首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1590篇
  免费   73篇
  国内免费   2篇
电工技术   22篇
综合类   1篇
化学工业   347篇
金属工艺   31篇
机械仪表   45篇
建筑科学   25篇
矿业工程   6篇
能源动力   119篇
轻工业   144篇
水利工程   46篇
石油天然气   1篇
无线电   158篇
一般工业技术   264篇
冶金工业   104篇
原子能技术   10篇
自动化技术   342篇
  2024年   4篇
  2023年   37篇
  2022年   59篇
  2021年   59篇
  2020年   40篇
  2019年   59篇
  2018年   75篇
  2017年   56篇
  2016年   66篇
  2015年   48篇
  2014年   70篇
  2013年   129篇
  2012年   65篇
  2011年   102篇
  2010年   72篇
  2009年   86篇
  2008年   62篇
  2007年   71篇
  2006年   48篇
  2005年   47篇
  2004年   32篇
  2003年   37篇
  2002年   28篇
  2001年   19篇
  2000年   18篇
  1999年   14篇
  1998年   32篇
  1997年   31篇
  1996年   20篇
  1995年   21篇
  1994年   11篇
  1993年   10篇
  1992年   16篇
  1991年   12篇
  1990年   13篇
  1989年   11篇
  1988年   13篇
  1987年   7篇
  1986年   6篇
  1985年   7篇
  1984年   6篇
  1983年   6篇
  1982年   9篇
  1981年   4篇
  1980年   5篇
  1979年   6篇
  1977年   5篇
  1976年   4篇
  1972年   3篇
  1969年   1篇
排序方式: 共有1665条查询结果,搜索用时 31 毫秒
51.
Dynamic slicing is a promising trace based technique that helps programmers in the process of debugging. In order to debug a failed run, dynamic slicing requires the dynamic dependence graph (DDG) information for that particular run. The two major challenges involved in utilizing dynamic slicing as a debugging technique are the efficient computation of the DDG and the efficient computation of the dynamic slice, given the DDG. In this paper, we present an efficient debugger, which first computes the DDG efficiently while the program is executing; dynamic slicing is later performed efficiently on the computed DDG, on demand. To minimize program slowdown during the online computation of DDG, we make the design decision of not outputting the computed dependencies to a file, instead, storing them in memory in a specially allocated fixed size circular buffer. The size of the buffer limits the length of the execution history that can be stored. To maximize the execution history that can be maintained, we introduce optimizations to eliminate the storage of most of the generated dependencies, at the same time ensuring that those that are stored are sufficient to capture the bug. Experiments conducted on CPU‐intensive programs show that our optimizations are able to reduce the trace rate from 16 to 0.8 bytes per executed instruction. This enables us to store the dependence trace history for a window of 20 million executed instructions in a 16‐MB buffer. Our debugger is also very efficient, yielding slicing times of around a second, and only slowing down the execution of the program by a factor of 19 during the online tracing step. Using recently proposed architectural support for monitoring, we are also able to handle multithreaded programs running on multicore processors. Copyright © 2011 John Wiley & Sons, Ltd.  相似文献   
52.
In this paper, we explore a novel idea of using high dynamic range (HDR) technology for uncertainty visualization. We focus on scalar volumetric data sets where every data point is associated with scalar uncertainty. We design a transfer function that maps each data point to a color in HDR space. The luminance component of the color is exploited to capture uncertainty. We modify existing tone mapping techniques and suitably integrate them with volume ray casting to obtain a low dynamic range (LDR) image. The resulting image is displayed on a conventional 8-bits-per-channel display device. The usage of HDR mapping reveals fine details in uncertainty distribution and enables the users to interactively study the data in the context of corresponding uncertainty information. We demonstrate the utility of our method and evaluate the results using data sets from ocean modeling.  相似文献   
53.
In the present study the polyethersulphone (PES) membranes of thickness (35 ±2) μm were prepared by solution cast method. The permeability of these membranes was calculated by varying the temperature and by irradiation of α ions. For the variation of temperature, the gas permeation cell was dipped in a constant temperature water bath in the temperature range from 303–373 K, which is well below the glass transition temperature (498 K). The permeability of H2 and CO2 increased with increasing temperature. The PES membrane was exposed by a-source (95Am241) of strength (1 μ Ci) in vacuum of the order of 10−6 torr, with fluence 2.7 × 107 ions/cm2. The permeability of H2 and CO2 has been observed for irradiated membrane with increasing etching time. The permeability increases with increasing etching time for both gases. There was a sudden change in permeability for both the gases when observed at 18 min etching. At this stage the tracks are visible with optical instrument, which confirms that the pores are generated. Most of pores seen in the micrograph are circular cross-section ones.  相似文献   
54.
Super Ultra-Small Angle Neutron Scattering (SUSANS) studies over wave vector transfers of 10–4 nm–1 to 10–3 nm–1 afford information on micrometer-size agglomerates in samples. Using a right-angled magnetic air prism, we have achieved a separation of ≈10 arcsec between ≈2 arcsec wide up- and down-spin peaks of 0.54 nm neutrons. The SUSANS instrument has thus been equipped with the polarized neutron option. The samples are placed in a uniform vertical field of 8.8 × 104 A/m (1.1 kOe). Several magnetic alloy ribbon samples broaden the up-spin neutron peak significantly over the ±1.3 × 10–3 nm–1 range, while leaving the down-spin peak essentially unaltered. Fourier transforms of these SUSANS spectra corrected for the instrument resolution, yield micrometer-range pair distribution functions for up- and down-spin neutrons as well as the nuclear and magnetic scattering length density distributions in the samples.  相似文献   
55.
We study a linear stochastic approximation algorithm that arises in the context of reinforcement learning. The algorithm employs a decreasing step-size, and is driven by Markov noise with time-varying statistics. We show that under suitable conditions, the algorithm can track the changes in the statistics of the Markov noise, as long as these changes are slower than the rate at which the step-size of the algorithm goes to zero.  相似文献   
56.
Determining service configurations is essential for effective service management. In this paper we describe a model-driven approach for service configuration auto-discovery. We develop metrics for performance and scalability analysis of such auto-discovery mechanisms. Our approach addresses several problems in auto-discovery: specification of what services to discover, how to efficiently distribute service discovery, and how to match instances of services into related groups. We use object-oriented models for discovery specifications, a flexible bus-based architecture for distribution and communication, and a novel multi-phased, instance matching approach. We have applied our approach to typical e-commerce services, Enterprise Resource Planning applications, like SAP, and Microsoft Exchange services running on a mixture of Windows and Unix platforms. The main contribution of this work is the flexibility of our models, architecture and algorithms to address discovery of a multitude of services.  相似文献   
57.
The scheduling of tasks in multiprocessor real-time systems has attracted many researchers in the recent past. Tasks in these systems have deadlines to be met, and most of the real-time scheduling algorithms use worst case computation times to schedule these tasks. Many resources will be left unused if the tasks are dispatched purely based on the schedule produced by these scheduling algorithms, since most of the tasks will take less time to execute than their respective worst case computation times. Resource reclaiming refers to the problem of reclaiming the resources left unused by a real-time task when it takes less time to execute than its worst case computation time. In this paper, we propose two algorithms to reclaim these resources from real-time tasks that are constrained by precedence relations and resource requirements, in shared memory multiprocessor systems. We introduce a notion called a restriction vector for each task which captures its resource and precedence constraints with other tasks. This will help not only in the efficient implementation of the algorithms, but also in obtaining an improvement in performance over the reclaiming algorithms proposed in earlier work [[2]]. We compare our resource reclaiming algorithms with the earlier algorithms and, by experimental studies, show that they reclaim more resources, thereby increasing the guarantee ratio (the ratio of the number of tasks guaranteed to meet their deadlines to the number of tasks that have arrived), which is the basic requirement of any resource reclaiming algorithm. From our simulation studies, we demonstrate that complex reclaiming algorithms with high reclaiming overheads do not lead to an improvement in the guarantee ratio.  相似文献   
58.
A software architecture is presented that allows client application programs to interact with a DBMS server in a flexible and powerful way, using either direct, volatile messages, or messages sent via recoverable queues. Normal requests from clients to the server and replies from the server to clients can be transmitted using direct or recoverable messages. In addition, an application event notification mechanism is provided, whereby client applications running anywhere on the network can register for events, and when those events are raised, the clients are notified. A novel parameter passing mechanism allows a set of tuples to be included in an event notification. The event mechanism is particularly useful in an active DBMS, where events can be raised by triggers to signal running application programs. Received July 21, 1995 / Accepted May 30, 1996  相似文献   
59.
Fractal symbolic analysis is a symbolic analysis technique for verifying the legality of program transformations. It is strictly more powerful than dependence analysis; for example, it can be used to verify the legality of blocking LU factorization with pivoting, a task for which dependence analysis is inadequate. In this paper, we show how fractal symbolic analysis can be used to convert between left- and right-looking versions of three kernels of central importance in computational science: triangular solve, Cholesky factorization, and LU factorization with pivoting.  相似文献   
60.
Numerical schemes and stability criteria are developed for solution of the one-dimensional fractional advection-dispersion equation (FRADE) derived by revising Fick’s first law. Employing 74 sets of dye test data measured on natural streams, it is found that the fractional order F of the partial differential operator acting on the dispersion term varies around the most frequently occurring value of F = 1.65 in the range of 1.4 to 2.0. Two series expansions are proposed for approximation of the limit definitions of fractional derivatives. On this ground, two three-term finite-difference schemes?“1.3 Backward Scheme” having the first-order accuracy and “F.3 Central Scheme” possessing the F-th order accuracy?are presented for fractional order derivatives. The F.3 scheme is found to perform better than does the 1.3 scheme in terms of error and stability analyses and is thus recommended for numerical solution of FRADE. The fractional dispersion model characterized by the FRADE and the F.3 scheme can accurately simulate the long-tailed dispersion processes in natural rivers.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号