首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   2831篇
  免费   144篇
  国内免费   7篇
电工技术   25篇
综合类   9篇
化学工业   533篇
金属工艺   50篇
机械仪表   47篇
建筑科学   126篇
矿业工程   28篇
能源动力   93篇
轻工业   353篇
水利工程   29篇
石油天然气   7篇
无线电   241篇
一般工业技术   406篇
冶金工业   496篇
原子能技术   9篇
自动化技术   530篇
  2023年   17篇
  2022年   19篇
  2021年   46篇
  2020年   60篇
  2019年   48篇
  2018年   72篇
  2017年   81篇
  2016年   82篇
  2015年   69篇
  2014年   86篇
  2013年   205篇
  2012年   129篇
  2011年   163篇
  2010年   155篇
  2009年   156篇
  2008年   168篇
  2007年   165篇
  2006年   124篇
  2005年   88篇
  2004年   92篇
  2003年   102篇
  2002年   74篇
  2001年   36篇
  2000年   51篇
  1999年   48篇
  1998年   165篇
  1997年   92篇
  1996年   64篇
  1995年   44篇
  1994年   38篇
  1993年   39篇
  1992年   21篇
  1991年   19篇
  1990年   14篇
  1989年   20篇
  1988年   14篇
  1987年   15篇
  1986年   12篇
  1985年   14篇
  1984年   9篇
  1983年   9篇
  1982年   4篇
  1981年   12篇
  1980年   5篇
  1979年   4篇
  1978年   3篇
  1977年   7篇
  1976年   7篇
  1973年   3篇
  1971年   3篇
排序方式: 共有2982条查询结果,搜索用时 93 毫秒
71.
This paper considers the problem of electing an eventual leader in an asynchronous shared memory system. While this problem has received a lot of attention in message-passing systems, very few solutions have been proposed for shared memory systems. As an eventual leader cannot be elected in a pure asynchronous system prone to process crashes, the paper first proposes to enrich the asynchronous system model with an additional assumption. That assumption (denoted AWB) is particularly weak. It is made up of two complementary parts. More precisely, it requires that, after some time, (1) there is a process whose write accesses to some shared variables be timely, and (2) the timers of (tf) other processes be asymptotically well-behaved (t denotes the maximal number of processes that may crash, and f the actual number of process crashes in a run). The asymptotically well-behaved timer notion is a new notion that generalizes and weakens the traditional notion of timers whose durations are required to monotonically increase when the values they are set to increase (a timer works incorrectly when it expires at arbitrary times, i.e., independently of the value it has been set to). The paper then focuses on the design of t-resilient AWB-based eventual leader protocols. “t-resilient” means that each protocol can cope with up to t process crashes (taking t=n−1 provides wait-free protocols, i.e., protocols that can cope with any number of process failures). Two protocols are presented. The first enjoys the following noteworthy properties: after some time only the elected leader has to write the shared memory, and all but one shared variables have a bounded domain, be the execution finite or infinite. This protocol is consequently optimal with respect to the number of processes that have to write the shared memory. The second protocol guarantees that all the shared variables have a bounded domain. This is obtained at the following additional price: t+1 processes are required to forever write the shared memory. A theorem is proved which states that this price has to be paid by any protocol that elects an eventual leader in a bounded shared memory model. This second protocol is consequently optimal with respect to the number of processes that have to write in such a constrained memory model. In a very interesting way, these protocols show an inherent tradeoff relating the number of processes that have to write the shared memory and the bounded/unbounded attribute of that memory.  相似文献   
72.
This study investigated the online practices of students enrolled in graduate-level distance education courses. Using interviews and a questionnaire as data sources, the study sought to: (a) identify common practices that students adopt in asynchronous discussions, and (b) gain an understanding of why students adopt them. An analysis of the data suggests that many of the practices are coping mechanisms developed to help students more easily meet course participation requirements. Some of these are time saving strategies designed to reduce information overload (e.g., skimming messages rather than reading them carefully). Other strategies are designed to help students project an image of themselves as knowledgeable and collaborative course participants. It is argued that although these practices provide students with a level of efficiency in terms of meeting course requirements, they may inadvertently undermine learning.  相似文献   
73.
The goal of this work is to present a causation modeling methodology with the ability to accurately infer blood glucose levels using a large set of highly correlated noninvasive input variables over an extended period of time. These models can provide insight to improve glucose monitoring, and glucose regulation through advanced model-based control technologies. The efficacy of this approach is demonstrated using real data from a type 2 diabetic (T2D) subject collected under free-living conditions over a period of 25 consecutive days. The model was identified and tested using eleven variables that included three food variables as well as several activity and stress variables. The model was trained using 20 days of data and validated using 5 days of data. This gave a fitted correlation coefficient of 0.70 and an average absolute error (AAE) (i.e., the average of the absolute values for the measured glucose concentration minus modeled glucose concentration) of 13.3 mg/dL for the validation data. This AAE result was significantly better than the subject’s personal glucose meter AAE of 15.3 mg/dL for replicated measurements.  相似文献   
74.
The purpose of this study was to examine social evaluations (i.e., perceptions of empathy and positivity) following peoples’ interactions with digital human representations. Female research participants engaged in a 3-min interaction while immersed in a 3-D immersive virtual environment with a “peer counselor.” Participants were led to believe that the peer counselor was either an embodied agent (i.e., computer algorithm) or an avatar (i.e., another person). During the interaction, the peer counselor either smiled or not. As predicted, a digitally-rendered smile was found to affect participants’ social evaluations. However, these effects were moderated by participants’ beliefs about their interaction partner. Specifically, smiles enhanced social evaluations of embodied agents but degraded them for avatars. Although these results are consistent with other findings concerning the communicative realism of embodied agents and avatars they uniquely demonstrate that people’s beliefs alone, rather than actual differences in virtual representations, can impact social evaluations.  相似文献   
75.
An order-clique-based approach for mining maximal co-locations   总被引:2,自引:0,他引:2  
Most algorithms for mining spatial co-locations adopt an Apriori-like approach to generate size-k prevalence co-locations after size-(k − 1) prevalence co-locations. However, generating and storing the co-locations and table instances is costly. A novel order-clique-based approach for mining maximal co-locations is proposed in this paper. The efficiency of the approach is achieved by two techniques: (1) the spatial neighbor relationships and the size-2 prevalence co-locations are compressed into extended prefix-tree structures, which allows the order-clique-based approach to mine candidate maximal co-locations and co-location instances; and (2) the co-location instances do not need to be stored after computing some characteristics of the corresponding co-location, which significantly reduces the execution time and space required for mining maximal co-locations. The performance study shows that the new method is efficient for mining both long and short co-location patterns, and is faster than some other methods (in particular the join-based method and the join-less method).  相似文献   
76.
The three-compartment model (3CM) was validated previously for prediction of endurance times by modifying its fatigue and recovery rates. However, endurance times do not typically represent work demands, and it is unknown if the current version of the 3CM is applicable for ergonomics analysis of all occupational tasks. The purpose of this study was to add biological fidelity to the 3CM, and validate the model against a series of submaximal force plateaus. The fatigue and recovery rates were modified to represent graded physiological motor unit characteristics (termed 3CMGMU). In nine experiments of submaximal efforts, the 3CMGMU produced a root-mean squared difference (RMSD) of 4.1 ± 0.5% MVC over experiments with an average strength loss (i.e. fatigue) of 31.0 ± 1.1% MVC. The 3CMGMU model performed poorly for endurance tasks. The 3CMGMU model is an improvement for evaluating submaximal force patterns consisting of intermittent muscle contractions of the hand and forearm.

Practitioner Summary: We modified an existing fatigue model using known physiological properties in order to predict fatigue during nine different submaximal force profiles; consistent with efforts seen in industrial work. We expect this model to be included in digital human modelling software, for the assessment of repetitive work and muscle fatigue in repetitive tasks.

Social Media Summary: The proposed model has applications for estimating task fatigue in proactive ergonomic analyses of complex force patterns using digital human models.  相似文献   

77.
In this paper, we present our system design, operational procedure, testing process, field results, and lessons learned for the valve-turning task of the DARPA Robotics Challenge (DRC). We present a software framework for cooperative traded control that enables a team of operators to control a remote humanoid robot over an unreliable communication link. Our system, composed of software modules running on-board the robot and on a remote workstation, allows the operators to specify the manipulation task in a straightforward manner. In addition, we have defined an operational procedure for the operators to manage the teleoperation task, designed to improve situation awareness and expedite task completion. Our testing process, consisting of hands-on intensive testing, remote testing, and remote practice runs , demonstrates that our framework is able to perform reliably and is resilient to unreliable network conditions. We analyze our approach, field tests, and experience at the DRC Trials and discuss lessons learned which may be useful for others when designing similar systems.  相似文献   
78.
This paper introduces and motivates ADL, a new formal notation for the specification of the temporal and functional behaviour of concurrent processes. ADL is tailored to be directly compatible with the DORIS design method. It combines a graphical Activity State-Machine (ASM) notation and a model-based Activity Functional Behaviour (AFB) notation. The abstract syntax, and static and dynamic semantics for the ASM notation are given, the dynamic semantics being given proof-theoretically in many-sorted logic extended with the RTL ‘occurrence’ relation, Θ, and the ERTL ‘holding’ relation, Φ. ADL is used to specify a small network, and proofs are given of its timeliness and safety properties. Received November 1998 / Accepted in revised form May 2000  相似文献   
79.
Who Are You? The Trade-Off between Information Utility and Privacy   总被引:1,自引:0,他引:1  
There's no doubt that personal information can be valuable to companies. People are willing to give up information about themselves not because they're stupid or because they're being tricked by evil corporations, but because it can sometimes be in their best interests to do so. From this perspective, the important questions are how users can provide or limit access to that information, what benefits they might receive in exchange for a bit of information, and how they perceive the value of those benefits.  相似文献   
80.
Service Science     
This paper is a first exploration of the relationship between service science and Grid computing. Service science is the study of value co-creation interactions among entities, known as service systems. Within the emerging service science community, service is often defined as the application of competences (resources) for the benefit of another. Grid computing is the study of resource sharing among entities, known as virtual organizations, which solve complex business, societal, scientific, and engineering problems. Within the Grid computing community, service is sometimes defined as protocols plus behavior. Both Grid computing and service science are connecting academic, industry, government, and volunteer sector collaborators on a range of projects including eScience, healthcare, environmental sustainability, and more. This paper compares and contrasts the notions of resource, entity, service, interaction, and success criteria for the two areas of study. In conclusion, new areas for collaborative inquiry are proposed.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号