首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   2686篇
  免费   170篇
  国内免费   3篇
电工技术   30篇
综合类   5篇
化学工业   663篇
金属工艺   39篇
机械仪表   44篇
建筑科学   122篇
矿业工程   10篇
能源动力   127篇
轻工业   196篇
水利工程   28篇
石油天然气   5篇
无线电   238篇
一般工业技术   501篇
冶金工业   205篇
原子能技术   12篇
自动化技术   634篇
  2024年   4篇
  2023年   32篇
  2022年   85篇
  2021年   145篇
  2020年   82篇
  2019年   83篇
  2018年   105篇
  2017年   87篇
  2016年   108篇
  2015年   91篇
  2014年   123篇
  2013年   203篇
  2012年   147篇
  2011年   243篇
  2010年   152篇
  2009年   144篇
  2008年   179篇
  2007年   125篇
  2006年   113篇
  2005年   78篇
  2004年   52篇
  2003年   62篇
  2002年   39篇
  2001年   28篇
  2000年   32篇
  1999年   27篇
  1998年   65篇
  1997年   49篇
  1996年   40篇
  1995年   24篇
  1994年   21篇
  1993年   18篇
  1992年   6篇
  1991年   5篇
  1990年   6篇
  1989年   8篇
  1988年   9篇
  1987年   2篇
  1986年   2篇
  1985年   5篇
  1984年   2篇
  1983年   1篇
  1982年   7篇
  1981年   3篇
  1980年   6篇
  1978年   3篇
  1977年   3篇
  1976年   2篇
  1975年   2篇
  1968年   1篇
排序方式: 共有2859条查询结果,搜索用时 15 毫秒
51.
52.
Application Layer Traffic Optimization (ALTO) has recently gained attention in the research and standardisation community as a way for a network operator to guide the peer selection process of distributed applications by providing network layer topology information. In particular P2P applications are expected to gain from ALTO, due to the many connections peers form among each other, often without taking network layer topology information into account. In this paper, we present results of an extensive intra-ISP trial with an ALTO-enhanced P2P filesharing software. In summary, our results show that—depending on the concrete setting and on the distribution of upload capacity in the network—ALTO enables an ISP to save operational costs significantly while not degrading application layer performance noticeably. In addition, based on our experience we are able to give advice to operators on how to save costs with ALTO while not sacrificing application layer performance at all.  相似文献   
53.
54.
In this paper, we tackle the problem of opportunistic spectrum access in large-scale cognitive radio networks, where the unlicensed Secondary Users (SUs) access the frequency channels partially occupied by the licensed Primary Users (PUs). Each channel is characterized by an availability probability unknown to the SUs. We apply population game theory to model the spectrum access problem and develop distributed spectrum access policies based on imitation, a behavior rule widely applied in human societies consisting of imitating successful behaviors. We develop two imitation-based spectrum access policies based on the basic Proportional Imitation (PI) rule and the more advanced Double Imitation (DI) rule given that a SU can only imitate the other SUs operating on the same channel. A systematic theoretical analysis is presented for both policies on the induced imitation dynamics and the convergence properties of the proposed policies to the Nash equilibrium. Simple and natural, the proposed imitation-based spectrum access policies can be implemented distributedly based on solely local interactions and thus is especially suited in decentralized adaptive learning environments as cognitive radio networks.  相似文献   
55.
Defocus can be modeled as a diffusion process and represented mathematically using the heat equation, where image blur corresponds to the diffusion of heat. This analogy can be extended to non-planar scenes by allowing a space-varying diffusion coefficient. The inverse problem of reconstructing 3-D structure from blurred images corresponds to an "inverse diffusion" that is notoriously ill-posed. We show how to bypass this problem by using the notion of relative blur. Given two images, within each neighborhood, the amount of diffusion necessary to transform the sharper image into the blurrier one depends on the depth of the scene. This can be used to devise a global algorithm to estimate the depth profile of the scene without recovering the deblurred image, using only forward diffusion.  相似文献   
56.
57.
We propose a model of the shape, motion and appearance of a scene, seen through a sequence of images, that captures occlusions, scene deformations, unconstrained viewpoint variations and changes in its radiance. This model is based on a collection of overlapping layers that can move and deform, each supporting an intensity function that can change over time. We discuss the generality and limitations of this model in relation to existing ones such as traditional optical flow or motion segmentation, layers, deformable templates and deformotion. We then illustrate how this model can be used for inference of shape, motion, deformation and appearance of the scene from a collection of images. The layering structure allows for automatic inpainting of partially occluded regions. We illustrate the model on synthetic and real sequences where existing schemes fail, and show how suitable choices of constants in the model yield existing schemes, from optical flow to motion segmentation and inpainting.  相似文献   
58.
In this paper we focus on the aggregation of IDS alerts, an important component of the alert fusion process. We exploit fuzzy measures and fuzzy sets to design simple and robust alert aggregation algorithms. Exploiting fuzzy sets, we are able to robustly state whether or not two alerts are “close in time”, dealing with noisy and delayed detections. A performance metric for the evaluation of fusion systems is also proposed. Finally, we evaluate the fusion method with alert streams from anomaly-based IDS.  相似文献   
59.
Anti-reflective (AR) boundary conditions (BC) have been introduced recently in connection with fast deblurring algorithms, both in the case of signals and images. Here we extend such BCs to d dimensions (d ≥ 1) and we study in detail the algebra induced by the AR-BCs, with strongly symmetric point spread functions (PSF), both from a structural and computational point of view. The use of the re-blurring idea and the computational features of the AR-algebra allow us to apply Tikhonov-like techniques within O(n d log(n)) arithmetic operations, where n d is the number of pixels of the reconstructed object. Extensive numerical experimentation concerning 2D images and strongly symmetric PSFs confirms the effectiveness of our proposal.   相似文献   
60.
Journal of Electronic Testing -  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号