全文获取类型
收费全文 | 942篇 |
免费 | 23篇 |
国内免费 | 3篇 |
专业分类
电工技术 | 7篇 |
综合类 | 2篇 |
化学工业 | 211篇 |
金属工艺 | 34篇 |
机械仪表 | 27篇 |
建筑科学 | 103篇 |
能源动力 | 19篇 |
轻工业 | 174篇 |
水利工程 | 8篇 |
无线电 | 59篇 |
一般工业技术 | 138篇 |
冶金工业 | 55篇 |
原子能技术 | 7篇 |
自动化技术 | 124篇 |
出版年
2023年 | 5篇 |
2022年 | 23篇 |
2021年 | 29篇 |
2020年 | 13篇 |
2019年 | 25篇 |
2018年 | 21篇 |
2017年 | 17篇 |
2016年 | 19篇 |
2015年 | 24篇 |
2014年 | 39篇 |
2013年 | 44篇 |
2012年 | 45篇 |
2011年 | 63篇 |
2010年 | 32篇 |
2009年 | 33篇 |
2008年 | 46篇 |
2007年 | 43篇 |
2006年 | 28篇 |
2005年 | 38篇 |
2004年 | 28篇 |
2003年 | 21篇 |
2002年 | 20篇 |
2001年 | 11篇 |
2000年 | 9篇 |
1999年 | 10篇 |
1998年 | 14篇 |
1997年 | 16篇 |
1996年 | 12篇 |
1995年 | 13篇 |
1994年 | 11篇 |
1993年 | 13篇 |
1992年 | 9篇 |
1991年 | 5篇 |
1990年 | 7篇 |
1989年 | 5篇 |
1985年 | 20篇 |
1984年 | 7篇 |
1983年 | 11篇 |
1982年 | 5篇 |
1981年 | 5篇 |
1980年 | 5篇 |
1978年 | 6篇 |
1977年 | 18篇 |
1976年 | 13篇 |
1975年 | 11篇 |
1974年 | 6篇 |
1973年 | 9篇 |
1972年 | 6篇 |
1969年 | 5篇 |
1927年 | 5篇 |
排序方式: 共有968条查询结果,搜索用时 15 毫秒
71.
Transactional memory (TM) is an approach to concurrency control that aims to make writing parallel programs both effective and simple. The approach has been initially proposed for nondistributed multiprocessor systems, but it is gaining popularity in distributed systems to synchronize tasks at large scales. Efficiency and scalability are often the key issues in TM research; thus, performance benchmarks are an important part of it. However, while standard TM benchmarks like the Stanford Transactional Applications for Multi‐Processing suite and STMBench7 are available and widely accepted, they do not translate well into distributed systems. Hence, the set of benchmarks usable with distributed TM systems is very limited, and must be padded with microbenchmarks, whose simplicity and artificial nature often makes them uninformative or misleading. Therefore, this paper introduces Helenos, a realistic, complex, and comprehensive distributed TM benchmark based on the problem of the Facebook inbox, an application of the Cassandra distributed store. 相似文献
72.
In this paper, we propose a method for network intrusion detection based on language models. Our method proceeds by extracting
language features such as n-grams and words from connection payloads and applying unsupervised anomaly detection—without prior learning phase or presence
of labeled data. The essential part of this procedure is linear-time computation of similarity measures between language models
of connection payloads. Particular patterns in these models decisive for differentiation of attacks and normal data can be
traced back to attack semantics and utilized for automatic generation of attack signatures.
Results of experiments conducted on two datasets of network traffic demonstrate the importance of high-order n-grams and variable-length language models for detection of unknown network attacks. An implementation of our system achieved
detection accuracy of over 80% with no false positives on instances of recent remote-to-local attacks in HTTP, FTP and SMTP
traffic. 相似文献
73.
Christian Konrad 《Parallel Computing》2011,37(4-5):203-216
In scientific computing, Space Filling Curves are a widely used tool for one-constraint domain decomposition. They provide a mechanism to sort multi-dimensional data in a locality preserving way, and, in this way, a (one dimensional) list of mesh elements is established which is subsequently split into 3 partitions under consideration of the constraint. This procedure has a runtime of O(NlogN) (N is the number of mesh elements) while nearly perfect load balancing can be established with reasonable partition surface sizes.In this work, we discuss the extensibility of this procedure to two-constraint settings which is desirable, since the methodology is extremely fast. Here, the splitting operation is subject to two constraints, and, unlike to the one-constraint case, obtaining near perfect balancing is often hard to establish, and is, even more as in the one-constraint case, in conflict with the induced surface sizes (or edge-cuts). We discuss multiple strategies to tackle the splitting, and we present a fast, O(NlogN) splitting heuristic algorithm which provides an integer σ that allows to trade off between balancing and surface sizes which results in a O(NlogN) two-constraint decomposition method. Results are compared to the multi-constraint domain decomposition abilities implemented in the Metis software package, and show that the method produces higher surface sizes, but is orders of magnitudes faster which makes the method superior for certain applications. 相似文献
74.
75.
The structuring of surface meshes is a labor intensive task in reverse engineering. For example, in CAD, scanned triangle meshes must be divided into characteristic/uniform patches to enable conversion into high-level spline surfaces. Typical industrial techniques, like rolling ball blends, are very labor intensive.We provide a novel, robust and quick algorithm for the automatic generation of a patch layout based on a topology consistent feature graph. The graph separates the surface along feature lines into functional and geometric building blocks. Our algorithm then thickens the edges of the feature graph and forms new regions with low varying curvature. Further, these new regions-so-called fillets and node patches-will have highly smooth boundary curves, making the algorithm an ideal preprocessor for a subsequent spline fitting algorithm. 相似文献
76.
QuadCover - Surface Parameterization using Branched Coverings 总被引:4,自引:0,他引:4
We introduce an algorithm for the automatic computation of global parameterizations on arbitrary simplicial 2-manifolds, whose parameter lines are guided by a given frame field, for example, by principal curvature frames. The parameter lines are globally continuous and allow a remeshing of the surface into quadrilaterals. The algorithm converts a given frame field into a single vector field on a branched covering of the 2-manifold and generates an integrable vector field by a Hodge decomposition on the covering space. Except for an optional smoothing and alignment of the initial frame field, the algorithm is fully automatic and generates high quality quadrilateral meshes. 相似文献
77.
Model predictive control of a rotary cement kiln 总被引:2,自引:0,他引:2
A first principles model of a cement kiln is used to control and optimize the burning of clinker in the cement production process. The model considers heat transfer between a gas and a feed state via convection and radiation. Furthermore, it contains effects such as chemical reactions, feed transport, energy losses and energy input. A model predictive controller is used to stabilize a temperature profile along the rotary kiln, guarantee good combustion conditions and maximize production. Moving horizon estimation was used for online estimation of selected model parameters and unmeasured states. Results from the pilot site are presented. 相似文献
78.
Pawel Bachara Konrad Blachnicki Krzysztof Zielinski 《Information and Software Technology》2010,52(1):67-78
The cost of computer system maintenance rises together with the increasing complexity of such systems. The use of an autonomic system architecture saves money by delegating some forms of maintenance to the systems themselves. The aim of this paper is to describe the results of creating a tool which introduces elements of adaptivity to Java applications using dynamic aspects. The impact of introducing aspects on the performance of various Application Servers is also discussed. Finally, benefits and problems arising from the use of the tool are presented, basing on sample use cases. 相似文献
79.
Roland Gabriel Jürgen Kunz Lars Schwarze Peter Fettke Christian Scheer Franz Lehner Konrad Walser Thomas Deelmann 《WIRTSCHAFTSINFORMATIK》2006,48(3):218-222
Ohne Zusammenfassung 相似文献
80.
Peter Mertens Christian Stary Konrad Walser Thomas Deelmann Franz Lehner Sebastian Günther Christian Scheer 《WIRTSCHAFTSINFORMATIK》2006,48(4):288-295
Ohne Zusammenfassung 相似文献