全文获取类型
收费全文 | 4005篇 |
免费 | 299篇 |
国内免费 | 3篇 |
专业分类
电工技术 | 54篇 |
综合类 | 3篇 |
化学工业 | 1286篇 |
金属工艺 | 50篇 |
机械仪表 | 93篇 |
建筑科学 | 129篇 |
矿业工程 | 3篇 |
能源动力 | 132篇 |
轻工业 | 479篇 |
水利工程 | 20篇 |
石油天然气 | 1篇 |
无线电 | 371篇 |
一般工业技术 | 707篇 |
冶金工业 | 242篇 |
原子能技术 | 43篇 |
自动化技术 | 694篇 |
出版年
2024年 | 5篇 |
2023年 | 40篇 |
2022年 | 247篇 |
2021年 | 282篇 |
2020年 | 123篇 |
2019年 | 113篇 |
2018年 | 147篇 |
2017年 | 145篇 |
2016年 | 175篇 |
2015年 | 148篇 |
2014年 | 168篇 |
2013年 | 255篇 |
2012年 | 252篇 |
2011年 | 303篇 |
2010年 | 222篇 |
2009年 | 210篇 |
2008年 | 185篇 |
2007年 | 167篇 |
2006年 | 166篇 |
2005年 | 115篇 |
2004年 | 105篇 |
2003年 | 91篇 |
2002年 | 60篇 |
2001年 | 53篇 |
2000年 | 35篇 |
1999年 | 45篇 |
1998年 | 89篇 |
1997年 | 60篇 |
1996年 | 44篇 |
1995年 | 28篇 |
1994年 | 38篇 |
1993年 | 20篇 |
1992年 | 13篇 |
1991年 | 10篇 |
1989年 | 12篇 |
1988年 | 3篇 |
1987年 | 4篇 |
1986年 | 9篇 |
1985年 | 16篇 |
1984年 | 8篇 |
1983年 | 18篇 |
1982年 | 9篇 |
1981年 | 11篇 |
1980年 | 12篇 |
1979年 | 7篇 |
1978年 | 3篇 |
1977年 | 10篇 |
1976年 | 12篇 |
1975年 | 4篇 |
1973年 | 3篇 |
排序方式: 共有4307条查询结果,搜索用时 31 毫秒
71.
Xin Lin Chris M. J. Tampère Francesco Viti Ben Immers 《Networks and Spatial Economics》2016,16(1):349-369
Increasing numbers of hard environmental constraints are being imposed in urban traffic networks by authorities in an attempt to mitigate pollution caused by traffic. However, it is not trivial for authorities to assess the cost of imposing such hard environmental constraints. This leads to difficulties when setting the constraining values as well as implementing effective control measures. For that reason, quantifying the cost of imposing hard environmental constraints for a certain network becomes crucial. This paper first indicates that for a given network, such cost is not only related to the attribution of environmental constraints but also related to the considered control measures. Next, we present an assessment criterion that quantifies the loss of optimality under the control measures considered by introducing the environmental constraints. The criterion can be acquired by solving a bi-level programming problem with/without environmental constraints. A simple case study shows its practicability as well as the differences between this framework and other frameworks integrating the environmental aspects. This proposed framework is widely applicable when assessing the interaction of traffic and its environmental aspects. 相似文献
72.
Michele Amoretti Alessandro Grazioli Francesco Zanichelli 《Peer-to-Peer Networking and Applications》2016,9(6):1226-1241
The rise of Cloud Computing has progressively dimmed the interest in volunteer and peer-to-peer computing, in general. However, efficient and cost-effective large scale distributed collaborative environments cannot be achieved leveraging upon the Cloud alone. In this paper, we propose a novel hybrid P2P/cloud approach where components and protocols are autonomically configured according to specific target goals, such as cost-effectiveness, reliability and availability. The proposed approach is based on the Networked Autonomic Machine (NAM) framework, which allows distributed system designers to include different kinds of cost and performance constraints. As an example, we show how the NAM-based approach can be used to design collaborative storage systems, enabling the definition of an autonomic policy to decide, according to cost minimization and data availability goals, how to part data chunks among peer nodes and Cloud, based on the local perception of the P2P network. 相似文献
73.
Most of the literature on innovation management highlights the fundamental role played by people in the innovation process and the need to fully develop the creative and innovative potential of organizations' members. This article offers the result of extensive research carried out among some of the most innovative companies in the Basque Country, a highly innovative region located in the north of Spain. It draws interesting conclusions about how these innovative companies combine strong leadership, human resource practices, and an organizational culture that enhances innovation capabilities among the company's employees. More specifically, it answers questions such as the following: Are human resources policies, leadership, and innovation culture implemented equally in Basque innovative companies? Do companies make the same effort in deploying these elements or routines and practices related to them? Can we see a pattern in the use of these elements among innovative firms? © 2012 Wiley Periodicals, Inc. 相似文献
74.
Rachid El-Azouzi Francesco De Pellegrini Habib B.A. Sidi Vijay Kamble 《Computer Networks》2013,57(4):1003-1018
In this paper, we apply evolutionary games to non-cooperative forwarding control in Delay Tolerant Networks (DTNs). The main focus is on mechanisms to rule the participation of the relays to the delivery of messages in DTNs. Thus, we express the success probability as a function of the competition that takes place within a large population of mobiles, and we characterize the effect of reward-based mechanisms on the performance of such systems. Devices acting as active relays, in fact, sacrifice part of their batteries in order to support message replication and thus increase the probability to reach the destination. In our scheme, a relay can choose the strategy by which they participate to the message relaying. A mobile that participates receives a unit of reward based on the reward mechanism selected by the network. A utility function is introduced as the difference between the expected reward and the energy cost, i.e., the cost spent by the relay to sustain forwarding operations. We show how the evolution dynamics and the equilibrium behavior (called Evolutionary Stable Strategy – ESS) are influenced by the characteristics of inter contact time, energy expenditure and pricing characteristics.We extend our analysis to mechanisms that the system can introduce in order to have the message delivered to the destination with high probability within a given deadline and under energy constraints which bound the number of released copies per message. Finally, we apply our findings in order to devise decentralized forwarding algorithms that are rooted in the theory of stochastic approximations. Thus, we demonstrate that the ESS can be attained without complete knowledge of the system state and letting the source monitor number of released copies per message only. We provide extensive numerical results to validate the proposed scheme. 相似文献
75.
Marco Domenichini Ranjana Sahai Piero Castrataro Roberto Valsecchi Claudio Tonelli Francesco Greco Paolo Dario 《Microfluidics and nanofluidics》2013,15(6):753-762
The development of multilayer soft lithography methodology has seen polydimethysiloxane (PDMS) as the preferred material for the fabrication of microfluidic devices. However, the functionality of these PDMS microfluidic chips is often limited by the poor chemical resistance of PDMS to certain solvents. Here, we propose the use of a photocurable perfluoropolyether (PFPE), specifically FOMBLIN® MD40 PFPE, as a candidate material to provide a solvent-resistant buffer layer to make the device substantially impervious to chemically induced swelling. We first carried out a systematic study of the solvent resistance properties of FOMBLIN® MD40 PFPE as compared with PDMS. The comparison presented here demonstrates the superiority of FOMBLIN® MD40 PFPE over PDMS in this regard; moreover, the results permitted to categorize solvents in four different groups depending on their swelling ratio. We then present a step-by-step recipe for a novel fabrication process that uses multilayer lithography to construct a comprehensive solvent-resistant device with fluid and control channels integrated with a valve structure and also permitting easy establishment of outside connections. 相似文献
76.
Francesco Bellotti Riccardo Berta Massimiliano Margarone Alessandro De Gloria 《Software》2008,38(12):1241-1259
The RFID technology is becoming ever more popular in the development of ubiquitous computing applications. A full exploitation of the RFID potential requires the study and implementation of human–computer interaction (HCI) modalities to be able to support wide usability by the target audience. This implies the need for programming methodologies specifically dedicated to support the easy and efficient prototyping of applications to have feedback from early tests with users. On the basis of our field‐working experience, we have designed oDect, a high‐level language and platform‐independent application programming interface (API), ad hoc designed to meet the needs of typical applications for mobile devices (smart phones and PDAs). oDect aims at allowing application developers to create their prototypes focusing on the needs of the final users, without having to care about the low‐level software that interacts with the RFID hardware. Further, in an end‐user developing (EUD) approach, oDect provides specific support for the application end‐user herself to cope with typical problems of RFID applications in detecting objects. We describe in detail the features of the API and discuss the findings of a test with four programmers, where we analyse and evaluate the use of the API in four sample applications. We also present results of an end‐user test, which investigated strengths and weaknesses of the territorial agenda (TA) concept. The TA is an RFID‐based citizen guide that aids—through time‐ and location‐based reminders—users in their daily activities in a city. The TA directly exploits EUD features of oDect, in particular concerning the possibility of linking detected objects with custom actions. Copyright © 2008 John Wiley & Sons, Ltd. 相似文献
77.
One of the main problems in operational risk management is the lack of loss data, which affects the parameter estimates of the marginal distributions of the losses. The principal reason is that financial institutions only started to collect operational loss data a few years ago, due to the relatively recent definition of this type of risk. Considering this drawback, the employment of Bayesian methods and simulation tools could be a natural solution to the problem. The use of Bayesian methods allows us to integrate the scarce and, sometimes, inaccurate quantitative data collected by the bank with prior information provided by experts. An original proposal is a Bayesian approach for modelling operational risk and for calculating the capital required to cover the estimated risks. Besides this methodological innovation a computational scheme, based on Markov chain Monte Carlo simulations, is required. In particular, the application of the MCMC method to estimate the parameters of the marginals shows advantages in terms of a reduction of capital charge according to different choices of the marginal loss distributions. 相似文献
78.
Boosting text segmentation via progressive classification 总被引:5,自引:4,他引:1
Eugenio Cesario Francesco Folino Antonio Locane Giuseppe Manco Riccardo Ortale 《Knowledge and Information Systems》2008,15(3):285-320
A novel approach for reconciling tuples stored as free text into an existing attribute schema is proposed. The basic idea
is to subject the available text to progressive classification, i.e., a multi-stage classification scheme where, at each intermediate stage, a classifier is learnt that analyzes the textual
fragments not reconciled at the end of the previous steps. Classification is accomplished by an ad hoc exploitation of traditional
association mining algorithms, and is supported by a data transformation scheme which takes advantage of domain-specific dictionaries/ontologies.
A key feature is the capability of progressively enriching the available ontology with the results of the previous stages
of classification, thus significantly improving the overall classification accuracy. An extensive experimental evaluation
shows the effectiveness of our approach. 相似文献
79.
Artificial institutions: a model of institutional reality for open multiagent systems 总被引:2,自引:0,他引:2
Nicoletta Fornara Francesco Viganò Mario Verdicchio Marco Colombetti 《Artificial Intelligence and Law》2008,16(1):89-105
Software agents’ ability to interact within different open systems, designed by different groups, presupposes an agreement
on an unambiguous definition of a set of concepts, used to describe the context of the interaction and the communication language
the agents can use. Agents’ interactions ought to allow for reliable expectations on the possible evolution of the system;
however, in open systems interacting agents may not conform to predefined specifications. A possible solution is to define
interaction environments including a normative component, with suitable rules to regulate the behaviour of agents. To tackle
this problem we propose an application-independent metamodel of artificial institutions that can be used to define open multiagent
systems. In our view an artificial institution is made up by an ontology that models the social context of the interaction,
a set of authorizations to act on the institutional context, a set of linguistic conventions for the performance of institutional
actions and a system of norms that are necessary to constrain the agents’ actions. 相似文献
80.
Classification of Fuzzy Mathematical Morphologies Based on Concepts of Inclusion Measure and Duality
Mathematical morphology was originally conceived as a set theoretic approach for the processing of binary images. Extensions
of classical binary morphology to gray-scale morphology include approaches based on fuzzy set theory. This paper discusses
and compares several well-known and new approaches towards gray-scale and fuzzy mathematical morphology. We show in particular
that a certain approach to fuzzy mathematical morphology ultimately depends on the choice of a fuzzy inclusion measure and
on a notion of duality. This fact gives rise to a clearly defined scheme for classifying fuzzy mathematical morphologies.
The umbra and the level set approach, an extension of the threshold approach to gray-scale mathematical morphology, can also
be embedded in this scheme since they can be identified with certain fuzzy approaches.
相似文献
Marcos Eduardo ValleEmail: |