible option to increase the operating time of sensor networks. If each node of the network, however, is powered by a fluctuating energy source, common power management solutions have to be reconceived. This holds in particular if real-time responsiveness of a given application has to be guaranteed. Task scheduling at the single nodes should account for the properties of the energy source, capacity of the energy storage as well as deadlines of the single tasks. We show that conventional scheduling algorithms (like e.g. EDF) are not suitable for this scenario. Based on this motivation, we have constructed optimal scheduling algorithms that jointly handle constraints from both energy and time domain. Further we present an admittance test that decides for arbitrary task sets, whether they can be scheduled without deadline violations. To this end, we introduce the concept of energy variability characterization curves (EVCC) which nicely captures the dynamics of various energy sources. Simulation results show that our algorithms allow significant reductions of the battery size compared to Earliest Deadline First scheduling.
Clemens MoserEmail:
  相似文献   
917.
This study explores how value congruence contributes to the formation of trust in e-businesses, and how trust and value congruence influence consumers to share personal information. It is hypothesized that the perceived values of organizations regarding moral, social, environmental and political causes can have an effect on the trusting beliefs of e-commerce consumers and their willingness to disclose private personal information. A total of 775 subjects rated their perceived value congruence with organizations, their trusting beliefs, and the types of information they would be willing to disclose. This study finds that value congruence not only plays a role in mediating the trust of consumers for the organizations, but it also has a strong effect on determining their willingness to disclose personal information. In some cases, the influence of value congruence is greater than that of trust, even though trust has been touted in the literature as one of the most important factors in e-commerce. This research expands prior work by using structural equation modeling to test the relative strength of the effect of value congruence on each dimension of trust and the overall trust level, as well as its direct effect on behavioral intentions in terms of information sharing for non-profit and for-profit organizations.
Robert D. St. LouisEmail:
  相似文献   
918.
Distributed authorization is an essential issue in computer security. Recent research shows that trust management is a promising approach for the authorization in distributed environments. There are two key issues for a trust management system: how to design an expressive high-level policy language and how to solve the compliance-checking problem (Blaze et al. in Proceedings of the Symposium on Security and Privacy, pp. 164–173, 1996; Proceedings of 2nd International Conference on Financial Cryptography (FC’98). LNCS, vol.1465, pp. 254–274, 1998), where ordinary logic programming has been used to formalize various distributed authorization policies (Li et al. in Proceedings of the 2002 IEEE Symposium on Security and Privacy, pp. 114–130, 2002; ACM Trans. Inf. Syst. Secur. (TISSEC) 6(1):128–171, 2003). In this paper, we employ Answer Set Programming to deal with many complex issues associated with the distributed authorization along the trust management approach. In particular, we propose a formal authorization language providing its semantics through Answer Set Programming. Using language , we cannot only express nonmonotonic delegation policies which have not been considered in previous approaches, but also represent the delegation with depth, separation of duty, and positive and negative authorizations. We also investigate basic computational properties related to our approach. Through two case studies. we further illustrate the application of our approach in distributed environments.  相似文献   
919.
This paper reports on an ergonomic study carried out during the design of a cutting machine-tool for the composite material in carbody parts casting. During this design process, the users’ needs were inferred by the designers on the basis of their own mental representations of the use of the new device. These representations of the users’ needs, correct or false, play a decisive role in the choice of a solution. The aim of the study is to identify their particularity. Analyzing the design meetings, we have highlighted that users are considered either as subsystems or basic design principles or elements of an imagined scenario. We have shown that these representations are linked to the types of meetings held during the design process. Accordingly, a diversification of the types of meetings should be promoted by the project leader, so that designers extend their points of view of the operators.  相似文献   
920.
一个基于持续消息的分布式工作流管理模型   总被引:5,自引:2,他引:3  
提出了一种新的分布式结构,在这个结构中,排除了工作流系统对一个集中式数据库的依赖,而是用持续消息的方法将与过程执行有关的信息存储起来,使过程的执行是完全分布式的,并且每个节点都是各自独立的。采用这种方式能增强对错误的恢复能力以及构造系统的灵活性和扩展性。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号