全文获取类型
收费全文 | 10787篇 |
免费 | 627篇 |
国内免费 | 595篇 |
专业分类
电工技术 | 606篇 |
技术理论 | 1篇 |
综合类 | 1470篇 |
化学工业 | 479篇 |
金属工艺 | 320篇 |
机械仪表 | 760篇 |
建筑科学 | 1268篇 |
矿业工程 | 739篇 |
能源动力 | 235篇 |
轻工业 | 271篇 |
水利工程 | 389篇 |
石油天然气 | 621篇 |
武器工业 | 101篇 |
无线电 | 790篇 |
一般工业技术 | 342篇 |
冶金工业 | 616篇 |
原子能技术 | 170篇 |
自动化技术 | 2831篇 |
出版年
2024年 | 11篇 |
2023年 | 51篇 |
2022年 | 108篇 |
2021年 | 134篇 |
2020年 | 121篇 |
2019年 | 108篇 |
2018年 | 106篇 |
2017年 | 166篇 |
2016年 | 184篇 |
2015年 | 207篇 |
2014年 | 583篇 |
2013年 | 445篇 |
2012年 | 711篇 |
2011年 | 788篇 |
2010年 | 743篇 |
2009年 | 630篇 |
2008年 | 626篇 |
2007年 | 807篇 |
2006年 | 761篇 |
2005年 | 701篇 |
2004年 | 546篇 |
2003年 | 551篇 |
2002年 | 436篇 |
2001年 | 427篇 |
2000年 | 354篇 |
1999年 | 276篇 |
1998年 | 194篇 |
1997年 | 208篇 |
1996年 | 158篇 |
1995年 | 153篇 |
1994年 | 104篇 |
1993年 | 101篇 |
1992年 | 73篇 |
1991年 | 59篇 |
1990年 | 34篇 |
1989年 | 50篇 |
1988年 | 31篇 |
1987年 | 29篇 |
1986年 | 24篇 |
1985年 | 24篇 |
1984年 | 17篇 |
1982年 | 10篇 |
1981年 | 11篇 |
1980年 | 9篇 |
1979年 | 15篇 |
1975年 | 9篇 |
1973年 | 11篇 |
1966年 | 9篇 |
1965年 | 9篇 |
1959年 | 8篇 |
排序方式: 共有10000条查询结果,搜索用时 705 毫秒
71.
Martin Sulzmann Kenny Zhuo Ming Lu 《Electronic Notes in Theoretical Computer Science》2006,148(2):239
We consider the problem of integrating XDuce into ML. This is difficult because of incompatible type and value representations. Our solution is a type-driven translation scheme from XDuce to ML based on a structured representation of XDuce values. XDuce type inference guides the insertion of appropriate coercion functions to translate regular expression pattern matching and uses of semantic subtyping. We can extend our translation scheme to include ML function calls and patterns into XDuce. Thus, we can embed XDuce into ML. Our results allow to enrich the ML language with support for dealing with semi-structured data. 相似文献
72.
本文介绍 IBM-PC 系列机中的定时信息。进而介绍利用这些信息实现各类长、短定时间隔的编程技巧,并以实例说明之。 相似文献
73.
Philippe Meunier Robert Bruce Findler Paul Steckler Mitchell Wand 《Higher-Order and Symbolic Computation》2005,18(3-4):245-269
A set-based program analysis establishes constraints between sets of abstract values for all expressions in a program. Solving
the system of constraints produces a conservative approximation to the program's runtime flow of values.
Some practical set-based analyses use explicit selectors to extract the relevant values from an approximation set. For example,
if the analysis needs to determine the possible return values of a procedure, it uses the appropriate selector to extract
the relevant component from the abstract representation of the procedure.
In this paper, we show that this selector-based approach complicates the constraint solving phase of the analysis too much
and thus fails to scale up to realistic programming languages. We demonstrate this claim with a full-fledged value flow analysis
for case-lambda, a multi-branched version of lambda. We show how both the theoretical underpinnings and the practical implementation become
too complex. In response, we present a variant of set-based closure analysis that computes equivalent results in a much more
efficient manner. 相似文献
74.
75.
76.
针对在煤气回收和放散调试过程中发现的问题,通过改进转炉煤气回收和放散控制系统,增加气动三通阀控制联锁信号,保证放散的高度可靠性和煤气自动回收的高度安全性。 相似文献
77.
《中国科学:信息科学(英文版)》2012,(1):149-164
It is significant to automatically detect and resolve the incompliance in security policy.Most existing works in this field focus on compliance verification,and few of them provide approaches to automatically correct the incompliant security policies.This paper proposes a novel approach to automatically transform a given security policy into a compliant one.Given security policy Π and delegation policy M declared by logic programs,the approach automatically rewrites Π into a new one ΠM which is compliant with M and is readable by the humans.We prove that the algorithm is sound and complete under noninterference assumption.Formally,we show that the security policy query evaluation algorithm with conflict and unsettlement resolution still works very well on ΠM.The approach is automatic,so it doesn’t require a administrator with excess abilities.In this sense,our proposal can help us to save much manpower resource in security management and improves the security assurance abilities. 相似文献
78.
《International Journal of Parallel, Emergent and Distributed Systems》2012,27(1-3):21-56
Data flow analysis has been used by compilers in diverse contexts, from optimization to register allocation. Traditional analysis of sequential programs has centered on scalar variables. More recently, several researchers have investigated analysis of array sections for optimizations on modern architectures. This information has been used to distribute data, optimize data movement and vectorize or parallelize programs. As multiprocessors become more common-place. we believe there will be considerable interest in explicitly parallel programming languages. In this paper, we extend traditional analysis to array section analysis for parallel languages which include additional control and synchronization structures. We show how to compute array section data flow information, i.e., Communication Sets, for a class of parallel programs. To illustrate its use, we show how this information can be applied in compile-time program partitioning. Information about array accesses can also be used to improve estimates of program execution time used to direct runtime thread scheduling. 相似文献
79.
80.
在人们生产、生活、以及科学研究中,常常会出现一些不容易求解的非线性方程或非线性方程组等特殊方程。文章运用数学知识和计算机MATLAB语言,介绍了这些方程的求解,从而快速得到这些方程的解。 相似文献