全文获取类型
收费全文 | 1443篇 |
免费 | 53篇 |
国内免费 | 2篇 |
专业分类
电工技术 | 12篇 |
化学工业 | 223篇 |
金属工艺 | 4篇 |
机械仪表 | 33篇 |
建筑科学 | 56篇 |
矿业工程 | 4篇 |
能源动力 | 20篇 |
轻工业 | 118篇 |
水利工程 | 19篇 |
石油天然气 | 3篇 |
无线电 | 152篇 |
一般工业技术 | 253篇 |
冶金工业 | 423篇 |
原子能技术 | 9篇 |
自动化技术 | 169篇 |
出版年
2023年 | 12篇 |
2022年 | 11篇 |
2021年 | 21篇 |
2020年 | 15篇 |
2019年 | 23篇 |
2018年 | 19篇 |
2017年 | 29篇 |
2016年 | 22篇 |
2015年 | 14篇 |
2014年 | 21篇 |
2013年 | 72篇 |
2012年 | 43篇 |
2011年 | 58篇 |
2010年 | 44篇 |
2009年 | 32篇 |
2008年 | 58篇 |
2007年 | 56篇 |
2006年 | 43篇 |
2005年 | 36篇 |
2004年 | 44篇 |
2003年 | 44篇 |
2002年 | 25篇 |
2001年 | 38篇 |
2000年 | 41篇 |
1999年 | 44篇 |
1998年 | 96篇 |
1997年 | 72篇 |
1996年 | 45篇 |
1995年 | 36篇 |
1994年 | 24篇 |
1993年 | 41篇 |
1992年 | 30篇 |
1991年 | 13篇 |
1990年 | 22篇 |
1989年 | 23篇 |
1988年 | 21篇 |
1987年 | 12篇 |
1986年 | 21篇 |
1985年 | 8篇 |
1984年 | 13篇 |
1983年 | 12篇 |
1982年 | 11篇 |
1981年 | 9篇 |
1980年 | 12篇 |
1979年 | 14篇 |
1978年 | 19篇 |
1977年 | 16篇 |
1976年 | 19篇 |
1975年 | 6篇 |
1974年 | 9篇 |
排序方式: 共有1498条查询结果,搜索用时 15 毫秒
71.
Testing the Schedulability of Synchronous Traffic for the Timed Token Medium Access Control Protocol
Zhang Sijing Burns Alan Mehaoua Ahmed Stewart Lee E. Yang Hongji 《Real-Time Systems》2002,22(3):251-280
One of the key issues related to guaranteeing synchronous message deadlines in a timed token network (such as fiber distributed data interface) where the timed token medium access control protocol is used is the schedulability test of synchronous traffic (i.e., testing whether or not all synchronous messages can be transmitted before their deadlines, under a given setting of network parameters). Much work has been done on how to assign network parameters appropriately in order to guarantee timely transmission of synchronous traffic. As a result quite a few synchronous bandwidth allocation schemes and some good guidelines on selection of the target token rotation time have been proposed. In contrast, limited research has been conducted on how to effectively test whether or not given network parameters can guarantee timely transmission of all synchronous messages (of a considered synchronous message set) before their deadlines. The previous testing methods for synchronous message schedulability only provide a sufficient (but not necessary) test and therefore fail to always keep effective for any synchronous message set considered. In this paper, we propose two testing methods for determining the schedulability of a synchronous message set with message deadlines no longer than periods. The proposed tests perform better than any previous test in the sense that they are both sufficient and necessary. Some numerical examples are given to compare different testing methods, all of which have demonstrated the superiority of the proposed tests to other existing testing methods. 相似文献
72.
Burns Kayreen A.; Deddish Ruth B.; Burns William J.; Hatcher Roger P. 《Canadian Metallurgical Quarterly》1983,19(5):746
22 healthy infants born at gestational ages of 28–32 wks were randomly assigned to experimental or control groups within the 1st 4 days following birth. Experimental Ss were placed in incubators equipped with oscillating waterbeds and rhythmic sounds; control Ss were placed in traditional incubators. Results indicate that general developmental progress was enhanced in the experimental group by the stimulation procedure. (22 ref) (PsycINFO Database Record (c) 2010 APA, all rights reserved) 相似文献
73.
T. Wilkinson S. Ward‐Foxton A. Menon W. H. Reeves S. E. Burns 《Journal of the Society for Information Display》2005,13(7):605-608
Abstract— In this paper, we present results from a new liquid crystal over plastic printed thin‐film‐transistor (TFT) display. The display demonstrator shows that the processing incompatibilities between the plastic TFT backplane and the liquid‐crystal materials can be addressed to make a stable twisted‐nematic structure. New fabrication processes such as the photo‐alignment of liquid crystals have made it possible to create a new generation of displays, which pave the way towards fully integrated plastic liquid‐crystal‐display technologies. 相似文献
74.
Determining a tight WCET of a block of code to be executed on a modern superscalar processor architecture is becoming ever more difficult due to the dynamic behaviour exhibited by current processors, which include dynamic scheduling features such as speculative and out-of-order execution in the context of multiple execution units with deep pipelines. We describe the use of Coloured Petri Nets (CP-nets) in a simulation based approach to this problem. A complex model of a generic processor architecture is described, with emphasis on the modelling strategy for obtaining the WCET and an analysis of the results. 相似文献
75.
76.
This work focuses on simultaneous approximation terms (SATs) for multidimensional summation-by-parts (SBP) discretizations of linear second-order partial differential equations with variable coefficients. Through the analysis of adjoint consistency and stability, we present several conditions on the SAT penalties for general operators, including those operators that do not have nodes on their boundary or do not correspond with a collocation discontinuous Galerkin method. Based on these conditions, we generalize the modified scheme of Bassi and Rebay and the symmetric interior penalty Galerkin method to SBP-SAT discretizations. Numerical experiments are carried out on unstructured grids with triangular elements to verify the theoretical results. 相似文献
77.
NFS-CD: Write-Enabled Cooperative Caching in NFS 总被引:1,自引:0,他引:1
We present the network file system with cluster delegation (NFS-CD), an enhancement to the NFSv4 that reduces server load and increases the scalability of distributed file systems in computing clusters. The cluster delegation feature of NFS-CD allows data sharing among clients by extending the NFSv4 delegation model so that multiple clients manage a single file without interacting with the server. Based on cluster delegation, we implement a fast-commit primitive, cooperative caching, and the ability to recover the uncommitted updates of a failed computer. NFS-CD supports both read and write operations in the cooperative cache without degrading the consistency model of NFSv4. We have implemented NFS-CD by modifying the Linux NFSv4 client only. Because the server remains unchanged, NFS-CD preserves the simple administration model of NFSv4 and interoperates with standard NFS clients. NFS-CD offers improved performance when compared to NFSv4 at the expense of slightly weaker reliability guarantees. An experimental evaluation of our implementation, using industry standard benchmarks and application workloads, reveals that NFS-CD reduces server load by more than half. It also demonstrates that under most workloads, file systems must support writes to the cooperative cache to achieve scale. 相似文献
78.
Alessandro Jatoba Amauri M. da Cunha Mario C. R. Vidal Catherine M. Burns Paulo V. R. de Carvalho 《人机工程学与制造业中的人性因素》2019,29(1):63-77
This paper aims at presenting a case study on the use of human factors and ergonomics to enhance requirement specifications for complex sociotechnical system support tools through enhancing the understanding of human performance within the business domain and the indication of high‐value requirements candidates to information technology support. This work uses methods based on cognitive engineering to build representations of the business domain, highlighting workers’ needs, and contributing to the improvement of software requirements specifications, used in the healthcare domain. As the human factors discipline fits between human sciences and technology design, we believe that its concepts can be combined with software engineering to improve understanding of how people work, enabling the design of better information technology. 相似文献
79.
Longy O. Anyanwu Jared Keengwe Gladys A. Arome 《通讯和计算机》2009,6(12):38-46
Each lnternet communication leaves trails that can be followed back to the user. Notably, anonymous communication schemes are purposed to hide users' identity as to personal, source, destination location and content information. Notably, no network capability is in existence to completely negate anonymity leakage in network latency[~l, thus, the minimization of anonymity leakage in network latency becomes critically salient. The purpose of this paper is to investigate network latency anonymity leaks, and propose practical techniques for their reduction. In this direction, the author investigate the following technical question: What implementation techniques can be configured to truly reduce anonymity leaks using deployable systems and exploiting the popular Tor security strategies. 相似文献
80.
The complete verification of the timing properties of a large critical system cannot be undertaken in a single step or with
a single method. In this paper we present a process that links together a number of techniques and approaches that cover all
stages of development from requirements analysis to code testing. The key elements of the process are: a constrained form
of timed automata that uses delay and deadline to define temporal behaviour, notions of rely and guarantee to cover temporal dependencies, model checking for design verification, SPARK and Ravenscar restrictions for programming,
and scheduling and response time analysis for asserting implementation compliance. Extended examples of the use of the process
are given. 相似文献