全文获取类型
收费全文 | 637篇 |
免费 | 36篇 |
专业分类
电工技术 | 7篇 |
综合类 | 1篇 |
化学工业 | 111篇 |
金属工艺 | 8篇 |
机械仪表 | 7篇 |
建筑科学 | 44篇 |
矿业工程 | 1篇 |
能源动力 | 24篇 |
轻工业 | 41篇 |
水利工程 | 2篇 |
无线电 | 58篇 |
一般工业技术 | 87篇 |
冶金工业 | 78篇 |
自动化技术 | 204篇 |
出版年
2023年 | 3篇 |
2022年 | 15篇 |
2021年 | 10篇 |
2020年 | 10篇 |
2019年 | 7篇 |
2018年 | 18篇 |
2017年 | 17篇 |
2016年 | 12篇 |
2015年 | 16篇 |
2014年 | 23篇 |
2013年 | 45篇 |
2012年 | 29篇 |
2011年 | 55篇 |
2010年 | 51篇 |
2009年 | 34篇 |
2008年 | 38篇 |
2007年 | 34篇 |
2006年 | 41篇 |
2005年 | 23篇 |
2004年 | 23篇 |
2003年 | 11篇 |
2002年 | 17篇 |
2001年 | 14篇 |
2000年 | 10篇 |
1999年 | 6篇 |
1998年 | 9篇 |
1997年 | 7篇 |
1996年 | 8篇 |
1995年 | 7篇 |
1994年 | 6篇 |
1993年 | 4篇 |
1992年 | 8篇 |
1991年 | 7篇 |
1990年 | 4篇 |
1989年 | 6篇 |
1988年 | 5篇 |
1987年 | 7篇 |
1986年 | 3篇 |
1985年 | 1篇 |
1984年 | 2篇 |
1983年 | 3篇 |
1982年 | 6篇 |
1981年 | 2篇 |
1980年 | 3篇 |
1979年 | 3篇 |
1978年 | 3篇 |
1977年 | 2篇 |
1976年 | 1篇 |
1973年 | 2篇 |
1965年 | 1篇 |
排序方式: 共有673条查询结果,搜索用时 15 毫秒
11.
Amir Yair Danilov Claudiu Dolev Danny Kirsch Jonathan Lane John Nita-Rotaru Cristina Olsen Josh Zage David 《Dependable and Secure Computing, IEEE Transactions on》2010,7(1):80-93
This paper presents the first hierarchical Byzantine fault-tolerant replication architecture suitable to systems that span multiple wide-area sites. The architecture confines the effects of any malicious replica to its local site, reduces message complexity of wide-area communication, and allows read-only queries to be performed locally within a site for the price of additional standard hardware. We present proofs that our algorithm provides safety and liveness properties. A prototype implementation is evaluated over several network topologies and is compared with a flat Byzantine fault-tolerant approach. The experimental results show considerable improvement over flat Byzantine replication algorithms, bringing the performance of Byzantine replication closer to existing benign fault-tolerant replication techniques over wide area networks. 相似文献
12.
13.
Hierarchical edge bundles: visualization of adjacency relations in hierarchical data 总被引:1,自引:0,他引:1
Holten D 《IEEE transactions on visualization and computer graphics》2006,12(5):741-748
A compound graph is a frequently encountered type of data set. Relations are given between items, and a hierarchy is defined on the items as well. We present a new method for visualizing such compound graphs. Our approach is based on visually bundling the adjacency edges, i.e., non-hierarchical edges, together. We realize this as follows. We assume that the hierarchy is shown via a standard tree visualization method. Next, we bend each adjacency edge, modeled as a B-spline curve, toward the polyline defined by the path via the inclusion edges from one node to another. This hierarchical bundling reduces visual clutter and also visualizes implicit adjacency edges between parent nodes that are the result of explicit adjacency edges between their respective child nodes. Furthermore, hierarchical edge bundling is a generic method which can be used in conjunction with existing tree visualization techniques. We illustrate our technique by providing example visualizations and discuss the results based on an informal evaluation provided by potential users of such visualizations 相似文献
14.
Obituaries
Grigorii Valentinovich Samsonov 相似文献15.
We study the problem of computing Nash equilibria in a two-player normal form (bimatrix) game from the perspective of parameterized complexity. Recent results proved hardness for a number of variants, when parameterized by the support size. We complement those results, by identifying three cases in which the problem becomes fixed-parameter tractable. Our results are based on a graph-theoretic representation of a bimatrix game, and on applying graph-theoretic tools on this representation. 相似文献
16.
Consider a situation where people have to choose among a sequence of n linearly ordered positions to perform some task requiring a certain amount of privacy. Which position should one choose so
as to maximize one’s privacy, i.e., minimize the chances that one of your neighboring positions becomes occupied by a later
arrival? In this paper, we attempt to answer this question under a variety of models for the behavior of the later arrivals.
Our results suggest that for the most part one should probably choose one of the extreme positions (with some interesting
exceptions). We also suggest a number of variations on the problem that lead to many open problems. 相似文献
17.
Danny Bradbury Author Vitae 《Network Security》2012,2012(8):12-15
18.
19.
This article reports on a large field study of Integrated Manufacturing (IM), consisting of Total Quality Management (TQM), Just in Time (JIT) and Advanced Manufacturing Technology (AMT). The relationship between these facets of Integrated Manufacturing and performance was examined empirically, including measures of employee performance and manufacturing performance. There was a significant correlation between employee performance and manufacturing performance. While all three facets of Integrated Manufacturing were relatively strongly connected with employee performance, manufacturing performance was significantly but less strongly connected to the intensity of TQM and JIT than employee performance, and not connected with the intensity of Advanced Manufacturing Technology. Some second-order interactive effects between the facets of Integrated Manufacturing and performance were found. Further, by partitioning the large data set into three using the AMT factor as a cutting variable, it was found that the stronger the AMT environment, the stronger the explanatory power of TQM and JIT on both employee and manufacturing performance. The interactive impact of AMT and TQM was significantly positively related to both employee and manufacturing performance. 相似文献
20.