全文获取类型
收费全文 | 1191篇 |
免费 | 91篇 |
国内免费 | 2篇 |
专业分类
电工技术 | 23篇 |
化学工业 | 344篇 |
金属工艺 | 23篇 |
机械仪表 | 39篇 |
建筑科学 | 34篇 |
矿业工程 | 1篇 |
能源动力 | 63篇 |
轻工业 | 139篇 |
水利工程 | 9篇 |
石油天然气 | 3篇 |
无线电 | 95篇 |
一般工业技术 | 222篇 |
冶金工业 | 33篇 |
原子能技术 | 4篇 |
自动化技术 | 252篇 |
出版年
2024年 | 10篇 |
2023年 | 28篇 |
2022年 | 77篇 |
2021年 | 82篇 |
2020年 | 44篇 |
2019年 | 64篇 |
2018年 | 52篇 |
2017年 | 54篇 |
2016年 | 58篇 |
2015年 | 48篇 |
2014年 | 43篇 |
2013年 | 78篇 |
2012年 | 90篇 |
2011年 | 99篇 |
2010年 | 74篇 |
2009年 | 72篇 |
2008年 | 61篇 |
2007年 | 66篇 |
2006年 | 26篇 |
2005年 | 27篇 |
2004年 | 29篇 |
2003年 | 14篇 |
2002年 | 13篇 |
2001年 | 9篇 |
2000年 | 2篇 |
1999年 | 8篇 |
1998年 | 8篇 |
1997年 | 4篇 |
1996年 | 8篇 |
1995年 | 3篇 |
1994年 | 2篇 |
1993年 | 3篇 |
1992年 | 4篇 |
1991年 | 1篇 |
1990年 | 2篇 |
1989年 | 1篇 |
1988年 | 1篇 |
1987年 | 3篇 |
1986年 | 1篇 |
1985年 | 1篇 |
1984年 | 3篇 |
1982年 | 3篇 |
1981年 | 3篇 |
1979年 | 1篇 |
1976年 | 1篇 |
1975年 | 1篇 |
1972年 | 1篇 |
1957年 | 1篇 |
排序方式: 共有1284条查询结果,搜索用时 15 毫秒
71.
In traditional networks special efforts are put to secure the perimeter with firewalls: particular routers that analyze and filter the traffic to separate zones with different levels of trust. In wireless multi-hop networks the perimeter is a concept extremely hard to identify, thus, it is much more effective to enforce control on the nodes that will route more traffic. But traffic filtering and traffic analysis are costly activities for the limited resources of mesh nodes, so a trade-off must be reached limiting the number of nodes that enforce them. This work shows how, using the OLSR protocol, the centrality of groups of nodes with reference to traffic can be estimated with high accuracy independently of the network topology or size. We also show how this approach greatly limits the impact of an attack to the network using a number of firewalls that is only a fraction of the available nodes. 相似文献
72.
Finkbeiner Bernd Mariani Leonardo 《International Journal on Software Tools for Technology Transfer (STTT)》2021,23(4):545-546
International Journal on Software Tools for Technology Transfer - 相似文献
73.
The operational environment can be a valuable source of information about the behavior of software applications and their usage context. Although a single instance of an application has limited evidence of the range of the possible behaviors and situations that might be experienced in the field, the collective knowledge composed by the evidence gathered by the many instances of a same application running in several diverse user environments (eg, a browser) might be an invaluable source of information. This information can be exploited by applications able to autonomously analyze how they behave in the field and adjust their behavior accordingly. Augmenting applications with the capability to collaborate and directly share information about their behavior is challenging because it requires the definition of a fully decentralized and dependable networked infrastructure whose nodes are the user machines. The nodes of the infrastructure must be collaborative, to share information, and autonomous, to exploit the available information to change their behavior, for instance, to better accommodate the needs of the users to prevent known problems. This paper describes the initial results that we obtained with the design and the development of an infrastructure that can enable the execution of collaborative scenarios in a fully decentralized way. Our idea is to combine the agent-based paradigm, which is well suited to design collaborative and autonomous nodes, and the peer-to-peer paradigm, which is well suited to design distributed and dynamic network infrastructures. To demonstrate our idea, we augmented the popular JADE agent-based platform with a software layer that supports both the creation of a fully decentralized peer-to-peer network of JADE platforms and the execution of services within that network, thus enabling JADE multiagent systems (MASs) to behave as peer-to-peer networks. The resulting platform can be used to study the design of collaborative applications running in the field. 相似文献
74.
Rosamaria W.C. Leonardo Jonas Yoshio Lilian R.F. 《Sensors and actuators. B, Chemical》2008,131(2):646-651
A novel poly(p-xylylene), PPX, derivative bearing alkoxyphenyl side groups was electrochemically synthesized in 87% yield. The polymer, poly(4′-hexyloxy-2,5-biphenyleneethylene) (PHBPE), presented a fraction (92%) soluble in common organic solvents. It showed to be thermally resistant up to 185 °C. UV–vis analysis revealed an Egap of 3.5 eV. Gas sensors made from thin films of 10-camphorsulfonic acid-doped PHBPE deposited on interdigitated electrodes exhibited significant changes in electrical conductance upon exposure to five VHOCs: 1,2-dichloroethane, bromochloromethane, trichloromethane, dichloromethane and tetrachloromethane. The conductance decreased after exposure to tetrachloromethane and increased after exposure to all the other VHOCs. Three-dimensional plots of relative response versus time of half response versus time of half recovery showed good discrimination between the five VHOCs tested. 相似文献
75.
A number of techniques that infer finite state automata from execution traces have been used to support test and analysis activities. Some of these techniques can produce automata that integrate information about the data-flow, that is, they also represent how data values affect the operations executed by programs.The integration of information about operation sequences and data values into a unique model is indeed conceptually useful to accurately represent the behavior of a program. However, it is still unclear whether handling heterogeneous types of information, such as operation sequences and data values, necessarily produces higher quality models or not.In this paper, we present an empirical comparative study between techniques that infer simple automata and techniques that infer automata extended with information about data-flow. We investigate the effectiveness of these techniques when applied to traces with different levels of sparseness, produced by different software systems. To the best of our knowledge this is the first work that quantifies both the effect of adding data-flow information within automata and the effectiveness of the techniques when varying sparseness of traces. 相似文献
76.
João Gustavo PrudêncioAuthor Vitae Leonardo MurtaAuthor Vitae 《Journal of Systems and Software》2012,85(2):277-289
Mechanisms to control concurrent access over project artefacts are needed to execute the software development process in an organized way. These mechanisms are implemented by concurrency control policies in version control systems that may inhibit (i.e. ‘to lock’) or allow (i.e., ‘not to lock’) parallel development. This work presents a novel approach named Orion that analyzes the project's historical changes and suggests the most appropriate concurrency control policy for each software element. This suggestion aims at minimizing conflict situations and thus improving the productivity of the development team. In addition, it identifies critical elements that do not work well with any of these policies and are candidates to refactoring. We evaluated Orion through two experimental studies and the results, which indicated it was effective, led us to a prototype implementation. Apart from the Orion approach this paper also presents the planning, execution, and analysis stages of the evaluation, and details of prototype internals. 相似文献
77.
Bartocci Ezio Manjunath Niveditha Mariani Leonardo Mateis Cristinel Nikovi Dejan 《International Journal on Software Tools for Technology Transfer (STTT)》2021,23(5):783-796
International Journal on Software Tools for Technology Transfer - Debugging cyber-physical system (CPS) models is a cumbersome and costly activity. CPS models combine continuous and discrete... 相似文献
78.
Aniello Leonardo Halak Basel Chai Peter Dhall Riddhi Mihalea Mircea Wilczynski Adrian 《International Journal of Information Security》2021,20(3):445-460
International Journal of Information Security - The complexity of today’s integrated circuit (IC) supply chain, organised in several tiers and including many companies located in different... 相似文献
79.
The aim of this paper is to obtain an explicit expression, instead of using a recursive method, for the nth term coefficient of the generalized Baker–Campbell–Hausdorff–Dynkin (gBCHD) formula. The gBCHD formula has been applied to control theory, specially to nonholonomic motion planning. 相似文献
80.
The Journal of Supercomputing - The design and tuning of parallel programs is known to be a hard and error-prone process. Structured parallel programming helps overcoming part of the related... 相似文献