全文获取类型
收费全文 | 62374篇 |
免费 | 7966篇 |
国内免费 | 6291篇 |
专业分类
电工技术 | 5521篇 |
技术理论 | 10篇 |
综合类 | 6789篇 |
化学工业 | 1403篇 |
金属工艺 | 725篇 |
机械仪表 | 3792篇 |
建筑科学 | 2474篇 |
矿业工程 | 1576篇 |
能源动力 | 831篇 |
轻工业 | 749篇 |
水利工程 | 1448篇 |
石油天然气 | 2922篇 |
武器工业 | 804篇 |
无线电 | 9834篇 |
一般工业技术 | 3123篇 |
冶金工业 | 1153篇 |
原子能技术 | 747篇 |
自动化技术 | 32730篇 |
出版年
2024年 | 333篇 |
2023年 | 906篇 |
2022年 | 1862篇 |
2021年 | 2287篇 |
2020年 | 2469篇 |
2019年 | 1893篇 |
2018年 | 1702篇 |
2017年 | 2101篇 |
2016年 | 2401篇 |
2015年 | 2721篇 |
2014年 | 4301篇 |
2013年 | 3872篇 |
2012年 | 4611篇 |
2011年 | 5022篇 |
2010年 | 3867篇 |
2009年 | 3782篇 |
2008年 | 4278篇 |
2007年 | 4830篇 |
2006年 | 4064篇 |
2005年 | 3617篇 |
2004年 | 3124篇 |
2003年 | 2622篇 |
2002年 | 2008篇 |
2001年 | 1517篇 |
2000年 | 1295篇 |
1999年 | 944篇 |
1998年 | 719篇 |
1997年 | 608篇 |
1996年 | 502篇 |
1995年 | 439篇 |
1994年 | 356篇 |
1993年 | 257篇 |
1992年 | 175篇 |
1991年 | 186篇 |
1990年 | 135篇 |
1989年 | 109篇 |
1988年 | 88篇 |
1987年 | 68篇 |
1986年 | 61篇 |
1985年 | 88篇 |
1984年 | 58篇 |
1983年 | 71篇 |
1982年 | 61篇 |
1981年 | 39篇 |
1980年 | 20篇 |
1979年 | 36篇 |
1978年 | 15篇 |
1977年 | 21篇 |
1976年 | 19篇 |
1959年 | 8篇 |
排序方式: 共有10000条查询结果,搜索用时 8 毫秒
131.
The mobile agent is a fundamental building block of the mobile computing paradigm. In mobile agent security, oblivious transfer
(OT) from a trusted party can be used to protect the agent’s privacy and the hosts’ privacy. In this paper, we introduce a
new cryptographic primitive called Verifiable Distributed Oblivious Transfer (VDOT), which allows us to replace a single trusted party with a group of threshold trusted servers. The design of VDOT uses a novel
technique called consistency verification of encrypted secret shares. VDOT protects the privacy of both the sender and the receiver against malicious attacks of the servers. We also show the
design of a system to apply VDOT to protect the privacy of mobile agents. Our design partitions an agent into the general
portion and the security-sensitive portion. We also implement the key components of our system. As far as we know, this is
the first effort to implement a system that protects the privacy of mobile agents. Our preliminary evaluation shows that protecting
mobile agents not only is possible, but also can be implemented efficiently.
This work was supported in part by the DoD University Research Initiative (URI) program administered by the Office of Naval
Research under grant N00014-01-1-0795. Sheng Zhong was supported by ONR grant N00014-01-1-0795 and NSF grants ANI-0207399
and CCR-TC-0208972. Yang Richard Yang was supported in part by NSF grant ANI-0207399. A preliminary version of this paper
was presented at the DialM-POMC Joint Workshop on Foundations of Mobile Computing in 2003.
Sheng Zhong received his Ph.D. in computer science from Yale University in the year of 2004. He holds an assistant professor position
at SUNY Buffalo and is currently on leave for postdoctoral research at the Center for Discrete Mathematics and Theoretical
Computer Science (DIMACS). His research interests, on the practical side, are security and incentives in data mining, databases,
and wireless networks. On the theoretical side, he is interested in cryptography and game theory.
Yang Richard Yang is an Assistant Professor of Computer Science at Yale University. His research interests include computer networks, mobile
computing, wireless networking, sensor networks, and network security. He leads the LAboratory of Networked Systems (LANS)
at Yale. His recent awards include a Schlumberger Fellowship and a CAREER Award from the National Science Foundation. He received
his B.E. degree from Tsinghua University (1993), and his M.S. and Ph.D. degrees from the University of Texas at Austin (1998
and 2001). 相似文献
132.
Intelligent multisensor surveillance systems consist of several types of sensors, which are installed on fixed and mobile devices. These components provide a huge quantity of information that has to be contrasted, correlated and integrated in order to recognize and react on special situations. These systems work in highly dynamic environments, with severe security and robustness requirements. All these characteristics imply the need for distributed solutions. In these solutions, scattered components can decide and act with some degree of autonomy (for instance, if they become isolated), or cooperate and coordinate for a complete tracking of special situations. In order to cope with these requirements and to better structure the solution, we have decided to design surveillance system control as a multiagent system. This is done by applying an agent-orientated methodology, which is assessed with concrete scenarios. 相似文献
133.
经对胜利油田近三年来典型井例测试资料分析评价及其增产措施效果分析认为,有三类地层压裂增油效果很好:地层物性相对较好的常压系统且存在严重堵塞的储层;物性较好的常压地层;高压低渗透储层。有两类地层酸化效果很好:灰岩、白云岩裂缝、低产低渗透储层;物性较好且存在严重污染堵塞的储层。其它地层压裂、酸化一般是无效的。 相似文献
134.
Composite scale modeling in the presence of censored data 总被引:1,自引:1,他引:0
A composite scale modeling approach can be used to combine several scales or variables into a single scale or variable. A typical application is to combine age and usage together to form a composite timescale model. The combined scale is expected to have better failure prediction capability than individual scales. Two typical models are the linear and multiplicative models. Their parameters are determined by minimizing the sample coefficient of variation of the composite scale. The minimum coefficient of variation is hard to apply in the presence of censored data. Another open issue is how to identify key variables when a number of variables are combined. This paper develops methods to handle these two issues. A numerical example is also included to illustrate the proposed methods. 相似文献
135.
本文描述并分析了一种适用于多信道VSAT卫星数据通信网的报文传输协议,特别是考虑了无线信道误码率对传输协议的影响,分析表明利用S-RE-ALOHA作为预订信道的多址方式及按报文占用数据信道方法可以减小报文传输延时并增加系统吞吐量。 相似文献
136.
137.
用常规电阻率测井资料确定水淹层的剩余油饱和度 总被引:7,自引:0,他引:7
油田综合含水越来越高,利用电阻率测井资料确定地层的剩余油饱和度变得非常困难。针对这一问题,提出了确定地层水民阻率和含油饱和度的方法。(1)利用已知的地怪水分析资料,采用井下自然电位刻度,井间对经和双自然电位一方法来示准地层水混合电阻率,然后利用相邻井相同地层的电阻率对比方法求含水饱和度。(2)利用电阻率的横向探测特性,避开阿尔奇公式中m、a选择上的困难,采用横向法计算水淹层目前的含水饱和度。利用以 相似文献
138.
David L. Spooner 《Journal of Intelligent Manufacturing》1994,5(1):13-21
A product database for a design and manufacturing enterprise serves as a repository for the data needed to manufacture a product. This paper discusses how an object-oriented persistent object manager named ROSE, under development at Rensselaer, has been used in the Rensselaer CIM program to develop a STEP/PDES-compliant product database for its research test bed. In so doing, it provides an overview of the requirements for a product database system in an integrated design and manufacturing facility, and it discusses how the chosen system meets these requirements. 相似文献
139.
Providing definition and temporal structure for multimedia data 总被引:1,自引:0,他引:1
140.