全文获取类型
收费全文 | 617篇 |
免费 | 36篇 |
国内免费 | 1篇 |
专业分类
电工技术 | 7篇 |
综合类 | 1篇 |
化学工业 | 171篇 |
金属工艺 | 6篇 |
机械仪表 | 6篇 |
建筑科学 | 31篇 |
能源动力 | 22篇 |
轻工业 | 42篇 |
水利工程 | 1篇 |
石油天然气 | 4篇 |
无线电 | 49篇 |
一般工业技术 | 102篇 |
冶金工业 | 62篇 |
原子能技术 | 2篇 |
自动化技术 | 148篇 |
出版年
2024年 | 3篇 |
2023年 | 4篇 |
2022年 | 18篇 |
2021年 | 31篇 |
2020年 | 27篇 |
2019年 | 27篇 |
2018年 | 27篇 |
2017年 | 23篇 |
2016年 | 29篇 |
2015年 | 18篇 |
2014年 | 26篇 |
2013年 | 36篇 |
2012年 | 39篇 |
2011年 | 49篇 |
2010年 | 33篇 |
2009年 | 27篇 |
2008年 | 28篇 |
2007年 | 15篇 |
2006年 | 23篇 |
2005年 | 9篇 |
2004年 | 16篇 |
2003年 | 6篇 |
2002年 | 14篇 |
2001年 | 6篇 |
2000年 | 4篇 |
1999年 | 7篇 |
1998年 | 11篇 |
1997年 | 10篇 |
1996年 | 7篇 |
1995年 | 6篇 |
1994年 | 2篇 |
1993年 | 6篇 |
1992年 | 3篇 |
1991年 | 2篇 |
1990年 | 2篇 |
1989年 | 2篇 |
1988年 | 4篇 |
1987年 | 3篇 |
1985年 | 3篇 |
1984年 | 2篇 |
1983年 | 3篇 |
1982年 | 5篇 |
1981年 | 9篇 |
1979年 | 2篇 |
1977年 | 5篇 |
1976年 | 5篇 |
1975年 | 5篇 |
1973年 | 5篇 |
1967年 | 1篇 |
1965年 | 1篇 |
排序方式: 共有654条查询结果,搜索用时 0 毫秒
51.
52.
Recently, Rozvany and Maute presented a simple problem of topology optimization under uncertainty with a single load condition that can be solved without Monte Carlo simulation. This note extends this idea to a two-bar truss under two load conditions for the purpose of illustrating differences between deterministic designs and reliability–based ones in terms of risk allocation. For this example, for the same probability of failure, a deterministic design based on the same safety factor for both loads can be substantially heavier than the reliability–based design. The difference in weight is due to very different risk allocation between the two failure modes. 相似文献
53.
Password-authenticated key exchange (PAKE) protocols allow parties to share secret keys in an authentic manner based on an easily memorizable password. Recently, Lu and Cao proposed a three-party password-authenticated key exchange protocol, so called S-3PAKE, based on ideas of the Abdalla and Pointcheval two-party SPAKE extended to three parties. S-3PAKE can be seen to have a structure alternative to that of another three-party PAKE protocol (3PAKE) by Abdalla and Pointcheval. Furthermore, a simple improvement to S-3PAKE was proposed very recently by Chung and Ku to resist the kind of attacks that applied to earlier versions of 3PAKE. In this paper, we show that S-3PAKE falls to unknown key-share attacks by any other client, and undetectable online dictionary attacks by any adversary. The latter attack equally applies to the recently improved S-3PAKE. Indeed, the provable security approach should be taken when designing PAKEs; and furthermore our results highlight that extra cautions still be exercised when defining models and constructing proofs in this direction. 相似文献
54.
Denitza T. Krasteva Layne T. Watson Chuck Baker Bernard Grossman William H. Mason Raphael T. Haftka 《Concurrency and Computation》1999,11(8):435-459
Multidisciplinary design optimization (MDO) for large-scale engineering problems poses many challenges (e.g. the design of an efficient concurrent paradigm for global optimization based on disciplinary analyses, expensive computations over vast data sets, etc.). This work focuses on the application of distributed schemes for massively parallel architectures to MDO problems, as a tool for reducing computation time and solving larger problems. The specific problem considered here is configuration optimization of a high speed civil transport (HSCT), and the efficient parallelization of the embedded paradigm for reasonable design space identification. Two distributed dynamic load balancing techniques (random polling and global round robin with message combining) and two necessary termination detection schemes (global task count and token passing) were implemented and evaluated in terms of effectiveness and scalability to large problem sizes and a thousand processors. The effect of certain parameters on execution time was also inspected. Empirical results demonstrated stable performance and effectiveness for all schemes, and the parametric study showed that the selected algorithmic parameters have a negligible effect on performance. Copyright © 1999 John Wiley & Sons, Ltd. 相似文献
55.
Low overhead analysis of large distributed data sets is necessary for current data centers and for future sensor networks. In such systems, each node holds some data value, e.g., a local sensor read, and a concise picture of the global system state needs to be obtained. In resource-constrained environments like sensor networks, this needs to be done without collecting all the data at any location, i.e., in a distributed manner. To this end, we address the distributed clustering problem, in which numerous interconnected nodes compute a clustering of their data, i.e., partition these values into multiple clusters, and describe each cluster concisely. We present a generic algorithm that solves the distributed clustering problem and may be implemented in various topologies, using different clustering types. For example, the generic algorithm can be instantiated to cluster values according to distance, targeting the same problem as the famous k-means clustering algorithm. However, the distance criterion is often not sufficient to provide good clustering results. We present an instantiation of the generic algorithm that describes the values as a Gaussian Mixture (a set of weighted normal distributions), and uses machine learning tools for clustering decisions. Simulations show the robustness, speed and scalability of this algorithm. We prove that any implementation of the generic algorithm converges over any connected topology, clustering criterion and cluster representation, in fully asynchronous settings. 相似文献
56.
In a multicore transactional memory (TM) system, concurrent execution threads interact and interfere with each other through shared memory. The less interference a thread provokes the better for the system. However, as a programmer is primarily interested in optimizing her individual code’s performance rather than the system’s overall performance, she does not have a natural incentive to provoke as little interference as possible. Hence, a TM system must be designed compatible with good programming incentives (GPI), i.e., writing efficient code for the overall system should coincide with writing code that optimizes an individual thread’s performance. We show that with most contention managers (CM) proposed in the literature so far, TM systems are not GPI compatible. We provide a generic framework for CMs that base their decisions on priorities and explain how to modify Timestamp-like CMs so as to feature GPI compatibility. In general, however, priority-based conflict resolution policies are prone to be exploited by selfish programmers. In contrast, a simple non-priority-based manager that resolves conflicts at random is GPI compatible. 相似文献
57.
Logic programming requires that the programmer convert a problem into a set of constraints based on predicates. Choosing the predicates and introducing appropriate constraints can be intricate and error prone. If the problem domain is structured enough, we can let the programmer express the problem in terms of more abstract, higher‐level constraints. A compiler can then convert the higher‐level program into a logic‐programming formalism. The compiler writer can experiment with alternative low‐level representations of the higher‐level constraints in order to achieve a high‐quality translation. The programmer can then take advantage of both a reduction in complexity and an improvement in runtime speed for all problems within the domain. We apply this analysis to the domain of tabular constraint‐satisfaction problems. Examples of such problems include logic puzzles solvable on a hatch grid and combinatorial problems such as graph coloring and independent sets. The proper abstractions for these problems are rows, columns, entries, and their interactions. We present a higher‐level language, Constraint Lingo, dedicated to problems in this domain. We also describe how we translate programs from Constraint Lingo into lower‐level logic formalisms such as the logic of propositional schemata. These translations require that we choose among competing lower‐level representations in order to produce efficient results. The overall effectiveness of our approach depends on the appropriateness of Constraint Lingo, our ability to translate Constraint Lingo programs into high‐quality representations in logic formalisms, and the efficiency with which logic engines can compute answer sets. We comment on our computational experience with these tools in solving both graph problems and logic puzzles. Copyright © 2004 John Wiley & Sons, Ltd. 相似文献
58.
59.
Gal Badishi Germano Caronni Idit Keidar Raphael Rom Glenn Scott 《Journal of Parallel and Distributed Computing》2009
Celeste is a robust peer-to-peer object store built on top of a distributed hash table (DHT). Celeste is a working system, developed by Sun Microsystems Laboratories. During the development of Celeste, we faced the challenge of complete object deletion, and moreover, of deleting “files” composed of several different objects. This important problem is not solved by merely deleting meta-data, as there are scenarios in which all file contents must be deleted, e.g., due to a court order. Complete file deletion in a realistic peer-to-peer storage system has not been previously dealt with due to the intricacy of the problem — the system may experience high churn rates, nodes may crash or have intermittent connectivity, and the overlay network may become partitioned at times. We present an algorithm that eventually deletes all file contents, data and meta-data, in the aforementioned complex scenarios. The algorithm is fully functional and has been successfully integrated into Celeste. 相似文献
60.
Opportunistic grid computing middleware has as a main concern the need to preserve the performance of the local applications running on machines that donate resources to the grid. This concern, together with the fact that it happens in an extremely dynamic environment, causes the adoption of a treatment based on thetextitbest‐effort principle for grid applications. This means that efficient application management schemes are usually not employed, which results in less than optimal performance as grid applications often need to be restarted due to (often temporary) resource claims by local user applications. This paper presents a method to improve the performance of grid applications, taking into account resource usage profiles for local applications, trying to identify when such resource claims are temporary and avoiding costly actions such as the migration of grid tasks. The approach is proposed as an extension to the InteGrade middleware and its evaluation shows promising results for the efficient management of grid applications. Copyright © 2011 John Wiley & Sons, Ltd. 相似文献