首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   2641篇
  免费   199篇
  国内免费   122篇
化学   154篇
晶体学   1篇
力学   131篇
综合类   25篇
数学   91篇
物理学   190篇
综合类   2370篇
  2024年   9篇
  2023年   26篇
  2022年   68篇
  2021年   70篇
  2020年   96篇
  2019年   60篇
  2018年   65篇
  2017年   81篇
  2016年   104篇
  2015年   163篇
  2014年   237篇
  2013年   166篇
  2012年   214篇
  2011年   229篇
  2010年   167篇
  2009年   146篇
  2008年   153篇
  2007年   171篇
  2006年   144篇
  2005年   112篇
  2004年   107篇
  2003年   82篇
  2002年   71篇
  2001年   44篇
  2000年   29篇
  1999年   27篇
  1998年   26篇
  1997年   15篇
  1996年   16篇
  1995年   13篇
  1994年   7篇
  1993年   12篇
  1992年   4篇
  1991年   9篇
  1990年   2篇
  1989年   4篇
  1988年   5篇
  1987年   2篇
  1986年   5篇
  1985年   1篇
排序方式: 共有2962条查询结果,搜索用时 234 毫秒
121.
管理软件失败率高是个不争的事实,主要是因为管理软件中存在个性化、可维护性、应用集成等问题,所以出现了面向业务导向和驱动的应用开发平台.通过引入企业模型理论(EE/EM),为管理软件设计和开发提供有效的导向和依据.  相似文献   
122.
农业专家系统开发平台测试方案研究   总被引:4,自引:0,他引:4  
主要阐述了对农业专家系统开发平台测试方案的研究及一些测试技术在其中的应用,提出了针对这类开发平台的一种分阶段、分步骤、分领域的测试方案,并运用案例分析了黑盒测试、应用操作覆盖测试和Web应用软件测试技术在测评这类开发平台中的应用。  相似文献   
123.
随着汽车产业的发展,以及人们对汽车安全性能的要求越来越高,汽车测试平台也得到迅猛发展,这其中制动器测试试验台的发展自然成为各大汽车厂家大力发展的一个项目方向.以往的试验台设计的配套软件适用的参数标准比较单一,并且可观性和操控性不强,而JF122型试验台采用计算机自动控制,执行试验程序,并能够完成数据的采集、处理、存储.  相似文献   
124.
在紧缩场中进行天线测量,天线定位结构型式及整体刚度性能非常重要.根据天线测量中心运动范围及精度要求,为减小部件之间的错位公差,采用分段整体结构封闭设计,设计了一种新的天线支撑台架结构方案,详细进行了结构变形刚度分析,提出以比刚度高和系统重量低为双指标的优化函数.最后,以结构尺寸为基本变量,采用模拟退火算法,得出了天线支撑台架的具体结构尺寸.  相似文献   
125.
This paper, focusing on the trusted computing group's standards, explained the key concept of trusted compuling and provided the architecture of trusted PC. It built trust bottom-up by starting with trusted hardware and adding layers of trusted software. It is a system-level solution available to all applications running on the member platforms. This solution reduces the security burden on applications and thus simplifies application programming.  相似文献   
126.
0 IntroductionDigital signatureis a key technique to provide datainteg-rity andsource authenticationcapabilities to enhance da-ta trustworthiness in trusted computing platform. Most cur-rent digital signature schemes are based on complex mathe-matical problems , such as integer factoring, discrete log-arithm,and discrete logarithm on elliptic curves . The hard-ness of these underlying mathematical problems is really un-certain at present . Merkle treeis a method used for authenti-cation and di…  相似文献   
127.
Trusted path is one of the crucial features that operating systems must provide for fundamental security support. In order to explore the possibility of implementing a trusted path mechanism with the support of trusted platform module (TPM) technologies, and to support TPM capabilities in operating systems, the paper extended the scope of the conventional trusted path to cover the situation in which a user communicates with software residing on a remote host. The paper combined the concept of operating system support for trusted path with that for TPM platforms, and proposed the architecture of an extended trusted path mechanism in operating system with considerations on TPM-capable platforms support. As part of the author's research in secure operating systems, the work of the paper was carried out with Linux as an experimental prototype system. The research result shows that TPM capabilities can strengthen extended trusted path mechanisms of operating systems.  相似文献   
128.
The lunar-landing is the continuity of manned spaceflight engineering. Comparing with the manned spacecraft engineering, it requires more reliability , larger scale, and more funds. On the basis of China' s achievements and the experiences of foreign com~tries, the paper brings forward the idea that using the existing transportation technology to send the launch vehicles and cosmonauts to the near-earth orbit in batches, assembling the components together on the space-launch platform, and then launching them to the moon to fulfill our dream of manned landing on the moon. The paper also discusses the space launch platform and the launching ways.  相似文献   
129.
0 IntroductionPeople need a secure and dependable computing environ-ment[1]. The cryptology is known as the core of com-puter security[2]. The application of cryptologyis mainly ful-filled by key management and credential mechanism.In thispaper , we should study the key management and credentialmechanismbased ontrusted computing platform,and give theactual application of these security mechanisms for buildingtrusted computing environment .1 OverviewTrusted Computing1 .1 The Original of Trus…  相似文献   
130.
0 IntroductionDue to the fast development of communication technolo-gies ,the lowered cost of hardware,there is anincreas-ing reliance on computer networks . However ,along with thetremendous convenience provided,there is increasing numberof network based attacks .One particular kind of attacks exploits software vulnera-bilities .It is lunched by a virus or worm.Some examples in-clude earlier worms such as Code Red, Ni mda as well as re-cently high speed worms ,such as Slammer , Witty and F…  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号