全文获取类型
收费全文 | 15051篇 |
免费 | 1370篇 |
国内免费 | 1299篇 |
专业分类
电工技术 | 916篇 |
综合类 | 1815篇 |
化学工业 | 258篇 |
金属工艺 | 287篇 |
机械仪表 | 759篇 |
建筑科学 | 436篇 |
矿业工程 | 403篇 |
能源动力 | 125篇 |
轻工业 | 234篇 |
水利工程 | 253篇 |
石油天然气 | 290篇 |
武器工业 | 78篇 |
无线电 | 1403篇 |
一般工业技术 | 372篇 |
冶金工业 | 247篇 |
原子能技术 | 83篇 |
自动化技术 | 9761篇 |
出版年
2024年 | 39篇 |
2023年 | 74篇 |
2022年 | 180篇 |
2021年 | 192篇 |
2020年 | 240篇 |
2019年 | 146篇 |
2018年 | 184篇 |
2017年 | 235篇 |
2016年 | 290篇 |
2015年 | 405篇 |
2014年 | 804篇 |
2013年 | 654篇 |
2012年 | 1018篇 |
2011年 | 1113篇 |
2010年 | 939篇 |
2009年 | 922篇 |
2008年 | 1170篇 |
2007年 | 1283篇 |
2006年 | 1097篇 |
2005年 | 1144篇 |
2004年 | 1093篇 |
2003年 | 974篇 |
2002年 | 761篇 |
2001年 | 665篇 |
2000年 | 491篇 |
1999年 | 335篇 |
1998年 | 243篇 |
1997年 | 189篇 |
1996年 | 158篇 |
1995年 | 143篇 |
1994年 | 127篇 |
1993年 | 101篇 |
1992年 | 75篇 |
1991年 | 52篇 |
1990年 | 31篇 |
1989年 | 32篇 |
1988年 | 15篇 |
1987年 | 13篇 |
1986年 | 10篇 |
1985年 | 20篇 |
1984年 | 17篇 |
1983年 | 8篇 |
1982年 | 10篇 |
1981年 | 9篇 |
1980年 | 7篇 |
1979年 | 5篇 |
1978年 | 3篇 |
1977年 | 1篇 |
1976年 | 2篇 |
1975年 | 1篇 |
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
1.
2.
Private information retrieval(PIR) is an important privacy protection issue of secure multi-party computation, but the PIR protocols based on classical cryptography are vulnerable because of new technologies,such as quantum computing and cloud computing. The quantum private queries(QPQ) protocols available, however, has a high complexity and is inefficient in the face of large database. This paper, based on the QKD technology which is mature now, proposes a novel QPQ protocol utilizing the key dilution and auxiliary parameter. Only N quits are required to be sent in the quantum channel to generate the raw key, then the straight k bits in the raw key are added bitwise to dilute the raw key, and a final key is consequently obtained to encrypt the database. By flexible adjusting of auxiliary parameters θ and k, privacy is secured and the query success ratio is improved. Feasibility and performance analyses indicate that the protocol has a high success ratio in first-trial query and is easy to implement, and that the communication complexity of O(N) is achieved. 相似文献
3.
4.
5.
在探讨了Web查询服务的典型模型后,论文阐述了服务器端会话追踪机制的实现方式,设计了基于服务器端会话追踪的Web查询服务的典型解决方案。该设计方案可以较为安全地保存和维护客户的上下文信息,可靠地跟踪用户查询所处的状态,有效地实现有状态的Web查询服务。 相似文献
6.
异构数据集成方法研究与实现 总被引:4,自引:4,他引:0
王行荣 《微电子学与计算机》2006,23(4):172-173,176
为解决异构数据集成的复杂性问题,文章提出了一种异构数据同步的新方法——半集成式中间件法。该方法成功地应用在重庆市社会保障综合信息系统中,具有易于实现、可扩展性、跨平台性和效率高等特点。 相似文献
7.
8.
An important feature of database technology of the nineties is the use of parallelism for speeding up the execution of complex queries. This technology is being tested in several experimental database architectures and a few commercial systems for conventional select-project-join queries. In particular, hash-based fragmentation is used to distribute data to disks under the control of different processors in order to perform selections and joins in parallel. With the development of new query languages, and in particular with the definition of transitive closure queries and of more general logic programming queries, the new dimension of recursion has been added to query processing. Recursive queries are complex; at the same time, their regular structure is particularly suited for parallel execution, and parallelism may give a high efficiency gain. We survey the approaches to parallel execution of recursive queries that have been presented in the recent literature. We observe that research on parallel execution of recursive queries is separated into two distinct subareas, one focused on the transitive closure of Relational Algebra expressions, the other one focused on optimization of more general Datalog queries. Though the subareas seem radically different because of the approach and formalism used, they have many common features. This is not surprising, because most typical Datalog queries can be solved by means of the transitive closure of simple algebraic expressions. We first analyze the relationship between the transitive closure of expressions in Relational Algebra and Datalog programs. We then review sequential methods for evaluating transitive closure, distinguishing iterative and direct methods. We address the parallelization of these methods, by discussing various forms of parallelization. Data fragmentation plays an important role in obtaining parallel execution; we describe hash-based and semantic fragmentation. Finally, we consider Datalog queries, and present general methods for parallel rule execution; we recognize the similarities between these methods and the methods reviewed previously, when the former are applied to linear Datalog queries. We also provide a quantitative analysis that shows the impact of the initial data distribution on the performance of methods.
Recommended by: Patrick Valduriez 相似文献
9.
10.
Management of multidimensional discrete data 总被引:1,自引:0,他引:1
Peter Baumann Ph.D. 《The VLDB Journal The International Journal on Very Large Data Bases》1994,3(4):401-444
Spatial database management involves two main categories of data: vector and raster data. The former has received a lot of in-depth investigation; the latter still lacks a sound framework. Current DBMSs either regard raster data as pure byte sequences where the DBMS has no knowledge about the underlying semantics, or they do not complement array structures with storage mechanisms suitable for huge arrays, or they are designed as specialized systems with sophisticated imaging functionality, but no general database capabilities (e.g., a query language). Many types of array data will require database support in the future, notably 2-D images, audio data and general signal-time series (1-D), animations (3-D), static or time-variant voxel fields (3-D and 4-D), and the ISO/IEC PIKS (Programmer's Imaging Kernel System) BasicImage type (5-D). In this article, we propose a comprehensive support ofmultidimensional discrete data (MDD) in databases, including operations on arrays of arbitrary size over arbitrary data types. A set of requirements is developed, a small set of language constructs is proposed (based on a formal algebraic semantics), and a novel MDD architecture is outlined to provide the basis for efficient MDD query evaluation. 相似文献