首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   10181篇
  免费   815篇
  国内免费   364篇
系统科学   1483篇
丛书文集   127篇
教育与普及   34篇
理论与方法论   290篇
现状及发展   898篇
综合类   8528篇
  2024年   22篇
  2023年   44篇
  2022年   86篇
  2021年   116篇
  2020年   137篇
  2019年   74篇
  2018年   803篇
  2017年   839篇
  2016年   549篇
  2015年   209篇
  2014年   240篇
  2013年   273篇
  2012年   550篇
  2011年   1305篇
  2010年   1178篇
  2009年   774篇
  2008年   885篇
  2007年   1158篇
  2006年   319篇
  2005年   367篇
  2004年   389篇
  2003年   308篇
  2002年   248篇
  2001年   196篇
  2000年   161篇
  1999年   65篇
  1998年   11篇
  1997年   3篇
  1996年   6篇
  1995年   6篇
  1994年   4篇
  1993年   3篇
  1992年   2篇
  1991年   7篇
  1990年   6篇
  1989年   1篇
  1988年   6篇
  1987年   3篇
  1981年   4篇
  1980年   1篇
  1967年   1篇
  1955年   1篇
排序方式: 共有10000条查询结果,搜索用时 984 毫秒
951.
This paper introduces agent-based methodology to build a distributed autonomic storage system infrastructure, and an effectively negotiation mechanism based on agent is applied for data location. We present Availability-based Data Allocation (ADA) algorithm as a data placement strategy to achieve high efficient utilization of storage resources by employing multiple distributed storage resources. We use Bloom filter in each storage device to track the location of data. We present the data lookup strategy that small size of read request is handled directly, and large size of read request is handled by cooperation with storage devices.The performance evaluation shows that the data location mechanism is high available and can work well for heterogeneous autonomic storage systems.  相似文献   
952.
给出了Sza'sz型算子线性组合的点态逼近的正、逆定理  相似文献   
953.
We discuss the linear conjugate boundary value problems on the unit circle and the real axis. We obtain some Fredholm integral equations. Using thess equations we discuss the solvable conditions on these problems and we also give a direct method for the extension problems on the real axis.  相似文献   
954.
Public discourse in Western democracies, particularly in the United States, is far from the Habermasian ideal of citizens engaging in a rational discussion of public affairs. Rather than providing an arena for informed deliberation, the growing expertise of the media, lobbyists, and politicians has sub-optimized the current system of discourse to focus on emotional manipulation and the creation of polarized interests, each competing with each other for dominance. Avoiding a potentially disastrous outcome from this unbalancing of public discourse requires a revitalization of the public sphere and a return of the citizen voice in public decision making. To that end, systems thinkers have a tremendous opportunity and can play an important role. This article will explore the current challenges facing public discourse and outline that potential role.  相似文献   
955.
This paper presents a method to analyze and calculate the angular glint of targets. By parting the target to very small size cells, using high-frequency approximation, the near-field radar cross section (RCS) is calculated based on the scattering from complex targets and environments (SCTE) system, and the angular glint is calculated by the phase grads. The results show that the angular glint can be calculated exactly in the SCTE system, and this method is correct and efficient. In the near-zone, the far-field theory is not applicable and the angular glint should be calculated by the near-field theory.  相似文献   
956.
采用北京核仪器厂生产的FJ-428型便携式多用辐射仪测定不同矿物、岩石以及湖南岳麓山、望城县桥驿洪家水库休闲度假区、西藏勒布旅游区等不同地质环境的放射性,表明高温高压下形成的矿物和岩石以及高温高压作用下形成的变质岩放射性剂量高,而沉积岩类和沉积类矿物放射性剂量低.不同矿物、岩石的α射线放射性剂量极低,放射性污染最主要的是γ射线污染.对放射性剂量高的矿物、岩石如花岗岩、板岩在一般情况下不适宜作室内建筑或装饰用材.  相似文献   
957.
A group-oriented (t, n) threshold signature scheme employs the cryptographic techniques of secret share, allows any subset of t players out of n players to sign message on behalf of the group and disallows the creation of a valid signature if fewer than t players take part in the signature protocol. In this paper, we proposed a new group-oriented (t, n) threshold signature schemes with traceable signers based on Schnorr signature. The proposed scheme is proved traceable, robust and unforgeable against the "static" adversary with the discrete logarithm assumption in the random oracle model and existence of broadcast channel. The proofs of the strongest security (existential unforgeability against adaptively chosen message attacks under the discrete logarithm assumption) are provided in the random oracle model.  相似文献   
958.
特殊技能人才,是根据素质结构分析法划分出来的现代社会四种基本人才类型之一。这类人才的教育和培养,迄今为止仍然是学校教育的一个难点,甚至是盲点。本文介绍了一套适应行业岗位需求、适合特殊技能型创业人才培养要求的“确立特殊技能型创业人才培养目标——调整、优化课程结构——完善技能培养和考核方案——实施顶岗实习、毕业实习——提高职业综合素质”的五位一体的特殊技能型创业人才培养模式。  相似文献   
959.
Traditional approach of design by contract, due to mixing the contract code with application code, is difficult for the extensibility and reusability of software system. This paper presents a framework named JADBC for design by contract based on Aspect-Oriented Programming (AOP) to resolve these problems. By providing a new modularized element, aspect, the framework successfully separates the contracts in design by contract, from functional codes. The implementation of this framework is based on dynamic AOP which can have the contract changed at runtime, consequently, enhancing program flexibility. JADBC framework modularizes the contracts in a clear-cut fashion that is easier to design, implement, and maintain. Biography: WEN Jing (1982–), female, Ph.D. candidate, research directions: software engineer, aspect-oriented software development.  相似文献   
960.
The singularly perturbed initial boundary value problems for the reaction diffusion system are raised. Firstly, under suitable conditions, using a iteration technique, the differential inequalities theorem is constructed and introducing two auxiliary functions the existence and uniqueness theorem of solution for the basic reaction diffusion system is proved. Using the singularly perturbed method the formal asymptotic expressions of the solution are constructed with power series theory. By using the comparison theorem the existence and its asymptotic behavior of solution for the original problem are studied. Finally, using method of estimate inequalities, the structure of solutions for the problem is discussed thoroughly in three cases and asymptotic solution of the original problem is given. The asymptotic behavior of solution in the three cases is proved.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号