全文获取类型
收费全文 | 271篇 |
免费 | 8篇 |
专业分类
化学工业 | 66篇 |
金属工艺 | 5篇 |
机械仪表 | 6篇 |
建筑科学 | 10篇 |
能源动力 | 3篇 |
轻工业 | 25篇 |
水利工程 | 2篇 |
石油天然气 | 2篇 |
无线电 | 11篇 |
一般工业技术 | 45篇 |
冶金工业 | 39篇 |
自动化技术 | 65篇 |
出版年
2023年 | 7篇 |
2022年 | 22篇 |
2021年 | 22篇 |
2020年 | 6篇 |
2019年 | 10篇 |
2018年 | 5篇 |
2017年 | 8篇 |
2016年 | 8篇 |
2015年 | 8篇 |
2014年 | 11篇 |
2013年 | 17篇 |
2012年 | 14篇 |
2011年 | 20篇 |
2010年 | 7篇 |
2009年 | 14篇 |
2008年 | 16篇 |
2007年 | 5篇 |
2006年 | 8篇 |
2005年 | 14篇 |
2004年 | 10篇 |
2003年 | 3篇 |
2002年 | 7篇 |
2001年 | 3篇 |
2000年 | 4篇 |
1999年 | 4篇 |
1998年 | 10篇 |
1997年 | 5篇 |
1995年 | 3篇 |
1994年 | 2篇 |
1993年 | 1篇 |
1992年 | 1篇 |
1991年 | 1篇 |
1986年 | 2篇 |
1981年 | 1篇 |
排序方式: 共有279条查询结果,搜索用时 15 毫秒
1.
Juan Pablo Hourcade Natasha E. Bullock-Rest Thomas E. Hansen 《Personal and Ubiquitous Computing》2012,16(2):157-168
In spite of great improvements in early diagnosis and interventions, most children diagnosed with autism spectrum disorders
(ASD) are unlikely to live independently when they reach adulthood. We have been conducting research on novel computer-based
interventions with the goal of promoting social skills. Working with 26 children with ASD, their teachers, and other stakeholders,
we have iteratively developed a set of activities based on applications that run on multitouch tablets. Our observations suggest
these activities increased pro-social behaviors such as collaboration and coordination, augmented appreciation for social
activities, and provided children with novel forms of expression. 相似文献
2.
Simone Fulvio Rollini Roberto Bruttomesso Natasha Sharygina Aliaksei Tsitovich 《Formal Methods in System Design》2014,45(1):1-41
Verification methods based on SAT, SMT, and theorem proving often rely on proofs of unsatisfiability as a powerful tool to extract information in order to reduce the overall effort. For example a proof may be traversed to identify a minimal reason that led to unsatisfiability, for computing abstractions, or for deriving Craig interpolants. In this paper we focus on two important aspects that concern efficient handling of proofs of unsatisfiability: compression and manipulation. First of all, since the proof size can be very large in general (exponential in the size of the input problem), it is indeed beneficial to adopt techniques to compress it for further processing. Secondly, proofs can be manipulated as a flexible preprocessing step in preparation for interpolant computation. Both these techniques are implemented in a framework that makes use of local rewriting rules to transform the proofs. We show that a careful use of the rules, combined with existing algorithms, can result in an effective simplification of the original proofs. We have evaluated several heuristics on a wide range of unsatisfiable problems deriving from SAT and SMT test cases. 相似文献
3.
The viewfinder of a digital camera has traditionally been used for one purpose: to display to the user a preview of what is seen through the camera's lens. High quality cameras are now available on devices such as mobile phones and PDAs, which provide a platform where the camera is a programmable device, enabling applications such as online computational photography, computer vision‐based interactive gaming, and augmented reality. For such online applications, the camera viewfinder provides the user's main interaction with the environment. In this paper, we describe an algorithm for aligning successive viewfinder frames. First, an estimate of inter‐frame translation is computed by aligning integral projections of edges in two images. The estimate is then refined to compute a full 2D similarity transformation by aligning point features. Our algorithm is robust to noise, never requires storing more than one viewfinder frame in memory, and runs at 30 frames per second on standard smartphone hardware. We use viewfinder alignment for panorama capture, low‐light photography, and a camera‐based game controller. 相似文献
4.
Sagar Chaki Edmund Clarke Natasha Sharygina Nishant Sinha 《Formal Methods in System Design》2008,32(3):235-266
This paper presents an automated and compositional procedure to solve the substitutability problem in the context of evolving software systems. Our solution contributes two
techniques for checking correctness of software upgrades: (1) a technique based on simultaneous use of over-and under-approximations
obtained via existential and universal abstractions; (2) a dynamic assume-guarantee reasoning algorithm—previously generated component assumptions are reused and altered on-the-fly to prove
or disprove the global safety properties on the updated system. When upgrades are found to be non-substitutable, our solution
generates constructive feedback to developers showing how to improve the components. The substitutability approach has been
implemented and validated in the ComFoRT reasoning framework, and we report encouraging results on an industrial benchmark.
This is an extended version of a paper, Dynamic Component Substitutability Analysis, published in the Proceedings of the Formal Methods 2005 Conference, Lecture Notes in Computer Science, vol. 3582, by the
same authors. This research was sponsored by the National Science Foundation under grant nos. CNS-0411152, CCF-0429120, CCR-0121547,
and CCR-0098072, the Semiconductor Research Corporation under grant no. TJ-1366, the US Army Research Office under grant no.
DAAD19-01-1-0485, the Office of Naval Research under grant no. N00014-01-1-0796, the ICAST project and the Predictable Assembly
from Certifiable Components (PACC) initiative at the Software Engineering Institute, Carnegie Mellon University. The views
and conclusions contained in this document are those of the authors and should not be interpreted as representing the official
policies, either expressed or implied, of any sponsoring institution, the US government or any other entity. 相似文献
5.
6.
Chiara Braghin Natasha Sharygina Katerina Barone-Adesi 《Formal Aspects of Computing》2011,23(5):627-648
This article describes an approach for the automated verification of mobile systems. Mobile systems are characterized by the
explicit notion of location (e.g., sites where they run) and the ability to execute at different locations, yielding a number of security issues. To
this aim, we formalize mobile systems as Labeled Kripke Structures, encapsulating the notion of location net that describes the hierarchical nesting of the threads constituting the system. Then, we formalize a generic security-policy specification language that includes rules for expressing and manipulating the code location. In contrast to many other approaches, our technique
supports both access control and information flow specification. We developed a prototype framework for model checking of
mobile systems. It works directly on the program code (in contrast to most traditional process-algebraic approaches that can
model only limited details of mobile systems) and uses abstraction-refinement techniques, based also on location abstractions,
to manage the program state space. We experimented with a number of mobile code benchmarks by verifying various security policies.
The experimental results demonstrate the validity of the proposed mobile system modeling and policy specification formalisms
and highlight the advantages of the model checking-based approach, which combines the validation of security properties with
other checks, such as the validation of buffer overflows. 相似文献
7.
The Dynamics of Syntactic Knowledge 总被引:1,自引:0,他引:1
The syntactic approach to epistemic logic avoids the logicalomniscience problem by taking knowledge as primary rather thanas defined in terms of possible worlds. In this study, we combinethe syntactic approach with modal logic, using transition systemsto model reasoning. We use two syntactic epistemic modalities:knowing at least a set of formulae and knowingat most a set of formulae. We are particularly interestedin models restricting the set of formulae known by an agentat a point in time to be finite. The resulting systems are investigatedfrom the point of view of axiomatization and complexity. Weshow how these logics can be used to formalise non-omniscientagents who know some inference rules, and study their relationshipto other systems of syntactic epistemic logics, such as Ågotnesand Walicki (2004, Proc. 2nd EUMAS, pp. 110), Alechinaet al. (2004, Proc. 3rd AAMAS, pp. 601613), Duc (1997,J. Logic Comput., 7, 633648). 相似文献
8.
Wu Rachel; Gopnik Alison; Richardson Daniel C.; Kirkham Natasha Z. 《Canadian Metallurgical Quarterly》2011,47(5):1220
In laboratory experiments, infants are sensitive to patterns of visual features that co-occur (e.g., Fiser & Aslin, 2002). Once infants learn the statistical regularities, however, what do they do with that knowledge? Moreover, which patterns do infants learn in the cluttered world outside of the laboratory? Across 4 experiments, we show that 9-month-olds use this sensitivity to make inferences about object properties. In Experiment 1, 9-month-old infants expected co-occurring visual features to remain fused (i.e., infants looked longer when co-occurring features split apart than when they stayed together). Forming such expectations can help identify integral object parts for object individuation, recognition, and categorization. In Experiment 2, we increased the task difficulty by presenting the test stimuli simultaneously with a different spatial layout from the familiarization trials to provide a more ecologically valid condition. Infants did not make similar inferences in this more distracting test condition. However, Experiment 3 showed that a social cue did allow inferences in this more difficult test condition, and Experiment 4 showed that social cues helped infants choose patterns among distractor patterns during learning as well as during test. These findings suggest that infants can use feature co-occurrence to learn about objects and that social cues shape such foundational learning in distraction-filled environments. (PsycINFO Database Record (c) 2011 APA, all rights reserved) 相似文献
9.
Type 2 diabetes mellitus (T2DM) can result in microvascular complications such as neuropathy, retinopathy, nephropathy, and cerebral small vessel disease, and contribute to macrovascular complications, such as heart failure, peripheral arterial disease, and large vessel stroke. T2DM also increases the risks of depression and dementia for reasons that remain largely unclear. Perturbations in the cytochrome P450-soluble epoxide hydrolase (CYP-sEH) pathway have been implicated in each of these diabetes complications. Here we review evidence from the clinical and animal literature suggesting the involvement of the CYP-sEH pathway in T2DM complications across organ systems, and highlight possible mechanisms (e.g., inflammation, fibrosis, mitochondrial function, endoplasmic reticulum stress, the unfolded protein response and autophagy) that may be relevant to the therapeutic potential of the pathway. These mechanisms may be broadly relevant to understanding, preventing and treating microvascular complications affecting the brain and other organ systems in T2DM. 相似文献
10.
Multifunctional or structural electrolytes are characterized by ionic conductivity high enough to be used in the electrochemical devices and mechanical performance suitable for the structural applications. Preliminary insights are provided into the combustion behavior of structural bi-continuous electrolytes based on bisphenol A diglycidyl ether (DGEBA), synthesized using the techniques of reaction induced phase separation and emulsion templating. The effect of the composition of the structural electrolytes and external heat flux on the behavior of the formulations were studied using a cone calorimeter with gases formed during testing analyzed using FTIR. The composition of the formulations investigated was changed by varying the type and amount of the ion conductive part of the bi-continuous electrolyte. Two ionic liquids, 1-ethyl-3-methylimidazolium bis(fluorosulfonyl)imide (EMIM-TFSI) and 1-butyl-3-methylimidazolium tetrafluoroborate (BMIM-BF4), as well as a deep eutectic solvent (DES) based on ethylene glycol and choline chloride, were used. The results obtained confirm that time to ignition, heat release rate (HRR), total mass loss, as well as the composition of the gases released during tests depend on the composition of the formulations. Addition of liquid electrolyte is found to reduce the time to ignition by up to 10% and the burning time by between 28% and 60% with the added benefit of reducing the HRR by at least 34%. Gaseous products such as CO2, CO, H2O, CH4, C2H2, N2O, NO, and HCN were detected for all formulations with the gases SO2, NH3, HCl, C2H4, and NH3 found to be for certain formulations only. 相似文献