全文获取类型
收费全文 | 22241篇 |
免费 | 1960篇 |
国内免费 | 1181篇 |
专业分类
电工技术 | 682篇 |
技术理论 | 1篇 |
综合类 | 1551篇 |
化学工业 | 305篇 |
金属工艺 | 153篇 |
机械仪表 | 616篇 |
建筑科学 | 8054篇 |
矿业工程 | 183篇 |
能源动力 | 186篇 |
轻工业 | 124篇 |
水利工程 | 78篇 |
石油天然气 | 218篇 |
武器工业 | 165篇 |
无线电 | 2725篇 |
一般工业技术 | 487篇 |
冶金工业 | 136篇 |
原子能技术 | 39篇 |
自动化技术 | 9679篇 |
出版年
2024年 | 179篇 |
2023年 | 456篇 |
2022年 | 657篇 |
2021年 | 711篇 |
2020年 | 801篇 |
2019年 | 611篇 |
2018年 | 377篇 |
2017年 | 396篇 |
2016年 | 411篇 |
2015年 | 551篇 |
2014年 | 1453篇 |
2013年 | 1091篇 |
2012年 | 1488篇 |
2011年 | 1857篇 |
2010年 | 1383篇 |
2009年 | 1465篇 |
2008年 | 1606篇 |
2007年 | 1808篇 |
2006年 | 1529篇 |
2005年 | 1400篇 |
2004年 | 1116篇 |
2003年 | 967篇 |
2002年 | 702篇 |
2001年 | 546篇 |
2000年 | 457篇 |
1999年 | 308篇 |
1998年 | 192篇 |
1997年 | 133篇 |
1996年 | 99篇 |
1995年 | 104篇 |
1994年 | 83篇 |
1993年 | 64篇 |
1992年 | 62篇 |
1991年 | 52篇 |
1990年 | 35篇 |
1989年 | 33篇 |
1988年 | 42篇 |
1987年 | 22篇 |
1986年 | 19篇 |
1985年 | 35篇 |
1984年 | 33篇 |
1983年 | 21篇 |
1982年 | 10篇 |
1981年 | 2篇 |
1980年 | 2篇 |
1979年 | 4篇 |
1977年 | 2篇 |
1966年 | 1篇 |
1965年 | 2篇 |
1955年 | 1篇 |
排序方式: 共有10000条查询结果,搜索用时 0 毫秒
1.
This work considers the problem of increasing the performance of the ciphers based on Data-Dependent (DD) operations (DDO)
for VLSI implementations. New minimum size primitives are proposed to design DDOs. Using advanced DDOs instead of DD permutations
(DDP) in the DDP-based iterative ciphers Cobra-H64 and Cobra-H128 the number of rounds has been significantly reduced yielding
enhancement of the “performance per cost” value and retaining security at the level of indistinguishability from a random
transformation. To obtain further enhancement of this parameter a new crypto-scheme based on the advanced DDOs is proposed.
The FPGA implementation of the proposed crypto-scheme achieves higher throughput value and minimizes the allocated resources
than the conventional designs. Design of the DDO boxes of different orders is considered and their ASIC implementation is
estimated. 相似文献
2.
3.
4.
本文描述数据访问组件MDAC(Microsoft Data Access Components)的结构与编程接口,分析了MDAC缓冲区溢出安全漏洞的原因,最后阐述了最新MDAC2.8的安全特征. 相似文献
5.
The cost of maintaining a software system over a long period of time far exceeds its initial development cost. Much of the maintenance cost is attributed to the time required by new developers to understand legacy systems. High-level structural information helps maintainers navigate through the numerous low-level components and relations present in the source code. Modularization tools can be used to produce subsystem decompositions from the source code but do not typically produce high-level architectural relations between the newly found subsystems. Controlling subsystem interactions is one important way in which the overall complexity of software maintenance can be reduced.We have developed a tool, called ARIS (Architecture Relation Inference System), that enables software engineers to define rules and relations for regulating subsystem interactions. These rules and relations are called Interconnection Styles and are definedusing a visual notation. The style definition is used by our tool to infer subsystem-level relations in designs being reverse engineered from source code.In this paper we describe our tool and its underlying techniques and algorithms. Using a case study, we describe how ARIS is used to reverse engineer high-level structural information from a real application. 相似文献
6.
The requirements on an object-oriented DBMS for management of information in a large, complex enterprise are presented. These requirements aid in the achievement of an environment characterized by data sharing, open architectures, application and data portability, and assurance of data integrity. They were defined from the point of view of a user of the DBMS; therefore they describe the expected functionality of the DBMS and do not specify the method of implementation to achieve this functionality. They encompass requirements on the data model, query and data manipulation languages, the system architecure, interfaces to the system, change management, and transaction management. 相似文献
7.
在互联网服务中,即时通讯已成为了最流行的服务模式之一,人们对即时通讯的依赖程度也与日俱增。但是, 频频出现的病毒和黑客攻击使广大用户深受其害,即时通讯的安全问题也日益严峻。为了从根本上解决问题,本文对即时通讯软件的架构和协议进行了深入分析,目的是找出漏洞根源,给开发者和使用者提供防止漏洞的依据。 相似文献
8.
通过对汉口西商跑马场的调查,说明它移植武汉的经过和历程,以及它在建筑设计方面的一些特点。 相似文献
9.
Sebastián López Gustavo M. Callicó Félix Tobajas Valentín de Armas José F. López Roberto Sarmiento 《ETRI Journal》2008,30(6):862-864
This letter presents a novel approach for organizing computational resources into groups within H.264/AVC motion estimation architectures, leading to reductions of up to 75% in the equivalent gate count with respect to state‐of‐the‐art designs. 相似文献
10.