首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   880篇
  免费   20篇
  国内免费   25篇
电工技术   12篇
综合类   17篇
化学工业   19篇
金属工艺   15篇
机械仪表   52篇
建筑科学   22篇
矿业工程   7篇
能源动力   13篇
轻工业   3篇
水利工程   2篇
石油天然气   7篇
武器工业   6篇
无线电   85篇
一般工业技术   82篇
冶金工业   16篇
原子能技术   37篇
自动化技术   530篇
  2024年   1篇
  2023年   3篇
  2022年   8篇
  2021年   13篇
  2020年   10篇
  2019年   6篇
  2018年   1篇
  2017年   21篇
  2016年   18篇
  2015年   23篇
  2014年   45篇
  2013年   33篇
  2012年   33篇
  2011年   66篇
  2010年   49篇
  2009年   43篇
  2008年   56篇
  2007年   83篇
  2006年   81篇
  2005年   56篇
  2004年   40篇
  2003年   37篇
  2002年   26篇
  2001年   22篇
  2000年   31篇
  1999年   19篇
  1998年   20篇
  1997年   20篇
  1996年   5篇
  1995年   7篇
  1994年   13篇
  1993年   3篇
  1992年   9篇
  1991年   4篇
  1989年   5篇
  1988年   1篇
  1987年   1篇
  1985年   1篇
  1984年   1篇
  1983年   4篇
  1982年   3篇
  1981年   1篇
  1980年   1篇
  1979年   1篇
  1978年   1篇
排序方式: 共有925条查询结果,搜索用时 953 毫秒
41.
Model checking based on the causal partial order semantics of Petri nets is an approach widely applied to cope with the state space explosion problem. One of the ways to exploit such a semantics is to consider (finite prefixes of) net unfoldings—themselves a class of acyclic Petri nets—which contain enough information, albeit implicit, to reason about the reachable markings of the original Petri nets. In [19], a verification technique for net unfoldings was proposed, in which deadlock detection was reduced to a mixed integer linear programming problem. In this paper, we present a further development of this approach. The essence of the proposed modifications is to transfer the information about causality and conflicts between the events involved in an unfolding, into a relationship between the corresponding integer variables in the system of linear constraints. Moreover, we present some problem-specific optimisation rules, reducing the search space. To solve other verification problems, such as mutual exclusion or marking reachability and coverability, we adopt Contejean and Devie's algorithm for solving systems of linear constraints over the natural numbers domain and refine it, by taking advantage of the specific properties of systems of linear constraints to be solved. Another contribution of this paper is a method of re-formulating some problems specified in terms of Petri nets as problems defined for their unfoldings. Using this method, we obtain a memory efficient translation of a deadlock detection problem for a safe Petri net into an LP problem. We also propose an on-the-fly deadlock detection method. Experimental results demonstrate that the resulting algorithms can achieve significant speedups.
Maciej KoutnyEmail:
  相似文献   
42.
In this paper we describe an algorithm for distributed, BDD-based bounded property checking and its implementation in the verification tool SymC. The distributed algorithm verifies larger models and returns results faster than the sequential version.The core algorithm distributes partitions of the state set to computation nodes after reaching a threshold size. The nodes proceed with image computation on the nodes asynchronously. The main scalability problem of this scheme is the overlap of state set partitions. We present static and dynamic overlap reduction techniques.  相似文献   
43.
In this paper, we discuss the semantics of BPEL4WS language which is a de facto standard for specifying and execution workflow specification for web service composition and orchestration. We propose a language μ-BPEL that includes most primitive and structured activities of BPEL4WS, and define its semantics. As the Timed Automata (TA) is powerful in designing real-time models with multiple clocks and has well developed automatic tool support, we define a map from μ-BPEL into composable TA. Therefore, the properties we want to check can be verified in TA network correspondingly. Furthermore, we prove that the mapping from μ-BPEL to TA is a simulation, which means that the TA network simulates correctly the corresponding μ-BPEL specification. The case study with model checker Uppaal shows that our method is effective, and a Java supporting tool based on Uppaal model checker engine has been developed.  相似文献   
44.
Knowledge-base V&V primarily addresses the question: “Does my knowledge-base contain the right answer and can I arrive at it?” One of the main goals of our work is to properly encapsulate the knowledge representation and allow the expert to work with manageable-sized chunks of the knowledge-base. This work develops a new methodology for the verification and validation of Bayesian knowledge-bases that assists in constructing and testing such knowledge-bases. Assistance takes the form of ensuring that the knowledge is syntactically correct, correcting “imperfect” knowledge, and also identifying when the current knowledge-base is insufficient as well as suggesting ways to resolve this insufficiency. The basis of our approach is the use of probabilistic network models of knowledge. This provides a framework for formally defining and working on the problems of uncertainty in the knowledge-base.

In this paper, we examine the project which is concerned with assisting a human expert to build knowledge-based systems under uncertainty. We focus on how verification and validation are currently achieved in .  相似文献   

45.
针对太阳辐射计量仪表进行检定的需要,提出了一种具有四个自由度功能动作的多维检定工作台。工作台在与太阳模拟器联合,可同时对两块待栓仪表的参数误差进行检定。在对太阳高度角和方位角的研究基础上,阐述了工作台旋转机构、升降机构、俯仰机构和转臂机构的设计过程,并对工作台的控制系统进行了说明。测试结果表明多维工作台各级转动误差小于0.05°,由倾角仪和步进电机组成的台面水平控制误差在±10’以内,满足设计指标要求。  相似文献   
46.
电子政务已经成为政府工作自动化和智能化的重要手段。近年来,中国电子政务软件市场获得了前所未有的发展机遇。随着电子政务软件的飞速发展,软件可靠性成为了建设电子政务的重要指标。软件可靠性测试是保证软件可靠性的有效方法。目前,国内对于电子政务的可靠性研究才刚刚起步,其可靠性测试一般都交给第三方机构。分析当前电子政务软件的可靠性测试特点,基于Musa和Nelson两种可靠性模型提出了一种电子政务软件的可靠性评测方法,从可靠性的评估测试和验证测试两方面具体分析阐述了方法的流程,并使用工具实现。最后用具体案例对方法进行了分析说明。  相似文献   
47.
韩煜  李洪海 《微处理机》2012,33(2):14-16
随着集成电路的发展,基于IP(Intellectual Property)核的设计方法成为片上系统设计的必然之选。IP核的建模不仅有助于重复使用而缩短设计周期,还能增强设计的安全保护。因此,迅速将知识产权(IP)硬化并建立精确的实现模型,是设计基于IP核技术的系统芯片(System onChip,SoC)的必要条件。  相似文献   
48.
SoC功能验证的特点和方法   总被引:3,自引:0,他引:3  
徐英伟  刘佳 《微处理机》2006,27(2):11-13
简要分析了传统集成电路(ASIC)验证方法的特点以及将这些方法应用于系统级芯片(SoC)验证时所面临的问题。在此基础上,论述说明了模块级验证是提高SoC验证效率的基础;而基于随机测试激励的验证方法能够提升SoC的功能验证的覆盖率。另外,还介绍了用于SoC功能验证的关键方法,包括断言和RTL形式验证,Farm,随机化测试激励和功能覆盖等。  相似文献   
49.
阐述了冲击能力验证产生可疑数据的原因,并通过试验作了验证。试验表明,由于使用的JB30B摆锤式冲击试验机在摆锤铅垂时,冲击刀刃到垂直支撑面的距离公差过小,且砧座之间跨距公差过大,造成了金属夏比能力验证在高能量级组数据出现了可疑数据的现象。就冲击试验现行的有关国家标准对这两项指标的规定作了比较与分析,提出了建议。  相似文献   
50.
The increasing need for hybrid Knowledge-Based Systems (KBS) that accommodate more complex applications has led to the need for new verification concerns that are more specific to the hybrid representation using objects and rule-based inference. Traditionally, verification of expert systems has focused solely on rule-based inference systems. Hybrid KBSs present additional verification problems not found in traditional rule-based systems. This paper is an investigation into the anomalies that may be present in a hybrid representation that warrant detection for the verification of the KBS. Many anomalies are due to the interaction of the component parts of the hybrid KBS. For example, subsumption anomalies arise due to an interaction between inheritance of objects and rule-based inference. In this paper, we extend the context of subsumption anomalies and introduce additional types of anomalies that may be present in the KBS. The goal of this research is to make hybrid KBSs more reliable by detecting such anomalies.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号