全文获取类型
收费全文 | 2210篇 |
免费 | 358篇 |
国内免费 | 302篇 |
专业分类
电工技术 | 61篇 |
综合类 | 164篇 |
化学工业 | 98篇 |
金属工艺 | 31篇 |
机械仪表 | 42篇 |
建筑科学 | 112篇 |
矿业工程 | 37篇 |
能源动力 | 31篇 |
轻工业 | 33篇 |
水利工程 | 73篇 |
石油天然气 | 26篇 |
武器工业 | 23篇 |
无线电 | 882篇 |
一般工业技术 | 71篇 |
冶金工业 | 35篇 |
原子能技术 | 6篇 |
自动化技术 | 1145篇 |
出版年
2024年 | 6篇 |
2023年 | 44篇 |
2022年 | 66篇 |
2021年 | 102篇 |
2020年 | 124篇 |
2019年 | 84篇 |
2018年 | 91篇 |
2017年 | 95篇 |
2016年 | 136篇 |
2015年 | 140篇 |
2014年 | 192篇 |
2013年 | 205篇 |
2012年 | 243篇 |
2011年 | 231篇 |
2010年 | 182篇 |
2009年 | 161篇 |
2008年 | 165篇 |
2007年 | 115篇 |
2006年 | 94篇 |
2005年 | 89篇 |
2004年 | 57篇 |
2003年 | 47篇 |
2002年 | 36篇 |
2001年 | 21篇 |
2000年 | 22篇 |
1999年 | 25篇 |
1998年 | 13篇 |
1997年 | 7篇 |
1996年 | 13篇 |
1995年 | 17篇 |
1994年 | 12篇 |
1993年 | 4篇 |
1992年 | 6篇 |
1991年 | 5篇 |
1990年 | 4篇 |
1989年 | 1篇 |
1988年 | 2篇 |
1984年 | 1篇 |
1983年 | 2篇 |
1982年 | 1篇 |
1981年 | 1篇 |
1980年 | 2篇 |
1978年 | 1篇 |
1973年 | 1篇 |
1965年 | 1篇 |
1962年 | 1篇 |
1959年 | 2篇 |
排序方式: 共有2870条查询结果,搜索用时 15 毫秒
91.
92.
93.
有向传感器网络最大覆盖调度算法 总被引:9,自引:1,他引:8
与传统的全向传感器不同,有向传感器可以切换到不同的方向,并且每个方向覆盖有限角度的感应范围.针对有向传感器网络的区域覆盖问题,研究了“最大有向区域覆盖”MDAC(maximum directional area coverage)问题,期望通过调度传感器的工作方向,最大化覆盖区域面积.首先给出了MDAC 的问题定义,使用整数线性规划描述MDAC 问题,并且证明其是NP 完全的.然后提出一种分布式贪心算法DGreedy(distributed greedy algorithm)解决MDAC 问题.在此基础上,通过计算可能的覆盖贡献比例来反映网络拓扑信息.还提出了一种增强的算法PGreedy(distributed probability-enhanced greedy algorithm)使覆盖区域更大.证明了所提算法的收敛性,并通过详细的模拟实验验证了其有效性. 相似文献
94.
“龙腾R2”微处理器模块级验证 总被引:1,自引:1,他引:0
针对"龙腾R2"微处理器验证过程中的存在验证规模大,人力资源不足的问题,采用流水线模型构建随机的指令序列生成器,搭建以功能覆盖率为导向的自动化验证平台;该平台在仿真验证过程中能根据处理器的运行状态及覆盖率实时地调整指令流以侧重当前验证不充分的功能模块,实现自动化验证;通过仿真,与传统方法相比,在达到同等验证程度的情况下,使用该平台验证周期明显缩短,同时验证覆盖率也有所提高。 相似文献
95.
Mutation testing has traditionally been used as a defect injection technique to assess the effectiveness of a test suite as
represented by a “mutation score.” Recently, mutation testing tools have become more efficient, and industrial usage of mutation
analysis is experiencing growth. Mutation analysis entails adding or modifying test cases until the test suite is sufficient
to detect as many mutants as possible and the mutation score is satisfactory. The augmented test suite resulting from mutation
analysis may reveal latent faults and provides a stronger test suite to detect future errors which might be injected. Software
engineers often look for guidance on how to augment their test suite using information provided by line and/or branch coverage
tools. As the use of mutation analysis grows, software engineers will want to know how the emerging technique compares with
and/or complements coverage analysis for guiding the augmentation of an automated test suite. Additionally, software engineers
can benefit from an enhanced understanding of efficient mutation analysis techniques. To address these needs for additional
information about mutation analysis, we conducted an empirical study of the use of mutation analysis on two open source projects.
Our results indicate that a focused effort on increasing mutation score leads to a corresponding increase in line and branch
coverage to the point that line coverage, branch coverage and mutation score reach a maximum but leave some types of code
structures uncovered. Mutation analysis guides the creation of additional “common programmer error” tests beyond those written
to increase line and branch coverage. We also found that 74% of our chosen set of mutation operators is useful, on average,
for producing new tests. The remaining 26% of mutation operators did not produce new test cases because their mutants were
immediately detected by the initial test suite, indirectly detected by test suites we added to detect other mutants, or were
not able to be detected by any test.
Ben Smith is a second year Ph.D. student in Computer Science at North Carolina State University working as an RA under Dr. Laurie Williams. He received his Bachelor’s degree in Computer Science in May of 2007 and he hopes to receive his doctorate in 2012. He has begun work on developing SQL Coverage Metrics as a predictive measure of the security of a web application. This fall, he will be beginning the doctoral preliminary exam and working as a Testing Manager for the NCSU CSC Senior Design Center: North Carolina State’s capstone course for Computer Science. Finally, he has designed and maintained the websites for the Center for Open Software Engineering and ESEM 2009. Laurie Williams is an Associate Professor in the Computer Science Department of the College of Engineering at North Carolina State University. She leads the Software Engineering Reasearch group and is also the Director of the North Carolina State University Laboratory for Collaborative System Development and the Center for Open Software Engineering. She is also technical co-director of the Center for Open Software Engineering (COSE) and the area technical director of the Secure Open Systems Initiative (SOSI) at North Carolina State University. Laurie received her Ph.D. in Computer Science from the University of Utah, her MBA from Duke University, and her BS in Industrial Engineering from Lehigh University. She worked for IBM for nine years in Raleigh, NC before returning to academia. Laurie’s research interests include agile software development methodologies and practices, collaborative/pair programming, software reliability and testing, and software engineering for secure systems development. 相似文献
Laurie WilliamsEmail: |
Ben Smith is a second year Ph.D. student in Computer Science at North Carolina State University working as an RA under Dr. Laurie Williams. He received his Bachelor’s degree in Computer Science in May of 2007 and he hopes to receive his doctorate in 2012. He has begun work on developing SQL Coverage Metrics as a predictive measure of the security of a web application. This fall, he will be beginning the doctoral preliminary exam and working as a Testing Manager for the NCSU CSC Senior Design Center: North Carolina State’s capstone course for Computer Science. Finally, he has designed and maintained the websites for the Center for Open Software Engineering and ESEM 2009. Laurie Williams is an Associate Professor in the Computer Science Department of the College of Engineering at North Carolina State University. She leads the Software Engineering Reasearch group and is also the Director of the North Carolina State University Laboratory for Collaborative System Development and the Center for Open Software Engineering. She is also technical co-director of the Center for Open Software Engineering (COSE) and the area technical director of the Secure Open Systems Initiative (SOSI) at North Carolina State University. Laurie received her Ph.D. in Computer Science from the University of Utah, her MBA from Duke University, and her BS in Industrial Engineering from Lehigh University. She worked for IBM for nine years in Raleigh, NC before returning to academia. Laurie’s research interests include agile software development methodologies and practices, collaborative/pair programming, software reliability and testing, and software engineering for secure systems development. 相似文献
96.
97.
提出了一种虚拟分布式IPv6路由器级拓扑探测模型--VDPM(Virtual Distributed Probing Model).VD-PM探测方式既达到了分布式拓扑探测效果,又避免了高昂的部署费用和繁琐的通讯维护工作.本文详细论述了VDPM实现的两个关键问题:虚拟探测源的选取和探测目标点集合的构建.通过对比VDPM方式和纯IPv6单源探测方式以Cemet2为目标网络进行拓扑发现的结果,体现了VDPM作为大规模IPv6路由器级拓扑发现原型系统设计依据的合理性. 相似文献
98.
设计并分析了一种基于链路冗余与修补方法的双层抗毁卫星网络。通过对网络中MEO星层进行基于快照周期的分群管理和群首备份选择机制,从星座组网结构方面提高卫星网络的抗毁性能;通过设计网络结构中群内、星层以及整个星座的通信链路,特别是对星座中MEO星层的通信链路进行充分的冗余设计,以及启用视距范围内间隔失效卫星间次相邻卫星节点链路连接的链路设计,从星座网络的通信链路上提高整个卫星网络的抗毁性能。最后对所设计的卫星网络的结构性能进行了简要分析。 相似文献
99.
为了满足低成本建设5G广覆盖网络的需求,需要提前研究低频3G、4G网络向5G重耕的最佳方案。在没有进行重耕,因而没有理想的低频5G测试环境的情况下,采用理论分析的手段进行重耕后的覆盖能力估算。以未来L900重耕用于5G广覆盖为例,探讨了链路预算的关键设定、模型选择等问题,并通过多个本地网实际测试数据间接验证估算结果的合理性。所得结论已实际应用于某大运营商对全国900 MHz网络的规划方案,对于指导网络重耕具有重要的借鉴意义,也为面向覆盖和感知的6G网络演进及重耕提供了参考模型。 相似文献
100.
针对传统应急电源车保供电存在的资产利用率不足、成本较高等问题,结合微电网的发展趋势,提出了一种保供电型光储微电网的运营策略,重点讨论了微电网应用于保供电领域的经济性。提出了光储微电网代替应急电源车的保供电思路,从初始投资成本、运维成本、收益三方面初步分析了微电网应用于保供电领域的经济性;为了解决现阶段储能投资效益差的难题,提出了供电企业向储能投资商给予补贴的建议,并为此提出了虚拟保电量的概念;为了合理确定供电企业给予储能投资商的补贴数额,提出了非博弈和博弈2种补贴方案,并对3种运营模式中共同博弈投资模式的内部交易和定价机制进行了详细讨论。基于算例分析了不同的运营模式下供电企业和社会资本的经济效益,以确定最优的运营策略。 相似文献