全文获取类型
收费全文 | 2666篇 |
免费 | 49篇 |
国内免费 | 5篇 |
专业分类
电工技术 | 44篇 |
综合类 | 5篇 |
化学工业 | 453篇 |
金属工艺 | 79篇 |
机械仪表 | 56篇 |
建筑科学 | 127篇 |
矿业工程 | 11篇 |
能源动力 | 51篇 |
轻工业 | 160篇 |
水利工程 | 24篇 |
石油天然气 | 15篇 |
无线电 | 200篇 |
一般工业技术 | 395篇 |
冶金工业 | 670篇 |
原子能技术 | 22篇 |
自动化技术 | 408篇 |
出版年
2022年 | 23篇 |
2021年 | 23篇 |
2020年 | 20篇 |
2019年 | 27篇 |
2018年 | 33篇 |
2017年 | 33篇 |
2016年 | 39篇 |
2015年 | 35篇 |
2014年 | 56篇 |
2013年 | 152篇 |
2012年 | 79篇 |
2011年 | 114篇 |
2010年 | 75篇 |
2009年 | 75篇 |
2008年 | 133篇 |
2007年 | 93篇 |
2006年 | 88篇 |
2005年 | 85篇 |
2004年 | 80篇 |
2003年 | 71篇 |
2002年 | 76篇 |
2001年 | 47篇 |
2000年 | 47篇 |
1999年 | 54篇 |
1998年 | 78篇 |
1997年 | 38篇 |
1996年 | 55篇 |
1995年 | 44篇 |
1994年 | 59篇 |
1993年 | 35篇 |
1992年 | 56篇 |
1991年 | 32篇 |
1990年 | 42篇 |
1989年 | 37篇 |
1988年 | 36篇 |
1987年 | 32篇 |
1986年 | 33篇 |
1985年 | 34篇 |
1984年 | 44篇 |
1983年 | 41篇 |
1982年 | 40篇 |
1981年 | 29篇 |
1980年 | 31篇 |
1979年 | 28篇 |
1978年 | 32篇 |
1977年 | 30篇 |
1976年 | 33篇 |
1975年 | 23篇 |
1974年 | 29篇 |
1973年 | 27篇 |
排序方式: 共有2720条查询结果,搜索用时 0 毫秒
131.
Accelerating Turing machines have attracted much attention in the last decade or so. They have been described as “the work-horse of hypercomputation” (Potgieter and Rosinger 2010: 853). But do they really compute beyond the “Turing limit”—e.g., compute the halting function? We argue that the answer depends on what you mean by an accelerating Turing machine, on what you mean by computation, and even on what you mean by a Turing machine. We show first that in the current literature the term “accelerating Turing machine” is used to refer to two very different species of accelerating machine, which we call end-stage-in and end-stage-out machines, respectively. We argue that end-stage-in accelerating machines are not Turing machines at all. We then present two differing conceptions of computation, the internal and the external, and introduce the notion of an epistemic embedding of a computation. We argue that no accelerating Turing machine computes the halting function in the internal sense. Finally, we distinguish between two very different conceptions of the Turing machine, the purist conception and the realist conception; and we argue that Turing himself was no subscriber to the purist conception. We conclude that under the realist conception, but not under the purist conception, an accelerating Turing machine is able to compute the halting function in the external sense. We adopt a relatively informal approach throughout, since we take the key issues to be philosophical rather than mathematical. 相似文献
132.
Information system development can be considered a collaboration between users and developers. The inability to leverage the localized knowledge embedded in these two stakeholders hinders software development work to achieve high performance. Exploring the ways to counter this difficulty is then critical. This study applies an intellectual capital perspective to address the issues around spanning the knowledge boundary between developers and users. Our findings highlighted how important effective knowledge boundary spanning is to both product and project quality. Furthermore, three dimensions of intellectual capital increased the degree to which knowledge boundary spanning was effective. 相似文献
133.
134.
This paper investigates the modelling of the interframe dependence in a hidden Markov model (HMM) for speech recognition. First, a new observation model, assuming dependence on multiple previous frames, is proposed. This model represents such a dependence structure with a weighted mixture of a set of first-order conditional Gaussian densities, each mixture component accounting for a specific conditional frame. Next, an optimization in choosing the conditional frames/segment is performed in both training and recognition, thereby helping to remove the mismatch of the conditional segments due to different observation histories. An EM (Expectation–Maximization) iteration algorithm is developed for the estimation of the model parameters and for the optimization over the dependence structure. Experimental comparisons on a speaker-independent E-set database show that the new model, without optimization on the dependence structure, achieves better performance than the standard HMM, the bigram HMM and the linear-predictive HMM, all in comparable or smaller parameter sizes. The optimization over the dependence structure leads to further improvement in the performance. 相似文献
135.
George Bosilca Aurlien Bouteiller Elisabeth Brunet Franck Cappello Jack Dongarra Amina Guermouche Thomas Herault Yves Robert Frdric Vivien Dounia Zaidouni 《Concurrency and Computation》2014,26(17):2772-2791
In this paper, we present a unified model for several well‐known checkpoint/restart protocols. The proposed model is generic enough to encompass both extremes of the checkpoint/restart space, from coordinated approaches to a variety of uncoordinated checkpoint strategies (with message logging). We identify a set of crucial parameters, instantiate them, and compare the expected efficiency of the fault tolerant protocols, for a given application/platform pair. We then propose a detailed analysis of several scenarios, including some of the most powerful currently available high performance computing platforms, as well as anticipated Exascale designs. The results of this analytical comparison are corroborated by a comprehensive set of simulations. Altogether, they outline comparative behaviors of checkpoint strategies at very large scale, thereby providing insight that is hardly accessible to direct experimentation. Copyright © 2013 John Wiley & Sons, Ltd. 相似文献
136.
Marc Baboulin Alfredo Buttari Jack Dongarra Jakub Kurzak Julie Langou Julien Langou Piotr Luszczek Stanimire Tomov 《Computer Physics Communications》2009,180(12):2526-2533
On modern architectures, the performance of 32-bit operations is often at least twice as fast as the performance of 64-bit operations. By using a combination of 32-bit and 64-bit floating point arithmetic, the performance of many dense and sparse linear algebra algorithms can be significantly enhanced while maintaining the 64-bit accuracy of the resulting solution. The approach presented here can apply not only to conventional processors but also to other technologies such as Field Programmable Gate Arrays (FPGA), Graphical Processing Units (GPU), and the STI Cell BE processor. Results on modern processor architectures and the STI Cell BE are presented.
Program summary
Program title: ITER-REFCatalogue identifier: AECO_v1_0Program summary URL:http://cpc.cs.qub.ac.uk/summaries/AECO_v1_0.htmlProgram obtainable from: CPC Program Library, Queen's University, Belfast, N. IrelandLicensing provisions: Standard CPC licence, http://cpc.cs.qub.ac.uk/licence/licence.htmlNo. of lines in distributed program, including test data, etc.: 7211No. of bytes in distributed program, including test data, etc.: 41 862Distribution format: tar.gzProgramming language: FORTRAN 77Computer: desktop, serverOperating system: Unix/LinuxRAM: 512 MbytesClassification: 4.8External routines: BLAS (optional)Nature of problem: On modern architectures, the performance of 32-bit operations is often at least twice as fast as the performance of 64-bit operations. By using a combination of 32-bit and 64-bit floating point arithmetic, the performance of many dense and sparse linear algebra algorithms can be significantly enhanced while maintaining the 64-bit accuracy of the resulting solution.Solution method: Mixed precision algorithms stem from the observation that, in many cases, a single precision solution of a problem can be refined to the point where double precision accuracy is achieved. A common approach to the solution of linear systems, either dense or sparse, is to perform the LU factorization of the coefficient matrix using Gaussian elimination. First, the coefficient matrix A is factored into the product of a lower triangular matrix L and an upper triangular matrix U. Partial row pivoting is in general used to improve numerical stability resulting in a factorization PA=LU, where P is a permutation matrix. The solution for the system is achieved by first solving Ly=Pb (forward substitution) and then solving Ux=y (backward substitution). Due to round-off errors, the computed solution, x, carries a numerical error magnified by the condition number of the coefficient matrix A. In order to improve the computed solution, an iterative process can be applied, which produces a correction to the computed solution at each iteration, which then yields the method that is commonly known as the iterative refinement algorithm. Provided that the system is not too ill-conditioned, the algorithm produces a solution correct to the working precision.Running time: seconds/minutes 相似文献137.
36 3-mo-old infants interacted with their mothers under conditions in which they could see and hear their mothers (correlated auditory plus visual information: A?+?V), see but not hear their mothers (V), and hear but not see their mothers (A); the latter 2 conditions are termed perceptual paradox. The interactions were videotaped, and the Ss' behavior was judged by naive observers who used a subjective 7-point rating scale of infant affect. For 2 groups of Ss, 3 1-min presentations of the A?+?V condition were alternated with 3 1-min presentations of either A (Group 1) or V (Group 2) conditions. In both groups, Ss were judged as being more distressed during unimodal presentations than during bimodal presentations. In a 3rd group, unimodal (A) presentations were alternated with unimodal (V) presentations. Ss in this group were significantly more distressed when they could hear but not see their mothers than when they could see but not hear their mothers. Results demonstrate the suitability of global subjective ratings of affective state in studies of infant perception. (17 ref) (PsycINFO Database Record (c) 2010 APA, all rights reserved) 相似文献
138.
Two brief laboratory tasks measuring delay of gratification in different ways were administered to 116 4-yr-old children. Personality data were available on these children separately at ages 3, 4, 7, and 11 yrs in the form of California Child Q-Set ratings by independent sets of teachers and examiners. The 2 delay-of-gratification measures were used to generate a more broadly based index of delay of gratification, and this index was correlated with the personality ratings available at the 4 ages. Boys who delayed gratification tended to be described as deliberative, attentive, reasonable, reserved, cooperative, and able to modulate motivational and emotional impulse. Boys who did not delay gratification, by contrast, were irritable, restless, aggressive, and generally not self-controlled. Girls who delayed gratification were consistently described as intelligent, resourceful, and competent. Girls who did not delay tended to go to pieces under stress; to be victimized by other children; and to be easily offended, sulky, and whiny. Findings are interpreted in terms of the constructs of ego control and ego resiliency and the differential socialization of the sexes. (26 ref) (PsycINFO Database Record (c) 2010 APA, all rights reserved) 相似文献
139.
Wiggins Jack G.; Bennett Bruce E.; Batchelor Walter F.; West Pamela R. 《Canadian Metallurgical Quarterly》1983,38(5):602
The professional and economic challenges to psychologists posed by organized medicine have been stymied in the past by the Federal Trade Commission and by strict enforcement of the antitrust laws. Now that professionals' competition and consumer choice are being supported in the courts, the American Medical Association (AMA) is redoubling its efforts to retain a monopolistic hold on health care, hospital practice, and health insurance throughout the nation. Organized psychology, with the help of other professions and the Congress, has barely held the line against politically and economically stronger forces. The Association for the Advancement of Psychology and the American Psychological Association actively opposed the AMA's proposed legislation in 1981 and 1982 that would have allowed the AMA to circumvent valid law. The medical profession has actively worked to control all health care and deny psychologists hospital staff privileges, preventing group practice between physicians and psychologists, denying them health insurance reimbursement, and restricting psychological services to physician supervision. (5 ref) (PsycINFO Database Record (c) 2010 APA, all rights reserved) 相似文献
140.
Jack J. Domet III T.M. Rajkumar Domet III David Yen 《Information Systems Management》1994,11(4):39-45
The realization of digital multimedia's full business potential requires networking. This article discusses the value-added benefits to the corporation of networked multimedia as well as the choice of architectures and technologies needed to deliver multimedia networking solutions. 相似文献