首页 | 官方网站   微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   20946篇
  免费   2954篇
  国内免费   2682篇
工业技术   26582篇
  2024年   93篇
  2023年   533篇
  2022年   846篇
  2021年   1007篇
  2020年   1102篇
  2019年   778篇
  2018年   794篇
  2017年   953篇
  2016年   1123篇
  2015年   1308篇
  2014年   2063篇
  2013年   1647篇
  2012年   1877篇
  2011年   1719篇
  2010年   1119篇
  2009年   1088篇
  2008年   1232篇
  2007年   1324篇
  2006年   1108篇
  2005年   987篇
  2004年   804篇
  2003年   733篇
  2002年   547篇
  2001年   418篇
  2000年   304篇
  1999年   260篇
  1998年   168篇
  1997年   132篇
  1996年   108篇
  1995年   90篇
  1994年   80篇
  1993年   47篇
  1992年   43篇
  1991年   29篇
  1990年   20篇
  1989年   22篇
  1988年   18篇
  1987年   9篇
  1986年   10篇
  1985年   5篇
  1984年   7篇
  1983年   8篇
  1982年   2篇
  1980年   3篇
  1979年   4篇
  1978年   1篇
  1977年   4篇
  1976年   1篇
  1972年   2篇
  1959年   1篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
31.
The present study investigates the impact of different key solutions of mobile phones on users' effectiveness and efficiency using the devices. In the first experiment, 36 children (9 - 14 years) and in the second experiment 45 young adults (19 - 33 years) completed four common phone tasks twice consecutively on three simulated phones that had identical menus, but different key solutions. An approach was undertaken to quantify the complexity of keys in three models, incorporating different factors contributing to the keys' complexity (number of key options, number of modes and number of modes with a semantically dissimilar meaning), in order to predict users' performance decrements. As a further main factor, the degree of the users' locus of control (LOC) was measured and interactions with performance outcomes were studied. As dependent measures, the number of inefficient keystrokes, the number of tasks solved and the processing time were determined. Results showed a significant effect of control key solutions on users' efficiency and effectiveness for both children and young adults. Moreover, children's LOC values significantly interacted with performance: children with low LOC values showed the lowest performance and no learnability, especially when using keys with a high complexity. From the three factors contributing to the complexity of keys, keys exerting different functions with semantically inconsistent meanings had the worst effect on performance. It is concluded that in mobile user interface design keys with semantically inconsistent meanings should be generally avoided.  相似文献   
32.
随着计算机网络技术的发展,远程教学系统的结构发生了重大的变化,逐步由原来的客户机/服务器(C/S)结构转变为基于Internet的浏览器/服务器(B/S)结构。本文提出了基于CORBA技术的B/S结构系统模型。分析了其运行过程,并与传统的结构进行了比较,指明了其优越性。在本文的结尾。指出了使用这种技术的一个具体例子。  相似文献   
33.
结合我国汽车计算平台工程,分析了国外相关的标准现状和基本框架,并为今后工作的开展提出了建议.  相似文献   
34.
Efficient multicast search under delay and bandwidth constraints   总被引:1,自引:0,他引:1  
The issue of a multicast search for a group of users is discussed in this study. Given the condition that the search is over only after all the users in the group are found, this problem is called the Conference Call Search (CCS) problem. The goal is to design efficient CCS strategies under delay and bandwidth constraints. While the problem of tracking a single user has been addressed by many studies, to the best of our knowledge, this study is one of the first attempts to reduce the search cost for multiple users. Moreover, as oppose to the single user tracking, for which one can always reduce the expected search delay by increasing the expected search cost, for a multicast search the dependency between the delay and the search cost is more complicated, as demonstrated in this study. We identify the key factors affecting the search efficiency, and the dependency between them and the search delay. Our analysis shows that under tight bandwidth constraints, the CCS problem is NP-hard. We therefore propose a search method that is not optimal, but has a low computational complexity. In addition, the proposed strategy yields a low search delay as well as a low search cost. The performance of the proposed search strategy is superior to the implementation of an optimal single user search on a group of users. Amotz Bar-Noy received the B.Sc. degree in 1981 in Mathematics and Computer Science and the Ph.D. degree in 1987 in Computer Science, both from the Hebrew University, Israel. From October 1987 to September 1989 he was a post-doc fellow in Stanford University, California. From October 1989 to August 1996 he was a Research Staff Member with IBM T. J. Watson Research Center, New York. From February 1995 to September 2001 he was an associate Professor with the Electrical Engineering-Systems department of Tel Aviv University, Israel. From September 1999 to December 2001 he was with AT research labs in New Jersey. Since February 2002 he is a Professor with the Computer and Information Science Department of Brooklyn College - CUNY, Brooklyn New York. Zohar Naor received the Ph.D. degree in Computer Science from Tel Aviv University, Tel Aviv, Israel, in 2000. Since 2003 he is with the University of Haifa, Israel. His areas of interests include wireless networks, resource management of computer networks, mobility, search strategies, and multiple access protocols.  相似文献   
35.
网格资源管理系统模型研究   总被引:10,自引:3,他引:7  
网格资源管理系统是网格计算系统的重要组成部分。文章分析了网格资源管理系统的功能需求,具体论述了该模型的原型系统,最后介绍了相关研究工作。  相似文献   
36.
在介绍宽带无线移动发展趋势所采用的新技术的基础上,论述了宽带无线移动通信网络优化及相关发展策略的一些问题。  相似文献   
37.
可信计算与可信网络   总被引:3,自引:0,他引:3  
论文对主流的可信计算技术——TCPA和NGSCB进行了分析,并对可信计算平台(TCP)进行了研究,对基于可信计算的可信网络的三个基本属性进行了分析和研究,最后介绍了可信网络的发展现状。  相似文献   
38.
在编制遥测数据处理软件的过程中,面对大量的测试数据,经常需要编写高效率的数据过滤器。本文讨论了一种通过采用跨单元、跨类访问Delphi类的私有域的方法实现快速删除TList批连续结点的新算法,并通过测试结果得到验证。  相似文献   
39.
40.
在参考国外井间示踪测试中示踪剂用量设计方法的报导及大庆油田井间示踪实践的基础上.以Brigham—Smith提出的水驱五点井网有效示踪物质用量计算方法为基础,提出了多层条件下的井网外的稀释修正,井网类型的修正、放射性示踪剂的衰变修正,并充分考虑环保因素和技术要求的示踪剂用量计算方法。同时也提出了商品纯度及有效示踪物质含量的示踪化学剂用量的计算方法。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号