首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   3040篇
  免费   67篇
  国内免费   8篇
电工技术   45篇
综合类   19篇
化学工业   559篇
金属工艺   57篇
机械仪表   62篇
建筑科学   173篇
矿业工程   8篇
能源动力   92篇
轻工业   197篇
水利工程   33篇
石油天然气   29篇
无线电   358篇
一般工业技术   605篇
冶金工业   255篇
原子能技术   18篇
自动化技术   605篇
  2024年   64篇
  2023年   58篇
  2022年   72篇
  2021年   124篇
  2020年   92篇
  2019年   106篇
  2018年   103篇
  2017年   90篇
  2016年   123篇
  2015年   101篇
  2014年   118篇
  2013年   213篇
  2012年   139篇
  2011年   236篇
  2010年   146篇
  2009年   160篇
  2008年   160篇
  2007年   165篇
  2006年   123篇
  2005年   89篇
  2004年   54篇
  2003年   54篇
  2002年   44篇
  2001年   40篇
  2000年   38篇
  1999年   27篇
  1998年   34篇
  1997年   28篇
  1996年   23篇
  1995年   23篇
  1994年   26篇
  1993年   11篇
  1992年   18篇
  1991年   8篇
  1990年   16篇
  1989年   16篇
  1988年   12篇
  1987年   11篇
  1986年   9篇
  1985年   15篇
  1984年   9篇
  1983年   11篇
  1982年   14篇
  1981年   7篇
  1979年   9篇
  1977年   8篇
  1975年   8篇
  1974年   13篇
  1973年   5篇
  1969年   5篇
排序方式: 共有3115条查询结果,搜索用时 15 毫秒
131.
We propose a novel, sound, and complete Simplex-based algorithm for solving linear inequalities over integers. Our algorithm, which can be viewed as a semantic generalization of the branch-and-bound technique, systematically discovers and excludes entire subspaces of the solution space containing no integer points. Our main insight is that by focusing on the defining constraints of a vertex, we can compute a proof of unsatisfiability for the intersection of the defining constraints and use this proof to systematically exclude subspaces of the feasible region with no integer points. We show experimentally that our technique significantly outperforms the top four competitors in the QF-LIA category of the SMT-COMP ’08 when solving conjunctions of linear inequalities over integers.  相似文献   
132.
133.
The execution process of an evolutionary algorithm typically involves some trial and error. This is due to the difficulty in setting the initial parameters of the algorithm—especially when little is known about the problem domain. This problem is magnified when applied to many-objective optimisation, as care is needed to ensure that the final population of candidate solutions is representative of the trade-off surface. We propose a computational steering system that allows the engineer to interact with the optimisation routine during execution. This interaction can be as simple as monitoring the values of some parameters during the execution process, or could involve altering those parameters to influence the quality of the solutions produced by the optimisation process. The implementation of this steering system should provide the ability to tailor the client to the hardware available, for example providing a lightweight steering and visualisation client for use on a PDA.  相似文献   
134.
This paper presents a low-power tag organization for physically tagged caches in embedded processors with virtual memory support. An exceedingly small subset of tag bits is identified for each application hot-spot so that only these tag bits are used for cache access with no performance sacrifice as they provide complete address resolution. The minimal subset of physical tag bits is dynamically updated following the changes in the physical address space of the application. Operating system support is introduced in order to maintain the reduced tags during program execution. Efficient algorithms are incorporated within the memory allocator and the dynamic linker in order to achieve dynamic update of the reduced tags. The only hardware support needed within the I/D-caches is the support for disabling bitlines of the tag arrays. An extensive set of experimental results demonstrates the efficacy of the proposed approach.  相似文献   
135.
In this paper, we propose several second order in time, fully discrete, linear and nonlinear numerical schemes for solving the phase field model of two-phase incompressible flows, in the framework of finite element method. The schemes are based on the second order Crank–Nicolson method for time discretization, projection method for Navier–Stokes equations, as well as several implicit–explicit treatments for phase field equations. The energy stability and unique solvability of the proposed schemes are proved. Ample numerical experiments are performed to validate the accuracy and efficiency of the proposed schemes.  相似文献   
136.
Wireless sensor networks are increasingly seen as a solution to the problem of performing continuous wide-area monitoring in many environmental, security, and military scenarios. The distributed nature of such networks and the autonomous behavior expected of them present many novel challenges. In this article, the authors argue that a new synthesis of electronic engineering and agent technology is required to address these challenges, and they describe three examples where this synthesis has succeeded. In more detail, they describe how these novel approaches address the need for communication and computationally efficient decentralized algorithms to coordinate the behavior of physically distributed sensors, how they enable the real-world deployment of sensor agent platforms in the field, and finally, how they facilitate the development of intelligent agents that can autonomously acquire data from these networks and perform information processing tasks such as fusion, inference, and prediction.  相似文献   
137.
138.
A simple mutual exclusion algorithm is presented that only uses nonatomic shared variables of bounded size, and that satisfies bounded overtaking. When the shared variables behave atomically, it has the first-come-first-served property (FCFS). Nonatomic access makes information vulnerable. The effects of this can be mitigated by minimizing the information and by spreading it over more variables. The design approach adopted here begins with such mitigating efforts. These resulted in an algorithm with a proof of correctness, first for atomic variables. This proof is then used as a blueprint for the simultaneous development of the algorithm for nonatomic variables and its proof. Mutual exclusion is proved by means of invariants. Bounded overtaking and liveness under weak fairness are proved with invariants and variant functions. Liveness under weak fairness is formalized and proved in a set-theoretic version of temporal logic. All these assertions are verified with the proof assistant PVS. We heavily rely on the possibility offered by a proof assistant like PVS to reuse proofs developed for one context in a different context.  相似文献   
139.
Recognizing the conversational context in which group interactions unfold has applications in machines that support collaborative work and perform automatic social inference using contextual knowledge. This paper addresses the task of discriminating one conversational context from another, specifically brainstorming from decision-making interactions, using easily computable nonverbal behavioral cues. Privacy-sensitive mobile sociometers are used to record the interaction data. We hypothesize that the difference in the conversational dynamics between brainstorming and decision-making discussions is significant and measurable using speaking activity-based nonverbal cues. We characterize the communication patterns of the entire group by the aggregation (both temporal and person-wise) of their nonverbal behavior. The results on our interaction data set show that the floor-occupation patterns in a brainstorming interaction are different from a decision-making interaction, and our method can obtain a classification accuracy as high as 87.5%.  相似文献   
140.
The area of software agents has experienced an exponential growth during the past decade, and is now being given a further boost by the introduction of global distributed computing services, such as Globus and Legion. The focus of the research has gradually shifted from single agent architectures to multi-agent systems and agent societies. In a Grid computing environment, agents should be able to discover efficiently other agents based on the computational services they offer or their characteristics (agent discovery). Existing systems either ignore this issue or use simplistic organisation models, which act as passive yellow pages thus keeping the discovery process separate from the computation. In this paper it is argued that the agent discovery can be coupled with several aspects of the computation such as access control and customisation resulting in a better sharing, use and management of the information held by the agent discovery system. A novel architecture is presented in which discovery messages and discovery paths are mutable, active entities, which interact with each other as peers making the organisation system dynamic in nature. Queries traversing the system can be reformulated while at the same time the system itself can change depending on the nature and volume of the query traffic. Furthermore it is shown that the organisation nodes of the proposed architecture can serve as re-usable components for building more complex, composite nodes from existing ones.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号