全文获取类型
收费全文 | 1868篇 |
免费 | 91篇 |
国内免费 | 5篇 |
专业分类
电工技术 | 26篇 |
综合类 | 16篇 |
化学工业 | 570篇 |
金属工艺 | 30篇 |
机械仪表 | 31篇 |
建筑科学 | 146篇 |
矿业工程 | 3篇 |
能源动力 | 27篇 |
轻工业 | 175篇 |
水利工程 | 11篇 |
石油天然气 | 4篇 |
无线电 | 118篇 |
一般工业技术 | 379篇 |
冶金工业 | 65篇 |
原子能技术 | 17篇 |
自动化技术 | 346篇 |
出版年
2024年 | 6篇 |
2023年 | 34篇 |
2022年 | 51篇 |
2021年 | 73篇 |
2020年 | 45篇 |
2019年 | 46篇 |
2018年 | 43篇 |
2017年 | 41篇 |
2016年 | 51篇 |
2015年 | 47篇 |
2014年 | 73篇 |
2013年 | 97篇 |
2012年 | 89篇 |
2011年 | 157篇 |
2010年 | 99篇 |
2009年 | 111篇 |
2008年 | 102篇 |
2007年 | 84篇 |
2006年 | 85篇 |
2005年 | 73篇 |
2004年 | 68篇 |
2003年 | 53篇 |
2002年 | 51篇 |
2001年 | 44篇 |
2000年 | 42篇 |
1999年 | 41篇 |
1998年 | 27篇 |
1997年 | 27篇 |
1996年 | 17篇 |
1995年 | 20篇 |
1994年 | 26篇 |
1993年 | 14篇 |
1992年 | 10篇 |
1991年 | 23篇 |
1990年 | 13篇 |
1989年 | 14篇 |
1988年 | 7篇 |
1987年 | 6篇 |
1986年 | 4篇 |
1985年 | 6篇 |
1984年 | 10篇 |
1983年 | 8篇 |
1981年 | 2篇 |
1980年 | 2篇 |
1978年 | 4篇 |
1977年 | 4篇 |
1976年 | 2篇 |
1974年 | 2篇 |
1967年 | 2篇 |
1931年 | 3篇 |
排序方式: 共有1964条查询结果,搜索用时 15 毫秒
121.
We define and study an optimization problem that is motivated by bandwidth allocation in radio networks. Because radio transmissions are subject to interference constraints in radio networks, physical space is a common resource that the nodes have to share in such a way, that concurrent transmissions do not interfere. The bandwidth allocation problem we study under these constraints is the following. Given bandwidth (traffic) demands between the nodes of the network, the objective is to schedule the radio transmissions in such a way that the traffic demands are satisfied. The problem is similar to a multicommodity flow problem, where the capacity constraints are replaced by the more complex notion of non-interfering transmissions. We provide a formal specification of the problem that we call round weighting . By modeling non-interfering radio transmissions as independent sets, we relate the complexity of round weighting to the complexity of various independent set problems (e.g. maximum weight independent set, vertex coloring, fractional coloring). From this relation, we deduce that in general, round weighting is hard to approximate within n1−ε (n being the size of the radio network). We also provide polynomial (exact or approximation) algorithms e.g. in the following two cases: (a) when the interference constraints are specific (for instance for a network whose vertices belong to the Euclidean space), or (b) when the traffic demands are directed towards a unique node in the network (also called gathering, analogous to single commodity flow). 相似文献
122.
Osama Abboud Konstantin Pussep Aleksandra Kovacevic Katharina Mohr Sebastian Kaune Ralf Steinmetz 《Multimedia Systems》2011,17(3):177-197
Peer-to-Peer (P2P) techniques for multimedia streaming have been shown to be a good enhancement to the traditional client/server methods when trying to reduce costs and increase robustness. Due to the fact that P2P systems are highly dynamic, the main challenge that has to be addressed remains supporting the general resilience of the system. Various challenges arise when building a resilient P2P streaming system, such as network failures and system dynamics. In this paper, we first classify the different challenges that face P2P streaming and then present and analyze the possible countermeasures. We classify resilience mechanisms as either core mechanisms, which are part of the system, or as cross-layer mechanisms that use information from different communication layers, which might inflict additional costs. We analyze and present resilience mechanisms from an engineering point of view, such that a system engineer can use our analysis as a guide to build a resilient P2P streaming system with different mechanisms and for various application scenarios. 相似文献
123.
Adrian Blumer Jan Novák Ralf Habel Derek Nowrouzezahrai Wojciech Jarosz 《Computer Graphics Forum》2016,35(7):461-473
Aggregate scattering operators (ASOs) describe the overall scattering behavior of an asset (i.e., an object or volume, or collection thereof) accounting for all orders of its internal scattering. We propose a practical way to precompute and compactly store ASOs and demonstrate their ability to accelerate path tracing. Our approach is modular avoiding costly and inflexible scene‐dependent precomputation. This is achieved by decoupling light transport within and outside of each asset, and precomputing on a per‐asset level. We store the internal transport in a reduced‐dimensional subspace tailored to the structure of the asset geometry, its scattering behavior, and typical illumination conditions, allowing the ASOs to maintain good accuracy with modest memory requirements. The precomputed ASO can be reused across all instances of the asset and across multiple scenes. We augment ASOs with functionality enabling multi‐bounce importance sampling, fast short‐circuiting of complex light paths, and compact caching, while retaining rapid progressive preview rendering. We demonstrate the benefits of our ASOs by efficiently path tracing scenes containing many instances of objects with complex inter‐reflections or multiple scattering. 相似文献
124.
Dipl.-Wirtsch.-Inf. Rainer Berbner Dr.-Ing. Oliver Heckmann Dr. Andreas Mauthe Prof. Dr.-Ing. Ralf Steinmetz 《WIRTSCHAFTSINFORMATIK》2005,47(4):268-277
Web services as a technology to enable distributed business processes gain in importance. However, the support of Quality of Service (QoS) is crucial in this context. Thus, we present an integrated web service architecture with comprehensive QoS support. The architecture we introduce in this paper supports the assessment of web services to assure that only web services will be used in critical business processes that satisfy the requirements defined by the user. The selection and execution of a certain web service depends on its QoS-properties that must be guaranteed in Service Level Agreements (SLAs). The compliance with SLAs is monitored by the system as well. Furthermore we introduce a prototypical implementation of our web service architecture. 相似文献
125.
Pietro Abate Roberto Di Cosmo Ralf Treinen Stefano Zacchiroli 《Journal of Systems and Software》2012,85(10):2228-2240
Maintenance of component-based software platforms often has to face rapid evolution of software components. Component dependencies, conflicts, and package managers with dependency solving capabilities are the key ingredients of prevalent software maintenance technologies that have been proposed to keep software installations synchronized with evolving component repositories. We review state-of-the-art package managers and their ability to keep up with evolution at the current growth rate of popular component-based platforms, and conclude that their dependency solving abilities are not up to the task.We show that the complexity of the underlying upgrade planning problem is NP-complete even for seemingly simple component models, and argue that the principal source of complexity lies in multiple available versions of components. We then discuss the need of expressive languages for user preferences, which makes the problem even more challenging.We propose to establish dependency solving as a separate concern from other upgrade aspects, and present CUDF as a formalism to describe upgrade scenarios. By analyzing the result of an international dependency solving competition, we provide evidence that the proposed approach is viable. 相似文献
126.
A Parallelization Approach for Hard Real-Time Systems and Its Application on Two Industrial Programs
Martin?FriebEmail author Ralf?Jahr Haluk?Ozaktas Andreas?Hugl Hans?Regler Theo?Ungerer 《International journal of parallel programming》2016,44(6):1296-1336
Applications in industry often have grown and improved over many years. Since their performance demands increase, they also need to benefit from the availability of multi-core processors. However, a reimplementation from scratch and even a restructuring of these industrial applications is very expensive, often due to high certification efforts. Therefore, a strategy for a systematic parallelization of legacy code is needed. We present a parallelization approach for hard real-time systems, which ensures a high reusage of legacy code and preserves timing analysability. To show its applicability, we apply it on the core algorithm of an avionics application as well as on the control program of a large construction machine. We create models of the legacy programs showing the potential of parallelism, optimize them and change the source codes accordingly. The parallelized applications are placed on a predictable multi-core processor with up to 18 cores. For evaluation, we compare the worst case execution times and their speedups. Furthermore, we analyse limitations coming up at the parallelization process. 相似文献
127.
128.
129.
Vasileios Belagiannis Xinchao Wang Horesh Beny Ben Shitrit Kiyoshi Hashimoto Ralf Stauder Yoshimitsu Aoki Michael Kranzfelder Armin Schneider Pascal Fua Slobodan Ilic Hubertus Feussner Nassir Navab 《Machine Vision and Applications》2016,27(7):1035-1046
Multiple human pose estimation is an important yet challenging problem. In an operating room (OR) environment, the 3D body poses of surgeons and medical staff can provide important clues for surgical workflow analysis. For that purpose, we propose an algorithm for localizing and recovering body poses of multiple human in an OR environment under a multi-camera setup. Our model builds on 3D Pictorial Structures and 2D body part localization across all camera views, using convolutional neural networks (ConvNets). To evaluate our algorithm, we introduce a dataset captured in a real OR environment. Our dataset is unique, challenging and publicly available with annotated ground truths. Our proposed algorithm yields to promising pose estimation results on this dataset. 相似文献
130.
In the Horn theory based approach for cryptographic protocol analysis, cryptographic protocols and (Dolev?CYao) intruders are modeled by Horn theories and security analysis boils down to solving the derivation problem for Horn theories. This approach and the tools based on this approach, including ProVerif, have been very successful in the automatic analysis of cryptographic protocols. However, dealing with the algebraic properties of operators, such as the exclusive OR (XOR), which are frequently used in cryptographic protocols has been problematic. In particular, ProVerif cannot deal with XOR. In this paper, we show how to reduce the derivation problem for Horn theories with XOR to the XOR-free case. Our reduction works for an expressive class of Horn theories. A large class of intruder capabilities and protocols that employ the XOR operator can be modeled by these theories. Our reduction allows us to carry out protocol analysis using tools, such as ProVerif, that cannot deal with XOR, but are very efficient in the XOR-free case. We implemented our reduction and, in combination with ProVerif, used it for the fully automatic analysis of several protocols that employ the XOR operator. Among others, our analysis revealed a new attack on an IBM security module. 相似文献