首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   13275篇
  免费   819篇
  国内免费   395篇
系统科学   1392篇
丛书文集   281篇
教育与普及   337篇
理论与方法论   294篇
现状及发展   891篇
研究方法   33篇
综合类   11260篇
自然研究   1篇
  2024年   54篇
  2023年   105篇
  2022年   155篇
  2021年   197篇
  2020年   105篇
  2019年   43篇
  2018年   785篇
  2017年   811篇
  2016年   522篇
  2015年   217篇
  2014年   281篇
  2013年   243篇
  2012年   540篇
  2011年   1269篇
  2010年   1077篇
  2009年   798篇
  2008年   891篇
  2007年   1092篇
  2006年   270篇
  2005年   307篇
  2004年   331篇
  2003年   323篇
  2002年   226篇
  2001年   218篇
  2000年   246篇
  1999年   386篇
  1998年   381篇
  1997年   377篇
  1996年   358篇
  1995年   317篇
  1994年   300篇
  1993年   258篇
  1992年   234篇
  1991年   180篇
  1990年   176篇
  1989年   156篇
  1988年   115篇
  1987年   75篇
  1986年   47篇
  1985年   19篇
  1984年   3篇
  1967年   1篇
排序方式: 共有10000条查询结果,搜索用时 46 毫秒
991.
The Ediacaran section in the Yangtze Gorges area, South China, is one of the most important in the worldand contains abundant fossils[1-4]. The earliest discov- ery of macrofossils in 1984, including macroscopic algal fossils from the uppermost Doushantuo…  相似文献   
992.
目的:探讨外侧张力带钢丝内固定治疗儿童肱骨髁上骨折的临床疗效.方法:采用外侧张力带钢丝内固定方法治疗儿童肱骨髁上骨折55例,术后进行了8个月~36个月,平均24个月随访.结果:根据李氏临床功能评定标准进行疗效评定,其中优46例,良5例,可4例.结论:外侧张力带钢丝内固定是治疗儿童肱骨髁上骨折的理想方法,具有操作容易、固定牢靠、可早期活动、不需特别设备等优点,适合基层医院开展.  相似文献   
993.
研究了基于均值场理论和马尔可夫场的运动目标分割方法.该算法先对帧差图像进行简单的前背景划分,再采用均值场理论(MFT),建立马尔可夫随机场(MRF)模型,构造系统相应的能量函数.然后通过求取最大后验估计(MRF-MAP),即求最小能量函数,得出标记场,提取运动目标.实验结果证明:该算法能够很好地消除噪声,对运动目标分割具有较好的分割效果.  相似文献   
994.
所谓人才培养模式,是指高等学校根据人才培养的目标和质量标准,为大学生设计的知识、能力和素质结构以及怎样实现这种结构的方式。社会对高等学校人才培养模式的评估,主要是以其外显质量特征即高等学校毕业生的质量作为依据来评价毕业生群体能否很好地适应国家、社会和市场的需要,从而提高人才培养对社会的适应程度,提高人才培养与培养目标的符合程度。本文将以外语院校的教育教学模式为基准,对如何有效评估、建立一套与之相适应的人才培养模式尝试进行一番剖析与论证,以供探讨。  相似文献   
995.
With analysis of limitations Trusted Computing Group (TCG) has encountered, we argued that virtual machine monitor (VMM) is the appropriate architecture for implementing TCG specification. Putting together the VMM architecture, TCG hardware and application-oriented "thin" virtual machine (VM), Trusted VMM-based security architecture is present in this paper with the character of reduced and distributed trusted computing base (TCB). It provides isolation and integrity guarantees based on which general security requirements can be satisfied.  相似文献   
996.
Certificateless public key cryptography (CL-PKC) avoids the inherent escrow of identity-based cryptography and does not require certificates to guarantee the authenticity of public keys. Based on CL-PKC, we present an efficient constant-round group key exchange protocol, which is provably secure under the intractability of computation Diffie-Hellman problem. Our protocol is a contributory key exchange with perfect forward secrecy and has only two communication rounds. So it is more efficient than other protocols. Moreover, our protocol provides a method to design efficient constant-round group key exchange protocols and most secret sharing schemes could be adopted to construct our protocol.  相似文献   
997.
Key agreement protocols are essential for secure communications. In this paper, to solve the inherent key escrow problem of identity-based cryptography, an escrow-free certificate-based authenticated key agreement (CB-AK) protocol with perfect forward secrecy is proposed. Our protocol makes use of pairings on elliptic curves. The protocol is described and its properties are discussed though comparison with Smart's protocol.  相似文献   
998.
In this paper, we give about prime numbers and Blum two theorems and one guess integers.We prove the two theorems about Blum integers.Combining the guess with the primitive non-sieving quadratic sieve,we proposed a improved non-sieving quadratic sieve(INQS).In INQS,we not only reduce the times of squares and modulo n, but also imply another important conclusion,that is,we don't need to find the greatest common divisor of two integers as we do in PNQS.By some examples,we compare it with the primitive non-sieving quadratic sieve(PNQS). It's faster to factor a integer by using improved non-sieving quadratic sieve than the primitive one.  相似文献   
999.
0 Introduction Watermarking relational database become a hotspot in recent years, it aims to protect copyrights by intro- ducing small errors into the original content without af- fecting the usability for intended purpose. Although some pioneer efforts h…  相似文献   
1000.
Trusted computing (TC) technology is brought out by trusted computing group (TCG) to make computing as safe and reliable as people expect. Attestation is one main function specified by TCG, which is the means by which a trusted computer assures a remote computer whose platform is not tampered with. There are two protocols that implement attestation without disclosing the platform's real identity, which are Privacy CA-based protocol and direct anonymous attestation (DAA) protocol. However, in the first protocol the privacy CA is the bottleneck and the platform's identity will be disclosed if the privacy CA is compromise, while DAA protocol can do profiling when dealing with rogue hardware device. In this paper, we propose a DAA-extended new approach to ensure full anonymous attestation that can not only detect a rogue TPM, but also reveal rogue TPM's real identity.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号