首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   4657篇
  免费   300篇
  国内免费   4篇
电工技术   77篇
综合类   4篇
化学工业   1396篇
金属工艺   57篇
机械仪表   122篇
建筑科学   149篇
矿业工程   6篇
能源动力   140篇
轻工业   784篇
水利工程   39篇
石油天然气   9篇
无线电   380篇
一般工业技术   667篇
冶金工业   270篇
原子能技术   25篇
自动化技术   836篇
  2023年   53篇
  2022年   226篇
  2021年   241篇
  2020年   131篇
  2019年   115篇
  2018年   167篇
  2017年   147篇
  2016年   204篇
  2015年   144篇
  2014年   189篇
  2013年   329篇
  2012年   283篇
  2011年   332篇
  2010年   241篇
  2009年   265篇
  2008年   221篇
  2007年   212篇
  2006年   183篇
  2005年   132篇
  2004年   100篇
  2003年   117篇
  2002年   109篇
  2001年   68篇
  2000年   58篇
  1999年   51篇
  1998年   95篇
  1997年   78篇
  1996年   57篇
  1995年   44篇
  1994年   43篇
  1993年   33篇
  1992年   25篇
  1991年   15篇
  1990年   34篇
  1989年   22篇
  1988年   17篇
  1987年   11篇
  1986年   12篇
  1985年   14篇
  1984年   12篇
  1983年   15篇
  1982年   14篇
  1981年   16篇
  1980年   20篇
  1979年   7篇
  1978年   9篇
  1977年   7篇
  1976年   6篇
  1973年   6篇
  1966年   5篇
排序方式: 共有4961条查询结果,搜索用时 15 毫秒
81.
This paper presents the Clearing Fund Protocol, a three layered protocol designed to schedule soft real-time sets of precedence related tasks with shared resources. These sets are processed in an open dynamic environment. Open because new applications may enter the system at any time and dynamic because the schedulability is tested on-line as tasks request admission. Top-down, the three layers are the Clearing Fund, the Bandwidth Inheritance and two versions of the Constant Bandwidth Server algorithms. Bandwidth Inheritance applies a priority inheritance mechanism to the Constant Bandwidth Server. However, a serious drawback is its unfairness. In fact, a task executing in a server can potentially steal the bandwidth of another server without paying any penalty. The main idea of the Clearing Fund Algorithm is to keep track of processor-time debts contracted by lower priority tasks that block higher priority ones and are executed in the higher priority servers by having inherited the higher priority. The proposed algorithm reduces the undesirable effects of those priority inversions because the blocked task can finish its execution in its own server or in the server of the blocking task, whichever has the nearest deadline. If demanded, debts are paid back in that way. Inheritors are therefore debtors. Moreover, at certain instants in time, all existing debts may be waived and the servers are reset making a clear restart of the system. The Clearing Fund Protocol showed definite better performances when evaluated by simulations against Bandwidth Inheritance, the protocol it tries to improve.  相似文献   
82.
Boosting text segmentation via progressive classification   总被引:5,自引:4,他引:1  
A novel approach for reconciling tuples stored as free text into an existing attribute schema is proposed. The basic idea is to subject the available text to progressive classification, i.e., a multi-stage classification scheme where, at each intermediate stage, a classifier is learnt that analyzes the textual fragments not reconciled at the end of the previous steps. Classification is accomplished by an ad hoc exploitation of traditional association mining algorithms, and is supported by a data transformation scheme which takes advantage of domain-specific dictionaries/ontologies. A key feature is the capability of progressively enriching the available ontology with the results of the previous stages of classification, thus significantly improving the overall classification accuracy. An extensive experimental evaluation shows the effectiveness of our approach.  相似文献   
83.
Real-time global illumination in VR systems enhances scene realism by incorporating soft shadows, reflections of objects in the scene, and color bleeding. The Virtual Light Field (VLF) method enables real-time global illumination rendering in VR. The VLF has been integrated with the Extreme VR system for real-time GPU-based rendering in a Cave Automatic Virtual Environment.  相似文献   
84.
Traditionally, direct marketing companies have relied on pre-testing to select the best offers to send to their audience. Companies systematically dispatch the offers under consideration to a limited sample of potential buyers, rank them with respect to their performance and, based on this ranking, decide which offers to send to the wider population. Though this pre-testing process is simple and widely used, recently the industry has been under increased pressure to further optimize learning, in particular when facing severe time and learning space constraints. The main contribution of the present work is to demonstrate that direct marketing firms can exploit the information on visual content to optimize the learning phase. This paper proposes a two-phase learning strategy based on a cascade of regression methods that takes advantage of the visual and text features to improve and accelerate the learning process. Experiments in the domain of a commercial Multimedia Messaging Service (MMS) show the effectiveness of the proposed methods and a significant improvement over traditional learning techniques. The proposed approach can be used in any multimedia direct marketing domain in which offers comprise both a visual and text component.
Giuseppe TribulatoEmail:

Sebastiano Battiato   was born in Catania, Italy, in 1972. He received the degree in Computer Science (summa cum laude) in 1995 and his Ph.D in Computer Science and Applied Mathematics in 1999. From 1999 to 2003 he has lead the “Imaging” team c/o STMicroelectronics in Catania. Since 2004 he works as a Researcher at Department of Mathematics and Computer Science of the University of Catania. His research interests include image enhancement and processing, image coding and camera imaging technology. He published more than 90 papers in international journals, conference proceedings and book chapters. He is co-inventor of about 15 international patents. He is reviewer for several international journals and he has been regularly a member of numerous international conference committees. He has participated in many international and national research projects. He is an Associate Editor of the SPIE Journal of Electronic Imaging (Specialty: digital photography and image compression). He is director of ICVSS (International Computer Vision Summer School). He is a Senior Member of the IEEE. Giovanni Maria Farinella   is currently contract researcher at Dipartimento di Matematica e Informatica, University of Catania, Italy (IPLAB research group). He is also associate member of the Computer Vision and Robotics Research Group at University of Cambridge since 2006. His research interests lie in the fields of computer vision, pattern recognition and machine learning. In 2004 he received his degree in Computer Science (egregia cum laude) from University of Catania. He was awarded a Ph.D. (Computer Vision) from the University of Catania in 2008. He has co-authored several papers in international journals and conferences proceedings. He also serves as reviewer numerous international journals and conferences. He is currently the co-director of the International Summer School on Computer Vision (ICVSS). Giovanni Giuffrida   is an assistant professor at University of Catania, Italy. He received a degree in Computer Science from the University of Pisa, Italy in 1988 (summa cum laude), a Master of Science in Computer Science from the University of Houston, Texas, in 1992, and a Ph.D. in Computer Science, from the University of California in Los Angeles (UCLA) in 2001. He has an extensive experience in both the industrial and academic world. He served as CTO and CEO in the industry and served as consultant for various organizations. His research interest is on optimizing content delivery on new media such as Internet, mobile phones, and digital tv. He published several papers on data mining and its applications. He is a member of ACM and IEEE. Catarina Sismeiro   is a senior lecturer at Imperial College Business School, Imperial College London. She received her Ph.D. in Marketing from the University of California, Los Angeles, and her Licenciatura in Management from the University of Porto, Portugal. Before joining Imperial College Catarina had been and assistant professor at Marshall School of Business, University of Southern California. Her primary research interests include studying pharmaceutical markets, modeling consumer behavior in interactive environments, and modeling spatial dependencies. Other areas of interest are decision theory, econometric methods, and the use of image and text features to predict the effectiveness of marketing communications tools. Catarina’s work has appeared in innumerous marketing and management science conferences. Her research has also been published in the Journal of Marketing Research, Management Science, Marketing Letters, Journal of Interactive Marketing, and International Journal of Research in Marketing. She received the 2003 Paul Green Award and was the finalist of the 2007 and 2008 O’Dell Awards. Catarina was also a 2007 Marketing Science Institute Young Scholar, and she received the D. Antonia Adelaide Ferreira award and the ADMES/MARKTEST award for scientific excellence. Catarina is currently on the editorial boards of the Marketing Science journal and the International Journal of Research in Marketing. Giuseppe Tribulato   was born in Messina, Italy, in 1979. He received the degree in Computer Science (summa cum laude) in 2004 and his Ph.D in Computer Science in 2008. From 2005 he has lead the research team at Neodata Group. His research interests include data mining techniques, recommendation systems and customer targeting.   相似文献   
85.
This paper presents semantic models, mechanisms and a service to locate mobile entities in Smart and Intelligent Environments. The key feature of the service is the semantic integration of different positioning systems that not only enables the environment to handle transparently such physical positioning systems, but also to reason on location information coming from different systems and to combine it to obtain higher context information. Indeed, the service relies on the use of ontologies and rules to define a uniform, unambiguous and well-defined model for the location information, independently of the particular positioning system. Moreover, the location service performs logic and reasoning mechanisms to provide both physical and semantic locations of mobile objects and to infer the finest granularity in the case when a mobile object is located by more than one positioning system. Finally, we present an application of the proposed approach to the case of a Smart Hospital.  相似文献   
86.
This paper describes the development of a system for measuring surface coordinates (commonly known as "shape measurements") which is able to give the temporal evolution of the position of the tire sidewall in transient conditions (such as during braking, when there are potholes or when the road surface is uneven) which may or may not be reproducible. The system is based on the well-known technique of projecting and observing structured light using a digital camera with an optical axis which is slanted with respect to the axis of the projector. The transient nature of the phenomenon has led to the development of specific innovative solutions as regards image processing algorithms. This paper briefly describes the components which make up the measuring system and presents the results of the measurements carried out on the drum bench. It then analyses the performance of the measuring system and the sources of uncertainty which led to the development of the system for a specific dynamic application: impact with an obstacle (cleat test). The measuring system guaranteed a measurement uncertainty of 0.28 mm along the Z axis (the axial direction of the tire) with a measurement range of 250(X) x 80(Y) x 25(Z) mm(3), with the tire rolling at a speed of up to 30 km/h.  相似文献   
87.
Counterexamples are given which show that a linear switched system (with controlled switching) that can be stabilized by means of a suitable switching law does not necessarily admit a convex Lyapunov function. Both continuous- and discrete-time cases are considered. This fact contributes in focusing the difficulties encountered so far in the theory of stabilization of switched system. In particular the result is in contrast with the case of uncontrolled switching in which it is known that if a system is stable under arbitrary switching then admits a polyhedral norm as a Lyapunov function.  相似文献   
88.

Due to the increase and complexity of computer systems, reducing the overhead of fault tolerance techniques has become important in recent years. One technique in fault tolerance is checkpointing, which saves a snapshot with the information that has been computed up to a specific moment, suspending the execution of the application, consuming I/O resources and network bandwidth. Characterizing the files that are generated when performing the checkpoint of a parallel application is useful to determine the resources consumed and their impact on the I/O system. It is also important to characterize the application that performs checkpoints, and one of these characteristics is whether the application does I/O. In this paper, we present a model of checkpoint behavior for parallel applications that performs I/O; this depends on the application and on other factors such as the number of processes, the mapping of processes and the type of I/O used. These characteristics will also influence scalability, the resources consumed and their impact on the IO system. Our model describes the behavior of the checkpoint size based on the characteristics of the system and the type (or model) of I/O used, such as the number I/O aggregator processes, the buffering size utilized by the two-phase I/O optimization technique and components of collective file I/O operations. The BT benchmark and FLASH I/O are analyzed under different configurations of aggregator processes and buffer size to explain our approach. The model can be useful when selecting what type of checkpoint configuration is more appropriate according to the applications’ characteristics and resources available. Thus, the user will be able to know how much storage space the checkpoint consumes and how much the application consumes, in order to establish policies that help improve the distribution of resources.

  相似文献   
89.
In order to consider the response of concrete columns confined by FRP and FRCM system, proper models have to be formulated. In this context the present paper shows a generalized criterion for the determination of the increase in strength, in ductility and in dissipated energy for varying corner radius ratio of the cross section and fiber volumetric ratio. The procedure is based on the best fitting of several experimental data and unlike the usual empirical approaches available in the literature, the proposed technique relates the confinement effectiveness to a single parameter representative of the relative stiffness between the original concrete core and the reinforcement system. Furthermore, the proposed analytical models overcomes the limit of many empirical or semi-empirical models given in the literature that are applicable only to specific cases. A comparison with same available models confirm the reliability of the proposed procedure.  相似文献   
90.
When dissolved in ethyl oleate secondary ozonide, both C60 and C70 fullerenes undergo a series of epoxidation reactions. The pseudofirst-order kinetic rate constants of this process were determined spectrophotometrically at various temperatures and the activation energy for C60 epoxidation through ethyl oleate ozonide was found at 25.9 kcal/mol. Furthermore, C60 was found more reactive than C70 with the ozonide. The kinetics rate constants of C60 epoxidation with ethyl oleate ozonide were compared with the C60 photo-oxidation and auto-oxidation determined in pure ethyl oleate. The epoxidation of fullerenes starts from the homolysis of the peroxide group of the 1,2,4-trioxolane ring of ethyl oleate secondary ozonide. Thus, it is suggested that fullerenes have a potential as decomposition agents of secondary ozonides in some technological applications.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号