全文获取类型
收费全文 | 39370篇 |
免费 | 4579篇 |
国内免费 | 2381篇 |
专业分类
电工技术 | 3036篇 |
技术理论 | 3篇 |
综合类 | 5178篇 |
化学工业 | 1972篇 |
金属工艺 | 747篇 |
机械仪表 | 1916篇 |
建筑科学 | 4546篇 |
矿业工程 | 1901篇 |
能源动力 | 1055篇 |
轻工业 | 4147篇 |
水利工程 | 2093篇 |
石油天然气 | 4198篇 |
武器工业 | 876篇 |
无线电 | 2912篇 |
一般工业技术 | 2780篇 |
冶金工业 | 1130篇 |
原子能技术 | 290篇 |
自动化技术 | 7550篇 |
出版年
2024年 | 237篇 |
2023年 | 626篇 |
2022年 | 1131篇 |
2021年 | 1371篇 |
2020年 | 1503篇 |
2019年 | 1204篇 |
2018年 | 1227篇 |
2017年 | 1303篇 |
2016年 | 1628篇 |
2015年 | 1662篇 |
2014年 | 2740篇 |
2013年 | 2458篇 |
2012年 | 3188篇 |
2011年 | 3249篇 |
2010年 | 2357篇 |
2009年 | 2457篇 |
2008年 | 2226篇 |
2007年 | 2645篇 |
2006年 | 2296篇 |
2005年 | 2003篇 |
2004年 | 1630篇 |
2003年 | 1366篇 |
2002年 | 987篇 |
2001年 | 901篇 |
2000年 | 695篇 |
1999年 | 588篇 |
1998年 | 432篇 |
1997年 | 411篇 |
1996年 | 346篇 |
1995年 | 298篇 |
1994年 | 234篇 |
1993年 | 176篇 |
1992年 | 122篇 |
1991年 | 109篇 |
1990年 | 75篇 |
1989年 | 90篇 |
1988年 | 37篇 |
1987年 | 33篇 |
1986年 | 36篇 |
1985年 | 26篇 |
1984年 | 31篇 |
1983年 | 32篇 |
1982年 | 20篇 |
1981年 | 16篇 |
1980年 | 8篇 |
1979年 | 14篇 |
1978年 | 9篇 |
1977年 | 9篇 |
1976年 | 9篇 |
1959年 | 7篇 |
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
181.
The mobile agent is a fundamental building block of the mobile computing paradigm. In mobile agent security, oblivious transfer
(OT) from a trusted party can be used to protect the agent’s privacy and the hosts’ privacy. In this paper, we introduce a
new cryptographic primitive called Verifiable Distributed Oblivious Transfer (VDOT), which allows us to replace a single trusted party with a group of threshold trusted servers. The design of VDOT uses a novel
technique called consistency verification of encrypted secret shares. VDOT protects the privacy of both the sender and the receiver against malicious attacks of the servers. We also show the
design of a system to apply VDOT to protect the privacy of mobile agents. Our design partitions an agent into the general
portion and the security-sensitive portion. We also implement the key components of our system. As far as we know, this is
the first effort to implement a system that protects the privacy of mobile agents. Our preliminary evaluation shows that protecting
mobile agents not only is possible, but also can be implemented efficiently.
This work was supported in part by the DoD University Research Initiative (URI) program administered by the Office of Naval
Research under grant N00014-01-1-0795. Sheng Zhong was supported by ONR grant N00014-01-1-0795 and NSF grants ANI-0207399
and CCR-TC-0208972. Yang Richard Yang was supported in part by NSF grant ANI-0207399. A preliminary version of this paper
was presented at the DialM-POMC Joint Workshop on Foundations of Mobile Computing in 2003.
Sheng Zhong received his Ph.D. in computer science from Yale University in the year of 2004. He holds an assistant professor position
at SUNY Buffalo and is currently on leave for postdoctoral research at the Center for Discrete Mathematics and Theoretical
Computer Science (DIMACS). His research interests, on the practical side, are security and incentives in data mining, databases,
and wireless networks. On the theoretical side, he is interested in cryptography and game theory.
Yang Richard Yang is an Assistant Professor of Computer Science at Yale University. His research interests include computer networks, mobile
computing, wireless networking, sensor networks, and network security. He leads the LAboratory of Networked Systems (LANS)
at Yale. His recent awards include a Schlumberger Fellowship and a CAREER Award from the National Science Foundation. He received
his B.E. degree from Tsinghua University (1993), and his M.S. and Ph.D. degrees from the University of Texas at Austin (1998
and 2001). 相似文献
182.
The recommendation of the CIE has been followed as closely as possible to evaluate the accuracy of five color gamut mapping algorithms (GMAs)—two nonspatial and three spatial algorithms—by psychophysical experiments with 20 test images, 20 observers, one test done on paper and a second one on display. Even though the results do not show any overall “winner,” one GMA is definitely perceived as not accurate. The importance of a high number of test images to obtain robust evaluation is underlined by the high variability of the results depending on the test images. Significant correlations between the percentage of out‐of‐gamut pixels, the number of distinguishable pairs of GMAs, and the perceived difficulty to distinguish them have been found. The type of observers is also important. The experts, who prefer a spatial GMA, show a stronger consensus and look especially for a good rendering of details, whereas the nonexperts hardly make a difference between the GMAs. © 2008 Wiley Periodicals, Inc. Col Res Appl, 33, 470–476, 2008 相似文献
183.
河南油田泌阳凹陷稠油地化录井评价方法 总被引:1,自引:1,他引:0
河南油田泌阳凹陷分布有古城、井楼、杨楼、新庄4个稠油油田,各油田油质复杂,查清各区块、各层系稠油油质是开发生产的重要工作之一。通过对稠油层基本特征分析,应用地化录井参数建立了TPI评价法、原油密度评价法及原油黏度评价法。TPI评价法主要是利用原油中气态烃和液态烃与全烃比值大小划分油质类型;原油密度评价法主要利用油质重,TPI值小,反之TPI值大的关系划分油质类型;原油黏度评价法主要利用TPI反映油质组分的综合性参数的特点,建立TPI与黏度的关系。这套评价评价方法提供了快速精细评价稠油油质的新手段。 相似文献
184.
支景波 《石油化工安全环保技术》2006,22(1):1-2
企业所建立的HSE管理体系已运行多年,大多满足认证的条件,HSE体系认证是体系运行的重要环节,也是体系运行绩效的肯定。审核时要面对大量的体系文件和作业记录,因此把握住审核要点会起到事半功倍的效果。 相似文献
185.
186.
在简单介绍高程系统的基础上,对影响GPS高程精度的几何水准联测误差、卫星分布不对称、星历误差、多路径误差等因素逐一进行了分析,并提出了相应的改进措施。同时,还对高程拟合使用的稳健估计方法进行了探讨。 相似文献
187.
气藏储量可采性评价的实质是对储层进行可采性评价。以苟西C2hl气藏为例,通过对该气藏储层孔隙度与渗透率、孔隙度与排驱压力及孔喉结构等反映储层连通性的各项参数分析,讨论储层可采性评价的方法。对气藏储量可采性评价及苟西C2hl气藏开发有一定指导意义。 相似文献
188.
针对太原可口可乐综合厂房主筋采用φ28、φ32三级钢存在的可焊性差的问题,提出了在施工中采用套筒挤压连接的方式,并对该方法的操作要点及质量控制措施进行了总结。 相似文献
189.
Grammatiki Tsaganou Maria Grigoriadou Theodora Cavoura Dimitra Koutra 《Expert systems with applications》2003,25(4):597-502
This work aims to present and evaluate a Fuzzy-Case Based Reasoning Diagnosis system of Historical Text Comprehension. The synergism of fuzzy logic and case based reasoning techniques handles the uncertainty in the acquisition of human expert's knowledge regarding learner's observable behaviour and integrates the right balance between expert's knowledge described in the form of fuzzy sets and previous experiences documented in the form of cases. The formative evaluation focused on the comparison of the system's performance to the performance of human experts concerning the diagnosis accuracy. The system was also evaluated for its behaviour when using two different historical texts. Empirical evaluation conducted with human experts and real students indicated the need for revision of the diagnosis model. The evaluation results are encouraging for the system's educational impact on learners and for future work concerning an intelligent educational system for individualized learning. 相似文献
190.
In this work, a new method for the creation of classifier ensembles is introduced. The patterns are partitioned into clusters to group together similar patterns, a training set is built using the patterns that belong to a cluster. Each of the new sets is used to train a classifier. We show that the approach here presented, called FuzzyBagging, obtains performance better than Bagging. 相似文献