首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   167篇
  免费   13篇
电工技术   7篇
化学工业   36篇
机械仪表   4篇
建筑科学   4篇
能源动力   1篇
轻工业   15篇
水利工程   1篇
无线电   15篇
一般工业技术   35篇
冶金工业   7篇
自动化技术   55篇
  2024年   1篇
  2022年   2篇
  2021年   7篇
  2020年   3篇
  2019年   7篇
  2018年   6篇
  2017年   4篇
  2016年   6篇
  2015年   9篇
  2014年   11篇
  2013年   16篇
  2012年   16篇
  2011年   11篇
  2010年   3篇
  2009年   5篇
  2008年   11篇
  2007年   6篇
  2006年   10篇
  2005年   8篇
  2004年   4篇
  2003年   1篇
  2002年   5篇
  2001年   1篇
  2000年   3篇
  1999年   2篇
  1998年   2篇
  1997年   4篇
  1995年   2篇
  1994年   1篇
  1993年   2篇
  1990年   1篇
  1989年   2篇
  1983年   1篇
  1981年   1篇
  1980年   2篇
  1978年   2篇
  1977年   1篇
  1974年   1篇
排序方式: 共有180条查询结果,搜索用时 15 毫秒
1.
IT systems for engineers are becoming more numerous and complex and will further proliferate in the future. It is infeasible to expect users to be trained to work with a plethora of systems, especially as many of them will only see occasional use. Therefore, in the near future, systems will need user interfaces that allow intuitive access and usage. This paper examines a new style of user interface based on virtual reality.  相似文献   
2.
This paper describes a verified compiler for PreScheme, the implementation language for thevlisp run-time system. The compiler and proof were divided into three parts: A transformational front end that translates source text into a core language, a syntax-directed compiler that translates the core language into a combinator-based tree-manipulation language, and a linearizer that translates combinator code into code for an abstract stored-program machine with linear memory for both data and code. This factorization enabled different proof techniques to be used for the different phases of the compiler, and also allowed the generation of good code. Finally, the whole process was made possible by carefully defining the semantics ofvlisp PreScheme rather than just adopting Scheme's. We believe that the architecture of the compiler and its correctness proof can easily be applied to compilers for languages other than PreScheme.This work was supported by Rome Laboratory of the United States Air Force, contract No. F19628-89-C-0001, through the MITRE Corporation, and by NSF and DARPA under NSF grants CCR-9002253 and CCR-9014603. Author's current address: Department of Computer Science and Engineering, Oregon Graduate Institute, P.O. Box 91000, Portland, OR 97291-1000.The work reported here was supported by Rome Laboratory of the United States Air Force, contract No. F19628-89-C-0001. Preparation of this paper was generously supported by The MITRE Corporation.This work was supported by Rome Laboratory of the United States Air Force, contract No. F19628-89-C-0001, through the MITRE Corporation, and by NSF and DARPA under NSF grants CCR-9002253 and CCR-9014603.  相似文献   
3.
The increasing availability of personal data of a sequential nature, such as time-stamped transaction or location data, enables increasingly sophisticated sequential pattern mining techniques. However, privacy is at risk if it is possible to reconstruct the identity of individuals from sequential data. Therefore, it is important to develop privacy-preserving techniques that support publishing of really anonymous data, without altering the analysis results significantly. In this paper we propose to apply the Privacy-by-design paradigm for designing a technological framework to counter the threats of undesirable, unlawful effects of privacy violation on sequence data, without obstructing the knowledge discovery opportunities of data mining technologies. First, we introduce a k-anonymity framework for sequence data, by defining the sequence linking attack model and its associated countermeasure, a k-anonymity notion for sequence datasets, which provides a formal protection against the attack. Second, we instantiate this framework and provide a specific method for constructing the k-anonymous version of a sequence dataset, which preserves the results of sequential pattern mining, together with several basic statistics and other analytical properties of the original data, including the clustering structure. A comprehensive experimental study on realistic datasets of process-logs, web-logs and GPS tracks is carried out, which empirically shows how, in our proposed method, the protection of privacy meets analytical utility.  相似文献   
4.
小议JavaScript库——Dojo、jQuery和PrototypeJS的比较   总被引:1,自引:0,他引:1  
这是一篇小文章,讨论了JavaScript的应用库,JavaScript是最近两年飞速发展的技术领域,希望这篇文章能引发你的兴趣,帮助你进入这个领域。  相似文献   
5.
理解LINQ-to-SQL   总被引:1,自引:0,他引:1  
Dino Esposito 《程序员》2008,(9):104-104
大多数Web应用程序都是以数据驱动的,并且以关系数据库为中心。然而,多年来架构师已经设计了通过对象来建模问题域的应用程序。对象和关系数据库之间的通信一直都不流畅和简单。建立这类通信时遇到的困难通常称为“对象/关系阻抗失配”(O/ RM)。需要一个持久层来保存对象和从关系表载入对象。这些年来,产生了许多设计样式,为从事这项任务的架构师提供指南。现在,开发人员可以自己编写整个持久层,或者借助像NHibernate或Genome等O/RM工具的帮助,进行设计。  相似文献   
6.
This paper presents the implementation of a new text document classification framework that uses the Support Vector Machine (SVM) approach in the training phase and the Euclidean distance function in the classification phase, coined as Euclidean-SVM. The SVM constructs a classifier by generating a decision surface, namely the optimal separating hyper-plane, to partition different categories of data points in the vector space. The concept of the optimal separating hyper-plane can be generalized for the non-linearly separable cases by introducing kernel functions to map the data points from the input space into a high dimensional feature space so that they could be separated by a linear hyper-plane. This characteristic causes the implementation of different kernel functions to have a high impact on the classification accuracy of the SVM. Other than the kernel functions, the value of soft margin parameter, C is another critical component in determining the performance of the SVM classifier. Hence, one of the critical problems of the conventional SVM classification framework is the necessity of determining the appropriate kernel function and the appropriate value of parameter C for different datasets of varying characteristics, in order to guarantee high accuracy of the classifier. In this paper, we introduce a distance measurement technique, using the Euclidean distance function to replace the optimal separating hyper-plane as the classification decision making function in the SVM. In our approach, the support vectors for each category are identified from the training data points during training phase using the SVM. In the classification phase, when a new data point is mapped into the original vector space, the average distances between the new data point and the support vectors from different categories are measured using the Euclidean distance function. The classification decision is made based on the category of support vectors which has the lowest average distance with the new data point, and this makes the classification decision irrespective of the efficacy of hyper-plane formed by applying the particular kernel function and soft margin parameter. We tested our proposed framework using several text datasets. The experimental results show that this approach makes the accuracy of the Euclidean-SVM text classifier to have a low impact on the implementation of kernel functions and soft margin parameter C.  相似文献   
7.
Dino Esposito 《硅谷》2005,(6):94-97
在软件行业中,五年就像是一个地质时代。五年前,Microsoft宣布了自己的Micorsoft.NET Framework计划。从那以后,DataSet(数据集)才开始作为关键对象出现在基于.NET的应用程序中,执行多种数据相关的任务。也是五年前,DataSet被誉为ADO记录集(Recordset)的威力增强版。那么在.NET Framework出现之前,您是如何设计数据访问层(DAL,Data Access Layer)的呢?我想您一定是以ADO和它全能的Recordset对象——断开的、且可进行XML序列化的——为中心构建数据访问层。  相似文献   
8.
Floyd?s operator precedence grammars and languages (FG, FL) are a classical subclass of deterministic context-free (DCF) grammars and languages. We prove that several recently introduced language families motivated by the needs of model checking and of specifying XML-like languages are proper subsets of FL. The main cases considered include visibly pushdown languages (VPL) and balanced languages (BALAN), which are characterized by restricted precedence relations. FL have all the closure properties available for regular languages and generally viewed as necessary for application to model checking: reversal, prefixing and suffixing, concatenation, Kleene star, and boolean operations. All but the last results are new, and some require complex proofs, due to the necessary changes of syntax structure. Thus FL are the largest known subfamily of DCF having the same closure properties as VPL. FG, unlike VPL grammars, which are intended for abstract syntax modelling, are structurally adequate to specify real programming languages.  相似文献   
9.
Magnetotactic bacteria (MTB) naturally synthesize magnetic nanoparticles that are wrapped in lipid membranes. These membrane‐bound particles, which are known as magnetosomes, are characterized by their narrow size distribution, high colloidal stability, and homogenous magnetic properties. These characteristics of magnetosomes confer them with significant value as materials for biomedical and industrial applications. MTB are also a model system to study key biological questions relating to formation of bacterial organelles, metal homeostasis, biomineralization, and magnetoaerotaxis. The similar size scale of nano and microfluidic systems to MTB and ease of coupling to local magnetic fields make them especially useful to study and analyze MTB. In this Review, a summary of nano‐ and microtechnologies that are developed for purposes such as MTB sorting, genetic engineering, and motility assays is provided. The use of existing platforms that can be adapted for large‐scale MTB processing including microfluidic bioreactors is also described. As this is a relatively new field, future synergistic research directions coupling MTB, and nano‐ and microfluidics are also suggested. It is hoped that this Review could start to bridge scientific communities and jump‐start new ideas in MTB research that can be made possible with nano‐ and microfluidic technologies.  相似文献   
10.
Novel compliant actuation systems have been developed in recent years for a variety of possible advantages, such as establishing a safe human–robot interaction, increasing energy efficiency, reducing the effects of impacts and even for the development of neuro-inspired robotic platforms to be used in human motor control studies.In this rapidly growing and transversal research field, systems involving more than one active element (typically motors) for each actuated degree of freedom are being investigated to allow separate position and impedance regulations. Considering the wide range of applications and the large number of different arrangements deriving from the combination of two active elements and passive elastic components, several actuation architectures have been devised.This paper reviews state-of-the-art rotary variable impedance units incorporating two separate motors. Existing devices are grouped in three main categories. A critical and comparative analysis of the most relevant features is carried out, also based on most representative prototypes. Recently proposed methodologies and evaluation criteria for design optimization are illustrated and perspectives on potential applications of double actuation systems are presented.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号