首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   942篇
  免费   23篇
  国内免费   3篇
电工技术   7篇
综合类   2篇
化学工业   211篇
金属工艺   34篇
机械仪表   27篇
建筑科学   103篇
能源动力   19篇
轻工业   174篇
水利工程   8篇
无线电   59篇
一般工业技术   138篇
冶金工业   55篇
原子能技术   7篇
自动化技术   124篇
  2023年   5篇
  2022年   23篇
  2021年   29篇
  2020年   13篇
  2019年   25篇
  2018年   21篇
  2017年   17篇
  2016年   19篇
  2015年   24篇
  2014年   39篇
  2013年   44篇
  2012年   45篇
  2011年   63篇
  2010年   32篇
  2009年   33篇
  2008年   46篇
  2007年   43篇
  2006年   28篇
  2005年   38篇
  2004年   28篇
  2003年   21篇
  2002年   20篇
  2001年   11篇
  2000年   9篇
  1999年   10篇
  1998年   14篇
  1997年   16篇
  1996年   12篇
  1995年   13篇
  1994年   11篇
  1993年   13篇
  1992年   9篇
  1991年   5篇
  1990年   7篇
  1989年   5篇
  1985年   20篇
  1984年   7篇
  1983年   11篇
  1982年   5篇
  1981年   5篇
  1980年   5篇
  1978年   6篇
  1977年   18篇
  1976年   13篇
  1975年   11篇
  1974年   6篇
  1973年   9篇
  1972年   6篇
  1969年   5篇
  1927年   5篇
排序方式: 共有968条查询结果,搜索用时 15 毫秒
71.
Transactional memory (TM) is an approach to concurrency control that aims to make writing parallel programs both effective and simple. The approach has been initially proposed for nondistributed multiprocessor systems, but it is gaining popularity in distributed systems to synchronize tasks at large scales. Efficiency and scalability are often the key issues in TM research; thus, performance benchmarks are an important part of it. However, while standard TM benchmarks like the Stanford Transactional Applications for Multi‐Processing suite and STMBench7 are available and widely accepted, they do not translate well into distributed systems. Hence, the set of benchmarks usable with distributed TM systems is very limited, and must be padded with microbenchmarks, whose simplicity and artificial nature often makes them uninformative or misleading. Therefore, this paper introduces Helenos, a realistic, complex, and comprehensive distributed TM benchmark based on the problem of the Facebook inbox, an application of the Cassandra distributed store.  相似文献   
72.
In this paper, we propose a method for network intrusion detection based on language models. Our method proceeds by extracting language features such as n-grams and words from connection payloads and applying unsupervised anomaly detection—without prior learning phase or presence of labeled data. The essential part of this procedure is linear-time computation of similarity measures between language models of connection payloads. Particular patterns in these models decisive for differentiation of attacks and normal data can be traced back to attack semantics and utilized for automatic generation of attack signatures. Results of experiments conducted on two datasets of network traffic demonstrate the importance of high-order n-grams and variable-length language models for detection of unknown network attacks. An implementation of our system achieved detection accuracy of over 80% with no false positives on instances of recent remote-to-local attacks in HTTP, FTP and SMTP traffic.  相似文献   
73.
In scientific computing, Space Filling Curves are a widely used tool for one-constraint domain decomposition. They provide a mechanism to sort multi-dimensional data in a locality preserving way, and, in this way, a (one dimensional) list of mesh elements is established which is subsequently split into 3 partitions under consideration of the constraint. This procedure has a runtime of O(NlogN) (N is the number of mesh elements) while nearly perfect load balancing can be established with reasonable partition surface sizes.In this work, we discuss the extensibility of this procedure to two-constraint settings which is desirable, since the methodology is extremely fast. Here, the splitting operation is subject to two constraints, and, unlike to the one-constraint case, obtaining near perfect balancing is often hard to establish, and is, even more as in the one-constraint case, in conflict with the induced surface sizes (or edge-cuts). We discuss multiple strategies to tackle the splitting, and we present a fast, O(NlogN) splitting heuristic algorithm which provides an integer σ that allows to trade off between balancing and surface sizes which results in a O(NlogN) two-constraint decomposition method. Results are compared to the multi-constraint domain decomposition abilities implemented in the Metis software package, and show that the method produces higher surface sizes, but is orders of magnitudes faster which makes the method superior for certain applications.  相似文献   
74.
75.
The structuring of surface meshes is a labor intensive task in reverse engineering. For example, in CAD, scanned triangle meshes must be divided into characteristic/uniform patches to enable conversion into high-level spline surfaces. Typical industrial techniques, like rolling ball blends, are very labor intensive.We provide a novel, robust and quick algorithm for the automatic generation of a patch layout based on a topology consistent feature graph. The graph separates the surface along feature lines into functional and geometric building blocks. Our algorithm then thickens the edges of the feature graph and forms new regions with low varying curvature. Further, these new regions-so-called fillets and node patches-will have highly smooth boundary curves, making the algorithm an ideal preprocessor for a subsequent spline fitting algorithm.  相似文献   
76.
QuadCover - Surface Parameterization using Branched Coverings   总被引:4,自引:0,他引:4  
We introduce an algorithm for the automatic computation of global parameterizations on arbitrary simplicial 2-manifolds, whose parameter lines are guided by a given frame field, for example, by principal curvature frames. The parameter lines are globally continuous and allow a remeshing of the surface into quadrilaterals. The algorithm converts a given frame field into a single vector field on a branched covering of the 2-manifold and generates an integrable vector field by a Hodge decomposition on the covering space. Except for an optional smoothing and alignment of the initial frame field, the algorithm is fully automatic and generates high quality quadrilateral meshes.  相似文献   
77.
Model predictive control of a rotary cement kiln   总被引:2,自引:0,他引:2  
A first principles model of a cement kiln is used to control and optimize the burning of clinker in the cement production process. The model considers heat transfer between a gas and a feed state via convection and radiation. Furthermore, it contains effects such as chemical reactions, feed transport, energy losses and energy input. A model predictive controller is used to stabilize a temperature profile along the rotary kiln, guarantee good combustion conditions and maximize production. Moving horizon estimation was used for online estimation of selected model parameters and unmeasured states. Results from the pilot site are presented.  相似文献   
78.
The cost of computer system maintenance rises together with the increasing complexity of such systems. The use of an autonomic system architecture saves money by delegating some forms of maintenance to the systems themselves. The aim of this paper is to describe the results of creating a tool which introduces elements of adaptivity to Java applications using dynamic aspects. The impact of introducing aspects on the performance of various Application Servers is also discussed. Finally, benefits and problems arising from the use of the tool are presented, basing on sample use cases.  相似文献   
79.
80.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号