全文获取类型
收费全文 | 6203篇 |
免费 | 817篇 |
国内免费 | 574篇 |
专业分类
电工技术 | 537篇 |
技术理论 | 1篇 |
综合类 | 399篇 |
化学工业 | 177篇 |
金属工艺 | 130篇 |
机械仪表 | 420篇 |
建筑科学 | 433篇 |
矿业工程 | 122篇 |
能源动力 | 130篇 |
轻工业 | 159篇 |
水利工程 | 196篇 |
石油天然气 | 101篇 |
武器工业 | 77篇 |
无线电 | 724篇 |
一般工业技术 | 573篇 |
冶金工业 | 150篇 |
原子能技术 | 124篇 |
自动化技术 | 3141篇 |
出版年
2024年 | 50篇 |
2023年 | 115篇 |
2022年 | 215篇 |
2021年 | 240篇 |
2020年 | 255篇 |
2019年 | 178篇 |
2018年 | 177篇 |
2017年 | 210篇 |
2016年 | 256篇 |
2015年 | 261篇 |
2014年 | 451篇 |
2013年 | 425篇 |
2012年 | 460篇 |
2011年 | 470篇 |
2010年 | 378篇 |
2009年 | 388篇 |
2008年 | 373篇 |
2007年 | 440篇 |
2006年 | 357篇 |
2005年 | 345篇 |
2004年 | 254篇 |
2003年 | 222篇 |
2002年 | 191篇 |
2001年 | 123篇 |
2000年 | 123篇 |
1999年 | 106篇 |
1998年 | 73篇 |
1997年 | 68篇 |
1996年 | 57篇 |
1995年 | 56篇 |
1994年 | 39篇 |
1993年 | 44篇 |
1992年 | 30篇 |
1991年 | 23篇 |
1990年 | 16篇 |
1989年 | 21篇 |
1988年 | 15篇 |
1987年 | 4篇 |
1986年 | 6篇 |
1985年 | 8篇 |
1984年 | 9篇 |
1983年 | 9篇 |
1982年 | 5篇 |
1980年 | 6篇 |
1979年 | 6篇 |
1963年 | 4篇 |
1961年 | 3篇 |
1956年 | 3篇 |
1955年 | 3篇 |
1954年 | 3篇 |
排序方式: 共有7594条查询结果,搜索用时 15 毫秒
101.
102.
基于口令的远程身份认证协议是目前认证协议研究的热点。2005年,Sung-Woon Lee等人提出了一个低开销的基于随机数的远程身份认证协议即Lee-Kim-Yoo协议,首先分析了此协议中所存在的安全性缺陷,随后构造了一个基于随机数和Hash函数,并使用智能卡的远程身份认证协议,最后用BAN逻辑对修改后的协议进行了形式化的分析,结果表明修改后的协议能够达到协议的安全目标。 相似文献
103.
手写签名认证是人工智能领域的一个重要课题,对它的深入研究具有重要的现实意义。文章采用基于概率统计的方法表示手写签名的速度特征,用vague集相似度表示书写压力特征,并通过细分的拐点表示笔画特征进行签名认证,最后,构造了一个在线手写签名认证系统。实验证明了该方法的有效性。 相似文献
104.
确保安全协议的正确性对于保证Internet上安全敏感的业务非常重要。采用形式化方法建模和验证安全协议可以检测到传统测试手段难以发现的错误。模型检查作为形式化验证方法的一种,有着自动化和提供反例等诸多优点。使用模型检查工具SPIN对802.11i双向认证协议EAP-TLS进行验证,提取出包含协议设计重要细节的形式化模型,对协议安全属性采用线性时态逻辑抽象,并验证协议模型是否满足安全属性。提出了一种使用PROMELA建模认证协议的方法。 相似文献
105.
One of the benefits of software product line approach is to improve time-to-market. The changes in market needs cause software requirements to be flexible in product lines. Whenever software requirements are changed, software architecture should be evolved to correspond with them. Therefore, domain architecture should be designed based on domain requirements. It is essential that there is traceability between requirements and architecture, and that the structure of architecture is derived from quality requirements. The purpose of this paper is to provide a framework for modeling domain architecture based on domain requirements within product lines. In particular, we focus on the traceable relationship between requirements and architectural structures. Our framework consists of processes, methods, and a supporting tool. It uses four basic concepts, namely, goal based domain requirements analysis, Analytical Hierarchy Process, Matrix technique, and architecture styles. Our approach is illustrated using HIS (Home Integration System) product line. Finally, industrial examples are used to validate DRAMA. 相似文献
106.
Franjo Ivančić Zijiang Yang Malay K. Ganai Aarti Gupta Pranav Ashar 《Theoretical computer science》2008
This paper discusses our methodology for formal analysis and automatic verification of software programs. It is applicable to a large subset of the C programming language that includes pointer arithmetic and bounded recursion. We consider reachability properties, in particular whether certain assertions or basic blocks are reachable in the source code, or whether certain standard property violations can occur. We perform this analysis via a translation to a Boolean circuit representation based on modeling basic blocks. The program is then analyzed by a back-end SAT-based bounded model checker, where each unrolling is mapped to one step in a block-wise execution of the program. 相似文献
107.
Automated regression suites are essential in developing large applications, while maintaining reasonable quality and timetables. The main argument against the automation of regression suites, in addition to the cost of creation and maintenance, is the observation that if you run the same test many times, it becomes increasingly less likely to find bugs. To alleviate such problems, a new regression suite practice, using random test generators to create regression suites on-the-fly, is becoming more common. In this practice, instead of maintaining tests, we generate test suites on-the-fly by choosing several specifications and generating a number of tests from each specification. 相似文献
108.
Sagar Chaki Edmund Clarke Natasha Sharygina Nishant Sinha 《Formal Methods in System Design》2008,32(3):235-266
This paper presents an automated and compositional procedure to solve the substitutability problem in the context of evolving software systems. Our solution contributes two
techniques for checking correctness of software upgrades: (1) a technique based on simultaneous use of over-and under-approximations
obtained via existential and universal abstractions; (2) a dynamic assume-guarantee reasoning algorithm—previously generated component assumptions are reused and altered on-the-fly to prove
or disprove the global safety properties on the updated system. When upgrades are found to be non-substitutable, our solution
generates constructive feedback to developers showing how to improve the components. The substitutability approach has been
implemented and validated in the ComFoRT reasoning framework, and we report encouraging results on an industrial benchmark.
This is an extended version of a paper, Dynamic Component Substitutability Analysis, published in the Proceedings of the Formal Methods 2005 Conference, Lecture Notes in Computer Science, vol. 3582, by the
same authors. This research was sponsored by the National Science Foundation under grant nos. CNS-0411152, CCF-0429120, CCR-0121547,
and CCR-0098072, the Semiconductor Research Corporation under grant no. TJ-1366, the US Army Research Office under grant no.
DAAD19-01-1-0485, the Office of Naval Research under grant no. N00014-01-1-0796, the ICAST project and the Predictable Assembly
from Certifiable Components (PACC) initiative at the Software Engineering Institute, Carnegie Mellon University. The views
and conclusions contained in this document are those of the authors and should not be interpreted as representing the official
policies, either expressed or implied, of any sponsoring institution, the US government or any other entity. 相似文献
109.
110.
传统入侵检测系统虽然可以根据特征匹配的方法检测出攻击企图,却无法验证攻击企图是否成功,生成的报警不仅数量巨大而且误警率很高。该文提出一种结合漏洞扫描工具对入侵检测系统生成的报警进行验证的方法,根据被攻击主机是否包含能使攻击成功的漏洞来判定攻击能否成功,对攻击的目标主机不存在对应漏洞的报警降低优先级,从而提高报警质量。说明了报警验证模型各部分的设计和实现方法,系统运行结果显示该方法能有效地压缩报警量,降低误警率,帮助管理员从大量数据中找到最应该关注的真实报警。 相似文献