首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   15593篇
  免费   827篇
  国内免费   28篇
电工技术   166篇
综合类   43篇
化学工业   3344篇
金属工艺   318篇
机械仪表   315篇
建筑科学   685篇
矿业工程   45篇
能源动力   511篇
轻工业   1228篇
水利工程   124篇
石油天然气   51篇
无线电   1122篇
一般工业技术   2987篇
冶金工业   2264篇
原子能技术   118篇
自动化技术   3127篇
  2023年   165篇
  2022年   359篇
  2021年   573篇
  2020年   374篇
  2019年   380篇
  2018年   497篇
  2017年   461篇
  2016年   531篇
  2015年   465篇
  2014年   595篇
  2013年   1062篇
  2012年   971篇
  2011年   1158篇
  2010年   812篇
  2009年   757篇
  2008年   791篇
  2007年   775篇
  2006年   586篇
  2005年   506篇
  2004年   372篇
  2003年   381篇
  2002年   340篇
  2001年   213篇
  2000年   186篇
  1999年   206篇
  1998年   222篇
  1997年   190篇
  1996年   186篇
  1995年   177篇
  1994年   154篇
  1993年   148篇
  1992年   119篇
  1991年   74篇
  1990年   123篇
  1989年   116篇
  1988年   80篇
  1987年   94篇
  1986年   100篇
  1985年   101篇
  1984年   91篇
  1983年   78篇
  1982年   96篇
  1981年   92篇
  1980年   72篇
  1979年   72篇
  1978年   63篇
  1977年   77篇
  1976年   62篇
  1975年   47篇
  1974年   44篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
81.
We prove that the function of normalization in base , which maps any -representation of a real number onto its -development, obtained by a greedy algorithm, is a function computable by a finite automaton over any alphabet if and only if is a Pisot number.Christiane Frougny was supported in part by the PRC Mathématiques et Informatique of the Ministère de la Recherche et de l'Espace.  相似文献   
82.
The objective of this paper is to propose an architecture for aCAble TeleVision (CATV) network, capable of supporting two-way transmission. This evolution is necessary for the survival of the CATV industry in an era of deregulation and of the development of the B-ISDN by the telecommunications companies. A communication transactional service is then considered and performance analysis is done under realistic assumptions.  相似文献   
83.
The main problem of interval computations is as follows:given sets of possible valuesX i for variablesx i, and an algorithmf:R n → R, to.estimate the rangef(X 1, ..,X n ) of the possible values off(x 1, ...,x n ). In many real-life, situations setsX i are not intervals. To handle such problems, it is desirable to add set data type and operations with sets to a programming language. it is well known that the entire mathematics can be formulated in terms of sets. So, if we already have a set as a data type, why have anything else. The main reason, is that expression in terms of sets is often clumsy. To avoid this clumsiness, it has been suggested to use not only sets, but alsobags (multisets), in which an element can have multiple occurrences. Bags are used in many areas of Computer Science, and recently, several languages have appeared that use the bag as a basic data type. In this paper, we explain the main ideas behind bag languages, and we also show:
  • · that bag languages are naturally parallelizable, thus leading to a parallelization of the coresponding generalized interval computations;
  • · and that bag languages can be also helpfully applied to traditional interval computations (where setsX i are intervals).
  •   相似文献   
    84.

    Due to the increase and complexity of computer systems, reducing the overhead of fault tolerance techniques has become important in recent years. One technique in fault tolerance is checkpointing, which saves a snapshot with the information that has been computed up to a specific moment, suspending the execution of the application, consuming I/O resources and network bandwidth. Characterizing the files that are generated when performing the checkpoint of a parallel application is useful to determine the resources consumed and their impact on the I/O system. It is also important to characterize the application that performs checkpoints, and one of these characteristics is whether the application does I/O. In this paper, we present a model of checkpoint behavior for parallel applications that performs I/O; this depends on the application and on other factors such as the number of processes, the mapping of processes and the type of I/O used. These characteristics will also influence scalability, the resources consumed and their impact on the IO system. Our model describes the behavior of the checkpoint size based on the characteristics of the system and the type (or model) of I/O used, such as the number I/O aggregator processes, the buffering size utilized by the two-phase I/O optimization technique and components of collective file I/O operations. The BT benchmark and FLASH I/O are analyzed under different configurations of aggregator processes and buffer size to explain our approach. The model can be useful when selecting what type of checkpoint configuration is more appropriate according to the applications’ characteristics and resources available. Thus, the user will be able to know how much storage space the checkpoint consumes and how much the application consumes, in order to establish policies that help improve the distribution of resources.

      相似文献   
    85.
    Ribonucleic acids (RNAs) possess great therapeutic potential and can be used to treat a variety of diseases. The unique biophysical properties of RNAs, such as high molecular weight, negative charge, hydrophilicity, low stability, and potential immunogenicity, require chemical modification and development of carriers to enable intracellular delivery of RNAs for clinical use. A variety of nanomaterials have been developed for the effective in vivo delivery of short/ small RNAs, messenger RNAs, and RNAs required for gene editing technologies including clustered regularly interspaced palindromic repeat (CRISPR)/Cas. This review outlines the challenges of delivering RNA therapeutics, explores the chemical synthesis of RNA modifications and carriers, and describes the efforts to design nanomaterials that can be used for a variety of clinical indications.  相似文献   
    86.
    The Body-Centered Cubic (BCC) and Face-Centered Cubic (FCC) lattices have been analytically shown to be more efficient sampling lattices than the traditional Cartesian Cubic (CC) lattice, but there has been no estimate of their visual comparability. Two perceptual studies (each with N = 12 participants) compared the visual quality of images rendered from BCC and FCC lattices to images rendered from the CC lattice. Images were generated from two signals: the commonly used Marschner-Lobb synthetic function and a computed tomography scan of a fish tail. Observers found that BCC and FCC could produce images of comparable visual quality to CC, using 30-35 percent fewer samples. For the images used in our studies, the L(2) error metric shows high correlation with the judgement of human observers. Using the L(2) metric as a proxy, the results of the experiments appear to extend across a wide range of images and parameter choices.  相似文献   
    87.
    Many times, even if a crowd simulation looks good in general, there could be some specific individual behaviors which do not seem correct. Spotting such problems manually can become tedious, but ignoring them may harm the simulation's credibility. In this paper we present a data‐driven approach for evaluating the behaviors of individuals within a simulated crowd. Based on video‐footage of a real crowd, a database of behavior examples is generated. Given a simulation of a crowd, an analog analysis is performed on it, defining a set of queries, which are matched by a similarity function to the database examples. The results offer a possible objective answer to the question of how similar are the simulated individual behaviors to real observed behaviors. Moreover, by changing the video input one can change the context of evaluation. We show several examples of evaluating simulated crowds produced using different techniques and comprising of dense crowds, sparse crowds and flocks.  相似文献   
    88.
    We consider the on-line version of the maximum vertex disjoint path problem when the underlying network is a tree. In this problem, a sequence of requests arrives in an on-line fashion, where every request is a path in the tree. The on-line algorithm may accept a request only if it does not share a vertex with a previously accepted request. The goal is to maximize the number of accepted requests. It is known that no on-line algorithm can have a competitive ratio better than Ω(log n) for this problem, even if the algorithm is randomized and the tree is simply a line. Obviously, it is desirable to beat the logarithmic lower bound. Adler and Azar (Proc. of the 10th ACM-SIAM Symposium on Discrete Algorithm, pp. 1–10, 1999) showed that if preemption is allowed (namely, previously accepted requests may be discarded, but once a request is discarded it can no longer be accepted), then there is a randomized on-line algorithm that achieves constant competitive ratio on the line. In the current work we present a randomized on-line algorithm with preemption that has constant competitive ratio on any tree. Our results carry over to the related problem of maximizing the number of accepted paths subject to a capacity constraint on vertices (in the disjoint path problem this capacity is 1). Moreover, if the available capacity is at least 4, randomization is not needed and our on-line algorithm becomes deterministic.  相似文献   
    89.
    Instructors in higher education are disseminating instructional content via podcasting, as many rally behind the technology’s potential benefits. Others have expressed concern about the risks of deleterious effects that might accompany the adoption of podcasting, such as lower class attendance. Yet, relatively few studies have investigated students’ perceptions of podcasting for educational purposes, especially in relation to different podcasting forms: repetitive and supplemental. The present study explored students’ readiness and attitudes towards these two forms of podcasting to provide fundamental information for future researchers and educators. The results indicated that students may not be as ready or eager to use podcasting for repetitive or supplemental educational purposes as much as we think they are, but they could be persuaded.  相似文献   
    90.
    Modern large-scale grid computing systems for processing advanced science and engineering applications rely on geographically distributed clusters. In such highly distributed environments, estimating the available bandwidth between clusters is a key issue for efficient task scheduling. We analyze the performance of two well known available bandwidth estimation tools, pathload and abget, with the aim of using them in grid environments. Differently than previous investigations (Jain et al., ; Shriram et al., in Passive and active network measurement: 6th international workshop, PAM 2005. Springer, Berlin, 2005), our experiments consider a series of relevant metrics such as accuracy of the estimation, convergence time, degree of intrusion in the grid links, and ability to handle multiple simultaneous estimations. No previous work has analyzed the use of available bandwidth tools for the derivation of efficient grid scheduling.  相似文献   
    设为首页 | 免责声明 | 关于勤云 | 加入收藏

    Copyright©北京勤云科技发展有限公司  京ICP备09084417号