首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   111篇
  免费   1篇
电工技术   1篇
综合类   1篇
化学工业   15篇
金属工艺   1篇
机械仪表   3篇
矿业工程   1篇
能源动力   2篇
轻工业   1篇
无线电   30篇
一般工业技术   9篇
冶金工业   12篇
自动化技术   36篇
  2023年   2篇
  2022年   1篇
  2021年   3篇
  2020年   1篇
  2019年   1篇
  2018年   3篇
  2016年   2篇
  2015年   1篇
  2014年   3篇
  2013年   4篇
  2012年   5篇
  2011年   3篇
  2010年   1篇
  2009年   1篇
  2008年   7篇
  2007年   8篇
  2006年   10篇
  2005年   6篇
  2004年   7篇
  2003年   7篇
  2002年   6篇
  2001年   2篇
  1999年   3篇
  1998年   1篇
  1997年   6篇
  1996年   1篇
  1995年   2篇
  1994年   4篇
  1992年   3篇
  1990年   1篇
  1989年   1篇
  1987年   2篇
  1982年   1篇
  1978年   1篇
  1972年   2篇
排序方式: 共有112条查询结果,搜索用时 15 毫秒
1.
Wireless Networks - Femto Cells offer higher data rates to users within closed spaces. Dense deployment of small cells is a characteristic of pre-5G/LTE-Advanced Pro (LTE-A Pro) networks and is a...  相似文献   
2.
Creep properties of three Sn–Zn solder alloys (Sn–9Zn, Sn–20Zn, and Sn–25Zn, wt%) were studied using the impression creep technique. Microstructural characteristics were examined using a scanning electron microscope. The alloys exhibited stress exponents of about 5.0. The activation energy for creep was calculated to be ~50–75 kJ/mol with a mean value of 66.3 kJ/mol. The likely creep mechanism was identified to be the low temperature viscous glide of dislocations.  相似文献   
3.
A new parallel algorithm for transforming an arithmetic infix expression into a par se tree is presented. The technique is based on a result due to Fischer (1980) which enables the construction of the parse tree, by appropriately scanning the vector of precedence values associated with the elements of the expression. The algorithm presented here is suitable for execution on a shared memory model of an SIMD machine with no read/write conflicts permitted. It uses O(n) processors and has a time complexity of O(log2n) where n is the expression length. Parallel algorithms for generating code for an SIMD machine are also presented.  相似文献   
4.
The Recursive Descent method of parsing is well established in practice. An Incremental Parsing algorithm using the Recursive Descent method is presented. The algorithm is applicable to LL(1) grammars. The algorithm has been implemented for a subset of Pascal.  相似文献   
5.
In this paper, an economic production quantity model is developed for a production–inventory system where the demand rate increases with time, the production rate is finite and adjustable in each cycle over an infinite planning horizon and shortages are permitted. The cost of adjusting the production rate depends linearly on the magnitude of the change in the production rate. During the stock‐out period, a known fraction of the unsatisfied demands is backordered while the remaining fraction is lost. The model is formulated taking the demand rate as a general increasing function of time and the optimal production policy is obtained for the special case of a linearly increasing demand rate. The proposed model is also shown to be suitable for a prescribed time horizon. A procedure to find approximately the minimum total cost of the system over a finite time horizon is suggested. A numerical example is taken to illustrate the solution procedure of the developed model.  相似文献   
6.
There has been much interest in admission control schemes that place the burden of admission control decisions on the end users. In these schemes, referred to as Endpoint Admission Control, the decision to join the network is taken by the user, based on the probing of the network using probe packets. Depending on the level of congestion, routers mark the probe packets and thus inform the user of the state of the network. In this paper, we analyze three mechanisms for providing Endpoint Admission Control: virtual-queue marking, random-early marking and tail drop. For each scheme, we analyze the probing duration necessary to guarantee the required QoS and achieve high link utilization. Our main conclusion is that very few probe packets have to be sent when early marking is used, whereas tail drop requires a large number of probe packets.  相似文献   
7.
In this paper, we study the problem of designing globally stable, scalable congestion control algorithms for the Internet. Prior work has primarily used linear stability as the criterion for such a design. Global stability has been studied only for single node, single source problems. Here, we obtain conditions for a general topology network accessed by sources with heterogeneous delays. We obtain a sufficient condition for global stability in terms of the increase/decrease parameters of the congestion control algorithm and the price functions used at the links.  相似文献   
8.
Stable scheduling policies for fading wireless channels   总被引:1,自引:0,他引:1  
We study the problem of stable scheduling for a class of wireless networks. The goal is to stabilize the queues holding information to be transmitted over a fading channel. Few assumptions are made on the arrival process statistics other than the assumption that their mean values lie within the capacity region and that they satisfy a version of the law of large numbers. We prove that, for any mean arrival rate that lies in the capacity region, the queues will be stable under our policy. Moreover, we show that it is easy to incorporate imperfect queue length information and other approximations that can simplify the implementation of our policy.  相似文献   
9.
Bayardo  R.J. Srikant  R. 《Computer》2003,36(9):115-118
The Web is commonly viewed as an information access tool for end users. But as much as it simplifies access to stock quotes, medical libraries, or reference manuals, the Web also makes it easier for individuals and organizations to obtain and infer. Emerging technologies can protect privacy without restricting the information flow crucial to efficient organizations. Solutions to privacy concern must combine laws, societal norms, market and technology.  相似文献   
10.
We consider a failure-prone manufacturing system with bursty demand arrivals. We prove that the hedging-point policy is optimal for this problem and provide analytical expressions to compute the hedging point. This allows us to compare our exact results to simpler approximations. We also show that our result leads to the solution for the constant demand rate problem, under an appropriate scaling of the demand process. We also provide a necessary and sufficient condition under which the just-in-time (JIT) policy is optimal for the case of linear, absolute value instantaneous cost  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号