全文获取类型
收费全文 | 907篇 |
免费 | 47篇 |
国内免费 | 1篇 |
专业分类
电工技术 | 17篇 |
化学工业 | 243篇 |
金属工艺 | 11篇 |
机械仪表 | 12篇 |
建筑科学 | 31篇 |
矿业工程 | 3篇 |
能源动力 | 30篇 |
轻工业 | 97篇 |
水利工程 | 10篇 |
石油天然气 | 4篇 |
无线电 | 97篇 |
一般工业技术 | 130篇 |
冶金工业 | 31篇 |
自动化技术 | 239篇 |
出版年
2023年 | 6篇 |
2022年 | 27篇 |
2021年 | 25篇 |
2020年 | 24篇 |
2019年 | 32篇 |
2018年 | 38篇 |
2017年 | 26篇 |
2016年 | 35篇 |
2015年 | 27篇 |
2014年 | 31篇 |
2013年 | 57篇 |
2012年 | 75篇 |
2011年 | 59篇 |
2010年 | 46篇 |
2009年 | 41篇 |
2008年 | 50篇 |
2007年 | 60篇 |
2006年 | 45篇 |
2005年 | 25篇 |
2004年 | 38篇 |
2003年 | 16篇 |
2002年 | 22篇 |
2001年 | 13篇 |
2000年 | 10篇 |
1999年 | 13篇 |
1998年 | 6篇 |
1997年 | 14篇 |
1996年 | 9篇 |
1995年 | 7篇 |
1994年 | 7篇 |
1993年 | 4篇 |
1992年 | 2篇 |
1991年 | 8篇 |
1990年 | 1篇 |
1989年 | 5篇 |
1988年 | 5篇 |
1987年 | 7篇 |
1986年 | 9篇 |
1985年 | 5篇 |
1984年 | 4篇 |
1983年 | 8篇 |
1982年 | 3篇 |
1981年 | 1篇 |
1980年 | 2篇 |
1979年 | 2篇 |
1977年 | 3篇 |
1976年 | 2篇 |
排序方式: 共有955条查询结果,搜索用时 328 毫秒
31.
Arnaud Grasset Philippe Millet Philippe Bonnot Sami Yehia Wolfram Putzke-Roeming Fabio Campi Alberto Rosti Michael Huebner Nikolaos S. Voros Davide Rossi Henning Sahlbach Rolf Ernst 《International journal of parallel programming》2011,39(3):328-356
Reconfigurable computing offers a wide range of low cost and efficient solutions for embedded systems. The proper choice of the reconfigurable device, the granularity of its processing elements and its memory architecture highly depend on the type of application and their data flow. Existing solutions either offer fine grain FPGAs, which rely on a hardware synthesis flow and offer the maximum degree of flexibility, or coarser grain solutions, which are usually more suitable for a particular type of data flow and applications. In this paper, we present the MORPHEUS architecture, a versatile reconfigurable heterogeneous System-on-Chip targeting streaming applications. The presented architecture exploits different reconfigurable technologies at several computation granularities that efficiently address the different applications needs. In order to efficiently exploit the presented architecture, we implemented a complete software solution to map C applications to the reconfigurable architecture. In this paper, we describe the complete toolset and provide concrete use cases of the architecture. 相似文献
32.
Secure authentication features of communication and electronic commerce protocols involve computationally expensive and memory intensive cryptographic operations that have the potential to be turned into denial-of-service (DoS) exploits. Recent proposals attempt to improve DoS resistance by implementing a trade-off between the resources required for the potential victim(s) with the resources used by a prospective attacker. Such improvements have been proposed for the Internet Key Exchange (IKE), the Just Fast Keying (JFK) key agreement protocol and the Secure Sockets Layer (SSL/TLS) protocol. In present article, we introduce probabilistic model checking as an efficient tool-assisted approach for systematically quantifying DoS security threats. We model a security protocol with a fixed network topology using probabilistic specifications for the protocol participants. We attach into the protocol model, a probabilistic attacker model which performs DoS related actions with assigned cost values. The costs for the protocol participants and the attacker reflect the level of some resource expenditure (memory, processing capacity or communication bandwidth) for the associated actions. From the developed model we obtain a Discrete Time Markov Chain (DTMC) via property preserving discrete-time semantics. The DTMC model is verified using the PRISM model checker that produces probabilistic estimates for the analyzed DoS threat. In this way, it is possible to evaluate the level of resource expenditure for the attacker, beyond which the likelihood of widespread attack is reduced and subsequently to compare alternative design considerations for optimal resistance to the analyzed DoS threat. Our approach is validated through the analysis of the Host Identity Protocol (HIP). The HIP base-exchange is seen as a cryptographic key-exchange protocol with special features related to DoS protection. We analyze a serious DoS threat, for which we provide probabilistic estimates, as well as results for the associated attacker and participants' costs. 相似文献
33.
Kalamaras Ilias Dimitriou Nikolaos Drosou Anastasios Tzovaras Dimitrios 《Multimedia Tools and Applications》2017,76(14):15923-15949
Multimedia Tools and Applications - Traditional multimedia search engines retrieve results based mostly on the query submitted by the user, or using a log of previous searches to provide... 相似文献
34.
The IP Multimedia Subsystem (IMS) seems to be the technology that will prevail in Next Generation Networks (NGNs), since the interworking environment and the service flexibility that this technology offers to the currently deployed wireless broadband technologies makes it appealing to users, service developers and network operators. In this paper we propose a heterogeneous network model based on the IMS that integrates the Worldwide Interoperability for Microwave Access (WiMAX), Universal Mobile Telecommunications System (UMTS) and Wireless Local Area Network (WLAN) technologies and provides guaranteed QoS. We present the complete signalling flow concerning the authorization, registration, session set up and vertical handoff processes, as well as, an analytic model for cost analysis of the proposed architecture. 相似文献
35.
36.
Galanis CC Sfantsikopoulos MM Koidis PT Kafantaris NM Mpikos PG 《Computer methods and programs in biomedicine》2007,86(1):30-38
The paper presents computer-aided methods that allocate a dental implant and suggest its size, during the pre-operative planning stage, in conformance with introduced optimization criteria and established clinical requirements. Based on computed tomography data of the jaw and prosthesis anatomy, single tooth cases are planned for the best-suited implant insertion at a user-defined region. An optimum implantation axis line is produced and cylindrical implants of various candidate sizes are then automatically positioned, while their occlusal end is leveled to bone ridge, and evaluated. Radial safety margins are used for the assessment of the implant safety distance from neighboring anatomical structures and bone quantity and quality are estimated and taken into consideration. A case study demonstrates the concept and allows for its discussion. 相似文献
37.
Rahul Singh Richard M. Voyles David Littau Nikolaos P. Papanikolopoulos 《Autonomous Robots》2001,10(3):317-338
We present an approach for controlling robotic interactions with objects, using synthetic images generated by morphing shapes. In particular, we attempt the problem of positioning an eye-in-hand robotic system with respect to objects in the workspace for grasping and manipulation. In our formulation, the grasp position (and consequently the approach trajectory of the manipulator), varies with each object. The proposed solution to the problem consists of two parts. First, based on a model-based object recognition framework, images of the objects taken at the desired grasp pose are stored in a database. The recognition and identification of the grasp position for an unknown input object (selected from the family of recognizable objects) occurs by morphing its contour to the templates in the database and using the virtual energy spent during the morph as a dissimilarity measure. In the second step, the images synthesized during the morph are used to guide the eye-in-hand system and execute the grasp. The proposed method requires minimal calibration of the system. Furthermore, it conjoins techniques from shape recognition, computer graphics, and vision-based robot control in a unified engineering amework. Potential applications range from recognition and positioning with respect to partially-occluded or deformable objects to planning robotic grasping based on human demonstration. 相似文献
38.
Eftychios G. Christoforou Nikolaos V. Tsekos Alpay Özcan 《Journal of Intelligent and Robotic Systems》2006,47(2):175-196
The effective integration of robotics together with magnetic resonance (mr) technology is expected to facilitate the real-time guidance of various diagnostic and therapeutic interventions. Specially designed robotic manipulators are required for this purpose, the development of which is a challenging task given the strong magnetic fields and the space limitations that characterize the mr scanning environment. A prototype mr-compatible manipulator is presented, designed to operate inside cylindrical mr scanners. It was developed for the study of minimally invasive diagnostic and therapeutic interventions in the abdominal and thoracic area with real-time mr image guidance. Initial tests were performed inside a high-field clinical mr scanner and included mr-compatibility tests and phantom studies on image-guided targeting. 相似文献
39.
The present work proposes a new approach to the nonlinear discrete-time feedback stabilization problem with pole-placement. The problem's formulation is realized through a system of nonlinear functional equations and a rather general set of necessary and sufficient conditions for solvability is derived. Using tools from functional equations theory, one can prove that the solution to the above system of nonlinear functional equations is locally analytic, and an easily programmable series solution method can be developed. Under a simultaneous implementation of a nonlinear coordinate transformation and a nonlinear discrete-time state feedback control law that are both computed through the solution of the system of nonlinear functional equations, the feedback stabilization with pole-placement design objective can be attained under rather general conditions. The key idea of the proposed single-step design approach is to bypass the intermediate step of transforming the original system into a linear controllable one with an external reference input associated with the classical exact feedback linearization approach. However, since the proposed method does not involve an external reference input, it cannot meet other control objectives such as trajectory tracking and model matching. 相似文献
40.