首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1191篇
  免费   91篇
  国内免费   2篇
电工技术   23篇
化学工业   344篇
金属工艺   23篇
机械仪表   39篇
建筑科学   34篇
矿业工程   1篇
能源动力   63篇
轻工业   139篇
水利工程   9篇
石油天然气   3篇
无线电   95篇
一般工业技术   222篇
冶金工业   33篇
原子能技术   4篇
自动化技术   252篇
  2024年   10篇
  2023年   28篇
  2022年   77篇
  2021年   82篇
  2020年   44篇
  2019年   64篇
  2018年   52篇
  2017年   54篇
  2016年   58篇
  2015年   48篇
  2014年   43篇
  2013年   78篇
  2012年   90篇
  2011年   99篇
  2010年   74篇
  2009年   72篇
  2008年   61篇
  2007年   66篇
  2006年   26篇
  2005年   27篇
  2004年   29篇
  2003年   14篇
  2002年   13篇
  2001年   9篇
  2000年   2篇
  1999年   8篇
  1998年   8篇
  1997年   4篇
  1996年   8篇
  1995年   3篇
  1994年   2篇
  1993年   3篇
  1992年   4篇
  1991年   1篇
  1990年   2篇
  1989年   1篇
  1988年   1篇
  1987年   3篇
  1986年   1篇
  1985年   1篇
  1984年   3篇
  1982年   3篇
  1981年   3篇
  1979年   1篇
  1976年   1篇
  1975年   1篇
  1972年   1篇
  1957年   1篇
排序方式: 共有1284条查询结果,搜索用时 15 毫秒
71.
In traditional networks special efforts are put to secure the perimeter with firewalls: particular routers that analyze and filter the traffic to separate zones with different levels of trust. In wireless multi-hop networks the perimeter is a concept extremely hard to identify, thus, it is much more effective to enforce control on the nodes that will route more traffic. But traffic filtering and traffic analysis are costly activities for the limited resources of mesh nodes, so a trade-off must be reached limiting the number of nodes that enforce them. This work shows how, using the OLSR protocol, the centrality of groups of nodes with reference to traffic can be estimated with high accuracy independently of the network topology or size. We also show how this approach greatly limits the impact of an attack to the network using a number of firewalls that is only a fraction of the available nodes.  相似文献   
72.
73.
The operational environment can be a valuable source of information about the behavior of software applications and their usage context. Although a single instance of an application has limited evidence of the range of the possible behaviors and situations that might be experienced in the field, the collective knowledge composed by the evidence gathered by the many instances of a same application running in several diverse user environments (eg, a browser) might be an invaluable source of information. This information can be exploited by applications able to autonomously analyze how they behave in the field and adjust their behavior accordingly. Augmenting applications with the capability to collaborate and directly share information about their behavior is challenging because it requires the definition of a fully decentralized and dependable networked infrastructure whose nodes are the user machines. The nodes of the infrastructure must be collaborative, to share information, and autonomous, to exploit the available information to change their behavior, for instance, to better accommodate the needs of the users to prevent known problems. This paper describes the initial results that we obtained with the design and the development of an infrastructure that can enable the execution of collaborative scenarios in a fully decentralized way. Our idea is to combine the agent-based paradigm, which is well suited to design collaborative and autonomous nodes, and the peer-to-peer paradigm, which is well suited to design distributed and dynamic network infrastructures. To demonstrate our idea, we augmented the popular JADE agent-based platform with a software layer that supports both the creation of a fully decentralized peer-to-peer network of JADE platforms and the execution of services within that network, thus enabling JADE multiagent systems (MASs) to behave as peer-to-peer networks. The resulting platform can be used to study the design of collaborative applications running in the field.  相似文献   
74.
A novel poly(p-xylylene), PPX, derivative bearing alkoxyphenyl side groups was electrochemically synthesized in 87% yield. The polymer, poly(4′-hexyloxy-2,5-biphenyleneethylene) (PHBPE), presented a fraction (92%) soluble in common organic solvents. It showed to be thermally resistant up to 185 °C. UV–vis analysis revealed an Egap of 3.5 eV. Gas sensors made from thin films of 10-camphorsulfonic acid-doped PHBPE deposited on interdigitated electrodes exhibited significant changes in electrical conductance upon exposure to five VHOCs: 1,2-dichloroethane, bromochloromethane, trichloromethane, dichloromethane and tetrachloromethane. The conductance decreased after exposure to tetrachloromethane and increased after exposure to all the other VHOCs. Three-dimensional plots of relative response versus time of half response versus time of half recovery showed good discrimination between the five VHOCs tested.  相似文献   
75.
A number of techniques that infer finite state automata from execution traces have been used to support test and analysis activities. Some of these techniques can produce automata that integrate information about the data-flow, that is, they also represent how data values affect the operations executed by programs.The integration of information about operation sequences and data values into a unique model is indeed conceptually useful to accurately represent the behavior of a program. However, it is still unclear whether handling heterogeneous types of information, such as operation sequences and data values, necessarily produces higher quality models or not.In this paper, we present an empirical comparative study between techniques that infer simple automata and techniques that infer automata extended with information about data-flow. We investigate the effectiveness of these techniques when applied to traces with different levels of sparseness, produced by different software systems. To the best of our knowledge this is the first work that quantifies both the effect of adding data-flow information within automata and the effectiveness of the techniques when varying sparseness of traces.  相似文献   
76.
Mechanisms to control concurrent access over project artefacts are needed to execute the software development process in an organized way. These mechanisms are implemented by concurrency control policies in version control systems that may inhibit (i.e. ‘to lock’) or allow (i.e., ‘not to lock’) parallel development. This work presents a novel approach named Orion that analyzes the project's historical changes and suggests the most appropriate concurrency control policy for each software element. This suggestion aims at minimizing conflict situations and thus improving the productivity of the development team. In addition, it identifies critical elements that do not work well with any of these policies and are candidates to refactoring. We evaluated Orion through two experimental studies and the results, which indicated it was effective, led us to a prototype implementation. Apart from the Orion approach this paper also presents the planning, execution, and analysis stages of the evaluation, and details of prototype internals.  相似文献   
77.
International Journal on Software Tools for Technology Transfer - Debugging cyber-physical system (CPS) models is a cumbersome and costly activity. CPS models combine continuous and discrete...  相似文献   
78.
International Journal of Information Security - The complexity of today’s integrated circuit (IC) supply chain, organised in several tiers and including many companies located in different...  相似文献   
79.
The aim of this paper is to obtain an explicit expression, instead of using a recursive method, for the nth term coefficient of the generalized Baker–Campbell–Hausdorff–Dynkin (gBCHD) formula. The gBCHD formula has been applied to control theory, specially to nonholonomic motion planning.  相似文献   
80.
The Journal of Supercomputing - The design and tuning of parallel programs is known to be a hard and error-prone process. Structured parallel programming helps overcoming part of the related...  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号