全文获取类型
收费全文 | 120篇 |
免费 | 4篇 |
专业分类
化学工业 | 16篇 |
机械仪表 | 1篇 |
建筑科学 | 7篇 |
轻工业 | 19篇 |
水利工程 | 4篇 |
无线电 | 7篇 |
一般工业技术 | 4篇 |
冶金工业 | 40篇 |
原子能技术 | 1篇 |
自动化技术 | 25篇 |
出版年
2023年 | 1篇 |
2021年 | 1篇 |
2019年 | 3篇 |
2018年 | 4篇 |
2017年 | 1篇 |
2016年 | 4篇 |
2015年 | 1篇 |
2014年 | 4篇 |
2013年 | 3篇 |
2012年 | 7篇 |
2011年 | 3篇 |
2010年 | 1篇 |
2009年 | 5篇 |
2008年 | 10篇 |
2007年 | 9篇 |
2006年 | 7篇 |
2005年 | 8篇 |
2004年 | 1篇 |
2003年 | 1篇 |
2002年 | 6篇 |
2001年 | 2篇 |
2000年 | 3篇 |
1998年 | 4篇 |
1997年 | 2篇 |
1996年 | 4篇 |
1995年 | 6篇 |
1994年 | 2篇 |
1990年 | 1篇 |
1989年 | 4篇 |
1988年 | 2篇 |
1985年 | 1篇 |
1983年 | 2篇 |
1981年 | 3篇 |
1979年 | 2篇 |
1978年 | 1篇 |
1977年 | 2篇 |
1976年 | 1篇 |
1974年 | 1篇 |
1968年 | 1篇 |
排序方式: 共有124条查询结果,搜索用时 15 毫秒
1.
Faith Myles S.; Fontaine Kevin R.; Baskin Monica L.; Allison David B. 《Canadian Metallurgical Quarterly》2007,133(2):205
The authors reviewed the evidential basis of three environmental approaches to reducing population obesity: What are the effects of (a) taxing or subsidizing foods, (b) manipulating the ease of food access, and (c) restricting access to certain foods? A narrative review evaluated evidence using National Heart, Lung, and Blood Institute criteria. There was strong evidence that subsidization influences food purchases, but not necessarily food consumption or body weight. Ease of food access may influence food purchases, and possibly food intake and body weight. Data on restriction were lacking. More studies are needed to justify that altering these macro-environmental variables will necessarily reduce population obesity. A proposed conceptual model posits that the steps through environmental interventions may exert intended and unintended influences on body weight and obesity prevalence. Contemplated policy changes should weigh scientific evidence with social judgments and values concerning changes to the environment. (PsycINFO Database Record (c) 2010 APA, all rights reserved) 相似文献
2.
We give matching upper and lower bounds of \(\varTheta(\min(\frac{\log m}{\log \log m},\, n))\) for the individual step complexity of a wait-free m-valued adopt-commit object implemented using multi-writer registers for n anonymous processes. While the upper bound is deterministic, the lower bound holds for randomized adopt-commit objects as well. Our results are based on showing that adopt-commit objects are equivalent, up to small additive constants, to a simpler class of objects that we call conflict detectors. Our anonymous lower bound also applies to the individual step complexity of m-valued wait-free anonymous consensus, even for randomized algorithms with global coins against an oblivious adversary. The upper bound can be used to slightly improve the cost of randomized consensus against an oblivious adversary. For deterministic non-anonymous implementations of adopt-commit objects, we show a lower bound of \(\varOmega(\min(\frac{\log m}{\log \log m}, \frac{\sqrt{\log n}}{\log \log n}))\) and an upper bound of \(O(\min(\frac{\log m}{\log \log m},\, \log n))\) on the worst-case individual step complexity. For randomized non-anonymous implementations, we show that any execution contains at least one process whose steps exceed the deterministic lower bound. 相似文献
3.
The timestamp problem captures a fundamental aspect of asynchronous distributed computing. It allows processes to label events
throughout the system with timestamps that provide information about the real-time ordering of those events. We consider the
space complexity of wait-free implementations of timestamps from shared read-write registers in a system of n processes. We prove an lower bound on the number of registers required. If the timestamps are elements of a nowhere dense set, for example the integers,
we prove a stronger, and tight, lower bound of n. However, if timestamps are not from a nowhere dense set, this bound can be beaten: we give an implementation that uses n − 1 (single-writer) registers. We also consider the special case of anonymous implementations, where processes are programmed
identically and do not have unique identifiers. In contrast to the general case, we prove anonymous timestamp implementations
require n registers. We also give an implementation to prove that this lower bound is tight. This is the first anonymous timestamp
implementation that uses a finite number of registers. 相似文献
4.
Faith Ellen Panagiota Fatourou Eleftherios Kosmas Alessia Milani Corentin Travers 《Distributed Computing》2016,29(4):251-277
A universal construction is a general mechanism for obtaining a concurrent implementation of an object from its sequential code. We show that there is no universal construction that is both disjoint-access parallel (guaranteeing the processes operating on different parts of an implemented object do not interfere with one another) and wait-free (guaranteeing progress for each nonfaulty process when accessing an object). In contrast, we present a universal construction which results in disjoint-access parallel, wait-free implementations of any object provided there is a bound on the number of data items accessed by each operation supported by the object. 相似文献
5.
Long-lived renaming allows processes to repeatedly get distinct names from a small name space and release these names. This
paper presents two long-lived renaming algorithms in which the name a process gets is bounded above by the number of processes
currently occupying a name or performing one of these operations. The first algorithm is asynchronous, uses LL/SC objects, and has step complexity that is linear in the number of processes, c, currently getting or releasing a name. The second is synchronous, uses registers and counters, and has step complexity that
is polylogarithmic in c. Both tolerate any number of process crashes. 相似文献
6.
Personalization and privacy: a survey of privacy risks and remedies in personalization-based systems
Eran Toch Yang Wang Lorrie Faith Cranor 《User Modeling and User-Adapted Interaction》2012,22(1-2):203-220
Personalization technologies offer powerful tools for enhancing the user experience in a wide variety of systems, but at the same time raise new privacy concerns. For example, systems that personalize advertisements according to the physical location of the user or according to the user??s friends?? search history, introduce new privacy risks that may discourage wide adoption of personalization technologies. This article analyzes the privacy risks associated with several current and prominent personalization trends, namely social-based personalization, behavioral profiling, and location-based personalization. We survey user attitudes towards privacy and personalization, as well as technologies that can help reduce privacy risks. We conclude with a discussion that frames risks and technical solutions in the intersection between personalization and privacy, as well as areas for further investigation. This frameworks can help designers and researchers to contextualize privacy challenges of solutions when designing personalization systems. 相似文献
7.
Joormann Jutta; Hertel Paula T.; Brozovich Faith; Gotlib Ian H. 《Canadian Metallurgical Quarterly》2005,114(4):640
The authors examined intentional forgetting of negative material in depression. Participants were instructed to not think about emotional nouns that they had learned to associate with a neutral cue word. The authors provided participants with multiple occasions to suppress the unwanted words. Overall, depressed participants successfully forgot negative words. Moreover, the authors obtained a clear practice effect. However, forgetting came at a cost: Compared with the nondepressed participants and with the depressed participants who were instructed to forget positive words, depressed participants who were instructed to forget negative words showed significantly worse recall of the baseline words. These results indicate that training depressed individuals in intentional forgetting could prove to be an effective strategy to counteract automatic ruminative tendencies and mood-congruent biases. (PsycINFO Database Record (c) 2010 APA, all rights reserved) 相似文献
8.
Faith Bamiduro Michael B. Ward Richard Brydson Steven J. Milne 《Journal of the American Ceramic Society》2014,97(5):1619-1624
The crystallization of ZnO microrods by hydrothermal treatment of a suspension formed from reaction of zinc acetate and sodium hydroxide has been examined using scanning and transmission electron microscopy. Polycrystalline hexagonal ZnO microrods first appeared after 0.5 h reaction time at 120°C. These early stage rods were composed of stacks of hexagonal layers, each ~50 nm in thickness containing closely aligned assemblies of nanocrystallites <20 nm in size. Further growth of the microrods involved columns of nanoparticles extending from the basal layers of the preformed hexagonal stacks. Re‐crystallization produced single‐crystal microrods, many of which existed as twin particles. 相似文献
9.
10.
Gold James M.; Berman Karen Faith; Randolph Christopher; Goldberg Terry E.; Weinberger Daniel R. 《Canadian Metallurgical Quarterly》1996,10(1):3
Deficits in working memory have been proposed to explain the performance failures of frontally lesioned primates on delayed alternation (DA) and delayed response (DR) tasks. The authors examined a computerized test of delayed response alternation (DRA), which combines elements of DR and DA in a sample of 18 normal volunteers who underwent oxygen-15 PET regional cerebral blood flow scans during the DRA and a sensorimotor control task. Significant activations were observed in a network of frontal, parietal, occipital, and temporal regions during initial task performance. A qualitatively similar but somewhat reduced set of activations was observed in a subset of participants who repeated the task after practice and instruction. These results are consistent with distributed models of working memory derived from studies of nonhuman primates and suggest that the frontal lobes contribute to human working memory function. (PsycINFO Database Record (c) 2010 APA, all rights reserved) 相似文献