首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1289篇
  免费   86篇
  国内免费   1篇
电工技术   6篇
综合类   2篇
化学工业   281篇
金属工艺   25篇
机械仪表   33篇
建筑科学   50篇
矿业工程   5篇
能源动力   64篇
轻工业   104篇
水利工程   10篇
石油天然气   3篇
无线电   140篇
一般工业技术   270篇
冶金工业   102篇
原子能技术   11篇
自动化技术   270篇
  2023年   21篇
  2022年   34篇
  2021年   53篇
  2020年   45篇
  2019年   34篇
  2018年   48篇
  2017年   51篇
  2016年   57篇
  2015年   47篇
  2014年   73篇
  2013年   81篇
  2012年   99篇
  2011年   123篇
  2010年   75篇
  2009年   65篇
  2008年   70篇
  2007年   67篇
  2006年   47篇
  2005年   38篇
  2004年   28篇
  2003年   28篇
  2002年   18篇
  2001年   16篇
  2000年   18篇
  1999年   16篇
  1998年   33篇
  1997年   14篇
  1996年   13篇
  1995年   7篇
  1994年   4篇
  1993年   5篇
  1992年   4篇
  1991年   4篇
  1990年   1篇
  1989年   4篇
  1988年   4篇
  1987年   3篇
  1986年   6篇
  1983年   2篇
  1982年   1篇
  1981年   1篇
  1980年   1篇
  1979年   1篇
  1978年   1篇
  1977年   7篇
  1976年   2篇
  1975年   1篇
  1974年   1篇
  1973年   2篇
  1972年   1篇
排序方式: 共有1376条查询结果,搜索用时 15 毫秒
101.
Malicious software and other attacks are a major concern in the computing ecosystem and there is a need to go beyond the answers based on untrusted software. Trusted and secure computing can add a new hardware dimension to software protection. Several secure computing hardware architectures using memory encryption and memory integrity checkers have been proposed during the past few years to provide applications with a tamper resistant environment. Some solutions, such as HIDE, have also been proposed to solve the problem of information leakage on the address bus. We propose the CRYPTOPAGE architecture which implements memory encryption, memory integrity protection checking and information leakage protection together with a low performance penalty (3% slowdown on average) by combining the Counter Mode of operation, local authentication values and MERKLE trees. It has also several other security features such as attestation, secure storage for applications and program identification. We present some applications of the CRYPTOPAGE architecture in the computer virology field as a proof of concept of improving security in presence of viruses compared to software only solutions.  相似文献   
102.
Robust full Bayesian learning for radial basis networks   总被引:1,自引:0,他引:1  
  相似文献   
103.
We address the problem of verifying planning domains as used in model-based planning, for example in space missions. We propose a methodology for testing flight rules of planning domains which is self-contained, in the sense that flight rules are verified using a planner and no external tools are required. We review and analyse coverage conditions for requirements-based testing, and we reason in detail on "Unique First Cause" (UFC) coverage for test suites. We characterise flight rules using patterns, encoded using LTL, and we provide UFC coverage for them. We then present a translation of LTL formulae into planning goals, and illustrate our approach on a case study.  相似文献   
104.
105.
106.
Making virtual modeling as easy and intuitive as real-clay manipulation is still an unsolved problem. This paper takes a step in this direction: in addition to offering standard features such as addition and removal of material, it uses a new real-time plasticity model to let the user apply local and global deformations such as those made in real clay by pressing with a finger or bending a sculpture with one hand. Although not completely physically accurate, the model exhibits several important features of real clay, namely plasticity, mass conservation, and surface tension effects. These features make the model intuitive, since the user obtains the shapes he expects, as demonstrated by our results.  相似文献   
107.
Mixture models are ubiquitous in applied science. In many real-world applications, the number of mixture components needs to be estimated from the data. A popular approach consists of using information criteria to perform model selection. Another approach which has become very popular over the past few years consists of using Dirichlet processes mixture (DPM) models. Both approaches are computationally intensive. The use of information criteria requires computing the maximum likelihood parameter estimates for each candidate model whereas DPM are usually trained using Markov chain Monte Carlo (MCMC) or variational Bayes (VB) methods. We propose here original batch and recursive expectation-maximization algorithms to estimate the parameters of DPM. The performance of our algorithms is demonstrated on several applications including image segmentation and image classification tasks. Our algorithms are computationally much more efficient than MCMC and VB and outperform VB on an example.  相似文献   
108.
We show that observed co-variations at sub-hourly time scales between the photochemical reflectance index (PRI) and canopy light use efficiency (LUE) over a Douglas-fir forest result directly from sub-hourly leaf reflectance changes in a 531 nm spectral window roughly 50 nm wide. We conclude then, that over a forest stand we are observing the direct effects of photosynthetic down-regulation on leaf-level reflectance at 531 nm. Key to our conclusion is our ability to simultaneously measure the LUE and reflectance of the Douglas-fir stand as a function of shadow fraction from the “hot spot” to the "dark spot"dark spot” and a new finding herein, based on radiative transfer theory, that the magnitude of a normalized reflectance difference index (NDRI) such as PRI can vary with shadow fraction only in case the reflectance of the shaded and sunlit leaves differ in at least one of the NDRI bands.Our spectrometer measurements over a nearly 6 month period show that at a forest stand scale, only two NDRIs (both containing a band near 570 nm) vary with shadow fraction and are correlated with LUE; an NDRI with a band centered at 531 nm roughly 50 nm wide, and another near 705 nm. Therefore, we are able to conclude that only these two bands' reflectance differ between the sunlit and the shaded elements of the canopy. Their reflectance changes on time scales of a few minutes or less. Our observations also show that the reflectance changes at 531 nm are more highly correlated with variations in canopy light use efficiency when only sunlit canopy elements are viewed (the hot spot), than when only shaded elements (the dark spot) are viewed. Taken together then, these results demonstrate that the observed sub-hourly changes in foliage reflectance at 531 nm and 705 nm can only result from corresponding variations in photosynthetic rates.The importance of our results are as follows: (1) We show that variations in PRI with LUE are a direct result of rapid changes in foliage reflectance at 531 nm resulting from photosynthetic down-regulation, and can be observed at forest scales. (2) Our findings also suggest a new sensor and methodology for the direct retrieval from space of changes in forest LUE by measuring PRI as a function of shadow fraction using a multi-angle spectrometer simultaneously retrieving both shadow fraction and PRI.  相似文献   
109.
The idea of decomposed software pipelining is to decouple the software pipelining problem into a cyclic scheduling problem without resource constraints and an acyclic scheduling problem with resource constraints. In terms of loop transformation and code motion, the technique can be formulated as a combination of loop shifting and loop compaction. Loop shifting amounts to moving statements between iterations thereby changing some loop independent dependences into loop carried dependences and vice versa. Then, loop compaction schedules the body of the loop considering only loop independent dependences, but taking into account the details of the target architecture. In this paper, we show how loop shifting can be optimized so as to minimize both the length of the critical path and the number of dependences for loop compaction. The first problem is well-known and can be solved by an algorithm due to Leiserson and Saxe. We show that the second optimization (and the combination with the first one) is also polynomially solvable with a fast graph algorithm, variant of minimum-cost flow algorithms. Finally, we analyze the improvements obtained on loop compaction by experiments on random graphs.  相似文献   
110.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号