首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   4071篇
  免费   228篇
  国内免费   7篇
电工技术   36篇
综合类   5篇
化学工业   1063篇
金属工艺   69篇
机械仪表   138篇
建筑科学   191篇
矿业工程   16篇
能源动力   159篇
轻工业   756篇
水利工程   33篇
石油天然气   15篇
无线电   223篇
一般工业技术   565篇
冶金工业   258篇
原子能技术   40篇
自动化技术   739篇
  2024年   8篇
  2023年   42篇
  2022年   120篇
  2021年   156篇
  2020年   124篇
  2019年   142篇
  2018年   171篇
  2017年   155篇
  2016年   177篇
  2015年   143篇
  2014年   190篇
  2013年   311篇
  2012年   268篇
  2011年   315篇
  2010年   212篇
  2009年   233篇
  2008年   202篇
  2007年   170篇
  2006年   156篇
  2005年   126篇
  2004年   115篇
  2003年   95篇
  2002年   89篇
  2001年   53篇
  2000年   45篇
  1999年   38篇
  1998年   83篇
  1997年   50篇
  1996年   47篇
  1995年   44篇
  1994年   19篇
  1993年   22篇
  1992年   19篇
  1991年   13篇
  1990年   15篇
  1989年   15篇
  1988年   9篇
  1987年   11篇
  1986年   14篇
  1985年   14篇
  1984年   9篇
  1983年   6篇
  1982年   9篇
  1981年   9篇
  1980年   4篇
  1979年   4篇
  1977年   7篇
  1976年   11篇
  1975年   4篇
  1974年   3篇
排序方式: 共有4306条查询结果,搜索用时 0 毫秒
21.
Precise timing and asynchronous I/O are appealing features for many applications. Unix kernels provide such features on a per‐process basis, using signals to communicate asynchronous events to applications. Per‐process signals and timers are grossly inadequate for complex multithreaded applications that require per‐thread signals and timers that operate at finer granularity. To respond to this need, we present a scheme that integrates asynchronous (Unix) signals with user‐level threads, using the ARIADNE system as a platform. This is done with a view towards support for portable, multithreaded, and multiprotocol distributed applications, namely the CLAM (connectionless, lightweight, and multiway) communications library. In the same context, we propose the use of continuations as an efficient mechanism for reducing thread context‐switching and busy‐wait overheads in multithreaded protocols. Our proposal for integrating timers and signal‐handling mechanisms not only solves problems related to race conditions, but also offers an efficient and flexible interface for timing and signalling threads. Copyright © 2006 John Wiley & Sons, Ltd.  相似文献   
22.
Steganographic techniques allow users to covertly transmit information, hiding the existence of the communication itself. These can be used in several scenarios ranging from evading censorship to discreetly extracting sensitive information from an organization. In this paper, we consider the problem of using steganography through a widely used network protocol (i.e. HTTP). We analyze the steganographic possibilities of HTTP, and propose an active warden model to hinder the usage of covert communication channels. Our framework is meant to be useful in many scenarios. It could be employed to ensure that malicious insiders are not able to use steganography to leak information outside an organization. Furthermore, our model could be used by web servers administrators to ensure that their services are not being abused, for example, as anonymous steganographic mailboxes. Our experiments show that steganographic contents can be successfully eliminated, but that dealing with high payload carriers such as large images may introduce notable delays in the communication process.  相似文献   
23.
For a given $\theta \in (a,b)$ , we investigate the question whether there exists a positive quadrature formula with maximal degree of precision which has the prescribed abscissa $\theta $ plus possibly $a$ and/or $b$ , the endpoints of the interval of integration. This study relies on recent results on the location of roots of quasi-orthogonal polynomials. The above positive quadrature formulae are useful in studying problems in one-sided polynomial $L_1$ approximation.  相似文献   
24.
This paper examines four different strategies, each one with its own data distribution, for implementing the parallel conjugate gradient (CG) method and how they impact communication and overall performance. Firstly, typical 1D and 2D distributions of the matrix involved in CG computations are considered. Then, a new 2D version of the CG method with asymmetric workload, based on leaving some threads idle during part of the computation to reduce communication, is proposed. The four strategies are independent of sparse storage schemes and are implemented using Unified Parallel C (UPC), a Partitioned Global Address Space (PGAS) language. The strategies are evaluated on two different platforms through a set of matrices that exhibit distinct sparse patterns, demonstrating that our asymmetric proposal outperforms the others except for one matrix on one platform.  相似文献   
25.
The cure fraction models have been widely used to analyze survival data in which a proportion of the individuals is not susceptible to the event of interest. In this article, we introduce a bivariate model for survival data with a cure fraction based on the three-parameter generalized Lindley distribution. The joint distribution of the survival times is obtained by using copula functions. We consider three types of copula function models, the Farlie–Gumbel–Morgenstern (FGM), Clayton and Gumbel–Barnett copulas. The model is implemented under a Bayesian framework, where the parameter estimation is based on Markov Chain Monte Carlo (MCMC) techniques. To illustrate the utility of the model, we consider an application to a real data set related to an invasive cervical cancer study.  相似文献   
26.
27.
Ultrasonication is very effective in dispersing alumina and barium titanate slurries. When optimum conditions are used, very short durations (2 to 3 min) are enough to achieve well-dispersed, stable suspensions.  相似文献   
28.
The alignment of information systems with the business goals of an organisation, although a topic of great importance, is not always properly valued or taken into consideration. In general, managers have different opinions to chief information officers (CIOs) in relation to IS, especially with regard to their importance and value to the business and also in terms of investment needs. Here, we discuss and study new approaches to methods and tools for assessing the relative importance of each information system to business, focusing on the financial sector including banks and insurance companies. We suggest the introduction of new key indicators for better decision support and to identify investment priorities, and present results regarding the relative importance of each process to support the business strategy. The primary goal for the inherent research project is to analyse the main problems and difficulties encountered by IS and IT managers, featuring different players and how they relate. The main contributions of this work are the CRUDi framework as a tool to improve alignment between business and IS strategies and the CRUDi survey and its results qualifying the financial sector's opinion regarding the relative importance of processes and investments.  相似文献   
29.
This paper introduces a novel solution for the multi‐input multi‐output (MIMO) quantitative feedback theory control design problem with tracking error specifications. Looking for a minimum controller overdesign, the technique finds new controller quantitative feedback theory bounds based on necessary and sufficient conditions for the existence of suitable associated prefilter matrix elements. It improves previous approaches to the subject and includes (i) the possibility of a free selection of the nominal plant, (ii) a less conservative application of the Schwartz inequality to decisively reduce the potential controller overdesign, (iii) a methodology to design independently the elements of the prefilter matrix, and (iv) a scope of application to both sequential and nonsequential MIMO controller design methods. The benefits of the new control design technique are illustrated by means of two examples. The first one, a standard 2 × 2 MIMO problem, is provided for comparison purposes with previous approaches. The second example, included as a major control challenge, deals with a well‐known demanding distillation column benchmark problem. Copyright © 2013 John Wiley & Sons, Ltd.  相似文献   
30.

The aim of this research is to find a segment of consumers of fashion products based on their personal visions of personalization of shoppable ads on mobile social media. To meet this objective, three operational objectives are defined. First, a theoretical model is evaluated based on the stimulus-organism-response framework (S–O–R). This examines, with a PLS-SEM approach, how the stimulation of personalization will affect consumers' internal cognitive state (perceived usefulness) and consequently generates a behavioral response (intention to buy). Second, we look for fashion consumer segments based on their perception of personalization through prediction-oriented segmentation (PLS-POS). Third, the segments are explained based on three constructs that were considered important in fashion consumption through mobile social networks: purchase intention, concern for privacy, and perception of trend. The inclusion of personalization and the perception of usefulness of advertisements can greatly help the intention to purchase clothing to be understood. The application of a posterior segmentation helps to better understand the different types of users exposed to shoppable ads on mobile social networks and their relationship with the purchase intention, concern for privacy and trend. While the measures and scales were tested in a context of mobile clothing trade, the methodology can be applied to other types of products or services.

  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号