首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1112篇
  免费   38篇
  国内免费   1篇
电工技术   18篇
综合类   2篇
化学工业   220篇
金属工艺   13篇
机械仪表   23篇
建筑科学   71篇
矿业工程   12篇
能源动力   28篇
轻工业   57篇
水利工程   9篇
石油天然气   2篇
武器工业   1篇
无线电   79篇
一般工业技术   153篇
冶金工业   224篇
原子能技术   9篇
自动化技术   230篇
  2023年   20篇
  2022年   13篇
  2021年   39篇
  2020年   13篇
  2019年   27篇
  2018年   24篇
  2017年   14篇
  2016年   38篇
  2015年   28篇
  2014年   41篇
  2013年   56篇
  2012年   47篇
  2011年   64篇
  2010年   48篇
  2009年   39篇
  2008年   51篇
  2007年   43篇
  2006年   28篇
  2005年   34篇
  2004年   23篇
  2003年   23篇
  2002年   16篇
  2001年   15篇
  2000年   17篇
  1999年   31篇
  1998年   85篇
  1997年   56篇
  1996年   30篇
  1995年   15篇
  1994年   11篇
  1993年   22篇
  1992年   7篇
  1991年   9篇
  1990年   6篇
  1989年   4篇
  1988年   5篇
  1987年   4篇
  1985年   8篇
  1984年   6篇
  1983年   9篇
  1982年   5篇
  1981年   5篇
  1980年   4篇
  1979年   6篇
  1978年   5篇
  1976年   10篇
  1971年   3篇
  1970年   4篇
  1930年   4篇
  1909年   3篇
排序方式: 共有1151条查询结果,搜索用时 31 毫秒
51.
Zusammenfassung   Der folgende Beitrag ist ein Pl?doyer für st?rkere methodische Standards in der Softwaretechnologie. Nicht immer werden wissenschaftstheoretischen Grunds?tze beachtet wie das Prinzip, da? Aussagen falsifizierbar sein sollten. Dies scheint die These der sog. Konstruktivisten zu best?tigen, da? n?mlich „objektive Wahrheiten“ in Wirklichkeit soziale Konstrukte seien. Der Beitrag pl?diert deshalb für eine st?rkere empirische Fundierung der Softwaretechnologie. Eingegangen in überarbeiteter Form am 07.09.1998  相似文献   
52.
This paper addresses the problem of training trajectories by means of continuous recurrent neural networks whose feedforward parts are multilayer perceptrons. Such networks can approximate a general nonlinear dynamic system with arbitrary accuracy. The learning process is transformed into an optimal control framework where the weights are the controls to be determined. A training algorithm based upon a variational formulation of Pontryagin's maximum principle is proposed for such networks. Computer examples demonstrating the efficiency of the given approach are also presented.  相似文献   
53.
We call a polynomial g(t1, . . . , tm,X ) over a field K generic for a group G if it has Galois group G as a polynomial inX , and if every Galois field extension N / L withK L and Gal(N / L) ≤ G arises as the splitting field of a suitable specializationg (λ1, . . . , λm, X) withλi L. We discuss how the rationality of the invariant field of a faithful linear representation leads to a generic polynomial which is often particularly simple and therefore useful. Then we consider various examples and applications in characteristic 0 and in positive characteristic. These include results on so-called vectorial polynomials and a generalization of an embedding criterion given by Abhyankar. We give recursive formulas for generic polynomials over a field of defining characteristic for the groups of upper unipotent and upper triangular matrices, and explicit formulae for generic polynomials for the groups GU2(q2) andGO3 (q).  相似文献   
54.
A digital security breach, by which confidential information is leaked, does not only affect the agent whose system is infiltrated but is also detrimental to other agents socially connected to the infiltrated system. Although it has been argued that these externalities create incentives to underinvest in security, this presumption is challenged by the possibility of strategic adversaries that attack the least protected agents. In this paper we study a new model of security games in which agents share tokens of sensitive information in a network of contacts. The agents have the opportunity to invest in security to protect against an attack that can be either strategically or randomly targeted. We show that, in the presence of random attack, underinvestments always prevail at the Nash equilibrium in comparison with the social optimum. Instead, when the attack is strategic, either underinvestments or overinvestments are possible, depending on the network topology and on the characteristics of the process of the spreading of information. Actually, agents invest more in security than socially optimal when dependencies among agents are low (which can happen because the information network is sparsely connected or because the probability that information tokens are shared is small). These overinvestments pass on to underinvestments when information sharing is more likely (and therefore, when the risk brought by the attack is higher). In order to keep our analysis tractable, some of our results on strategic attacks make an assumption of homogeneity in the network, namely, that the network is vertex‐transitive. We complement these results with an analysis on star graphs (which are nonhomogeneous), which confirms that the essential lines of our findings can remain valid on general networks.  相似文献   
55.
56.
An initiative was introduced in one of the production facilities of Germany’s E.G.O. Group in order to enhance its SAP information system with a custom-made application for production-scheduling optimization. The goal of the optimization is to find a production schedule that satisfies different, contradictory production and business constraints. We show the challenges faced in the application of the multi-objective optimization approach, which is gaining influence in the management of production scheduling. We implement a memetic version of the Indicator-Based Evolutionary Algorithm with customized reproduction operators and local search procedures to find a set of feasible, non-dominated solutions. Such a memetic algorithm was applied to two real order lists from the production company. Additionally, we also lay out an efficient presentation of the multi-objective results for an expert’s support in decision making. This provides the management with the possibility to gain additional insights into how the production schedule dynamically reacts to changes in the decision criteria. We show that the multi-objective approach is able to find high-quality solutions, which enables flexibility when it comes to quickly adapting to specific business conditions.  相似文献   
57.
Software design is an area where it is most important to elicit an accurate and complete set of requirements. Determining the users requirements and their qualitative satisfaction with a developing product are two major problems which arise, often due to the different backgrounds and perspectives of the different stakeholders, including the software engineer, the domain expert and the end-user. Involving users throughout the design and development process is an essential part of any project. Computer-based interviewing has been found to be a valuable tool in eliciting information, which can also enhance interpersonal communication afterwards. This paper discusses the development of a computer interviewing tool to facilitate the gathering of user requirements and conducting user evaluations.  相似文献   
58.
Although “User-Centred”, “Participatory”, and other similar design approaches have proved to be very valuable for mainstream design, their principles are more difficult to apply successfully when the user group contains, or is composed of, older and/or disabled users. In the field of design for older and disabled people, the “Universal Design”, “Inclusive Design” and “Design for All” movements have encouraged designers to extend their design briefs to include older and disabled people. The downside of these approaches is that they can tend to encourage designers to follow a traditional design path to produce a prototype design, and only then investigate how to modify their interfaces and systems to cope with older and/or disabled users. This can lead to an inefficient design process and sometimes an inappropriate design, which may be “accessible” to people with disabilities, but in practice unusable. This paper reviews the concept that the authors have called “User-Sensitive Inclusive Design”, which suggests a different approach to designing for marginalised groups of people. Rather than suggesting that designers rely on standards and guidelines, it is suggested that designers need to develop a real empathy with their user groups. A number of ways to achieve this are recommended, including the use of ethnography and techniques derived from professional theatre both for requirements gathering and for improving designers’ empathy for marginalised groups of users, such as older and disabled people.  相似文献   
59.
Acceptance testing is a time-consuming task for complex software systems that have to fulfill a large number of requirements. To reduce this effort, we have developed a widely automated method for deriving test plans from requirements that are expressed in natural language. It consists of three stages: annotation, clustering, and test plan specification. The general idea is to exploit redundancies and implicit relationships in requirements specifications. Multi-viewpoint techniques based on RM-ODP (Reference Model for Open Distributed Processing) are employed for specifying the requirements. We then use linguistic analysis techniques, requirements clustering algorithms, and pattern-based requirements collection to reduce the total effort of testing against the requirements specification. In particular, we use linguistic analysis for extracting and annotating the actor, process and object of a requirements statement. During clustering, a similarity function is computed as a measure for the overlap of requirements. In the test plan specification stage, our approach provides capabilities for semi-automatically deriving test plans and acceptance criteria from the clustered informal textual requirements. Two patterns are applied to compute a suitable order of test activities. The generated test plans consist of a sequence of test steps and asserts that are executed or checked in the given order. We also present the supporting prototype tool TORC, which is available open source. For the evaluation of the approach, we have conducted a case study in the field of acceptance testing of a national electronic identification system. In summary, we report on lessons learned how linguistic analysis and clustering techniques can help testers in understanding the relations between requirements and for improving test planning.  相似文献   
60.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号