首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   14217篇
  免费   825篇
  国内免费   220篇
电工技术   183篇
综合类   55篇
化学工业   3065篇
金属工艺   502篇
机械仪表   275篇
建筑科学   521篇
矿业工程   43篇
能源动力   373篇
轻工业   1509篇
水利工程   81篇
石油天然气   369篇
武器工业   15篇
无线电   947篇
一般工业技术   1957篇
冶金工业   3522篇
原子能技术   142篇
自动化技术   1703篇
  2023年   76篇
  2022年   186篇
  2021年   283篇
  2020年   216篇
  2019年   264篇
  2018年   362篇
  2017年   365篇
  2016年   413篇
  2015年   333篇
  2014年   479篇
  2013年   792篇
  2012年   647篇
  2011年   830篇
  2010年   686篇
  2009年   655篇
  2008年   673篇
  2007年   524篇
  2006年   569篇
  2005年   485篇
  2004年   433篇
  2003年   422篇
  2002年   434篇
  2001年   328篇
  2000年   308篇
  1999年   268篇
  1998年   368篇
  1997年   326篇
  1996年   252篇
  1995年   224篇
  1994年   247篇
  1993年   242篇
  1992年   160篇
  1991年   96篇
  1990年   162篇
  1989年   164篇
  1988年   118篇
  1987年   116篇
  1986年   113篇
  1985年   122篇
  1984年   111篇
  1983年   103篇
  1982年   77篇
  1981年   113篇
  1979年   101篇
  1978年   64篇
  1977年   90篇
  1976年   86篇
  1975年   71篇
  1974年   62篇
  1971年   98篇
排序方式: 共有10000条查询结果,搜索用时 62 毫秒
871.
872.
We present a framework for model checking concurrent software systems which incorporates both states and events. Contrary to other state/event approaches, our work also integrates two powerful verification techniques, counterexample-guided abstraction refinement and compositional reasoning. Our specification language is a state/event extension of linear temporal logic, and allows us to express many properties of software in a concise and intuitive manner. We show how standard automata-theoretic LTL model checking algorithms can be ported to our framework at no extra cost, enabling us to directly benefit from the large body of research on efficient LTL verification. We also present an algorithm to detect deadlocks in concurrent message-passing programs. Deadlock- freedom is not only an important and desirable property in its own right, but is also a prerequisite for the soundness of our model checking algorithm. Even though deadlock is inherently non-compositional and is not preserved by classical abstractions, our iterative algorithm employs both (non-standard) abstractions and compositional reasoning to alleviate the state-space explosion problem. The resulting framework differs in key respects from other instances of the counterexample-guided abstraction refinement paradigm found in the literature. We have implemented this work in the magic verification tool for concurrent C programs and performed tests on a broad set of benchmarks. Our experiments show that this new approach not only eases the writing of specifications, but also yields important gains both in space and in time during verification. In certain cases, we even encountered specifications that could not be verified using traditional pure event-based or state-based approaches, but became tractable within our state/event framework. We also recorded substantial reductions in time and memory consumption when performing deadlock-freedom checks with our new abstractions. Finally, we report two bugs (including a deadlock) in the source code of Micro-C/OS versions 2.0 and 2.7, which we discovered during our experiments. This research was sponsored by the National Science Foundation (NSF) under grants no. CCR-9803774 and CCR-0121547, the Office of Naval Research (ONR) and the Naval Research Laboratory (NRL) under contract no. N00014-01-1-0796, the Army Research Office (ARO) under contract no. DAAD19-01-1-0485, and was conducted as part of the Predictable Assembly from Certifiable Components (PACC) project at the Software Engineering Institute (SEI). This article combines and builds upon the papers (CCO+04) and (CCOS04). Received December 2004 Revised July 2005 Accepted July 2005 by Eerke A. Boiten, John Derrick, Graeme Smith and Ian Hayes  相似文献   
873.
An experimental site was set up in a large, flat and homogeneous area of rice crops for the validation of satellite derived land surface temperature (LST). Experimental campaigns were held in the summers of 2002-2004, when rice crops show full vegetation cover. LSTs were measured radiometrically along transects covering an area of 1 km2. A total number of four thermal radiometers were used, which were calibrated and inter-compared through the campaigns. Radiometric temperatures were corrected for emissivity effects using field emissivity and downwelling sky radiance measurements. A database of ground-based LSTs corresponding to morning, cloud-free overpasses of Envisat/Advanced Along-Track Scanning Radiometer (AATSR) and Terra/Moderate Resolution Imaging Spectroradiometer (MODIS) is presented. Ground LSTs ranged from 25 to 32 °C, with uncertainties between ± 0.5 and ± 0.9 °C. The largest part of these uncertainties was due to the spatial variability of surface temperature. The database was used for the validation of LSTs derived from the operational AATSR and MODIS split-window algorithms, which are currently used to generate the LST product in the L2 level data. A quadratic, emissivity dependent split-window equation applicable to both AATSR and MODIS data was checked as well. Although the number of cases analyzed is limited (five concurrences for AATSR and eleven for MODIS), it can be concluded that the split-window algorithms work well, provided that the characteristics of the area are adequately prescribed, either through the classification of the land cover type and the vegetation cover, or with the surface emissivity. In this case, the AATSR LSTs yielded an average error or bias of − 0.9 °C (ground minus algorithm), with a standard deviation of 0.9 °C. The MODIS LST product agreed well with the ground LSTs, with differences comparable or smaller than the uncertainties of the ground measurements for most of the days (bias of + 0.1 °C and standard deviation of 0.6 °C, for cloud-free cases and viewing angles smaller than 60°). The quadratic split-window algorithm resulted in small average errors (+ 0.3 °C for AATSR and 0.0 °C for MODIS), with differences not exceeding ± 1.0 °C for most of the days (standard deviation of 0.9 °C for AATSR and 0.5 °C for MODIS).  相似文献   
874.
Abstract— An overview of our recent work on the mechanisms of singlet and triplet exciton formation in electroluminescent π‐conjugated materials will be presented. According to simple spin statistics, only one‐fourth of the excitons are formed as singlets. However, deviations from that statistics can occur if the initially formed triplet charge‐transfer (CT) excited states are amenable to intersystem crossing or dissociation. Although the electronic couplings between the CT states and the neutral exciton states are expected to be largest for the lowest singlet and triplet excitons (S1 and T1, respectively), the possibility for direct recombination into T1 is always very small due to the large exchange energy. In small molecules, spin statistics is expected to be observed because both singlet and triplet exciton formations proceed via higher‐lying Sn/Tn states with similar electronic couplings and fast formation rates. In extended conjugated chains, however, that the 1CT → S1 pathway is faster while the 3CT → Tn channels become much slower, opening the route to intersystem crossing or dissociation among the 3CT states.  相似文献   
875.
Constraint diagrams are a diagrammatic notation which may be used to express logical constraints. They generalize Venn diagrams and Euler circles, and include syntax for quantification and navigation of relations. The notation was designed to complement the Unified Modelling Language in the development of software systems.Since symbols representing quantification in a diagrammatic language can be naturally ordered in multiple ways, some constraint diagrams have more than one intuitive meaning in first-order predicate logic. Any equally expressive notation which is based on Euler diagrams and conveys logical statements using explicit quantification will have to address this problem.We explicitly augment constraint diagrams with reading trees, which provides a partial ordering for the quantifiers (determining their scope as well as their relative ordering). Alternative approaches using spatial arrangements of components, or alphabetical ordering of symbols, for example, can be seen as implicit representations of a reading tree.Whether the reading tree accompanies the diagram explicitly (optimizing expressiveness) or implicitly (simplifying diagram syntax), we show how to construct unambiguous semantics for the augmented constraint diagram.  相似文献   
876.
The 2005 Policy and Planning Board of the American Psychological Association (APA) was chaired by Sandra E. Tars, PhD. Other members of the Policy and Planning Board included G. Andrew H. Benjamin, JD, PhD; Mae Lee Billet-Ziskin, PhD; Connie Chan, PhD; Cynthia P. Deutsch, PhD; Lisa R. Grossman, JD, PhD; Janet R. Matthews, PhD; Morgan T. Sammons, PhD; Derald Wing Sue, PhD; Susan Krauss Whitbourne, PhD; and Gerald P. Koocher, PhD, the liaison for the Board of Directors. APA Bylaws Article XI.7 requires that the Policy and Planning Board report annually by publication to the membership and review the structure and function of the Association as a whole every fifth year. Given the tremendous psychological impact of disasters and crises, the Policy and Planning Board decided to focus this 2005 annual report on the history and evolution of APA's responses to such traumas, with an eye to future directions that might be taken as the need arises. This report reviews the phases of response to disaster and proposes parameters for APA's organizational response. It also highlights concerns posed by the racial and economic disparities laid bare in the aftermath of Hurricane Katrina and raises questions about the proper role of psychology in addressing the broader social context in both preparation for and the aftermath of disaster. Ultimately, it is our intent to identify points of both pride and challenge for APA members and governance leaders to consider. (PsycINFO Database Record (c) 2010 APA, all rights reserved)  相似文献   
877.
In this paper we investigate how formal software verification systems can be improved by utilising parallel assignment in weakest precondition computations.We begin with an introduction to modern software verification systems. Specifically, we review the method in which software abstractions are built using counterexample-guided abstraction refinement (CEGAR). The classical NP-complete parallel assignment problem is first posed, and then an additional restriction is added to create a special case in which the problem is tractable with an O(n2) algorithm. The parallel assignment problem is then discussed in the context of weakest precondition computations. In this special situation where statements can be assumed to execute truly concurrently, we show that any sequence of simple assignment statements without function calls can be transformed into an equivalent parallel assignment block.Results of compressing assignment statements into a parallel form with this algorithm are presented for a wide variety of software applications. The proposed algorithms were implemented in the ComFoRT reasoning framework [J. Ivers and N. Sharygina. Overview of ComFoRT: A model checking reasoning framework. Technical Report CMU/SEI-2004-TN-018, Carnegie Mellon Software Engineering Institute, 2004] and used to measure the improvement in the verification of real software systems. This improvement in time proved to be significant for many classes of software.  相似文献   
878.
张伯兰  陈鹰 《遥感信息》2002,66(3):41-45
关于影响数字地面模型精度的因素问题,不同研究机构的科研人员进行过大量的实验研究,并成功获得了影响数字地面模型精度的因素,研究成果有着或多或少的相近之处,普遍认为原始数据点的三个属性(精度、密度和分布),地形特征以及建模方法是影响数字地面模型精度的主要因素。本分析了一些典型研究的成果,并列出一些建设性的提议,以提高数字地面模型生成过程中经济上,时间上和质量上的效率。  相似文献   
879.
The Hough transform was originally designed to recognize artifical objects in images. A Hough transform for natural shapes (HTNS) was subsequently proposed, but necessitates the supervised learning of the class of shapes. Here, we extend HTNS to unsupervised pattern recognition, the variability of the object class being coded with tools originating from mathematical morphology (erosion, dilation and distance functions).  相似文献   
880.
Several strategies have been proposed recently to improve the performance of the IS-41 location management scheme. A forwarding pointers' strategy and a built-in memory strategy are proposed to reduce the signaling cost for location update and improve the IS-41 location update procedure. In this paper, we present a performance analysis of each strategy in an arbitrary time interval. In this analysis, users are classified by their call to mobility ratio which is defined as the call arrival rate divided by the mobility rate. We evaluate each of these strategies using this call to mobility ratio in order to come up with a set of recommendations that determine when each strategy is beneficial and for which class of users. We provide also a simplified analysis of the database loads generated by each strategy.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号