全文获取类型
收费全文 | 47篇 |
免费 | 4篇 |
专业分类
电工技术 | 4篇 |
化学工业 | 2篇 |
建筑科学 | 4篇 |
轻工业 | 1篇 |
无线电 | 6篇 |
一般工业技术 | 8篇 |
自动化技术 | 26篇 |
出版年
2016年 | 4篇 |
2014年 | 1篇 |
2013年 | 1篇 |
2012年 | 2篇 |
2008年 | 5篇 |
2007年 | 1篇 |
2006年 | 2篇 |
2005年 | 2篇 |
2003年 | 3篇 |
2002年 | 2篇 |
2000年 | 2篇 |
1999年 | 3篇 |
1998年 | 1篇 |
1995年 | 2篇 |
1994年 | 3篇 |
1993年 | 2篇 |
1992年 | 2篇 |
1991年 | 1篇 |
1990年 | 2篇 |
1988年 | 3篇 |
1987年 | 1篇 |
1986年 | 1篇 |
1985年 | 1篇 |
1982年 | 1篇 |
1981年 | 2篇 |
1980年 | 1篇 |
排序方式: 共有51条查询结果,搜索用时 283 毫秒
1.
In Praise of Scripting: Real Programming Pragmatism 总被引:1,自引:0,他引:1
2.
A. Loui F.T. Goericke T.V. Ratto J. Lee B.R. Hart W.P. King 《Sensors and actuators. A, Physical》2008,147(2):516-521
We have designed, fabricated, and tested five piezoresistive cantilever configurations to investigate the effect of shape and piezoresistor placement on the sensitivity of microcantilevers under both point loading and surface stress loading. The experimental study reveals that: (1) high aspect ratio cantilevers that are much longer than they are wide are optimal for point-loading applications such as microscopy and force measurements; (2) low aspect ratio cantilevers that are short and wide are optimal for surface stress-loading scenarios such as those that occur in biological and chemical sensor applications. The sensitivity data for both point loads and surface stress are consistent with previously developed finite-element models. 相似文献
3.
Ronald P. Loui 《Artificial Intelligence and Law》2016,24(4):371-385
This paper revisits the challenge of Berman and Hafner’s “missing link” paper on representing teleological structure in case-based legal reasoning. It is noted that this was mainly an ontological challenge to represent some of what made legal reasoning distinctive, which was given less attention than factual similarity in the dominant AI and Law paradigm, deriving from HYPO. The response to their paper is noted and briefly evaluated. A parallel is drawn to a new challenge to provide deep structure to the legal context of textual meaning, drawing on the forthcoming work of two Constitutional law scholars who appear to place some faith in the ways of thinking that AI and Law has developed. 相似文献
4.
Abstract. Updating a minimum spanning tree (MST) is a basic problem for communication networks. In this paper we consider single node deletions in MSTs. Let G=(V,E) be an undirected graph with n nodes and m edges, and let T be the MST of G . For each node v in V , the node replacement for v is the minimum weight set of edges R(v) that connect the components of T-v . We present a sequential algorithm and a parallel algorithm that find R(v) for all V simultaneously. The sequential algorithm takes O(m log n) time, but only O(m α (m,n)) time when the edges of E are presorted by weight. The parallel algorithm takes O(log 2 n) time using m processors on a CREW PRAM. 相似文献
5.
6.
7.
Joseph Y. Halpern Michael C. Loui Albert R. Meyer Daniel Weise 《Theory of Computing Systems》1986,19(1):13-28
Paul and Reischuk devised space efficient simulations of logarithmic cost random access machines and multidimensional Turing machines. We simplify their general space reduction technique and extend it to other computational models, including pointer machines, which model computations on graphs and data structures. Every pointer machine of time complexityT(n) can be simulated by a pointer machine of space complexityO(T(n)/logT(n)). 相似文献
8.
9.
A successful educational course on assembly language programming at the University of Illinois is described with particular emphasis on its pedagogical innovations, including the treatment of multitasking and the provision of library versions of subroutines. The course reinforces fundamental concepts of both data and control structures by illustrating their machine-level implementations. The machine problems provide experience with the design of large programs and with real-time data acquisition and control graphic devices 相似文献
10.
On the worst case performance of buddy systems 总被引:1,自引:1,他引:0
Summary The worst-case performance of both binary and Fibonacci buddy systems is analyzed. For both unrestricted and allocation-only request sequences, exact bounds on both the external and total fragmentation are derived.Partially supported under NSF Grant MCS-8103713Partially supported under NSF Grant IST-8012242 相似文献