全文获取类型
收费全文 | 3622篇 |
免费 | 203篇 |
国内免费 | 7篇 |
专业分类
电工技术 | 38篇 |
综合类 | 5篇 |
化学工业 | 921篇 |
金属工艺 | 66篇 |
机械仪表 | 117篇 |
建筑科学 | 178篇 |
矿业工程 | 15篇 |
能源动力 | 137篇 |
轻工业 | 687篇 |
水利工程 | 31篇 |
石油天然气 | 17篇 |
无线电 | 202篇 |
一般工业技术 | 521篇 |
冶金工业 | 182篇 |
原子能技术 | 27篇 |
自动化技术 | 688篇 |
出版年
2024年 | 7篇 |
2023年 | 39篇 |
2022年 | 112篇 |
2021年 | 145篇 |
2020年 | 116篇 |
2019年 | 130篇 |
2018年 | 158篇 |
2017年 | 136篇 |
2016年 | 167篇 |
2015年 | 137篇 |
2014年 | 177篇 |
2013年 | 287篇 |
2012年 | 241篇 |
2011年 | 285篇 |
2010年 | 197篇 |
2009年 | 205篇 |
2008年 | 168篇 |
2007年 | 153篇 |
2006年 | 133篇 |
2005年 | 119篇 |
2004年 | 105篇 |
2003年 | 82篇 |
2002年 | 73篇 |
2001年 | 44篇 |
2000年 | 42篇 |
1999年 | 31篇 |
1998年 | 51篇 |
1997年 | 32篇 |
1996年 | 35篇 |
1995年 | 36篇 |
1994年 | 17篇 |
1993年 | 18篇 |
1992年 | 16篇 |
1991年 | 14篇 |
1990年 | 10篇 |
1989年 | 13篇 |
1988年 | 7篇 |
1987年 | 8篇 |
1986年 | 10篇 |
1985年 | 12篇 |
1984年 | 6篇 |
1983年 | 8篇 |
1982年 | 11篇 |
1981年 | 8篇 |
1980年 | 5篇 |
1979年 | 3篇 |
1977年 | 7篇 |
1976年 | 6篇 |
1975年 | 4篇 |
1974年 | 2篇 |
排序方式: 共有3832条查询结果,搜索用时 0 毫秒
41.
Dan Lin Prathima Rao Elisa Bertino Ninghui Li Jorge Lobo 《International Journal of Information Security》2010,9(4):253-273
Policy integration and inter-operation is often a crucial requirement when parties with different access control policies
need to participate in collaborative applications and coalitions. Such requirement is even more difficult to address for dynamic
large-scale collaborations, in which the number of access control policies to analyze and compare can be quite large. An important
step in policy integration and inter-operation is to analyze the similarity of policies. Policy similarity can sometimes also
be a pre-condition for establishing a collaboration, in that a party may enter a collaboration with another party only if
the policies enforced by the other party match or are very close to its own policies. Existing approaches to the problem of
analyzing and comparing access control policies are very limited, in that they only deal with some special cases. By recognizing
that a suitable approach to the policy analysis and comparison requires combining different approaches, we propose in this
paper a comprehensive environment—EXAM. The environment supports various types of analysis query, which we categorize in the
paper. A key component of such environment, on which we focus in the paper, is the policy analyzer able to perform several
types of analysis. Specifically, our policy analyzer combines the advantages of existing MTBDD-based and SAT-solver-based
techniques. Our experimental results, also reported in the paper, demonstrate the efficiency of our analyzer. 相似文献
42.
Bruno R. de Araújo Tiago Guerreiro Manuel J. Fonseca Joaquim A. Jorge João M. Pereira Monica Bordegoni Francesco Ferrise Mario Covarrubias Michele Antolini 《Journal of Real-Time Image Processing》2010,5(2):73-90
Currently, the design of aesthetic products is a process that requires a set of activities where digital models and physical
mockups play a key role. Typically, these are modified (and built) several times before reaching the desired design, increasing
the development time and, consequently, the final product cost. In this paper, we present an innovative design environment
for computer-aided design (CAD) surface analysis. Our system relies on a direct visuo-haptic display system, which enables
users to visualize models using a stereoscopic view, and allows the evaluation of sectional curves using touch. Profile curves
are rendered using an haptic device that deforms a plastic strip, thanks to a set of actuators, to reproduce the curvature
of the shape co-located with the virtual model. By touching the strip, users are able to evaluate shape characteristics, such
as curvature or discontinuities (rendered using sound), and to assess the surface quality. We believe that future computer-aided
systems (CAS)/CAD systems based on our approach will contribute in improving the design process at industrial level. Moreover,
these will allow companies to reduce the product development time by reducing the number of physical mockups necessary for
the product design evaluation and by increasing the quality of the final product, allowing a wider exploration and comparative
evaluation of alternatives in the given time. 相似文献
43.
Jorge Cortés Author vitae 《Automatica》2009,45(12):2754-2762
This paper proposes a simple, distributed algorithm that achieves global stabilization of formations for relative sensing networks in arbitrary dimensions with fixed topology. Assuming the network runs an initialization procedure to equally orient all agent reference frames, convergence to the desired formation shape is guaranteed even in partially asynchronous settings. We characterize the algorithm robustness against several sources of errors: link failures, measurement errors, and frame initialization errors. The technical approach combines algebraic graph theory, multidimensional scaling, and distributed linear iterations. 相似文献
44.
Jorge Navarro-Ortiz Pablo Ameigeiras Juan J. Ramos-Munoz Juan M. Lopez-Soler 《Computer Communications》2009,32(11):1281-1297
In this paper we present a solution for the IEEE 802.11e HCCA (Hybrid coordination function Controlled Channel Access) mechanism which aims both at supporting strict real-time traffic requirements and, simultaneously, at handling TCP applications efficiently. Our proposal combines a packet scheduler and a dynamic resource allocation algorithm. The scheduling discipline is based on the Monolithic Shaper-Scheduler, which is a modification of a General Processor Sharing (GPS) related scheduler. It supports minimum-bandwidth and delay guarantees and, at the same time, it achieves the optimal latency of all the GPS-related schedulers. In addition, our innovative resource allocation procedure, called the territory method, aims at prioritizing real time services and at improving the performance of TCP applications. For this purpose, it splits the wireless channel capacity (in terms of transmission opportunities) into different territories for the different types of traffic, taking into account the end-to-end network dynamics. In order to give support to the desired applications, we consider the following traffic classes: conversational, streaming, interactive and best-effort. The so called territories shrink or expand depending on the current quality experienced by the corresponding traffic class. We evaluated the performance of our solution through extensive simulations in a heterogeneous wired-cum-wireless scenario under different traffic conditions. Additionally, we compare our proposal to other HCCA scheduling algorithms, the HCCA reference scheduler and Fair Hybrid Coordination Function (FHCF). The results show that the combination of the MSS and the territory method obtains higher system capacity for VoIP traffic (up to 32 users) in the simulated scenario, compared to FHCF and the HCCA reference scheduler (13 users). In addition, the MSS with the territory method also improves the throughput of TCP sources (one FTP application achieves between 6.1 Mbps without VoIP traffic and 2.1 Mbps with 20 VoIP users) compared to the reference scheduler (at most 388 kbps) and FHCF (with a maximum FTP throughput of 4.8 Mbps). 相似文献
45.
Using new scheduling heuristics based on resource consumption information for increasing throughput on rule‐based spam filtering systems 下载免费PDF全文
David Ruano‐Ordás Jorge Fdez‐Glez Florentino Fdez‐Riverola José Ramón Méndez 《Software》2016,46(8):1035-1051
The large increase of spam deliveries since the first half of 2013 entailed hard to solve troubles in spam filters. In order to adequately fight spam, the throughput of spam filtering platforms should be necessarily increased. In this context, and taking into consideration the widespread utilization of rule‐based filtering frameworks in the spam filtering domain, this work proposes three novel scheduling strategies for optimizing the time needed to classify new incoming e‐mails through an intelligent management of computational resources depending on the Central Processing Unit (CPU) usage and Input/Output (I/O) delays. In order to demonstrate the suitability of our approaches, we include in our experiments a comparative study in contrast to other successful heuristics previously published in the scientific literature. Results achieved demonstrated that one of our alternative heuristics allows time savings of up to 10% in message filtering, while keeping the same classification accuracy. Copyright © 2015 John Wiley & Sons, Ltd. 相似文献
46.
47.
Carlos?Alberto?Martínez-Angeles Haicheng?Wu Inês?DutraEmail author Vítor?Santos?Costa Jorge?Buenabad-Chávez 《International journal of parallel programming》2016,44(3):663-685
Relational learning algorithms mine complex databases for interesting patterns. Usually, the search space of patterns grows very quickly with the increase in data size, making it impractical to solve important problems. In this work we present the design of a relational learning system, that takes advantage of graphics processing units (GPUs) to perform the most time consuming function of the learner, rule coverage. To evaluate performance, we use four applications: a widely used relational learning benchmark for predicting carcinogenesis in rodents, an application in chemo-informatics, an application in opinion mining, and an application in mining health record data. We compare results using a single and multiple CPUs in a multicore host and using the GPU version. Results show that the GPU version of the learner is up to eight times faster than the best CPU version. 相似文献
48.
Ilaria Castellani Mariangiola Dezani-Ciancaglini Jorge A. Pérez 《Formal Aspects of Computing》2016,28(4):669-696
We present a comprehensive model of structured communications in which self-adaptation and security concerns are jointly addressed. More specifically, we propose a model of multiparty, self-adaptive communications with access control and secure information flow guarantees. In our model, multiparty protocols (choreographies) are described as global types; security violations occur when process implementations of protocol participants attempt to read or write messages of inappropriate security levels within directed exchanges. Such violations trigger adaptation mechanisms that prevent the violations to occur and/or to propagate their effect in the choreography. Our model is equipped with local and global adaptation mechanisms for reacting to security violations of different gravity; type soundness results ensure that the overall multiparty protocol is still correctly executed while the system adapts itself to preserve the participants’ security. 相似文献
49.
50.
Jorge Lopez-Moreno Jorge JimenezSunil Hadap Ken AnjyoErik Reinhard Diego Gutierrez 《Computers & Graphics》2011,35(1):99-111
Recent works in image editing are opening up new possibilities to manipulate and enhance input images. Within this context, we leverage well-known characteristics of human perception along with a simple depth approximation algorithm to generate non-photorealistic renditions that would be difficult to achieve with existing methods. Once a perceptually plausible depth map is obtained from the input image, we show how simple algorithms yield powerful new depictions of such an image. Additionally, we show how artistic manipulation of depth maps can be used to create novel non-photorealistic versions, for which we provide the user with an intuitive interface. Our real-time implementation on graphics hardware allows the user to efficiently explore artistic possibilities for each image. We show results produced with six different styles proving the versatility of our approach, and validate our assumptions and simplifications by means of a user study. 相似文献