首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   14760篇
  免费   1700篇
  国内免费   653篇
电工技术   849篇
技术理论   2篇
综合类   1008篇
化学工业   810篇
金属工艺   1100篇
机械仪表   527篇
建筑科学   500篇
矿业工程   152篇
能源动力   167篇
轻工业   250篇
水利工程   273篇
石油天然气   144篇
武器工业   158篇
无线电   2267篇
一般工业技术   1824篇
冶金工业   2462篇
原子能技术   76篇
自动化技术   4544篇
  2025年   168篇
  2024年   544篇
  2023年   489篇
  2022年   584篇
  2021年   670篇
  2020年   615篇
  2019年   497篇
  2018年   389篇
  2017年   443篇
  2016年   443篇
  2015年   446篇
  2014年   661篇
  2013年   701篇
  2012年   787篇
  2011年   1109篇
  2010年   813篇
  2009年   838篇
  2008年   847篇
  2007年   864篇
  2006年   783篇
  2005年   760篇
  2004年   692篇
  2003年   525篇
  2002年   470篇
  2001年   380篇
  2000年   235篇
  1999年   184篇
  1998年   161篇
  1997年   156篇
  1996年   137篇
  1995年   127篇
  1994年   106篇
  1993年   90篇
  1992年   69篇
  1991年   41篇
  1990年   51篇
  1989年   41篇
  1988年   39篇
  1987年   10篇
  1986年   14篇
  1985年   13篇
  1984年   11篇
  1983年   11篇
  1982年   6篇
  1981年   6篇
  1979年   7篇
  1977年   11篇
  1966年   5篇
  1963年   5篇
  1961年   5篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
1.
EuLisp has an integrated object system with reflective capabilities. We discuss some example applications which use these facilities to experiment with some advanced and powerful concepts, namely, finalization, virtual shared memory and persistence. A secondary goal is to attempt to illustrate the additional possibilities of metaobject programming over non-metalevel techniques.  相似文献   
2.
In a series of experiments, participants were required to keep track of 1 or 2 working memory (WM) objects, having to update their values in 80% of the trials. Updating cost, defined as the difference between update and non-update trials, was larger when 2 objects were involved compared with when there was only 1 object was involved. This finding was interpreted as evidence that the updating process encompasses both objects in WM, even though only 1 of them is actually updated. This feature of WM updating is limited to objects defined as "updateable," throughout the trial sequence. The results are explained by the need to reprogram the phonological loop when updating or the need for desynchronization followed by resynchronization of WM contents. (PsycINFO Database Record (c) 2010 APA, all rights reserved)  相似文献   
3.
In long-term memory, negative information is better remembered than neutral information. Differences in processes important to working memory may contribute to this emotional memory enhancement. To examine the effect that the emotional content of stimuli has on working memory performance, the authors asked participants to perform working memory tasks with negative and neutral stimuli. Task accuracy was unaffected by the emotional content of the stimuli. Reaction times also did not differ for negative relative to neutral words, but on an n-back task using faces, participants were slower to respond to fearful faces than to neutral faces. These results suggest that although emotional content does not have a robust effect on working memory, in some instances emotional salience can impede working memory performance. (PsycINFO Database Record (c) 2010 APA, all rights reserved)  相似文献   
4.
In shape memory materials,that have been trained to have a two way shape memory effect(TWSM),themartensitic variants are classified into two groups,i.e.,preferentially oriented variants and self-accommodatingvariants.Applied stress may promote or constrain the transition of preferentially oriented variants and so changetransformation temperatures but has no essential effect on self-accommodating variants.According to the pointof view mentioned above,some experimental phenomena during thermocycling of a TWSM device may be ex-plained,such as the absence of synchronization between the plot of resistance change.temperature and the plotof memory strain vs.temperature.  相似文献   
5.
信息总量、网络浏览人数以及人们对网络享受需求的增加,促使着信息制作水平的提高,制作水平的提高在给人们带来了更好的视觉和听觉享受的同时,也对计算机的硬件系统提出了巨大的考验.计算机内存作为计算机硬件系统的重要组成部分,能否对内存做好合理的划分,对计算机的体验具有重要的意义.  相似文献   
6.
在要求高可靠性的系统设计中要求系统能够实现双机热备份,从而保证在出现问题时能够快速恢复服务。详细解读了在开发的调度机中如何实现热备份。  相似文献   
7.
Up to now, it is still an open question of how to construct a chosen-ciphertext secure unidirectional proxy re-encryption scheme in the adaptive corruption model. To address this problem, we propose a new unidirectional proxy re-encryption scheme, and prove its chosen-ciphertext security in the adaptive corruption model without random oracles. Compared with the best known unidirectional proxy re-encryption scheme proposed by Libert and Vergnaud in PKC’08, our scheme enjoys the advantages of both higher effi...  相似文献   
8.
Flash memory efficient LTL model checking   总被引:1,自引:0,他引:1  
As the capacity and speed of flash memories in form of solid state disks grow, they are becoming a practical alternative for standard magnetic drives. Currently, most solid-state disks are based on NAND technology and much faster than magnetic disks in random reads, while in random writes they are generally not.So far, large-scale LTL model checking algorithms have been designed to employ external memory optimized for magnetic disks. We propose algorithms optimized for flash memory access. In contrast to approaches relying on the delayed detection of duplicate states, in this work, we design and exploit appropriate hash functions to re-invent immediate duplicate detection.For flash memory efficient on-the-fly LTL model checking, which aims at finding any counter-example to the specified LTL property, we study hash functions adapted to the two-level hierarchy of RAM and flash memory. For flash memory efficient off-line LTL model checking, which aims at generating a minimal counterexample and scans the entire state space at least once, we analyze the effect of outsourcing a memory-based perfect hash function from RAM to flash memory.Since the characteristics of flash memories are different to magnetic hard disks, the existing I/O complexity model is no longer sufficient. Therefore, we provide an extended model for the computation of the I/O complexity adapted to flash memories that has a better fit to the observed behavior of our algorithms.  相似文献   
9.
该文创造性地探讨了内存缓存技术在门户网站开发中的应用,介绍了Memcached这一杰出成果在truelife.com的应用情况,并就其实际存在的一些缺陷进行了深入分析。  相似文献   
10.
《Ergonomics》2012,55(7):758-781
From the literature on error detection, the authors select several concepts relating error detection mechanisms and prospective memory features. They emphasize the central role of intention in the classification of the errors into slips/lapses/mistakes, in the error handling process and in the usual distinction between action-based and outcome-based detection. Intention is again a core concept in their investigation of prospective memory theory, where they point out the contribution of intention retrievals, intention persistence and output monitoring in the individual's possibilities for detecting their errors. The involvement of the frontal lobes in prospective memory and in error detection is also analysed. From the chronology of a prospective memory task, the authors finally suggest a model for error detection also accounting for neural mechanisms highlighted by studies on error-related brain activity.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号