全文获取类型
收费全文 | 14760篇 |
免费 | 1700篇 |
国内免费 | 653篇 |
专业分类
电工技术 | 849篇 |
技术理论 | 2篇 |
综合类 | 1008篇 |
化学工业 | 810篇 |
金属工艺 | 1100篇 |
机械仪表 | 527篇 |
建筑科学 | 500篇 |
矿业工程 | 152篇 |
能源动力 | 167篇 |
轻工业 | 250篇 |
水利工程 | 273篇 |
石油天然气 | 144篇 |
武器工业 | 158篇 |
无线电 | 2267篇 |
一般工业技术 | 1824篇 |
冶金工业 | 2462篇 |
原子能技术 | 76篇 |
自动化技术 | 4544篇 |
出版年
2025年 | 168篇 |
2024年 | 544篇 |
2023年 | 489篇 |
2022年 | 584篇 |
2021年 | 670篇 |
2020年 | 615篇 |
2019年 | 497篇 |
2018年 | 389篇 |
2017年 | 443篇 |
2016年 | 443篇 |
2015年 | 446篇 |
2014年 | 661篇 |
2013年 | 701篇 |
2012年 | 787篇 |
2011年 | 1109篇 |
2010年 | 813篇 |
2009年 | 838篇 |
2008年 | 847篇 |
2007年 | 864篇 |
2006年 | 783篇 |
2005年 | 760篇 |
2004年 | 692篇 |
2003年 | 525篇 |
2002年 | 470篇 |
2001年 | 380篇 |
2000年 | 235篇 |
1999年 | 184篇 |
1998年 | 161篇 |
1997年 | 156篇 |
1996年 | 137篇 |
1995年 | 127篇 |
1994年 | 106篇 |
1993年 | 90篇 |
1992年 | 69篇 |
1991年 | 41篇 |
1990年 | 51篇 |
1989年 | 41篇 |
1988年 | 39篇 |
1987年 | 10篇 |
1986年 | 14篇 |
1985年 | 13篇 |
1984年 | 11篇 |
1983年 | 11篇 |
1982年 | 6篇 |
1981年 | 6篇 |
1979年 | 7篇 |
1977年 | 11篇 |
1966年 | 5篇 |
1963年 | 5篇 |
1961年 | 5篇 |
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
1.
EuLisp has an integrated object system with reflective capabilities. We discuss some example applications which use these facilities to experiment with some advanced and powerful concepts, namely, finalization, virtual shared memory and persistence. A secondary goal is to attempt to illustrate the additional possibilities of metaobject programming over non-metalevel techniques. 相似文献
2.
In a series of experiments, participants were required to keep track of 1 or 2 working memory (WM) objects, having to update their values in 80% of the trials. Updating cost, defined as the difference between update and non-update trials, was larger when 2 objects were involved compared with when there was only 1 object was involved. This finding was interpreted as evidence that the updating process encompasses both objects in WM, even though only 1 of them is actually updated. This feature of WM updating is limited to objects defined as "updateable," throughout the trial sequence. The results are explained by the need to reprogram the phonological loop when updating or the need for desynchronization followed by resynchronization of WM contents. (PsycINFO Database Record (c) 2010 APA, all rights reserved) 相似文献
3.
In long-term memory, negative information is better remembered than neutral information. Differences in processes important to working memory may contribute to this emotional memory enhancement. To examine the effect that the emotional content of stimuli has on working memory performance, the authors asked participants to perform working memory tasks with negative and neutral stimuli. Task accuracy was unaffected by the emotional content of the stimuli. Reaction times also did not differ for negative relative to neutral words, but on an n-back task using faces, participants were slower to respond to fearful faces than to neutral faces. These results suggest that although emotional content does not have a robust effect on working memory, in some instances emotional salience can impede working memory performance. (PsycINFO Database Record (c) 2010 APA, all rights reserved) 相似文献
4.
In shape memory materials,that have been trained to have a two way shape memory effect(TWSM),themartensitic variants are classified into two groups,i.e.,preferentially oriented variants and self-accommodatingvariants.Applied stress may promote or constrain the transition of preferentially oriented variants and so changetransformation temperatures but has no essential effect on self-accommodating variants.According to the pointof view mentioned above,some experimental phenomena during thermocycling of a TWSM device may be ex-plained,such as the absence of synchronization between the plot of resistance change.temperature and the plotof memory strain vs.temperature. 相似文献
5.
李文棣 《网络安全技术与应用》2013,(11):135-136
信息总量、网络浏览人数以及人们对网络享受需求的增加,促使着信息制作水平的提高,制作水平的提高在给人们带来了更好的视觉和听觉享受的同时,也对计算机的硬件系统提出了巨大的考验.计算机内存作为计算机硬件系统的重要组成部分,能否对内存做好合理的划分,对计算机的体验具有重要的意义. 相似文献
6.
张俊华 《电脑编程技巧与维护》2011,(14):30-31
在要求高可靠性的系统设计中要求系统能够实现双机热备份,从而保证在出现问题时能够快速恢复服务。详细解读了在开发的调度机中如何实现热备份。 相似文献
7.
CCA-secure unidirectional proxy re-encryption in the adaptive corruption model without random oracles 总被引:1,自引:0,他引:1
DENG Robert 《中国科学:信息科学(英文版)》2010,(3):593-606
Up to now, it is still an open question of how to construct a chosen-ciphertext secure unidirectional proxy re-encryption scheme in the adaptive corruption model. To address this problem, we propose a new unidirectional proxy re-encryption scheme, and prove its chosen-ciphertext security in the adaptive corruption model without random oracles. Compared with the best known unidirectional proxy re-encryption scheme proposed by Libert and Vergnaud in PKC’08, our scheme enjoys the advantages of both higher effi... 相似文献
8.
Flash memory efficient LTL model checking 总被引:1,自引:0,他引:1
S. EdelkampD. Sulewski J. BarnatL. Brim P. Šime?ek 《Science of Computer Programming》2011,76(2):136-157
As the capacity and speed of flash memories in form of solid state disks grow, they are becoming a practical alternative for standard magnetic drives. Currently, most solid-state disks are based on NAND technology and much faster than magnetic disks in random reads, while in random writes they are generally not.So far, large-scale LTL model checking algorithms have been designed to employ external memory optimized for magnetic disks. We propose algorithms optimized for flash memory access. In contrast to approaches relying on the delayed detection of duplicate states, in this work, we design and exploit appropriate hash functions to re-invent immediate duplicate detection.For flash memory efficient on-the-fly LTL model checking, which aims at finding any counter-example to the specified LTL property, we study hash functions adapted to the two-level hierarchy of RAM and flash memory. For flash memory efficient off-line LTL model checking, which aims at generating a minimal counterexample and scans the entire state space at least once, we analyze the effect of outsourcing a memory-based perfect hash function from RAM to flash memory.Since the characteristics of flash memories are different to magnetic hard disks, the existing I/O complexity model is no longer sufficient. Therefore, we provide an extended model for the computation of the I/O complexity adapted to flash memories that has a better fit to the observed behavior of our algorithms. 相似文献
9.
该文创造性地探讨了内存缓存技术在门户网站开发中的应用,介绍了Memcached这一杰出成果在truelife.com的应用情况,并就其实际存在的一些缺陷进行了深入分析。 相似文献
10.
《Ergonomics》2012,55(7):758-781
From the literature on error detection, the authors select several concepts relating error detection mechanisms and prospective memory features. They emphasize the central role of intention in the classification of the errors into slips/lapses/mistakes, in the error handling process and in the usual distinction between action-based and outcome-based detection. Intention is again a core concept in their investigation of prospective memory theory, where they point out the contribution of intention retrievals, intention persistence and output monitoring in the individual's possibilities for detecting their errors. The involvement of the frontal lobes in prospective memory and in error detection is also analysed. From the chronology of a prospective memory task, the authors finally suggest a model for error detection also accounting for neural mechanisms highlighted by studies on error-related brain activity. 相似文献