全文获取类型
收费全文 | 7322篇 |
免费 | 535篇 |
国内免费 | 10篇 |
专业分类
电工技术 | 105篇 |
综合类 | 9篇 |
化学工业 | 2115篇 |
金属工艺 | 78篇 |
机械仪表 | 169篇 |
建筑科学 | 258篇 |
矿业工程 | 10篇 |
能源动力 | 325篇 |
轻工业 | 1323篇 |
水利工程 | 38篇 |
石油天然气 | 42篇 |
无线电 | 517篇 |
一般工业技术 | 1126篇 |
冶金工业 | 180篇 |
原子能技术 | 61篇 |
自动化技术 | 1511篇 |
出版年
2024年 | 8篇 |
2023年 | 77篇 |
2022年 | 316篇 |
2021年 | 330篇 |
2020年 | 215篇 |
2019年 | 225篇 |
2018年 | 260篇 |
2017年 | 289篇 |
2016年 | 329篇 |
2015年 | 227篇 |
2014年 | 381篇 |
2013年 | 605篇 |
2012年 | 494篇 |
2011年 | 595篇 |
2010年 | 465篇 |
2009年 | 464篇 |
2008年 | 436篇 |
2007年 | 365篇 |
2006年 | 284篇 |
2005年 | 217篇 |
2004年 | 190篇 |
2003年 | 165篇 |
2002年 | 182篇 |
2001年 | 97篇 |
2000年 | 74篇 |
1999年 | 77篇 |
1998年 | 71篇 |
1997年 | 41篇 |
1996年 | 40篇 |
1995年 | 45篇 |
1994年 | 31篇 |
1993年 | 29篇 |
1992年 | 25篇 |
1991年 | 13篇 |
1990年 | 16篇 |
1989年 | 19篇 |
1988年 | 13篇 |
1987年 | 10篇 |
1986年 | 14篇 |
1985年 | 18篇 |
1984年 | 18篇 |
1983年 | 7篇 |
1982年 | 18篇 |
1981年 | 10篇 |
1980年 | 11篇 |
1979年 | 9篇 |
1978年 | 10篇 |
1977年 | 10篇 |
1975年 | 6篇 |
1973年 | 5篇 |
排序方式: 共有7867条查询结果,搜索用时 15 毫秒
151.
Juan M. Marín Pérez Jorge Bernal Bernabé Jose M. Alcaraz Calero Felix J. Garcia Clemente Gregorio Martínez Pérez Antonio F. Gómez Skarmeta 《Future Generation Computer Systems》2011,27(1):40-55
There are a few issues that still need to be covered regarding security in the Grid area. One of them is authorization where there exist good solutions to define, manage and enforce authorization policies in Grid scenarios. However, these solutions usually do not provide Grid administrators with semantic-aware components closer to the particular Grid domain and easing different administration tasks such as conflict detection or resolution. This paper defines a proposal based on Semantic Web to define, manage and enforce security policies in a Grid scenario. These policies are defined by means of semantic-aware rules which help the administrator to create higher-level definitions with more expressiveness. These rules also permit performing added-value tasks such as conflict detection and resolution, which can be of interest in medium and large scale scenarios where different administrators define the authorization rules that should be followed before accessing a resource in the Grid. The proposed solution has been also tested providing some reasonable response times in the authorization decision process. 相似文献
152.
Francisco Jes��s Mart��n-Mateos Jos�� Luis Ruiz-Reina Jos�� Antonio Alonso Mar��a Jos�� Hidalgo 《Journal of Automated Reasoning》2011,47(3):229-250
Higman??s lemma is an important result in infinitary combinatorics, which has been formalized in several theorem provers. In this paper we present a formalization and proof of Higman??s Lemma in the ACL2 theorem prover. Our formalization is based on a proof by Murthy and Russell, where the key termination argument is justified by the multiset relation induced by a well-founded relation. To our knowledge, this is the first mechanization of this proof. 相似文献
153.
Abstract: Many real‐world visual tracking applications have a high dimensionality, i.e. the system state is defined by a large number of variables. This kind of problem can be modelled as a dynamic optimization problem, which involves dynamic variables whose values change in time. Most applied research on optimization methods have focused on static optimization problems but these static methods often lack explicit adaptive methodologies. Heuristics are specific methods for solving problems in the absence of an algorithm for formal proof. Metaheuristics are approximate optimization methods which have been applied to more general problems with significant success. However, particle filters are Monte Carlo algorithms which solve the sequential estimation problem by approximating the theoretical distributions in the state space by simulated random measures called particles. However, particle filters lack efficient search strategies. In this paper, we propose a general framework to hybridize heuristics/metaheuristics with particle filters properly. The aim of this framework is to devise effective hybrid visual tracking algorithms naturally, guided by the use of abstraction techniques. Resulting algorithms exploit the benefits of both complementary approaches. As a particular example, a memetic algorithm particle filter is derived from the proposed hybridization framework. Finally, we show the performance of the memetic algorithm particle filter when it is applied to a multiple object tracking problem. 相似文献
154.
Angel Rivas Casado Rafael Martinez‐Tomás Antonio Fernández‐Caballero 《Expert Systems》2011,28(5):488-501
This work presents a multi‐agent system for knowledge‐based high‐level event composition, which interprets activities, behaviour and situations semantically in a scenario with multi‐sensory monitoring. A perception agent (plurisensory agent and visual agent)‐based structure is presented. The agents process the sensor information and identify (agent decision system) significant changes in the monitored signals, which they send as simple events to the composition agent that searches for and identifies pre‐defined patterns as higher‐level semantic composed events. The structure has a methodology and a set of tools that facilitate its development and application to different fields without having to start from scratch. This creates an environment to develop knowledge‐based systems generally for event composition. The application task of our work is surveillance, and event composition/inference examples are shown which characterize an alarming situation in the scene and resolve identification and tracking problems of people in the scenario being monitored. 相似文献
155.
The main contribution of this paper is a theorem to guarantee uniform global asymptotic stability (UGAS) and uniform local exponential stability (ULES) for a class of nonlinear non‐autonomous systems which includes passive systems. These properties (and a uniform local Lipschitz condition) guarantee robustness of stability while weaker properties, like uniform global stability plus global convergence, do not. Our main result is then used in the tracking control problem of mechanical systems and ships. We use an adaptive backstepping design and prove UGAS of the closed‐loop tracking error system, in particular, we obtain that both the tracking and parameter estimation errors converge uniformly globally to zero. Copyright © 2001 John Wiley & Sons, Ltd. 相似文献
156.
Pérez-Ortiz Juan Antonio Calera-Rubio Jorge Forcada Mikel L. 《Neural Processing Letters》2001,14(2):127-140
Arithmetic coding is one of the most outstanding techniques for lossless data compression. It attains its good performance with the help of a probability model which indicates at each step the probability of occurrence of each possible input symbol given the current context. The better this model, the greater the compression ratio achieved. This work analyses the use of discrete-time recurrent neural networks and their capability for predicting the next symbol in a sequence in order to implement that model. The focus of this study is on online prediction, a task much harder than the classical offline grammatical inference with neural networks. The results obtained show that recurrent neural networks have no problem when the sequences come from the output of a finite-state machine, easily giving high compression ratios. When compressing real texts, however, the dynamics of the sequences seem to be too complex to be learned online correctly by the net. 相似文献
157.
Antonio Liotta Daniel H. Tyrode-Goilo Adetola Oredope 《Journal of Network and Systems Management》2008,16(2):163-181
Virtual Private Networks (VPNs) are normally used for secured communications over the Internet. The VPNs have evolved significantly
over the years, leading to a range of open-source and proprietary solutions. In Converged, all-IP networks terminal mobility
introduces, however, new challenges that have so far been addressed only partially and via proprietary solutions. In this
article we assess the level of maturity, the viability and performance achieved in mobile VPNs, based merely on open-source
software. Our prototype MVPN is obtained by integrating IPv6, Mobile IPv6 and IPsec, i.e., the protocols that 3GPP envisions
for all-IP, mobile and fixed networks. We perform a series of tests on a multi-access wireless network (WLAN, GPRS and UMTS),
aimed at identifying the issues arising when mobility management (vertical and horizontal handover) is combined with different
levels of network security. Tests led to the discovery of various results such as the flushing of routing tables in MIPv6
during handover. Our performance analysis is complemented with lessons learnt and recommendations.
相似文献
Antonio LiottaEmail: |
158.
Félix Bou Francesco Paoli Antonio Ledda Hector Freytes 《Soft Computing - A Fusion of Foundations, Methodologies and Applications》2008,12(4):341-352
The present paper is a sequel to Paoli F, Ledda A, Giuntini R, Freytes H (On some properties of QMV algebras and QMV algebras, submitted). We provide two representation results for quasi-MV algebras in terms of MV algebras enriched with
additional structure; we investigate the lattices of subvarieties and subquasivarieties of quasi-MV algebras; we show that
quasi-MV algebras, as well as cartesian and flat quasi-MV algebras, have the amalgamation property. 相似文献
159.
Johan Montagnat Ákos Frohner Daniel Jouvenot Christophe Pera Peter Kunszt Birger Koblitz Nuno Santos Charles Loomis Romain Texier Diane Lingrand Patrick Guio Ricardo Brito Da Rocha Antonio Sobreira de Almeida Zoltán Farkas 《Journal of Grid Computing》2008,6(1):45-59
The medical community is producing and manipulating a tremendous volume of digital data for which computerized archiving,
processing and analysis is needed. Grid infrastructures are promising for dealing with challenges arising in computerized
medicine but the manipulation of medical data on such infrastructures faces both the problem of interconnecting medical information
systems to Grid middlewares and of preserving patients’ privacy in a wide and distributed multi-user system. These constraints
are often limiting the use of Grids for manipulating sensitive medical data. This paper describes our design of a medical
data management system taking advantage of the advanced gLite data management services, developed in the context of the EGEE
project, to fulfill the stringent needs of the medical community. It ensures medical data protection through strict data access
control, anonymization and encryption. The multi-level access control provides the flexibility needed for implementing complex
medical use-cases. Data anonymization prevents the exposure of most sensitive data to unauthorized users, and data encryption
guarantees data protection even when it is stored at remote sites. Moreover, the developed prototype provides a Grid storage
resource manager (SRM) interface to standard medical DICOM servers thereby enabling transparent access to medical data without
interfering with medical practice. 相似文献
160.
An important area of Human Reliability Assessment in interactive systems is the ability to understand the causes of human
error and to model their occurrence. This paper investigates a new approach to analysis of task failures based on patterns
of operator behaviour, in contrast with more traditional event-based approaches. It considers, as a case study, a formal model
of an Air Traffic Control system operator’s task which incorporates a simple model of the high-level cognitive processes involved.
The cognitive model is formalised in the CSP process algebra. Various patterns of behaviour that could lead to task failure
are described using temporal logic. Then a model-checking technique is used to verify whether the set of selected behavioural
patterns is sound and complete with respect to the definition of task failure. The decomposition is shown to be incomplete
and a new behavioural pattern is identified, which appears to have been overlooked in the informal analysis of the problem.
This illustrates how formal analysis of operator models can yield fresh insights into how failures may arise in interactive
systems.
相似文献
Antonio Cerone (Corresponding author)Email: |
Simon ConnellyEmail: |
Peter LindsayEmail: |