首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   62374篇
  免费   7966篇
  国内免费   6291篇
电工技术   5521篇
技术理论   10篇
综合类   6789篇
化学工业   1403篇
金属工艺   725篇
机械仪表   3792篇
建筑科学   2474篇
矿业工程   1576篇
能源动力   831篇
轻工业   749篇
水利工程   1448篇
石油天然气   2922篇
武器工业   804篇
无线电   9834篇
一般工业技术   3123篇
冶金工业   1153篇
原子能技术   747篇
自动化技术   32730篇
  2024年   333篇
  2023年   906篇
  2022年   1862篇
  2021年   2287篇
  2020年   2469篇
  2019年   1893篇
  2018年   1702篇
  2017年   2101篇
  2016年   2401篇
  2015年   2721篇
  2014年   4301篇
  2013年   3872篇
  2012年   4611篇
  2011年   5022篇
  2010年   3867篇
  2009年   3782篇
  2008年   4278篇
  2007年   4830篇
  2006年   4064篇
  2005年   3617篇
  2004年   3124篇
  2003年   2622篇
  2002年   2008篇
  2001年   1517篇
  2000年   1295篇
  1999年   944篇
  1998年   719篇
  1997年   608篇
  1996年   502篇
  1995年   439篇
  1994年   356篇
  1993年   257篇
  1992年   175篇
  1991年   186篇
  1990年   135篇
  1989年   109篇
  1988年   88篇
  1987年   68篇
  1986年   61篇
  1985年   88篇
  1984年   58篇
  1983年   71篇
  1982年   61篇
  1981年   39篇
  1980年   20篇
  1979年   36篇
  1978年   15篇
  1977年   21篇
  1976年   19篇
  1959年   8篇
排序方式: 共有10000条查询结果,搜索用时 8 毫秒
131.
Verifiable Distributed Oblivious Transfer and Mobile Agent Security   总被引:1,自引:0,他引:1  
The mobile agent is a fundamental building block of the mobile computing paradigm. In mobile agent security, oblivious transfer (OT) from a trusted party can be used to protect the agent’s privacy and the hosts’ privacy. In this paper, we introduce a new cryptographic primitive called Verifiable Distributed Oblivious Transfer (VDOT), which allows us to replace a single trusted party with a group of threshold trusted servers. The design of VDOT uses a novel technique called consistency verification of encrypted secret shares. VDOT protects the privacy of both the sender and the receiver against malicious attacks of the servers. We also show the design of a system to apply VDOT to protect the privacy of mobile agents. Our design partitions an agent into the general portion and the security-sensitive portion. We also implement the key components of our system. As far as we know, this is the first effort to implement a system that protects the privacy of mobile agents. Our preliminary evaluation shows that protecting mobile agents not only is possible, but also can be implemented efficiently. This work was supported in part by the DoD University Research Initiative (URI) program administered by the Office of Naval Research under grant N00014-01-1-0795. Sheng Zhong was supported by ONR grant N00014-01-1-0795 and NSF grants ANI-0207399 and CCR-TC-0208972. Yang Richard Yang was supported in part by NSF grant ANI-0207399. A preliminary version of this paper was presented at the DialM-POMC Joint Workshop on Foundations of Mobile Computing in 2003. Sheng Zhong received his Ph.D. in computer science from Yale University in the year of 2004. He holds an assistant professor position at SUNY Buffalo and is currently on leave for postdoctoral research at the Center for Discrete Mathematics and Theoretical Computer Science (DIMACS). His research interests, on the practical side, are security and incentives in data mining, databases, and wireless networks. On the theoretical side, he is interested in cryptography and game theory. Yang Richard Yang is an Assistant Professor of Computer Science at Yale University. His research interests include computer networks, mobile computing, wireless networking, sensor networks, and network security. He leads the LAboratory of Networked Systems (LANS) at Yale. His recent awards include a Schlumberger Fellowship and a CAREER Award from the National Science Foundation. He received his B.E. degree from Tsinghua University (1993), and his M.S. and Ph.D. degrees from the University of Texas at Austin (1998 and 2001).  相似文献   
132.
Intelligent multisensor surveillance systems consist of several types of sensors, which are installed on fixed and mobile devices. These components provide a huge quantity of information that has to be contrasted, correlated and integrated in order to recognize and react on special situations. These systems work in highly dynamic environments, with severe security and robustness requirements. All these characteristics imply the need for distributed solutions. In these solutions, scattered components can decide and act with some degree of autonomy (for instance, if they become isolated), or cooperate and coordinate for a complete tracking of special situations. In order to cope with these requirements and to better structure the solution, we have decided to design surveillance system control as a multiagent system. This is done by applying an agent-orientated methodology, which is assessed with concrete scenarios.  相似文献   
133.
经对胜利油田近三年来典型井例测试资料分析评价及其增产措施效果分析认为,有三类地层压裂增油效果很好:地层物性相对较好的常压系统且存在严重堵塞的储层;物性较好的常压地层;高压低渗透储层。有两类地层酸化效果很好:灰岩、白云岩裂缝、低产低渗透储层;物性较好且存在严重污染堵塞的储层。其它地层压裂、酸化一般是无效的。  相似文献   
134.
Composite scale modeling in the presence of censored data   总被引:1,自引:1,他引:0  
A composite scale modeling approach can be used to combine several scales or variables into a single scale or variable. A typical application is to combine age and usage together to form a composite timescale model. The combined scale is expected to have better failure prediction capability than individual scales. Two typical models are the linear and multiplicative models. Their parameters are determined by minimizing the sample coefficient of variation of the composite scale. The minimum coefficient of variation is hard to apply in the presence of censored data. Another open issue is how to identify key variables when a number of variables are combined. This paper develops methods to handle these two issues. A numerical example is also included to illustrate the proposed methods.  相似文献   
135.
郭庆  顾学迈 《通信学报》1996,17(6):90-93
本文描述并分析了一种适用于多信道VSAT卫星数据通信网的报文传输协议,特别是考虑了无线信道误码率对传输协议的影响,分析表明利用S-RE-ALOHA作为预订信道的多址方式及按报文占用数据信道方法可以减小报文传输延时并增加系统吞吐量。  相似文献   
136.
本文根据欧拉方程对于连续层状介质进行了方程推导,得出一个波传播的射线路径公式,利用中 公式导出了VSP资料处理中的速度反演公式。  相似文献   
137.
用常规电阻率测井资料确定水淹层的剩余油饱和度   总被引:7,自引:0,他引:7  
韩清忠  率世和 《测井技术》1996,20(5):351-355
油田综合含水越来越高,利用电阻率测井资料确定地层的剩余油饱和度变得非常困难。针对这一问题,提出了确定地层水民阻率和含油饱和度的方法。(1)利用已知的地怪水分析资料,采用井下自然电位刻度,井间对经和双自然电位一方法来示准地层水混合电阻率,然后利用相邻井相同地层的电阻率对比方法求含水饱和度。(2)利用电阻率的横向探测特性,避开阿尔奇公式中m、a选择上的困难,采用横向法计算水淹层目前的含水饱和度。利用以  相似文献   
138.
A product database for a design and manufacturing enterprise serves as a repository for the data needed to manufacture a product. This paper discusses how an object-oriented persistent object manager named ROSE, under development at Rensselaer, has been used in the Rensselaer CIM program to develop a STEP/PDES-compliant product database for its research test bed. In so doing, it provides an overview of the requirements for a product database system in an integrated design and manufacturing facility, and it discusses how the chosen system meets these requirements.  相似文献   
139.
140.
描述了二流量试井工艺的实现,从常规分析和双对数曲线拟合两上方面,给出了二流量试井的资料解释分析方法,分析认为二流量试井同样可以计算出正常关井测压力恢复(或压力降落)资料所解释的油藏及流体参数。这种试井方法不但可以减少因正常关井测压对产油量和注水量的影响,而且可以减缓因突然关、开井造成的套管变形或损坏。实践证明,该试井技术方法具有较好的经济效益和应用前景。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号