首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1517篇
  免费   74篇
  国内免费   3篇
电工技术   18篇
综合类   2篇
化学工业   509篇
金属工艺   47篇
机械仪表   56篇
建筑科学   30篇
矿业工程   4篇
能源动力   60篇
轻工业   132篇
水利工程   2篇
石油天然气   3篇
无线电   104篇
一般工业技术   219篇
冶金工业   107篇
原子能技术   6篇
自动化技术   295篇
  2023年   6篇
  2022年   62篇
  2021年   92篇
  2020年   35篇
  2019年   41篇
  2018年   37篇
  2017年   55篇
  2016年   60篇
  2015年   49篇
  2014年   85篇
  2013年   119篇
  2012年   76篇
  2011年   83篇
  2010年   71篇
  2009年   71篇
  2008年   78篇
  2007年   49篇
  2006年   56篇
  2005年   32篇
  2004年   37篇
  2003年   42篇
  2002年   21篇
  2001年   14篇
  2000年   18篇
  1999年   13篇
  1998年   20篇
  1997年   24篇
  1996年   22篇
  1995年   19篇
  1994年   18篇
  1993年   17篇
  1992年   13篇
  1991年   14篇
  1990年   7篇
  1989年   6篇
  1988年   14篇
  1987年   7篇
  1986年   4篇
  1985年   7篇
  1984年   9篇
  1983年   18篇
  1982年   6篇
  1981年   8篇
  1980年   10篇
  1979年   5篇
  1978年   7篇
  1977年   7篇
  1973年   4篇
  1971年   6篇
  1965年   3篇
排序方式: 共有1594条查询结果,搜索用时 664 毫秒
31.
32.
Economy models have long been considered as a promising complement to the classical distributed resource management not only due of their dynamic and decentralized nature, but also because the concept of financial valuation of resources and services is an inherent part of any such model. In its broadest sense, scheduling of scientific applications in distributed Grid and Cloud environments can be regarded as a market-based negotiation between a scheduling service optimizing user-centric objectives (execution time, budget), and a resource manager optimizing provider-centric metrics (resource utilization, income, job throughput). In this paper, we propose a new instantiation of the negotiation protocol between the scheduler and resource manager using a market-based Continuous Double Auction (CDA) model. We analyze different scheduling strategies that can be applied and identify general strategic patterns that can lead to a fast and cheap work ow execution. In the experimental study, we demonstrate that under certain circumstances one can benefit by applying an aggressive scheduling strategy.  相似文献   
33.
A problem of allocating resources of a grid to workflow applications is considered. The problem consists, generally, in allocating distributed grid resources to tasks of a workflow in such a way that the resource demands of each task are satisfied. Grid resources are divided into computational resources and network resources. Computational tasks and transmission tasks of a workflow are distinguished. We present a model of the problem, and an algorithm for finding feasible resource allocations. A numerical example is included, showing the importance of the resource allocation phase on a grid. Some conclusions and directions for future research are given.  相似文献   
34.
Mobile devices could facilitate human interaction and access to knowledge resources anytime and anywhere. With respect to wide application possibilities of mobile learning, investigating learners’ acceptance towards it is an essential issue. Based on activity theory approach, this research explores positive factors for the acceptance of m-learning systems. In the research, we developed an m-learning system for learners’ knowledge management and invited 152 participants who knew how to use the m-learning system then report on their experience. The results show that enhancing learners’ satisfaction, encouraging learners’ autonomy, empowering system functions, and enriching interaction and communication activities have a significant positive influence on the acceptance of m-learning systems.  相似文献   
35.
This paper presents a method for multi-scale segmentation of surface data using scale-adaptive region growing. The proposed segmentation algorithm is initiated by an unsupervised learning of optimal seed positions through the surface attribute clustering with a two-criterion score function. The seeds are selected as consecutive local maxima of the clustering map, which is computed by an aggregation of the local isotropic contrast and local variance maps. The proposed method avoids typical segmentation errors caused by an inappropriate choice of seed points and thresholds used in the region-growing algorithm. The scale-adaptive threshold estimate is based on the image local statistics in the neighborhoods of seed points. The performance of this method was evaluated on LiDAR surface images.  相似文献   
36.
This paper presents an experimental study for turning process in machining by using Takagi-Sugeno-Kang (TSK) fuzzy modeling to accomplish the integration of multi-sensor information and tool wear information. It generates fuzzy rules directly from the input-output data acquired from sensors, and provides high accuracy and high reliability of the tool wear prediction over a wide range of cutting conditions. The experimental results show its effectiveness and satisfactory comparisons relative to other artificial intelligence methods.  相似文献   
37.
In this paper we present a new algorithm for adaptive prefix coding. Our algorithm encodes a text S of m symbols in O(m) time, i.e., in O(1) amortized time per symbol. The length of the encoded string is bounded above by (H+1)m+O(nlog 2 m) bits where n is the alphabet size and H is the entropy. This is the first algorithm that adaptively encodes a text in O(m) time and achieves an almost optimal bound on the encoding length in the worst case. Besides that, our algorithm does not depend on an explicit code tree traversal. A preliminary version of this paper appeared in the Proceedings of the 2006 IEEE International Symposium on Information Theory (ISIT 2006). M. Karpinski’s work partially supported by a DFG grant, Max-Planck Research Prize, and IST grant 14036 (RAND-APX). Y. Nekrich’s work partially supported by IST grant 14036 (RAND-APX).  相似文献   
38.
39.
40.
In this paper we consider the mutual exclusion problem on a multiple access channel. Mutual exclusion is one of the fundamental problems in distributed computing. In the classic version of this problem, n processes execute a concurrent program that occasionally triggers some of them to use shared resources, such as memory, communication channel, device, etc. The goal is to design a distributed algorithm to control entries and exits to/from the shared resource (also called a critical section), in such a way that at any time, there is at most one process accessing it. In our considerations, the shared resource is the shared communication channel itself (multiple access channel), and the main challenge arises because the channel is also the only mean of communication between these processes. We consider both the classic and a slightly weaker version of mutual exclusion, called \(\varepsilon \)-mutual-exclusion, where for each period of a process staying in the critical section the probability that there is some other process in the critical section is at most \(\varepsilon \). We show that there are channel settings, where the classic mutual exclusion is not feasible even for randomized algorithms, while the \(\varepsilon \)-mutual-exclusion is. In more relaxed channel settings, we prove an exponential gap between the makespan complexity of the classic mutual exclusion problem and its weaker \(\varepsilon \)-exclusion version. We also show how to guarantee fairness of mutual exclusion algorithms, i.e., that each process that wants to enter the critical section will eventually succeed.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号