全文获取类型
收费全文 | 370篇 |
免费 | 17篇 |
国内免费 | 15篇 |
专业分类
电工技术 | 10篇 |
综合类 | 17篇 |
化学工业 | 51篇 |
金属工艺 | 13篇 |
机械仪表 | 18篇 |
建筑科学 | 26篇 |
矿业工程 | 5篇 |
能源动力 | 3篇 |
轻工业 | 32篇 |
水利工程 | 2篇 |
石油天然气 | 15篇 |
武器工业 | 3篇 |
无线电 | 42篇 |
一般工业技术 | 44篇 |
冶金工业 | 44篇 |
自动化技术 | 77篇 |
出版年
2023年 | 7篇 |
2022年 | 12篇 |
2021年 | 18篇 |
2020年 | 10篇 |
2019年 | 3篇 |
2018年 | 11篇 |
2017年 | 11篇 |
2016年 | 6篇 |
2015年 | 12篇 |
2014年 | 11篇 |
2013年 | 18篇 |
2012年 | 11篇 |
2011年 | 23篇 |
2010年 | 19篇 |
2009年 | 24篇 |
2008年 | 22篇 |
2007年 | 10篇 |
2006年 | 13篇 |
2005年 | 20篇 |
2004年 | 12篇 |
2003年 | 15篇 |
2002年 | 6篇 |
2001年 | 12篇 |
2000年 | 8篇 |
1999年 | 13篇 |
1998年 | 8篇 |
1997年 | 9篇 |
1996年 | 7篇 |
1995年 | 6篇 |
1994年 | 3篇 |
1993年 | 6篇 |
1992年 | 1篇 |
1991年 | 1篇 |
1990年 | 2篇 |
1989年 | 3篇 |
1988年 | 3篇 |
1987年 | 3篇 |
1985年 | 7篇 |
1984年 | 3篇 |
1983年 | 2篇 |
1982年 | 1篇 |
1981年 | 2篇 |
1980年 | 1篇 |
1979年 | 1篇 |
1977年 | 2篇 |
1976年 | 2篇 |
1971年 | 1篇 |
1966年 | 1篇 |
排序方式: 共有402条查询结果,搜索用时 538 毫秒
361.
对蔬果脆片的特点、真空低温油炸工艺的原理以及工艺流程做了阐述。着重对关键工艺做了分析,对蔬果脆片质量的提高、设备的改进提出了建议。 相似文献
362.
363.
364.
365.
366.
Inferring maps between shapes is a long standing problem in geometry processing. The less similar the shapes are, the harder it is to compute a map, or even define criteria to evaluate it. In many cases, shapes appear as part of a collection, e.g. an animation or a series of faces or poses of the same character, where the shapes are similar enough, such that maps within the collection are easy to obtain. Our main observation is that given two collections of shapes whose “shape space” structure is similar, it is possible to find a correspondence between the collections, and then compute a cross‐collection map. The cross‐map is given as a functional correspondence, and thus it is more appropriate in cases where a bijective point‐to‐point map is not well defined. Our core idea is to treat each collection as a point‐sampling from a low‐dimensional shape‐space manifold, and use dimensionality reduction techniques to find a low‐dimensional Euclidean embedding of this sampling. To measure distances on the shape‐space manifold, we use the recently introduced shape differences, which lead to a similar low‐dimensional structure of the shape spaces, even if the shapes themselves are quite different. This allows us to use standard affine registration for point‐clouds to align the shape‐spaces, and then find a functional cross‐map using a linear solve. We demonstrate the results of our algorithm on various shape collections and discuss its properties. 相似文献
367.
Keren Censor-Hillel Seth Gilbert Fabian Kuhn Nancy Lynch Calvin Newport 《Distributed Computing》2014,27(1):1-19
In this paper we study the problem of building a constant-degree connected dominating set (CCDS), a network structure that can be used as a communication backbone, in the dual graph radio network model (Clementi et al. in J Parallel Distrib Comput 64:89–96, 2004; Kuhn et al. in Proceedings of the international symposium on principles of distributed computing 2009, Distrib Comput 24(3–4):187–206 2011, Proceedings of the international symposium on principles of distributed computing 2010). This model includes two types of links: reliable, which always deliver messages, and unreliable, which sometimes fail to deliver messages. Real networks compensate for this differing quality by deploying low-layer detection protocols to filter unreliable from reliable links. With this in mind, we begin by presenting an algorithm that solves the CCDS problem in the dual graph model under the assumption that every process $u$ is provided with a local link detector set consisting of every neighbor connected to $u$ by a reliable link. The algorithm solves the CCDS problem in $O\left( \frac{\varDelta \log ^2{n}}{b} + \log ^3{n}\right) $ rounds, with high probability, where $\varDelta $ is the maximum degree in the reliable link graph, $n$ is the network size, and $b$ is an upper bound in bits on the message size. The algorithm works by first building a Maximal Independent Set (MIS) in $\log ^3{n}$ time, and then leveraging the local topology knowledge to efficiently connect nearby MIS processes. A natural follow-up question is whether the link detector must be perfectly reliable to solve the CCDS problem. With this in mind, we first describe an algorithm that builds a CCDS in $O(\varDelta $ polylog $(n))$ time under the assumption of $O(1)$ unreliable links included in each link detector set. We then prove this algorithm to be (almost) tight by showing that the possible inclusion of only a single unreliable link in each process’s local link detector set is sufficient to require $\varOmega (\varDelta )$ rounds to solve the CCDS problem, regardless of message size. We conclude by discussing how to apply our algorithm in the setting where the topology of reliable and unreliable links can change over time. 相似文献
368.
Minimum witnesses for Boolean matrix multiplication play an important role in several graph algorithms. For two Boolean matrices A and B of order n, with one of the matrices having at most m nonzero entries, the fastest known algorithms for computing the minimum witnesses of their product run in either O(n 2.575) time or in O(n 2+mnlog(n 2/m)/log2 n) time. We present a new algorithm for this problem. Our algorithm runs either in time $$\tilde{O}\bigl(n^{\frac{3}{4-\omega}}m^{1-\frac{1}{4-\omega }}\bigr) $$ where ω<2.376 is the matrix multiplication exponent, or, if fast rectangular matrix multiplication is used, in time $$O\bigl(n^{1.939}m^{0.318}\bigr). $$ In particular, if ω?1<α<2 where m=n α , the new algorithm is faster than both of the aforementioned algorithms. 相似文献
369.
Herman Hartmann Mila Keren Aart Matsinger Julia Rubin Tim Trew Tali Yatzkar-Haham 《Science of Computer Programming》2013
Software product lines are increasingly built using components from specialized suppliers. A company that is in the middle of a supply chain has to integrate components from its suppliers and offer (partially configured) products to its customers. To satisfy both the variability required by each customer and the variability required to satisfy different customers’ needs, it may be necessary for such a company to use components from different suppliers, partly offering the same feature set. This leads to a product line with alternative components, possibly using different mechanisms for interfacing, binding and variability, which commonly occurs in embedded software development. 相似文献
370.