首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   8595篇
  免费   968篇
  国内免费   839篇
电工技术   453篇
技术理论   1篇
综合类   872篇
化学工业   185篇
金属工艺   59篇
机械仪表   275篇
建筑科学   398篇
矿业工程   97篇
能源动力   123篇
轻工业   55篇
水利工程   263篇
石油天然气   170篇
武器工业   89篇
无线电   1228篇
一般工业技术   495篇
冶金工业   198篇
原子能技术   42篇
自动化技术   5399篇
  2024年   43篇
  2023年   90篇
  2022年   108篇
  2021年   150篇
  2020年   167篇
  2019年   206篇
  2018年   172篇
  2017年   239篇
  2016年   252篇
  2015年   274篇
  2014年   411篇
  2013年   529篇
  2012年   506篇
  2011年   634篇
  2010年   477篇
  2009年   582篇
  2008年   614篇
  2007年   708篇
  2006年   556篇
  2005年   513篇
  2004年   426篇
  2003年   385篇
  2002年   310篇
  2001年   241篇
  2000年   213篇
  1999年   200篇
  1998年   175篇
  1997年   156篇
  1996年   157篇
  1995年   116篇
  1994年   138篇
  1993年   93篇
  1992年   74篇
  1991年   71篇
  1990年   39篇
  1989年   39篇
  1988年   34篇
  1987年   19篇
  1986年   10篇
  1985年   32篇
  1984年   30篇
  1983年   29篇
  1982年   31篇
  1981年   24篇
  1980年   27篇
  1979年   31篇
  1978年   12篇
  1977年   8篇
  1976年   13篇
  1964年   5篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
1.
It has recently been shown that authenticated Byzantine agreement, in which more than a third of the parties are corrupted, cannot be securely realized under concurrent or parallel (stateless) composition. This result puts into question any usage of authenticated Byzantine agreement in a setting where many executions take place. In particular, this is true for the whole body of work of secure multi-party protocols in the case that a third or more of the parties are corrupted. This is because these protocols strongly rely on the extensive use of a broadcast channel, which is in turn realized using authenticated Byzantine agreement. We remark that it was accepted folklore that the use of a broadcast channel (or authenticated Byzantine agreement) is actually essential for achieving meaningful secure multi-party computation whenever a third or more of the parties are corrupted. In this paper we show that this folklore is false. We present a mild relaxation of the definition of secure computation allowing abort. Our new definition captures all the central security issues of secure computation, including privacy, correctness and independence of inputs. However, the novelty of the definition is in decoupling the issue of agreement from these issues. We then show that this relaxation suffices for achieving secure computation in a point-to-point network. That is, we show that secure multi-party computation for this definition can be achieved for any number of corrupted parties and without a broadcast channel (or trusted pre-processing phase as required for running authenticated Byzantine agreement). Furthermore, this is achieved by just replacing the broadcast channel in known protocols with a very simple and efficient echo-broadcast protocol. An important corollary of our result is the ability to obtain multi-party protocols that remain secure under composition, without assuming a broadcast channel.  相似文献   
2.
Analog circuits are one of the most important parts of modern electronic systems and the failure of electronic hardware presents a critical threat to the completion of modern aircraft, spacecraft, and robot missions. Compared to digital circuits, designing fault-tolerant analog circuits is a difficult and knowledge-intensive task. A simple but powerful method for robustness is a redundancy approach to use multiple circuits instead of single one. For example, if component failures occur, other redundant components can replace the functions of broken parts and the system can still work. However, there are several research issues to make the redundant system automatically. In this paper, we used evolutionary computation to generate multiple analog circuits automatically and then we combined the solutions to generate robust outputs. Evolutionary computation is a natural way to produce multiple redundant solutions because it is a population-based search. Experimental results on the evolution of the low-pass, high-pass and band-stop filters show that the combination of multiple evolved analog circuits produces results that are more robust than those of the best single circuit.  相似文献   
3.
The modern technological advancement influences the growth of the cyber–physical system and cyber–social system to a more advanced computing system cyber–physical–social system (CPSS). Therefore, CPSS leads the data science revolution by promoting tri-space information resource from a single space. The establishment of CPSSs increases the related privacy concerns. To provide privacy on CPSSs data, various privacy-preserving schemes have been introduced in the recent past. However, technological advancement in CPSSs requires the modifications of previous techniques to suit its dynamics. Meanwhile, differential privacy has emerged as an effective method to safeguard CPSSs data privacy. To completely comprehend the state-of-the-art developments and learn the field’s research directions, this article provides a comprehensive review of differentially private data fusion and deep learning in CPSSs. Additionally, we present a novel differentially private data fusion and deep learning Framework for Cyber–Physical–Social Systems , and various future research directions for CPSSs.  相似文献   
4.
5.
为提高大小和数量都不确定的数据动态存储的空间利用率和处理速度,针对常规系统动态存储分配存在的问题,提出一种高效的动态存储再分配方案。通过减少系统动态存储分配的执行次数,在有效提高存储空间利用率的同时,提高存储空间动态分配的速度,给出动态存储再分配方案的具体实现算法,用实际数据对其性能进行测试。测试结果表明,该方案能节省36%至75%的系统存储空间,分配速度提高了20至50倍。  相似文献   
6.
We study the problem of minimizing the sum of a smooth convex function and a convex block-separable regularizer and propose a new randomized coordinate descent method, which we call ALPHA. Our method at every iteration updates a random subset of coordinates, following an arbitrary distribution. No coordinate descent methods capable to handle an arbitrary sampling have been studied in the literature before for this problem. ALPHA is a very flexible algorithm: in special cases, it reduces to deterministic and randomized methods such as gradient descent, coordinate descent, parallel coordinate descent and distributed coordinate descent—both in nonaccelerated and accelerated variants. The variants with arbitrary (or importance) sampling are new. We provide a complexity analysis of ALPHA, from which we deduce as a direct corollary complexity bounds for its many variants, all matching or improving best known bounds.  相似文献   
7.
This short note considers and resolves the apparent contradiction between known worst-case complexity results for first- and second-order methods for solving unconstrained smooth nonconvex optimization problems and a recent note by Jarre [On Nesterov's smooth Chebyshev–Rosenbrock function, Optim. Methods Softw. (2011)] implying a very large lower bound on the number of iterations required to reach the solution's neighbourhood for a specific problem with variable dimension.  相似文献   
8.
Abstract

The layout of pages which carry information is the bread and butter of the graphic design profession. The rationale of what elements are chosen and where they are placed is based on tacit knowledge gained over a number of years of experience. The aesthetics associated with the overall finished design are often based on a style. Important elements of style are complexity and aesthetic value. In this paper I explore how various mathematical aesthetic functions can use complexity as an arousal enhancing or limiting mechanism in the application of layout designs.  相似文献   
9.
For the all-ones lower triangular matrices, the upper and lower bounds on rigidity are known to match [P. Pudlak, Z. Vavrin, Computation of rigidity of order n2/r for one simple matrix, Comment Math. Univ. Carolin. 32 (2) (1991) 213-218]. In this short note, we apply these techniques to the all-ones extended lower triangular matrices, to obtain upper and lower bounds with a small gap between the two; we show that the rigidity is .  相似文献   
10.
Several researchers have recently investigated the connection between reinforcement learning and classification. We are motivated by proposals of approximate policy iteration schemes without value functions, which focus on policy representation using classifiers and address policy learning as a supervised learning problem. This paper proposes variants of an improved policy iteration scheme which addresses the core sampling problem in evaluating a policy through simulation as a multi-armed bandit machine. The resulting algorithm offers comparable performance to the previous algorithm achieved, however, with significantly less computational effort. An order of magnitude improvement is demonstrated experimentally in two standard reinforcement learning domains: inverted pendulum and mountain-car.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号