全文获取类型
收费全文 | 374篇 |
免费 | 18篇 |
国内免费 | 27篇 |
专业分类
电工技术 | 1篇 |
综合类 | 37篇 |
化学工业 | 9篇 |
金属工艺 | 6篇 |
机械仪表 | 29篇 |
建筑科学 | 37篇 |
矿业工程 | 8篇 |
轻工业 | 6篇 |
水利工程 | 1篇 |
石油天然气 | 3篇 |
武器工业 | 3篇 |
无线电 | 16篇 |
一般工业技术 | 19篇 |
冶金工业 | 32篇 |
自动化技术 | 212篇 |
出版年
2023年 | 4篇 |
2022年 | 1篇 |
2021年 | 4篇 |
2020年 | 1篇 |
2019年 | 7篇 |
2018年 | 4篇 |
2017年 | 3篇 |
2016年 | 5篇 |
2015年 | 10篇 |
2014年 | 15篇 |
2013年 | 20篇 |
2012年 | 14篇 |
2011年 | 23篇 |
2010年 | 25篇 |
2009年 | 29篇 |
2008年 | 16篇 |
2007年 | 28篇 |
2006年 | 27篇 |
2005年 | 24篇 |
2004年 | 23篇 |
2003年 | 23篇 |
2002年 | 28篇 |
2001年 | 16篇 |
2000年 | 10篇 |
1999年 | 16篇 |
1998年 | 4篇 |
1997年 | 9篇 |
1996年 | 6篇 |
1995年 | 2篇 |
1994年 | 1篇 |
1991年 | 4篇 |
1990年 | 1篇 |
1989年 | 1篇 |
1988年 | 5篇 |
1987年 | 1篇 |
1986年 | 3篇 |
1985年 | 3篇 |
1984年 | 1篇 |
1982年 | 1篇 |
1964年 | 1篇 |
排序方式: 共有419条查询结果,搜索用时 15 毫秒
1.
This paper presents a dynamic integration algorithm to triangulate a surface from multiple range views. This integration technique is based on the reparameterization of the canonic subsets of the Venn diagram of the set of range views. We compute a model based onN views from a model based onN–1 views by processing only the surface segments visible in theN
th view. An experimental result shows that the proposed integration algorithm can process complex multipart objects containing holes. 相似文献
2.
Views stored in a data warehouse need to be kept current. As recomputing the views is very expensive, incremental maintenance algorithms are required. Over recent years, several incremental maintenance algorithms have been proposed. None of the proposed algorithms handle the general case of relational expressions involving aggregate and outerjoin operators efficiently. 相似文献
3.
To extend R. E. Fancher's (see record 1987-31600-001) review of claims that photographs of the Kallikak family in H. H. Goddard's (1912) study had been retouched to make them look more menacing and retarded, 29 Ss (aged 18–69 yrs) were surveyed for their impressions of the photographs. Overall, Ss were strongly inclined to view the photographed individuals as "kind" and "very bright." (PsycINFO Database Record (c) 2010 APA, all rights reserved) 相似文献
4.
Discusses retouching of the Kallikak family photographs in H. H. Goddard's (1912) study of mental retardation and heredity, with reference to analyses by R. E. Fancher (see record 1987-31600-001) and S. J. Gould (1981), and concurs with Fancher that the retouching was probably not done for deceitful purposes. (PsycINFO Database Record (c) 2010 APA, all rights reserved) 相似文献
5.
Modern database systems desperate for the ability to support highly scalable transactions and efficient queries simultaneously for real-time applications. One solution is to utilize query optimization techniques on the on-line transaction processing (OLTP) systems. The materialized view is considered as a panacea to decrease query latency. However, it also involves the significant cost of maintenance which trades away transaction performance. In this paper, we examine the design space and conclude several design features for the implementation of a view on a distributed log-structured merge-tree (LSMtree), which is a well-known structure for improving data write performance. As a result, we develop two incremental view maintenance (IVM) approaches on LSM-tree. One avoids join computation in view maintenance transactions. Another with two optimizations is proposed to decouple the view maintenance with the transaction process. Under the asynchronous update, we also provide consistency queries for views. Experiments on TPC-H benchmark show our methods achieve better performance than straightforward methods on different workloads. 相似文献
6.
丁永久 《南通纺织职业技术学院学报》2014,(4):18-21
在兴办实业教育的过程中,张謇投资基础设施,建设实习实训环境;融合中西文化,塑造学习文化环境;规划城市建设,改善校园外部环境.与杜威、黄炎培相比,张謇的职业教育环境观与他们的观点存在着相似之处,但作为实践者和拓荒者,张謇从朴素的救国救民思想出发,率先进行了实业教育的物质环境、文化环境和外部环境的建设,反映了他对环境在人才培养中作用的重视,也体现了他环境育人的价值追求. 相似文献
7.
rootkit对系统的危害十分严重,其极强的隐蔽性为检测带来了很大的困难。当前对rootkit的检测方法中存在一些不足,并且缺少对检测到rootkit后的定位与处理。针对现有检测方法中的不足,提出了一种虚拟环境下基于虚拟机监控器(Virtual Machine Monitor,VMM)的rootkit检测与处理技术,并在Xen上实现了原型系统rDetector。使用以安全链表为基础的多视图同步谎言检测机制检测rootkit的隐藏性,以内核敏感信息完整性检查检测rootkit对系统的攻击,并利用VMM提供了对rootkit的定位与处理。实验表明,rDetecor对rootkit的检测效果良好,能够迅速准确的检测出rootkit对系统的攻击,并能有效地对rootkit进行处理,对系统造成的性能损失在可接受的范围内。 相似文献
8.
9.
We show that several classes of tree patterns observe the independence of containing patterns property, that is, if a pattern is contained in the union of several patterns, then it is contained in one of them. We apply this property to two related problems on tree pattern rewriting using views. First, given view V and query Q, is it possible for Q to have an equivalent rewriting using V which is the union of two or more tree patterns, but not an equivalent rewriting which is a single pattern? This problem is of both theoretical and practical importance because, if the answer is no, then, to find an equivalent rewriting of a tree pattern using a view, we should use more efficient methods, such as the polynomial time algorithm of Xu and Özsoyoglu (2005), rather than try to find the union of all contained rewritings (which takes exponential time in the worst case) and test its equivalence to Q. Second, given a set S of views, we want to know under what conditions a subset S′ of S is redundant in the sense that for any query Q, the contained rewritings of Q using the views in S′ are contained in those using the views in S???S′. Solving this problem can help us to, for example, choose the minimum number of views to be cached, or better design the virtual schema in a mediated data integration system, or avoid repeated calculation in query optimization. For the first problem, we identify several classes of tree patterns for which the equivalent rewriting can be expressed as a single tree pattern. For the second problem, we present necessary and sufficient conditions for S′ to be redundant with respect to some classes of tree patterns. For both problems we consider extension to cases where there are rewritings using the intersection of multiple views and/or where a schema graph is present. 相似文献
10.
基于正、侧、背面4幅正交人体图像,变形模板人体模型后得到带服饰纹理的个性化虚拟人.以截面环为基本几何元素,给出了模板人体模型的生成和变形方法,建立了截面环和三维人体骨架之间的内在关联;自动提取图像上的人体特征点,生成二维图像上的人体骨架;由三维人体骨架和二维图像上人体骨架之间的对应关系,建立截面环和人体图像之间的对应关系;从人体图像上获取截面环的形状参数,通过参数化变形截面环得到个性化的虚拟人体模型.与已有方法相比,该方法建立在基于特征的参数化框架之上,变形更容易控制,消除了三维模型和二维图像之间对应的不确定性,避免了人体变形中的自交现象,效率高、真实感效果较好. 相似文献