首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   6923篇
  免费   659篇
  国内免费   601篇
电工技术   114篇
技术理论   1篇
综合类   346篇
化学工业   230篇
金属工艺   199篇
机械仪表   200篇
建筑科学   2221篇
矿业工程   193篇
能源动力   225篇
轻工业   228篇
水利工程   88篇
石油天然气   110篇
武器工业   33篇
无线电   749篇
一般工业技术   229篇
冶金工业   1010篇
原子能技术   43篇
自动化技术   1964篇
  2024年   12篇
  2023年   80篇
  2022年   343篇
  2021年   276篇
  2020年   315篇
  2019年   231篇
  2018年   154篇
  2017年   153篇
  2016年   219篇
  2015年   244篇
  2014年   575篇
  2013年   490篇
  2012年   454篇
  2011年   487篇
  2010年   373篇
  2009年   552篇
  2008年   381篇
  2007年   461篇
  2006年   405篇
  2005年   335篇
  2004年   266篇
  2003年   287篇
  2002年   392篇
  2001年   130篇
  2000年   117篇
  1999年   114篇
  1998年   61篇
  1997年   46篇
  1996年   49篇
  1995年   32篇
  1994年   21篇
  1993年   16篇
  1992年   14篇
  1991年   11篇
  1990年   9篇
  1989年   17篇
  1988年   10篇
  1987年   7篇
  1986年   10篇
  1985年   7篇
  1984年   6篇
  1983年   5篇
  1982年   4篇
  1981年   3篇
  1980年   4篇
  1979年   3篇
  1958年   1篇
  1954年   1篇
排序方式: 共有8183条查询结果,搜索用时 31 毫秒
41.
A method is presented for controlling cryptographic key usage based on control vectors. Each cryptographic key has an associated control vector that defines the permitted uses of the key within the cryptographic system. At key generation, the control vector is cryptographically coupled to the key by way of a special encryption process. Each encrypted key and control vector are stored and distributed within the cryptographic system as a single token. Decryption of a key requires respecification of the control vector. As part of the decryption process, the cryptographic hardware verifies that the requested use of the key is authorized by the control vector. This article focuses mainly on the use of control vectors in cryptosystems based on the Data Encryption Algorithm.  相似文献   
42.
Provides the biography of Dante Cicchetti and announces that he has received the APA Award for Distinguished Senior Career Contributions to Psychology in the Public Interest (2004) for his seminal role in bridging theory, research, and practice by fostering the emergence and coalescence of the field of developmental psychopathology. A selected bibliography is also provided. (PsycINFO Database Record (c) 2010 APA, all rights reserved)  相似文献   
43.
Key-insulated encryption schemes use a combination of key splitting and key evolution to protect against key exposure. Existing schemes, however scale poorly, having cost proportional to the number t of time periods that may be compromised by the adversary, and thus are practical only for small values of t. Yet in practice t might be large. This paper presents a strongly key-insulated encryption scheme with optimal threshold. In our scheme, t need not be known in advance and can be as large as one less than the total number of periods, yet the cost of the scheme is not impacted. This brings key-insulated encryption closer to practice. Our scheme is based on the Boneh-Franklin identity-based encryption (IBE) scheme [9], and exploits algebraic properties of the latter. Another contribution of this paper is to show that (not strongly) key-insulated encryption with optimal threshold and allowing random-access key updates (which our scheme and all others known allow) is equivalent to a restricted form of IBE. This means that the connection between key-insulated encryption and IBE is not accidental. Supported in part by NSF grants CCR-0098123, ANR-0129617 and CCR-0208842, and by an IBM Faculty Partnership Development Award. Supported in part by an NSF graduate fellowship.  相似文献   
44.
Renewable energy systems: A societal and technological platform   总被引:1,自引:0,他引:1  
Today, the analysis of renewable energy places the emphasis on the technological and economic attributes with social and environmental impact assessment providing for a rather static, narrow frame of analysis. The participation and response of social actors and other stakeholders is usually of a traditional type, with consultation documents and public meetings, collection of complaints and suggestion schemes. This often encourages parochialism and an over-concentration on relatively trivial issues. It is, therefore, imperative to establish a new participatory planning platform to incorporate the wider socio-economic aspects of renewable energy systems and to provide for an operational analytical decomposition of them. In this work the issue of decomposition analysis is clarified, and a new agenda for the societal and technological decomposition analysis of renewable energy systems is developed. A case study is disclosed to present the relevance of the established platform for integrated (renewable) energy systems planning. Innovative aspects comprise of the simultaneous inclusion of decision analysis and social acceptance methods and tools in concert with the related public participation techniques.  相似文献   
45.
首尔地面公交系统改革的成功经验   总被引:1,自引:0,他引:1  
随着经济、人口的快速发展,首尔开展了一次针对地面公交系统的成功而深刻的变革。其中包括组建以公众参与为基础的公交系统改革公民委员会,形成了“以线路连接为导向的公交系统”,采用新型公交智能卡、票价新制度以及信息一体化的管理系统。  相似文献   
46.
王敏 《计算机学报》1993,16(2):106-112
本文提出了一种新的4级密钥管理方案.该方案通过一个密码操作核心的精心设计,为各用户使用系统的各种功能提供了方便的手段,同时确保了系统的安全性.此外,该方案还大大降低了系统开发费用和保密通信的复杂度.因此,该方案克服了以往方案中的缺陷,已被正在开发的系统SUTU采用.  相似文献   
47.
The infrastructure renewal program at MIT consists of a large number of projects with an estimated budget that could approach $1 billion. Infrastructure renewal at the Massachusetts Institute of Technology (MIT) is the process of evaluating and investing in the maintenance of facility systems and basic structure to preserve existing campus buildings. The selection and prioritization of projects must be addressed with a systematic method for the optimal allocation of funds and other resources. This paper presents a case study of a prioritization method utilizing multi-attribute utility theory. This method was developed at MIT's Department of Nuclear Engineering and was deployed by the Department of Facilities after appropriate modifications were implemented to address the idiosyncrasies of infrastructure renewal projects and the competing criteria and constraints that influence the judgment of the decision-makers. Such criteria include minimization of risk, optimization of economic impact, and coordination with academic policies, programs, and operations of the Institute. A brief overview of the method is presented, as well as the results of its application to the prioritization of infrastructure renewal projects. Results of workshops held at MIT with the participation of stakeholders demonstrate the feasibility of the prioritization method and the usefulness of this approach.  相似文献   
48.
This article is concerned with various arithmetic operations inGF(2 m ). In particular we discuss techniques for computing multiplicative inverses and doing exponentiation. The method used for exponentiation is highly suited to parallel computation. All methods achieve much of their efficiency from exploiting a normal basis representation in the field.  相似文献   
49.
城市规划行政的制约机制——公众参与   总被引:7,自引:0,他引:7  
颜丽杰  王国恩 《规划师》2002,18(9):57-60
通过对我国城市规划编制过程和实施管理过程中“非理性”因素及其产生根源的分析,提出改进城市规划行政模式,阐述城市规划公众参与的必要性,同时阐明现阶段公众参与的重点。  相似文献   
50.
公益产品设计近年来备受社会瞩目,其构想的价值毋庸置疑,然而,在设计中,一些思想未必成熟,各方面因素考虑不周,设计出的产品不仅难以实现公益,甚至出现南辕北辙的无奈。把握公益产品设计的正确方向,使得产品设计能够真正做到公益的效果,对于参与公益产品设计的企业和设计者而言是当务之急。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号