首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   7021篇
  免费   462篇
  国内免费   6篇
电工技术   68篇
综合类   1篇
化学工业   1815篇
金属工艺   182篇
机械仪表   173篇
建筑科学   275篇
矿业工程   25篇
能源动力   268篇
轻工业   951篇
水利工程   47篇
石油天然气   42篇
无线电   503篇
一般工业技术   1522篇
冶金工业   318篇
原子能技术   56篇
自动化技术   1243篇
  2024年   31篇
  2023年   71篇
  2022年   119篇
  2021年   220篇
  2020年   208篇
  2019年   183篇
  2018年   303篇
  2017年   330篇
  2016年   382篇
  2015年   232篇
  2014年   329篇
  2013年   676篇
  2012年   386篇
  2011年   517篇
  2010年   391篇
  2009年   410篇
  2008年   371篇
  2007年   333篇
  2006年   270篇
  2005年   196篇
  2004年   180篇
  2003年   158篇
  2002年   151篇
  2001年   83篇
  2000年   90篇
  1999年   78篇
  1998年   95篇
  1997年   82篇
  1996年   72篇
  1995年   51篇
  1994年   52篇
  1993年   40篇
  1992年   36篇
  1991年   32篇
  1990年   20篇
  1989年   22篇
  1988年   20篇
  1987年   18篇
  1986年   15篇
  1985年   29篇
  1984年   12篇
  1983年   12篇
  1982年   19篇
  1981年   19篇
  1980年   12篇
  1979年   15篇
  1978年   14篇
  1977年   16篇
  1976年   14篇
  1974年   11篇
排序方式: 共有7489条查询结果,搜索用时 0 毫秒
91.
Reasoning about software systems at the architectural level is key to effective software development, management, evolution and reuse. All too often, though, the lack of appropriate documentation leads to a situation where architectural design information has to be recovered directly from implemented software artifacts. This is a very demanding process, particularly when involving recovery of runtime abstractions (clients, servers, interaction protocols, etc.) that are typical to the design of distributed software systems. This paper presents an exploratory reverse engineering approach, called X-ray, to aid programmers in recovering architectural runtime information from a distributed system's existing software artifacts. X-ray comprises three domain-based static analysis techniques, namely component module classification, syntactic pattern matching, and structural reachability analysis. These complementary techniques can facilitate the task of identifying a distributed system's implemented executable components and their potential runtime interconnections. The component module classification technique automatically distinguishes source code modules according to the executables components they implement. The syntactic pattern matching technique in turn helps to recognise specific code fragments that may implement typical component interaction features. Finally, the structural reachability analysis technique aids in the association of those features to the code specific for each executable component. The paper describes and illustrates the main concepts underlying each technique, reports on their implementation as a suit of new and off-the-shelf tools, and, to give evidence of the utility of the approach, provides a detailed account of a successful application of the three techniques to help recover a static approximation of the runtime architecture for Field, a publicly-available distributed programming environment.  相似文献   
92.
The acidity constants, pK(a) values for protonation of some substituted thiazole derivatives were calculated by using AM1 and PM3 basis sets of semi-empirical methods and B3LYP/6-31G(d) basis sets of density functional theory (DFT) calculated physical and thermodynamic parameters. Correlation search among the experimental and calculated acidity constants, pK(a) values, revealed that the best correlation exist between the experimental and ab initio calculated pK(a) values with a regression of R(2)=0.98.  相似文献   
93.
In this paper, we present the ARIA media processing workflow architecture that processes, filters, and fuses sensory inputs and actuates responses in real-time. The components of the architecture are programmable and adaptable; i.e. the delay, size, and quality/precision characteristics of the individual operators can be controlled via a number of parameters. Each data object processed by qStream components is subject to transformations based on the parameter values. For instance, the quality of an output data object and the corresponding processing delay and resource usage depend on the values assigned to parameters of the operators in the object flow path. In Candan, Peng, Ryu, Chatha, Mayer (Efficient stream routing in quality- and resource-adaptive flow architectures. In: Workshop on multimedia information systems, 2004), we introduced a class of flow optimization problems that promote creation and delivery of small delay or small resource-usage objects to the actuators in single-sensor, single-actuator workflows. In this paper, we extend our attention to multi-sensor media processing workflow scenarios. The algorithms we present take into account the implicit dependencies between various system parameters, such as resource consumption and object sizes. We experimentally show the effectiveness and efficiency of the algorithms.
Kyung Dong RyuEmail:
  相似文献   
94.
This paper reports on an ergonomic study carried out during the design of a cutting machine-tool for the composite material in carbody parts casting. During this design process, the users’ needs were inferred by the designers on the basis of their own mental representations of the use of the new device. These representations of the users’ needs, correct or false, play a decisive role in the choice of a solution. The aim of the study is to identify their particularity. Analyzing the design meetings, we have highlighted that users are considered either as subsystems or basic design principles or elements of an imagined scenario. We have shown that these representations are linked to the types of meetings held during the design process. Accordingly, a diversification of the types of meetings should be promoted by the project leader, so that designers extend their points of view of the operators.  相似文献   
95.
96.
We consider the problem of finding a cutset in a directed graph G=(V,E)G=(V,E), i.e., a set of vertices that cuts all cycles in G  . Finding a cutset of minimum cardinality is NP-hard. There exist several approximate and exact algorithms, most of them using graph reduction techniques. In this paper, we propose a constraint programming approach to cutset problems and design a global constraint for computing cutsets. This cutset constraint is a global constraint over boolean variables associated to the vertices of a given graph and states that the subgraph restricted to the vertices having their boolean variable set to true is acyclic. We propose a filtering algorithm based on graph contraction operations and inference of simple boolean constraints, that has a linear time complexity in O(|E|+|V|)O(|E|+|V|). We discuss search heuristics based on graph properties provided by the cutset constraint, and show the efficiency of the cutset constraint on benchmarks of the literature for pure minimum cutset problems, and on an application to log-based reconciliation problems where the global cutset constraint is mixed with other boolean constraints.  相似文献   
97.
Analyzing the way computer technologies are used is crucial for their development. Such analyses make it possible to evaluate these technologies and enhance their evolution. The present article presents some ideas drawn from the development of a cooperation platform for elementary school children (10–11 years old). On the basis of an obvious ergonomic requirement, we worked on two other dimensions: cultural aspects and the teaching scenario. The goal was to set up observation situations and analyze the conversations produced during those situations, in order to understand what using the platform meant to both the pupils and their teachers.
Claude GodartEmail:
  相似文献   
98.
On Similarity Measures for Multimedia Database Applications   总被引:1,自引:1,他引:0  
A multimedia database query consists of a set of fuzzy and boolean (or crisp) predicates, constants, variables, and conjunction, disjunction, and negation operators. The fuzzy predicates are evaluated based on different media criteria, such as color, shape, layout, keyword. Since media-based evaluation yields similarity values, results to such a query is defined as an ordered set. Since many multimedia applications require partial matches, query results also include tuples which do not satisfy all predicates. Hence, any fuzzy semantics which extends the boolean semantics of conjunction in a straight forward manner may not be desirable for multimedia databases. In this paper, we focus on the problem of ‘given a multimedia query which consists of multiple fuzzy and crisp predicates, how to provide the user with a meaningful overall ranking.’ More specifically, we study the problem of merging similarity values in queries with multiple fuzzy predicates. We describe the essential multimedia retrieval semantics, compare these with the known approaches, and propose a semantics which captures the retrieval requirements in multimedia databases. Received 13 August 1999 / Revised 13 May 2000 / Accepted in revised form 26 July 2000  相似文献   
99.
This paper presents an assessment method to evaluate the quality of object oriented software systems. The assessment method is based on source code abstraction, object–oriented metrics and graphical representation. The metrics used and the underlying model representing the software are presented. The assessment method experiment is part of an industrial research effort with the Bell Canada Quality Engineering and Research Group. It helps evaluators assess the quality and risks associated with software by identifying code fragments presenting unusual characteristics. The assessment method evaluates object–oriented software systems at three levels of granularity: system level, class level and method level. One large C++ and eight Java software systems, for a total of over one million lines of code, are presented as case studies. A critical analysis of the results is presented comparing the systems and the two languages.  相似文献   
100.
This paper deals with the two-dimensional bin packing problem with conflicts (BPC-2D). Given a finite set of rectangular items, an unlimited number of rectangular bins and a conflict graph, the goal is to find a conflict-free packing of the items minimizing the number of bins used. In this paper, we propose a new framework based on a tree-decomposition for solving this problem. It proceeds by decomposing a BPC-2D instance into subproblems to be solved independently. Applying this decomposition method is not straightforward, since merging partial solutions is hard. Several heuristic strategies are proposed to make an effective use of the decomposition. Computational experiments show the practical effectiveness of our approach.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号