全文获取类型
收费全文 | 1860篇 |
免费 | 54篇 |
专业分类
电工技术 | 22篇 |
化学工业 | 214篇 |
金属工艺 | 35篇 |
机械仪表 | 21篇 |
建筑科学 | 90篇 |
矿业工程 | 28篇 |
能源动力 | 34篇 |
轻工业 | 163篇 |
水利工程 | 31篇 |
石油天然气 | 41篇 |
武器工业 | 1篇 |
无线电 | 225篇 |
一般工业技术 | 210篇 |
冶金工业 | 400篇 |
原子能技术 | 4篇 |
自动化技术 | 395篇 |
出版年
2023年 | 10篇 |
2022年 | 6篇 |
2021年 | 24篇 |
2020年 | 21篇 |
2019年 | 30篇 |
2018年 | 28篇 |
2017年 | 43篇 |
2016年 | 48篇 |
2015年 | 35篇 |
2014年 | 64篇 |
2013年 | 108篇 |
2012年 | 76篇 |
2011年 | 115篇 |
2010年 | 102篇 |
2009年 | 79篇 |
2008年 | 103篇 |
2007年 | 95篇 |
2006年 | 96篇 |
2005年 | 69篇 |
2004年 | 66篇 |
2003年 | 61篇 |
2002年 | 40篇 |
2001年 | 35篇 |
2000年 | 26篇 |
1999年 | 34篇 |
1998年 | 64篇 |
1997年 | 54篇 |
1996年 | 80篇 |
1995年 | 40篇 |
1994年 | 23篇 |
1993年 | 26篇 |
1992年 | 21篇 |
1991年 | 11篇 |
1990年 | 8篇 |
1989年 | 8篇 |
1988年 | 13篇 |
1987年 | 23篇 |
1986年 | 12篇 |
1985年 | 20篇 |
1984年 | 14篇 |
1983年 | 8篇 |
1982年 | 14篇 |
1981年 | 17篇 |
1980年 | 10篇 |
1979年 | 4篇 |
1978年 | 7篇 |
1977年 | 4篇 |
1976年 | 11篇 |
1975年 | 3篇 |
1974年 | 2篇 |
排序方式: 共有1914条查询结果,搜索用时 15 毫秒
41.
Vassilis Agouridas Alison McKay Henri Winand Alan de Pennington 《Requirements Engineering》2008,13(1):19-48
This paper reports results of research into the definition of requirements for new consumer products––specifically, electro-mechanical
products. The research dealt with the derivation of design requirements that are demonstrably aligned with stakeholder needs.
The paper describes a comprehensive process that can enable product development teams to deal with statements of product requirements,
as originally collected through market research activities, in a systematic and traceable manner from the early, fuzzy front
end, stages of the design process. The process described has been based on principles of systems engineering. A case study
from its application and evaluation drawn from the power sector is described in this paper. The case study demonstrates how
the process can significantly improve product quality planning practices through revision of captured product requirements,
analysis of stakeholder requirements and derivation of design requirements. The paper discusses benefits and issues from the
use of the process by product development teams, and identifies areas for further research. Finally, the conclusions drawn
from the reported research are presented.
相似文献
Vassilis AgouridasEmail: |
42.
The engineering of distributed adaptive software is a complex task which requires a rigorous approach. Software architectural
(structural) concepts and principles are highly beneficial in specifying, designing, analysing, constructing and evolving
distributed software. A rigorous architectural approach dictates formalisms and techniques that are compositional, components
that are context independent and systems that can be constructed and evolved incrementally. This paper overviews some of the
underlying reasons for adopting an architectural approach, including a brief “rational history” of our research work, and
indicates how an architectural model can potentially facilitate the provision of self-managed adaptive software system.
Much of the research has been supported by the Engineering and Physical Sciences Research Council and is currently partly
supported by EPSRC Platform grant AEDUS 2 and a DTC grant. 相似文献
43.
Shape deformation in continuous map generalization 总被引:2,自引:0,他引:2
Jeff Danciger Satyan L. Devadoss John Mugno Don Sheehy Rachel Ward 《GeoInformatica》2009,13(2):203-221
Given a collection of regions on a map, we seek a method of continuously altering the regions as the scale is varied. This
is formalized and brought to rigor as well-defined problems in homotopic deformation. We ask the regions to preserve topology,
area-ratios, and relative position as they change over time. A solution is presented using differential methods and computational
geometric techniques. Most notably, an application of this method is used to provide an algorithm to obtain cartograms.
Jeff Danciger Jeffrey received his undergraduate degree from the College of Creative Studies at UCSB in mathematics and physics. He is currently working on his Ph.D. in mathematics at Stanford University. His research interests include low dimensional topology and geometric analysis. Satyan L. Devadoss is an Associate Professor of Mathematics at Williams College. His research interests lie in the interplay between topology and geometry, notably in applications to theoretical physics (moduli spaces and string theory) and computer science (cartography and polytopes). John Mugno received his undergraduate degree from Williams College and is currently continuing his studies in mathematics at the University of Maryland. His areas of interest include combinatorics and topology. Don Sheehy received his undergraduate degree in Princeton University and is currently pursuing a PhD in Computer Science at Carnegie Mellon University. His research focuses on computational geometry algorithms for meshing. Rachel Ward received her undergraduate degree at the University of Texas at Austin. She is now a PhD student at Princeton University in the Program in Applied and Computational Mathematics. Her current work is in the area of compressed sensing, combining tools from computational harmonic analysis, probability, and optimization theory. 相似文献
Rachel WardEmail: |
Jeff Danciger Jeffrey received his undergraduate degree from the College of Creative Studies at UCSB in mathematics and physics. He is currently working on his Ph.D. in mathematics at Stanford University. His research interests include low dimensional topology and geometric analysis. Satyan L. Devadoss is an Associate Professor of Mathematics at Williams College. His research interests lie in the interplay between topology and geometry, notably in applications to theoretical physics (moduli spaces and string theory) and computer science (cartography and polytopes). John Mugno received his undergraduate degree from Williams College and is currently continuing his studies in mathematics at the University of Maryland. His areas of interest include combinatorics and topology. Don Sheehy received his undergraduate degree in Princeton University and is currently pursuing a PhD in Computer Science at Carnegie Mellon University. His research focuses on computational geometry algorithms for meshing. Rachel Ward received her undergraduate degree at the University of Texas at Austin. She is now a PhD student at Princeton University in the Program in Applied and Computational Mathematics. Her current work is in the area of compressed sensing, combining tools from computational harmonic analysis, probability, and optimization theory. 相似文献
44.
Cheating is rampant in current gameplay on the Internet. However, it isn't as well understood as we might expect. The authors summarize the various known methods of cheating and define a taxonomy of online game cheating with respect to the underlying vulnerability, consequence, and cheating principal. This taxonomy provides a systematic introduction to the characteristics of cheats in online games and how they can arise. Although cheating in online games is largely due to various security failures, the four traditional aspects of security—confidentiality, integrity, availability, and authenticity—are insufficient to explain it. Instead, fairness becomes a vital additional aspect, and its enforcement provides a convincing perspective for understanding security techniques' role in developing and operating online games. 相似文献
45.
46.
47.
We consider the setting of a multiprocessor where the speeds of the m processors can be individually scaled. Jobs arrive over time and have varying degrees of parallelizability. A nonclairvoyant
scheduler must assign the processes to processors, and scale the speeds of the processors. We consider the objective of energy
plus flow time. We assume that a processor running at speed s uses power s
α
for some constant α>1. For processes that may have side effects or that are not checkpointable, we show an W(m(a-1)/a2)\Omega(m^{(\alpha -1)/\alpha^{2}}) bound on the competitive ratio of any randomized algorithm. For checkpointable processes without side effects, we give an
O(log m)-competitive algorithm. Thus for processes that may have side effects or that are not checkpointable, the achievable competitive
ratio grows quickly with the number of processors, but for checkpointable processes without side effects, the achievable competitive
ratio grows slowly with the number of processors. We then show a lower bound of Ω(log 1/α
m) on the competitive ratio of any randomized algorithm for checkpointable processes without side effects. 相似文献
48.
Jeff Jones 《Natural computing》2011,10(4):1345-1369
The single-celled organism Physarum polycephalum efficiently constructs and minimises dynamical nutrient transport networks resembling proximity graphs in the Toussaint hierarchy.
We present a particle model which collectively approximates the behaviour of Physarum. We demonstrate spontaneous transport network formation and complex network evolution using the model and show that the model
collectively exhibits quasi-physical emergent properties, allowing it to be considered as a virtual computing material. This
material is used as an unconventional method to approximate spatially represented geometry problems by representing network
nodes as nutrient sources. We demonstrate three different methods for the construction, evolution and minimisation of Physarum-like transport networks which approximate Steiner trees, relative neighbourhood graphs, convex hulls and concave hulls. We
extend the model to adapt population size in response to nutrient availability and show how network evolution is dependent
on relative node position (specifically inter-node angle), sensor scaling and nutrient concentration. We track network evolution
using a real-time method to record transport network topology in response to global differences in nutrient concentration.
We show how Steiner nodes are utilised at low nutrient concentrations whereas direct connections to nutrients are favoured
when nutrient concentration is high. The results suggest that the foraging and minimising behaviour of Physarum-like transport networks reflect complex interplay between nutrient concentration, nutrient location, maximising foraging
area coverage and minimising transport distance. The properties and behaviour of the synthetic virtual plasmodium may be useful
in future physical instances of distributed unconventional computing devices, and may also provide clues to the generation
of emergent computation behaviour by Physarum. 相似文献
49.
Jeff Winter Author Vitae Kari Rönkkö Author Vitae 《Journal of Systems and Software》2010,83(11):2059-2072
This article presents an experience report where we compare 8 years of experience of product related usability testing and evaluation with principles for software process improvement (SPI). In theory the product and the process views are often seen to be complementary, but studies of industry have demonstrated the opposite. Therefore, more empirical studies are needed to understand and improve the present situation. We find areas of close agreement as well as areas where our work illuminates new characteristics. It has been identified that successful SPI is dependent upon being successfully combined with a business orientation. Usability and business orientation also have strong connections although this has not been extensively addressed in SPI publications. Reasons for this could be that usability focuses on product metrics whilst today's SPI mainly focuses on process metrics. Also because today's SPI is dominated by striving towards a standardized, controllable, and predictable software engineering process; whilst successful usability efforts in organisations are more about creating a creative organisational culture advocating a useful product throughout the development and product life cycle. We provide a study and discussion that supports future development when combining usability and product focus with SPI, in particular if these efforts are related to usability process improvement efforts. 相似文献
50.
Anneliese A. Andrews Jeff Offutt Curtis Dyreson Christopher J. Mallery Kshamta Jerath Roger Alexander 《Information and Software Technology》2010,52(1):52-66
Web applications are fast becoming more widespread, larger, more interactive, and more essential to the international use of computers. It is well understood that web applications must be highly dependable, and as a field we are just now beginning to understand how to model and test Web applications. One straightforward technique is to model Web applications as finite state machines. However, large numbers of input fields, input choices and the ability to enter values in any order combine to create a state space explosion problem. This paper evaluates a solution that uses constraints on the inputs to reduce the number of transitions, thus compressing the FSM. The paper presents an analysis of the potential savings of the compression technique and reports actual savings from two case studies. 相似文献