全文获取类型
收费全文 | 2166篇 |
免费 | 77篇 |
国内免费 | 7篇 |
专业分类
电工技术 | 19篇 |
综合类 | 5篇 |
化学工业 | 456篇 |
金属工艺 | 29篇 |
机械仪表 | 36篇 |
建筑科学 | 124篇 |
矿业工程 | 9篇 |
能源动力 | 49篇 |
轻工业 | 174篇 |
水利工程 | 19篇 |
石油天然气 | 3篇 |
无线电 | 157篇 |
一般工业技术 | 366篇 |
冶金工业 | 347篇 |
原子能技术 | 33篇 |
自动化技术 | 424篇 |
出版年
2023年 | 27篇 |
2022年 | 47篇 |
2021年 | 63篇 |
2020年 | 31篇 |
2019年 | 43篇 |
2018年 | 38篇 |
2017年 | 38篇 |
2016年 | 49篇 |
2015年 | 49篇 |
2014年 | 93篇 |
2013年 | 94篇 |
2012年 | 131篇 |
2011年 | 147篇 |
2010年 | 90篇 |
2009年 | 109篇 |
2008年 | 116篇 |
2007年 | 106篇 |
2006年 | 86篇 |
2005年 | 68篇 |
2004年 | 61篇 |
2003年 | 53篇 |
2002年 | 48篇 |
2001年 | 37篇 |
2000年 | 38篇 |
1999年 | 33篇 |
1998年 | 80篇 |
1997年 | 60篇 |
1996年 | 48篇 |
1995年 | 33篇 |
1994年 | 25篇 |
1993年 | 31篇 |
1992年 | 20篇 |
1991年 | 10篇 |
1990年 | 11篇 |
1989年 | 15篇 |
1988年 | 12篇 |
1987年 | 20篇 |
1986年 | 15篇 |
1985年 | 18篇 |
1984年 | 8篇 |
1983年 | 11篇 |
1981年 | 10篇 |
1980年 | 9篇 |
1978年 | 9篇 |
1977年 | 7篇 |
1976年 | 15篇 |
1975年 | 8篇 |
1974年 | 10篇 |
1969年 | 7篇 |
1954年 | 11篇 |
排序方式: 共有2250条查询结果,搜索用时 0 毫秒
41.
Jun Wang Sijing Zhang Carsten Maple Zhengxu Zhao 《Computer Standards & Interfaces》2009,31(3):557-565
Synchronous bandwidth, defined as the maximum time a node is allowed to send its synchronous messages while holding the token, is a sensitive parameter for deadline guarantees of synchronous messages in any timed token network. In order to offer such guarantees, synchronous bandwidth has to be allocated carefully to each individual node. This paper studies the synchronous bandwidth allocated to those synchronous message streams whose deadlines are less than twice the Target Token Rotation Time (TTRT). A new approach for allocating synchronous bandwidth to such streams, which can be used with any previously published local synchronous bandwidth allocation (SBA) for guaranteeing a general synchronous message set with its minimum deadline (Dmin) no less than 2 · TTRT, is proposed. The proposed scheme can be applied efficiently in practice to any general synchronous message set with Dmin > TTRT. Numerical examples are presented to demonstrate the enhanced performance of this new local scheme over any of the previously published local SBA schemes. 相似文献
42.
Action systems provide a formal approach to modelling parallel and reactive systems. They have a well established theory of refinement supported by simulation-based proof rules. This paper introduces an automatic approach for verifying action system refinements utilising standard CTL model checking. To do this, we encode each of the simulation conditions as a simulation machine, a Kripke structure on which the proof obligation can be discharged by checking that an associated CTL property holds. This procedure transforms each simulation condition into a model checking problem. Each simulation condition can then be model checked in isolation, or, if desired, together with the other simulation conditions by combining the simulation machines and the CTL properties. 相似文献
43.
44.
Carsten Carstensen Xiaoping Xie Guozhu Yu Tianxiao Zhou 《Computer Methods in Applied Mechanics and Engineering》2011,200(9-12):1161-1175
This paper proposes a quadrilateral finite element method of the lowest order for Reissner–Mindlin (R–M) plates on the basis of Hellinger–Reissner variational principle, which includes variables of displacements, shear stresses and bending moments. This method uses continuous piecewise isoparametric bilinear interpolation for the approximation of transverse displacement and rotation. The piecewise-independent shear stress/bending moment approximation is constructed by following a self-equilibrium criterion and a shear-stress-enhanced condition. A priori and reliable a posteriori error estimates are derived and shown to be uniform with respect to the plate thickness t. Numerical experiments confirm the theoretical results. 相似文献
45.
Deepak Kapur Victor L. Winter Raymond S. Berg 《Electronic Notes in Theoretical Computer Science》2001,50(1)
The use of formal methods for analyzing and synthesizing a controller for a multi-train multi-track railway system is discussed. The research was motivated by a case study involving the Bay Area Rapid Transit (BART) system. The overall goal is to design a train acceleration control function that enables trains to be safely placed but also increases system throughput. The use of a modeling language for specifying safety properties and a control function is illustrated. The program transformation methodology supported in the HATS system is employed to generate an efficient implementation from a high-level specification of a controller. This implementation can then be used to simulate the controller behavior, thus further enhancing confidence in the design. Properties of optimization transformations can be verified using an rewrite-rule based induction theorem prover Rewrite Rule Laboratory (RRL). 相似文献
46.
Kolmogorov V Criminisi A Blake A Cross G Rother C 《IEEE transactions on pattern analysis and machine intelligence》2006,28(9):1480-1492
This paper describes models and algorithms for the real-time segmentation of foreground from background layers in stereo video sequences. Automatic separation of layers from color/contrast or from stereo alone is known to be error-prone. Here, color, contrast, and stereo matching information are fused to infer layers accurately and efficiently. The first algorithm, layered dynamic programming (LDP), solves stereo in an extended six-state space that represents both foreground/background layers and occluded regions. The stereo-match likelihood is then fused with a contrast-sensitive color model that is learned on-the-fly and stereo disparities are obtained by dynamic programming. The second algorithm, layered graph cut (LGC), does not directly solve stereo. Instead, the stereo match likelihood is marginalized over disparities to evaluate foreground and background hypotheses and then fused with a contrast-sensitive color model like the one used in LDP. Segmentation is solved efficiently by ternary graph cut. Both algorithms are evaluated with respect to ground truth data and found to have similar performance, substantially better than either stereo or color/contrast alone. However, their characteristics with respect to computational efficiency are rather different. The algorithms are demonstrated in the application of background substitution and shown to give good quality composite video output. 相似文献
47.
Witt C 《Evolutionary computation》2006,14(1):65-86
Although Evolutionary Algorithms (EAs) have been successfully applied to optimization in discrete search spaces, theoretical developments remain weak, in particular for population-based EAs. This paper presents a first rigorous analysis of the (mu+1) EA on pseudo-Boolean functions. Using three well-known example functions from the analysis of the (1+1) EA, we derive bounds on the expected runtime and success probability. For two of these functions, upper and lower bounds on the expected runtime are tight, and on all three functions, the (mu+1) EA is never more efficient than the (1+1) EA. Moreover, all lower bounds grow with mu. On a more complicated function, however, a small increase of mu probably decreases the expected runtime drastically.This paper develops a new proof technique that bounds the runtime of the (mu+1) EA. It investigates the stochastic process for creating family trees of individuals; the depth of these trees is bounded. Thereby, the progress of the population towards the optimum is captured. This new technique is general enough to be applied to other population-based EAs. 相似文献
48.
Digital natives increasingly populate organizations?? management. These new-generation managers more naturally accept management support systems (MSS), but also have higher expectations about how they should accommodate their individual user preferences. As a result, managers question MSS that have been developed without configuration mechanisms to accommodate their working style, relevant MSS use cases, and different MSS access modes. The objective of this article is to reveal managers?? different MSS use situations and propose levers for tailoring (conceptual) MSS design to them. Use situations generalize classes of similar user-group preferences. We first apply findings from a literature review to cluster managers?? user-group preferences into 36 MSS use situations. Second, we propose that the selection of end-user devices can serve as a main lever for MSS configuration. Third, we complete the configuration with a MSS user-interface design. Finally, we demonstrate utility of our configuration model by presenting and evaluating a prototype. 相似文献
49.
50.
Businesses have embraced the Internet to reap economic advantages through the use of Websites. Most Website design guidelines fail to address issues of branding and identity formation, focusing instead on concerns adapted from previous technologies. However, many firms are not getting their desired results from the Website investments they have made following design guidelines reflecting graphic layout and system usability issues. We suggest that Websites should be considered ‘electronic storefronts’ or public work areas providing frames of symbolic representations that create impressions of their sponsoring firms. Our exploratory study shows that Websites influence potential customers' impressions of firms' legitimacy, innovation and caring, and that these impressions vary significantly across firms and industries. Website visitors encounter symbols that are compared to mental models stored in memory and used to form impressions of the site and to draw inferences about the firm. These inferences have previously been found to influence purchasing behavior. Designers should be cognizant of these aspects of e-Business and executives should recognize the power of Web-based impression management. Identity management must take center stage in creating a Web presence. 相似文献