首页 | 官方网站   微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   3792篇
  免费   50篇
  国内免费   1篇
工业技术   3843篇
  2021年   26篇
  2020年   17篇
  2019年   26篇
  2018年   26篇
  2017年   30篇
  2016年   17篇
  2015年   26篇
  2014年   22篇
  2013年   132篇
  2012年   63篇
  2011年   78篇
  2010年   84篇
  2009年   85篇
  2008年   93篇
  2007年   71篇
  2006年   80篇
  2005年   67篇
  2004年   47篇
  2003年   73篇
  2002年   76篇
  2001年   67篇
  2000年   55篇
  1999年   106篇
  1998年   431篇
  1997年   267篇
  1996年   193篇
  1995年   150篇
  1994年   134篇
  1993年   136篇
  1992年   65篇
  1991年   54篇
  1990年   76篇
  1989年   62篇
  1988年   64篇
  1987年   48篇
  1986年   63篇
  1985年   66篇
  1984年   40篇
  1983年   49篇
  1982年   45篇
  1981年   47篇
  1980年   37篇
  1979年   27篇
  1978年   38篇
  1977年   56篇
  1976年   103篇
  1975年   24篇
  1974年   30篇
  1972年   20篇
  1970年   17篇
排序方式: 共有3843条查询结果,搜索用时 13 毫秒
51.
The M/G/1 queue with permanent customers   总被引:2,自引:0,他引:2  
The authors examine an M/G/1 FCFS (first come, first served) queue with two types of customers: ordinary customers, who arrive according to a Poisson process, and permanent customers, who immediately return to the end of the queue after having received a service. The influence of the permanent customers on queue length and sojourn times of the Poisson customers is studied using results from queuing theory and from the theory of branching processes. In particular, it is shown that, when the service time distributions of the Poisson customers and all K permanent customers are negative exponential with identical means, the queue length and sojourn time distributions of the Poisson customers are the (K+1)-fold convolution of those for the case without permanent customers  相似文献   
52.
On the establishment of an access VPN in broadband access networks   总被引:16,自引:0,他引:16  
Many corporate networks use the Internet as a cost-effective substitute for expensive leased lines and long-distance telephone calls, for allowing their users to have on-demand connectivity into their intranets through ad hoc tunnels, a concept known as access VPN. Establishing an access VPN in a broadband access network is very often a difficult networking challenge that requires several tunnels to be established between the various involved entities. This is especially the case in an open broadband access network where the association between a host and its ISP is not known to the network in advance. This article discusses several schemes for establishing an access VPN in a broadband access network, and explains the need for the various tunnels in each scheme.  相似文献   
53.
We investigate the problem of scanning and prediction (ldquoscandiction,rdquo for short) of multidimensional data arrays. This problem arises in several aspects of image and video processing, such as predictive coding, for example, where an image is compressed by coding the error sequence resulting from scandicting it. Thus, it is natural to ask what is the optimal method to scan and predict a given image, what is the resulting minimum prediction loss, and whether there exist specific scandiction schemes which are universal in some sense. Specifically, we investigate the following problems: first, modeling the data array as a random field, we wish to examine whether there exists a scandiction scheme which is independent of the field's distribution, yet asymptotically achieves the same performance as if this distribution were known. This question is answered in the affirmative for the set of all spatially stationary random fields and under mild conditions on the loss function. We then discuss the scenario where a nonoptimal scanning order is used, yet accompanied by an optimal predictor, and derive bounds on the excess loss compared to optimal scanning and prediction. This paper is the first part of a two-part paper on sequential decision making for multidimensional data. It deals with clean, noiseless data arrays. The second part deals with noisy data arrays, namely, with the case where the decision maker observes only a noisy version of the data, yet it is judged with respect to the original, clean data.  相似文献   
54.
This study demonstrates that third-person perceptions regarding the influence of media coverage of peripheral towns indirectly affect the desire to consider moving. It is argued that regardless of whether people's perceptions of where they live are really shaped by media coverage, if people believe others are affected by this coverage more than they are, they are more likely to consider relocation. We investigated whether the perceived stigmatization of peripheral development towns in Israel has an impact on the desire of their residents to stay or leave, over and above the disaffection with actual living conditions in these communities. Using structural equation modeling ( N = 472), we show that third-person estimations indeed influence both perceptions and behavioral intentions.  相似文献   
55.
The effect of Copper on TDDB failure in a structure incorporating a low-k interlevel dielectric was studied theoretically and experimentally. Interdigitated comb capacitor structures were prepared with and without Cu metallization and stressed at 4.0 to 6.6 MV/cm at 150C. The samples without Cu did not fail to over 1800 hours at 4 MV/cm whereas the samples with Cu exhibited a median time to failure (t50) of 45 minutes. At 6.6 MV/cm, the t50 was 1.8 hours for the Cu free samples. This experiment demonstrated the importance of Cu in the TDDB behaviour of low-k dielectrics, but also demonstrated that the presence of Cu was not a necessary condition for failure. The effect of Cu diffusion on TDDB behaviour was studied in the context of the “Impact Damage” model. Both field assisted ionic diffusion and diffusion of neutral Cu was considered. It is seen that the behaviour at low fields near use conditions may have little relationship to the predictions obtained from the results of typical TDDB testing.  相似文献   
56.
In recent years, bulk metallic glasses (BMGs) have drawn much research attention and are shown to be of industrial interest due to their superior mechanical properties and resistance to corrosion. In spite of the interest in harnessing MG for microelectromechanical systems devices, there are limitations in manufacturing such micrometer‐scale structures. A novel approach for the fabrication of 3D MG structures using laser‐induced forward transfer (LIFT) is demonstrated. Inherent tremendous cooling rates associated with the metal LIFT process (≈1010 k s?1) make the formation of a variety of BMGs accessible, including also various binary compositions. In this work, it is demonstrated that LIFT printing of ZrPd‐based metallic glass microstructures can also be performed under ambient conditions. X‐ray diffraction analysis of the printed structures reveals > 95% of amorphous metal phase. Taking advantage of the properties of BMG, high quality printing of high aspect ratio BMG pillars, and microbridges are demonstrated. It is also shown how a composite, amorphous‐crystalline metal structure with a required configuration can be fabricated using multimaterial LIFT printing. The inherent high resolution of the method combined with the noncontact and multimaterial printing capacity makes LIFT a valuable additive manufacturing technique to produce metallic glass‐based devices.  相似文献   
57.
58.
Intermetallics that coexist with III-V’s in the bulk are expected to form thermodynamically stable overlayers when deposited as a thin film. To the extent that adsorption kinetics do not play a role, these films should be abrupt and able to withstand high temperature processing. Some of these films have been found to be epitaxial after heating in vacuum. FeAl has been found to form pseudomorphic films on InP(l00) substrates and to grow in a layer-by-layer mode even when code-posited. To explore the role of stoichiometry and crystal strain, we have used reflection high energy electron diffraction (RHEED) to compare the growth of Fe x -Al1−x on GaAs(l00) to its growth on InP substrates. In both cases RHEED intensity oscillations are observed at 200° C, indicating two-dimensional island formation and layer-by-layer growth. For both, the growth is pseudomorphic on an AlAs buffer layer, with any lattice constant change less than 0.3%. When the intermetallics were codeposited, the growth proceeded via double layer formation forx < 0.7 and via single layers for largex. The films were stable to 550° C. Subsequent growth of AlAs was three dimensional.  相似文献   
59.
n‐Si/CnH2n + 1/Hg junctions (n = 12, 14, 16 and 18) can be prepared with sufficient quality to assure that the transport characteristics are not anymore dominated by defects in the molecular monolayers. With such organic monolayers we can, using electron, UV and X‐ray irradiation, alter the charge transport through the molecular junctions on n‐ as well as on p‐type Si. Remarkably, the quality of the self‐assembled molecular monolayers following irradiation remains sufficiently high to provide the same very good protection of Si from oxidation in ambient atmosphere as provided by the pristine films. Combining spectroscopic (UV photoemission spectroscopy (UPS), X‐ray photoelectron spectroscopy (XPS), Auger, near edge‐X‐ray absorption fine structure (NEXAFS)) and electrical transport measurements, we show that irradiation induces defects in the alkyl films, most likely C?C bonds and C? C crosslinks, and that the density of defects can be controlled by irradiation dose. These altered intra‐ and intermolecular bonds introduce new electronic states in the highest occupied molecular orbital (HOMO)–lowest unoccupied molecular orbital (LUMO) gap of the alkyl chains and, in the process, dope the organic film. We demonstrate an enhancement of 1–2 orders of magnitude in current. This change is clearly distinguishable from the previous observed difference between transport through high quality and defective monolayers. A detailed analysis of the electrical transport at different temperatures shows that the dopants modify the transport mechanism from tunnelling to hopping. This study suggests a way to extend significantly the use of monolayers in molecular electronics.  相似文献   
60.
A major challenge in the study of cryptography is characterizing the necessary and sufficient assumptions required to carry out a given cryptographic task. The focus of this work is the necessity of a broadcast channel for securely computing symmetric functionalities (where all the parties receive the same output) when one third of the parties, or more, might be corrupted. Assuming all parties are connected via a point-to-point network, but no broadcast channel (nor a secure setup phase) is available, we prove the following characterization:
  • A symmetric n-party functionality can be securely computed facing \(n/3\le t<n/2\) corruptions (i.e., honest majority), if and only if it is \((n-2t)\) -dominated; a functionality is k-dominated, if any k-size subset of its input variables can be set to determine its output to some predetermined value.
  • Assuming the existence of one-way functions, a symmetric n-party functionality can be securely computed facing \(t\ge n/2\) corruptions (i.e., no honest majority), if and only if it is 1-dominated and can be securely computed with broadcast.
It follows that, in case a third of the parties might be corrupted, broadcast is necessary for securely computing non-dominated functionalities (in which “small” subsets of the inputs cannot determine the output), including, as interesting special cases, the Boolean XOR and coin-flipping functionalities.
  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号