全文获取类型
收费全文 | 71669篇 |
免费 | 3932篇 |
国内免费 | 2776篇 |
专业分类
电工技术 | 5640篇 |
技术理论 | 19篇 |
综合类 | 8117篇 |
化学工业 | 2399篇 |
金属工艺 | 837篇 |
机械仪表 | 2986篇 |
建筑科学 | 13169篇 |
矿业工程 | 3051篇 |
能源动力 | 1895篇 |
轻工业 | 1873篇 |
水利工程 | 4248篇 |
石油天然气 | 1766篇 |
武器工业 | 304篇 |
无线电 | 6082篇 |
一般工业技术 | 3546篇 |
冶金工业 | 4999篇 |
原子能技术 | 456篇 |
自动化技术 | 16990篇 |
出版年
2024年 | 114篇 |
2023年 | 479篇 |
2022年 | 986篇 |
2021年 | 1368篇 |
2020年 | 1523篇 |
2019年 | 1070篇 |
2018年 | 992篇 |
2017年 | 1348篇 |
2016年 | 1719篇 |
2015年 | 1940篇 |
2014年 | 5903篇 |
2013年 | 4698篇 |
2012年 | 5269篇 |
2011年 | 5643篇 |
2010年 | 4385篇 |
2009年 | 4683篇 |
2008年 | 4690篇 |
2007年 | 5659篇 |
2006年 | 4859篇 |
2005年 | 4121篇 |
2004年 | 3550篇 |
2003年 | 3157篇 |
2002年 | 2489篇 |
2001年 | 1815篇 |
2000年 | 1402篇 |
1999年 | 1047篇 |
1998年 | 718篇 |
1997年 | 536篇 |
1996年 | 423篇 |
1995年 | 360篇 |
1994年 | 267篇 |
1993年 | 198篇 |
1992年 | 134篇 |
1991年 | 106篇 |
1990年 | 68篇 |
1989年 | 94篇 |
1988年 | 72篇 |
1987年 | 35篇 |
1986年 | 68篇 |
1985年 | 73篇 |
1984年 | 74篇 |
1983年 | 82篇 |
1982年 | 24篇 |
1981年 | 19篇 |
1980年 | 11篇 |
1979年 | 13篇 |
1977年 | 14篇 |
1961年 | 7篇 |
1960年 | 7篇 |
1959年 | 9篇 |
排序方式: 共有10000条查询结果,搜索用时 0 毫秒
911.
随着越来越多多点投递应用的出现,由于Internet本身固有的异构性,分层多点投递将在Internet上得到广泛应用,这样,网络就面临着如何高效支持分层多点投递的问题,为了解决这一问题,给出一种支持分层多点投递的主动队列管理机制LMRED,其贡献主要有两点:(1)提出一种识别Internet中分层多点投递会话的机制,这是实现LMRED的基础;(2)对RED进行改进(改进后的RED称为LMRED),在报文随机丢弃的基础上实现优先级丢弃机制和预丢弃机制,LMRED具有公平性,稳定性和快速响应网络拥塞等特点,可以更好地适应分层多点投递的要求,并最终改善应用性能。 相似文献
912.
基于C/S的工程数据库管理系统中事务管理子系统的设计 总被引:2,自引:0,他引:2
事务管理是分布式工程数据库管理系统中核心部分。介绍自行研制的基于C/S的工程数据库管理系统中事务管理子系统设计,包括其实现结构、原理以及功能模块设计。 相似文献
913.
914.
过程建模的Petri网模型 总被引:1,自引:0,他引:1
工作流管理的问题由于广泛存在于计算机应用的许多方面而迅速得到发展。本文介绍了一个以扩展的Petri网作为建模工具、以消息队列作为执行机制实现的过程管理的原型系统。该模型描述了活动的并发执行和依赖关系、活动激发的条件、事件顺序及文档管理等信息。执行该模型,在分布、异构、自治的环境中可自动监视、管理和调度工作任务,为业务过程重组、业务过程自动化提供了有力的支持。 相似文献
915.
916.
Real-time scheduling for energy harvesting sensor nodes 总被引:1,自引:1,他引:0
Energy harvesting has recently emerged as a feasible option to increase the operating time of sensor networks. If each node
of the network, however, is powered by a fluctuating energy source, common power management solutions have to be reconceived.
This holds in particular if real-time responsiveness of a given application has to be guaranteed. Task scheduling at the single
nodes should account for the properties of the energy source, capacity of the energy storage as well as deadlines of the single
tasks. We show that conventional scheduling algorithms (like e.g. EDF) are not suitable for this scenario. Based on this motivation,
we have constructed optimal scheduling algorithms that jointly handle constraints from both energy and time domain. Further
we present an admittance test that decides for arbitrary task sets, whether they can be scheduled without deadline violations.
To this end, we introduce the concept of energy variability characterization curves (EVCC) which nicely captures the dynamics
of various energy sources. Simulation results show that our algorithms allow significant reductions of the battery size compared
to Earliest Deadline First scheduling.
相似文献
Clemens MoserEmail: |
917.
Joseph A. Cazier Benjamin B. M. Shao Robert D. St. Louis 《Information Systems Frontiers》2007,9(5):515-529
This study explores how value congruence contributes to the formation of trust in e-businesses, and how trust and value congruence
influence consumers to share personal information. It is hypothesized that the perceived values of organizations regarding
moral, social, environmental and political causes can have an effect on the trusting beliefs of e-commerce consumers and their
willingness to disclose private personal information. A total of 775 subjects rated their perceived value congruence with
organizations, their trusting beliefs, and the types of information they would be willing to disclose. This study finds that
value congruence not only plays a role in mediating the trust of consumers for the organizations, but it also has a strong
effect on determining their willingness to disclose personal information. In some cases, the influence of value congruence
is greater than that of trust, even though trust has been touted in the literature as one of the most important factors in
e-commerce. This research expands prior work by using structural equation modeling to test the relative strength of the effect
of value congruence on each dimension of trust and the overall trust level, as well as its direct effect on behavioral intentions
in terms of information sharing for non-profit and for-profit organizations.
相似文献
Robert D. St. LouisEmail: |
918.
Distributed authorization is an essential issue in computer security. Recent research shows that trust management is a promising
approach for the authorization in distributed environments. There are two key issues for a trust management system: how to
design an expressive high-level policy language and how to solve the compliance-checking problem (Blaze et al. in Proceedings
of the Symposium on Security and Privacy, pp. 164–173, 1996; Proceedings of 2nd International Conference on Financial Cryptography
(FC’98). LNCS, vol.1465, pp. 254–274, 1998), where ordinary logic programming has been used to formalize various distributed
authorization policies (Li et al. in Proceedings of the 2002 IEEE Symposium on Security and Privacy, pp. 114–130, 2002; ACM
Trans. Inf. Syst. Secur. (TISSEC) 6(1):128–171, 2003). In this paper, we employ Answer Set Programming to deal with many complex
issues associated with the distributed authorization along the trust management approach. In particular, we propose a formal
authorization language providing its semantics through Answer Set Programming. Using language , we cannot only express nonmonotonic delegation policies which have not been considered in previous approaches, but also
represent the delegation with depth, separation of duty, and positive and negative authorizations. We also investigate basic
computational properties related to our approach. Through two case studies. we further illustrate the application of our approach
in distributed environments. 相似文献
919.
This paper reports on an ergonomic study carried out during the design of a cutting machine-tool for the composite material in carbody parts casting. During this design process, the users’ needs were inferred by the designers on the basis of their own mental representations of the use of the new device. These representations of the users’ needs, correct or false, play a decisive role in the choice of a solution. The aim of the study is to identify their particularity. Analyzing the design meetings, we have highlighted that users are considered either as subsystems or basic design principles or elements of an imagined scenario. We have shown that these representations are linked to the types of meetings held during the design process. Accordingly, a diversification of the types of meetings should be promoted by the project leader, so that designers extend their points of view of the operators. 相似文献
920.
一个基于持续消息的分布式工作流管理模型 总被引:5,自引:2,他引:3
提出了一种新的分布式结构,在这个结构中,排除了工作流系统对一个集中式数据库的依赖,而是用持续消息的方法将与过程执行有关的信息存储起来,使过程的执行是完全分布式的,并且每个节点都是各自独立的。采用这种方式能增强对错误的恢复能力以及构造系统的灵活性和扩展性。 相似文献