全文获取类型
收费全文 | 1374篇 |
免费 | 34篇 |
国内免费 | 15篇 |
专业分类
电工技术 | 15篇 |
综合类 | 1篇 |
化学工业 | 265篇 |
金属工艺 | 86篇 |
机械仪表 | 45篇 |
建筑科学 | 19篇 |
能源动力 | 49篇 |
轻工业 | 75篇 |
水利工程 | 3篇 |
石油天然气 | 4篇 |
无线电 | 213篇 |
一般工业技术 | 328篇 |
冶金工业 | 181篇 |
原子能技术 | 7篇 |
自动化技术 | 132篇 |
出版年
2023年 | 10篇 |
2022年 | 25篇 |
2021年 | 20篇 |
2020年 | 20篇 |
2019年 | 32篇 |
2018年 | 43篇 |
2017年 | 38篇 |
2016年 | 34篇 |
2015年 | 26篇 |
2014年 | 39篇 |
2013年 | 83篇 |
2012年 | 54篇 |
2011年 | 71篇 |
2010年 | 55篇 |
2009年 | 85篇 |
2008年 | 76篇 |
2007年 | 65篇 |
2006年 | 47篇 |
2005年 | 35篇 |
2004年 | 24篇 |
2003年 | 20篇 |
2002年 | 34篇 |
2001年 | 19篇 |
2000年 | 17篇 |
1999年 | 20篇 |
1998年 | 43篇 |
1997年 | 26篇 |
1996年 | 29篇 |
1995年 | 18篇 |
1994年 | 16篇 |
1993年 | 23篇 |
1992年 | 19篇 |
1991年 | 14篇 |
1990年 | 9篇 |
1989年 | 12篇 |
1988年 | 11篇 |
1987年 | 9篇 |
1986年 | 15篇 |
1985年 | 21篇 |
1984年 | 20篇 |
1983年 | 15篇 |
1982年 | 13篇 |
1981年 | 10篇 |
1980年 | 11篇 |
1979年 | 10篇 |
1978年 | 12篇 |
1976年 | 15篇 |
1975年 | 11篇 |
1973年 | 7篇 |
1971年 | 7篇 |
排序方式: 共有1423条查询结果,搜索用时 15 毫秒
101.
Aniruddha Gokhale Jaiganesh Balasubramanian Gan Deng Jeffrey Parsons Douglas C. Schmidt 《Science of Computer Programming》2008,73(1):39-58
Distributed real-time and embedded (DRE) systems have become critical in domains such as avionics (e.g., flight mission computers), telecommunications (e.g., wireless phone services), tele-medicine (e.g., robotic surgery), and defense applications (e.g., total ship computing environments). These types of system are increasingly interconnected via wireless and wireline networks to form systems of systems. A challenging requirement for these DRE systems involves supporting a diverse set of quality of service (QoS) properties, such as predictable latency/jitter, throughput guarantees, scalability, 24x7 availability, dependability, and security that must be satisfied simultaneously in real-time. Although increasing portions of DRE systems are based on QoS-enabled commercial-off-the-shelf (COTS) hardware and software components, the complexity of managing long lifecycles (often ∼15-30 years) remains a key challenge for DRE developers and system integrators. For example, substantial time and effort is spent retrofitting DRE applications when the underlying COTS technology infrastructure changes.This paper provides two contributions that help improve the development, validation, and integration of DRE systems throughout their lifecycles. First, we illustrate the challenges in creating and deploying QoS-enabled component middleware-based DRE applications and describe our approach to resolving these challenges based on a new software paradigm called Model Driven Middleware (MDM), which combines model-based software development techniques with QoS-enabled component middleware to address key challenges faced by developers of DRE systems — particularly composition, integration, and assured QoS for end-to-end operations. Second, we describe the structure and functionality of CoSMIC (Component Synthesis using Model Integrated Computing), which is an MDM toolsuite that addresses key DRE application and middleware lifecycle challenges, including partitioning the components to use distributed resources effectively, validating software configurations, assuring multiple simultaneous QoS properties in real-time, and safeguarding against rapidly changing technology. 相似文献
102.
The effect of doping iron at the yttrium site in hexagonal KCaY(PO4)2 is studied for various concentrations ofx (0≤x≤1), of iron using Mössbauer and X-ray diffraction methods. For low iron concentrations, very little changes in structure are seen but atx≈0·1, onset of new peaks in the XRD pattern is observed. The Mössbauer study of the doped samples reveals that iron has a solubility of up to 2·5% in the parent phase with any excess iron precipitating out to form a new and unknown phase. From a detailed analysis of the X-ray diffraction pattern (corresponding tox=1) of the latter phase, it is found that this phase is rhombohedral with the possible space groupR3. 相似文献
103.
Stephen R. Schach Tokunbo O. S. Adeshiyan Daniel Balasubramanian Gabor Madl Esteban P. Osses Sameer Singh Karlkim Suwanmongkol Minhui Xie Dror G. Feitelson 《Software Quality Journal》2007,15(1):99-113
Both common coupling and pointer variables can exert a deleterious effect on the quality of software. The situation is exacerbated
when global variables are assigned to pointer variables, that is, when an alias to a global variable is created. When this
occurs, the number of global variables increases, and it becomes considerably harder to compute quality metrics correctly.
However, unless aliasing is taken into account, variables may incorrectly appear to be unreferenced (neither defined nor used),
or to be used without being defined. These ideas are illustrated by means of a case study of common coupling in the Linux
kernel.
相似文献
Stephen R. SchachEmail: |
104.
We present a new method for estimating the edges in a piecewise smooth function from blurred and noisy Fourier data. The proposed method is constructed by combining the so called concentration factor edge detection method, which uses a finite number of Fourier coefficients to approximate the jump function of a piecewise smooth function, with compressed sensing ideas. Due to the global nature of the concentration factor method, Gibbs oscillations feature prominently near the jump discontinuities. This can cause the misidentification of edges when simple thresholding techniques are used. In fact, the true jump function is sparse, i.e. zero almost everywhere with non-zero values only at the edge locations. Hence we adopt an idea from compressed sensing and propose a method that uses a regularized deconvolution to remove the artifacts. Our new method is fast, in the sense that it only needs the solution of a single l 1 minimization. Numerical examples demonstrate the accuracy and robustness of the method in the presence of noise and blur. 相似文献
105.
Ed Dawson Kapali Viswanathan Colin Boyd 《International Journal of Information Security》2002,1(3):189-202
Literally, the word compliance suggests conformity in fulfilling official requirements. This paper presents the results of
the analysis and design of a class of protocols called compliant cryptologic protocols (CCPs). The paper presents a notion
for compliance in cryptosystems that is conducive as a cryptologic goal. CCPs are employed in security systems used by at
least two mutually mistrusting sets of entities. The individuals in the sets of entities only trust the design of the security
system and any trusted third party the security system may include. Such a security system can be thought of as a broker between
the mistrusting sets of entities.
Published online: 15 November 2002 相似文献
106.
K. R. Paramasivam M. Radhakrishnan C. Balasubramanian 《Journal of Materials Science》1981,16(5):1183-1186
The current-voltage characteristics of thin-film capacitors with evaporated terbium fluoride dielectric have been studied as a function of temperature (in the range 300 to 418 K). For sufficiently high electric fields (> 104 V cm–1, the leakage current is found to increase exponentially with the square root of the applied electric field. Analysis of the data suggests an electrode-limited mechanism such as that suggested by Schottky. It is seen that the conduction mechanism is an activated process with the activation energy decreasing with increasing field. Dielectric break-down and its dependence on film thickness have also been investigated. Break-down field strength follows the Forlani-Minnaja relation. 相似文献
107.
Ivan Rodero Hariharasudhan Viswanathan Eun Kyung Lee Marc Gamell Dario Pompili Manish Parashar 《Journal of Grid Computing》2012,10(3):447-473
Virtualized datacenters and clouds are being increasingly considered for traditional High-Performance Computing (HPC) workloads that have typically targeted Grids and conventional HPC platforms. However, maximizing energy efficiency and utilization of datacenter resources, and minimizing undesired thermal behavior while ensuring application performance and other Quality of Service (QoS) guarantees for HPC applications requires careful consideration of important and extremely challenging tradeoffs. Virtual Machine (VM) migration is one of the most common techniques used to alleviate thermal anomalies (i.e., hotspots) in cloud datacenter servers as it reduces load and, hence, the server utilization. In this article, the benefits of using other techniques such as voltage scaling and pinning (traditionally used for reducing energy consumption) for thermal management over VM migrations are studied in detail. As no single technique is the most efficient to meet temperature/performance optimization goals in all situations, an autonomic approach that performs energy-efficient thermal management while ensuring the QoS delivered to the users is proposed. To address the problem of VM allocation that arises during VM migrations, an innovative application-centric energy-aware strategy for Virtual Machine (VM) allocation is proposed. The proposed strategy ensures high resource utilization and energy efficiency through VM consolidation while satisfying application QoS by exploiting knowledge obtained through application profiling along multiple dimensions (CPU, memory, and network bandwidth utilization). To support our arguments, we present the results obtained from an experimental evaluation on real hardware using HPC workloads under different scenarios. 相似文献
108.
This paper presents a new semi-blind reference watermarking scheme based on discrete wavelet transform(DWT) and singular value decomposition(SVD) for copyright protection and authenticity. We are using a gray scale logo image as watermark instead of randomly generated Gaussian noise type watermark. For watermark embedding, the original image is transformed into wavelet domain and a reference sub-image is formed using directive contrast and wavelet coefficients. We embed watermark into reference image by modifying the singular values of reference image using the singular values of the watermark. A reliable watermark extraction scheme is developed for the extraction of watermark from distorted image. Experimental evaluation demonstrates that the proposed scheme is able to withstand a variety of attacks. We show that the proposed scheme also stands with the ambiguity attack also. 相似文献
109.
110.
M. P. Sridhar Kumar B. Viswanathan C. S. Swamy V. Srinivasan 《Journal of Materials Science》1986,21(7):2335-2338
X-ray photoelectron spectroscopic studies on the activated pure CaNi5 alloy as well as the hydride formed at 1 atm pressure and room temperature, CaNi5H4.8, showed that on activation calcium segregates to the surface and forms the oxide, whereas most of the nickel on the surface is present in the metallic form. This indicates that the coexistance of the oxide phase and the metal phase is essential for the facile hydriding behaviour of CaNi5. 相似文献