首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   13146篇
  免费   804篇
  国内免费   382篇
系统科学   1378篇
丛书文集   282篇
教育与普及   334篇
理论与方法论   294篇
现状及发展   888篇
研究方法   33篇
综合类   11122篇
自然研究   1篇
  2024年   54篇
  2023年   97篇
  2022年   144篇
  2021年   177篇
  2020年   88篇
  2019年   37篇
  2018年   782篇
  2017年   803篇
  2016年   513篇
  2015年   204篇
  2014年   259篇
  2013年   242篇
  2012年   534篇
  2011年   1258篇
  2010年   1073篇
  2009年   792篇
  2008年   891篇
  2007年   1090篇
  2006年   269篇
  2005年   308篇
  2004年   329篇
  2003年   322篇
  2002年   223篇
  2001年   217篇
  2000年   247篇
  1999年   384篇
  1998年   380篇
  1997年   377篇
  1996年   356篇
  1995年   319篇
  1994年   301篇
  1993年   257篇
  1992年   234篇
  1991年   180篇
  1990年   175篇
  1989年   156篇
  1988年   116篇
  1987年   74篇
  1986年   47篇
  1985年   19篇
  1984年   3篇
  1967年   1篇
排序方式: 共有10000条查询结果,搜索用时 31 毫秒
991.
The Ediacaran section in the Yangtze Gorges area, South China, is one of the most important in the worldand contains abundant fossils[1-4]. The earliest discov- ery of macrofossils in 1984, including macroscopic algal fossils from the uppermost Doushantuo…  相似文献   
992.
目的:探讨外侧张力带钢丝内固定治疗儿童肱骨髁上骨折的临床疗效.方法:采用外侧张力带钢丝内固定方法治疗儿童肱骨髁上骨折55例,术后进行了8个月~36个月,平均24个月随访.结果:根据李氏临床功能评定标准进行疗效评定,其中优46例,良5例,可4例.结论:外侧张力带钢丝内固定是治疗儿童肱骨髁上骨折的理想方法,具有操作容易、固定牢靠、可早期活动、不需特别设备等优点,适合基层医院开展.  相似文献   
993.
研究了基于均值场理论和马尔可夫场的运动目标分割方法.该算法先对帧差图像进行简单的前背景划分,再采用均值场理论(MFT),建立马尔可夫随机场(MRF)模型,构造系统相应的能量函数.然后通过求取最大后验估计(MRF-MAP),即求最小能量函数,得出标记场,提取运动目标.实验结果证明:该算法能够很好地消除噪声,对运动目标分割具有较好的分割效果.  相似文献   
994.
所谓人才培养模式,是指高等学校根据人才培养的目标和质量标准,为大学生设计的知识、能力和素质结构以及怎样实现这种结构的方式。社会对高等学校人才培养模式的评估,主要是以其外显质量特征即高等学校毕业生的质量作为依据来评价毕业生群体能否很好地适应国家、社会和市场的需要,从而提高人才培养对社会的适应程度,提高人才培养与培养目标的符合程度。本文将以外语院校的教育教学模式为基准,对如何有效评估、建立一套与之相适应的人才培养模式尝试进行一番剖析与论证,以供探讨。  相似文献   
995.
With analysis of limitations Trusted Computing Group (TCG) has encountered, we argued that virtual machine monitor (VMM) is the appropriate architecture for implementing TCG specification. Putting together the VMM architecture, TCG hardware and application-oriented "thin" virtual machine (VM), Trusted VMM-based security architecture is present in this paper with the character of reduced and distributed trusted computing base (TCB). It provides isolation and integrity guarantees based on which general security requirements can be satisfied.  相似文献   
996.
Certificateless public key cryptography (CL-PKC) avoids the inherent escrow of identity-based cryptography and does not require certificates to guarantee the authenticity of public keys. Based on CL-PKC, we present an efficient constant-round group key exchange protocol, which is provably secure under the intractability of computation Diffie-Hellman problem. Our protocol is a contributory key exchange with perfect forward secrecy and has only two communication rounds. So it is more efficient than other protocols. Moreover, our protocol provides a method to design efficient constant-round group key exchange protocols and most secret sharing schemes could be adopted to construct our protocol.  相似文献   
997.
Key agreement protocols are essential for secure communications. In this paper, to solve the inherent key escrow problem of identity-based cryptography, an escrow-free certificate-based authenticated key agreement (CB-AK) protocol with perfect forward secrecy is proposed. Our protocol makes use of pairings on elliptic curves. The protocol is described and its properties are discussed though comparison with Smart's protocol.  相似文献   
998.
In this paper, we give about prime numbers and Blum two theorems and one guess integers.We prove the two theorems about Blum integers.Combining the guess with the primitive non-sieving quadratic sieve,we proposed a improved non-sieving quadratic sieve(INQS).In INQS,we not only reduce the times of squares and modulo n, but also imply another important conclusion,that is,we don't need to find the greatest common divisor of two integers as we do in PNQS.By some examples,we compare it with the primitive non-sieving quadratic sieve(PNQS). It's faster to factor a integer by using improved non-sieving quadratic sieve than the primitive one.  相似文献   
999.
0 Introduction Watermarking relational database become a hotspot in recent years, it aims to protect copyrights by intro- ducing small errors into the original content without af- fecting the usability for intended purpose. Although some pioneer efforts h…  相似文献   
1000.
Trusted computing (TC) technology is brought out by trusted computing group (TCG) to make computing as safe and reliable as people expect. Attestation is one main function specified by TCG, which is the means by which a trusted computer assures a remote computer whose platform is not tampered with. There are two protocols that implement attestation without disclosing the platform's real identity, which are Privacy CA-based protocol and direct anonymous attestation (DAA) protocol. However, in the first protocol the privacy CA is the bottleneck and the platform's identity will be disclosed if the privacy CA is compromise, while DAA protocol can do profiling when dealing with rogue hardware device. In this paper, we propose a DAA-extended new approach to ensure full anonymous attestation that can not only detect a rogue TPM, but also reveal rogue TPM's real identity.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号