全文获取类型
收费全文 | 13146篇 |
免费 | 804篇 |
国内免费 | 382篇 |
专业分类
系统科学 | 1378篇 |
丛书文集 | 282篇 |
教育与普及 | 334篇 |
理论与方法论 | 294篇 |
现状及发展 | 888篇 |
研究方法 | 33篇 |
综合类 | 11122篇 |
自然研究 | 1篇 |
出版年
2024年 | 54篇 |
2023年 | 97篇 |
2022年 | 144篇 |
2021年 | 177篇 |
2020年 | 88篇 |
2019年 | 37篇 |
2018年 | 782篇 |
2017年 | 803篇 |
2016年 | 513篇 |
2015年 | 204篇 |
2014年 | 259篇 |
2013年 | 242篇 |
2012年 | 534篇 |
2011年 | 1258篇 |
2010年 | 1073篇 |
2009年 | 792篇 |
2008年 | 891篇 |
2007年 | 1090篇 |
2006年 | 269篇 |
2005年 | 308篇 |
2004年 | 329篇 |
2003年 | 322篇 |
2002年 | 223篇 |
2001年 | 217篇 |
2000年 | 247篇 |
1999年 | 384篇 |
1998年 | 380篇 |
1997年 | 377篇 |
1996年 | 356篇 |
1995年 | 319篇 |
1994年 | 301篇 |
1993年 | 257篇 |
1992年 | 234篇 |
1991年 | 180篇 |
1990年 | 175篇 |
1989年 | 156篇 |
1988年 | 116篇 |
1987年 | 74篇 |
1986年 | 47篇 |
1985年 | 19篇 |
1984年 | 3篇 |
1967年 | 1篇 |
排序方式: 共有10000条查询结果,搜索用时 31 毫秒
991.
A new discovery of macroscopic fossils from the Ediacaran Doushantuo Formation in the Yangtze Gorges area 总被引:1,自引:0,他引:1
TANG Feng YIN Chongyu Bengtson Stefan LIU Yongqing WANG Ziqiang LIU Pengju GAO Linzhi 《科学通报(英文版)》2006,51(12):1487-1493
The Ediacaran section in the Yangtze Gorges area, South China, is one of the most important in the worldand contains abundant fossils[1-4]. The earliest discov- ery of macrofossils in 1984, including macroscopic algal fossils from the uppermost Doushantuo… 相似文献
992.
目的:探讨外侧张力带钢丝内固定治疗儿童肱骨髁上骨折的临床疗效.方法:采用外侧张力带钢丝内固定方法治疗儿童肱骨髁上骨折55例,术后进行了8个月~36个月,平均24个月随访.结果:根据李氏临床功能评定标准进行疗效评定,其中优46例,良5例,可4例.结论:外侧张力带钢丝内固定是治疗儿童肱骨髁上骨折的理想方法,具有操作容易、固定牢靠、可早期活动、不需特别设备等优点,适合基层医院开展. 相似文献
993.
研究了基于均值场理论和马尔可夫场的运动目标分割方法.该算法先对帧差图像进行简单的前背景划分,再采用均值场理论(MFT),建立马尔可夫随机场(MRF)模型,构造系统相应的能量函数.然后通过求取最大后验估计(MRF-MAP),即求最小能量函数,得出标记场,提取运动目标.实验结果证明:该算法能够很好地消除噪声,对运动目标分割具有较好的分割效果. 相似文献
994.
所谓人才培养模式,是指高等学校根据人才培养的目标和质量标准,为大学生设计的知识、能力和素质结构以及怎样实现这种结构的方式。社会对高等学校人才培养模式的评估,主要是以其外显质量特征即高等学校毕业生的质量作为依据来评价毕业生群体能否很好地适应国家、社会和市场的需要,从而提高人才培养对社会的适应程度,提高人才培养与培养目标的符合程度。本文将以外语院校的教育教学模式为基准,对如何有效评估、建立一套与之相适应的人才培养模式尝试进行一番剖析与论证,以供探讨。 相似文献
995.
HUANG Qiang SHEN Changxiang FANG Yanxiang 《武汉大学学报:自然科学英文版》2007,12(1):13-16
With analysis of limitations Trusted Computing Group (TCG) has encountered, we argued that virtual machine monitor (VMM) is the appropriate architecture for implementing TCG specification. Putting together the VMM architecture, TCG hardware and application-oriented "thin" virtual machine (VM), Trusted VMM-based security architecture is present in this paper with the character of reduced and distributed trusted computing base (TCB). It provides isolation and integrity guarantees based on which general security requirements can be satisfied. 相似文献
996.
CAO Chunjie MA Jianfeng MOON Sangjae 《武汉大学学报:自然科学英文版》2007,12(1):41-45
Certificateless public key cryptography (CL-PKC) avoids the inherent escrow of identity-based cryptography and does not require certificates to guarantee the authenticity of public keys. Based on CL-PKC, we present an efficient constant-round group key exchange protocol, which is provably secure under the intractability of computation Diffie-Hellman problem. Our protocol is a contributory key exchange with perfect forward secrecy and has only two communication rounds. So it is more efficient than other protocols. Moreover, our protocol provides a method to design efficient constant-round group key exchange protocols and most secret sharing schemes could be adopted to construct our protocol. 相似文献
997.
WANG Shengbao CAO Zhenfu 《武汉大学学报:自然科学英文版》2007,12(1):63-66
Key agreement protocols are essential for secure communications. In this paper, to solve the inherent key escrow problem of identity-based cryptography, an escrow-free certificate-based authenticated key agreement (CB-AK) protocol with perfect forward secrecy is proposed. Our protocol makes use of pairings on elliptic curves. The protocol is described and its properties are discussed though comparison with Smart's protocol. 相似文献
998.
In this paper, we give about prime numbers and Blum two theorems and one guess integers.We prove the two theorems about Blum integers.Combining the guess with the primitive non-sieving quadratic sieve,we proposed a improved non-sieving quadratic sieve(INQS).In INQS,we not only reduce the times of squares and modulo n, but also imply another important conclusion,that is,we don't need to find the greatest common divisor of two integers as we do in PNQS.By some examples,we compare it with the primitive non-sieving quadratic sieve(PNQS). It's faster to factor a integer by using improved non-sieving quadratic sieve than the primitive one. 相似文献
999.
CUI Xinchun QIN Xiaolin SHENG Gang 《武汉大学学报:自然科学英文版》2007,12(1):79-82
0 Introduction Watermarking relational database become a hotspot in recent years, it aims to protect copyrights by intro- ducing small errors into the original content without af- fecting the usability for intended purpose. Although some pioneer efforts h… 相似文献
1000.
HAO Liming SUN Xun YANG Shutang LU Songnian 《武汉大学学报:自然科学英文版》2007,12(1):101-104
Trusted computing (TC) technology is brought out by trusted computing group (TCG) to make computing as safe and reliable as people expect. Attestation is one main function specified by TCG, which is the means by which a trusted computer assures a remote computer whose platform is not tampered with. There are two protocols that implement attestation without disclosing the platform's real identity, which are Privacy CA-based protocol and direct anonymous attestation (DAA) protocol. However, in the first protocol the privacy CA is the bottleneck and the platform's identity will be disclosed if the privacy CA is compromise, while DAA protocol can do profiling when dealing with rogue hardware device. In this paper, we propose a DAA-extended new approach to ensure full anonymous attestation that can not only detect a rogue TPM, but also reveal rogue TPM's real identity. 相似文献