全文获取类型
收费全文 | 923篇 |
免费 | 51篇 |
专业分类
电工技术 | 8篇 |
综合类 | 1篇 |
化学工业 | 177篇 |
金属工艺 | 10篇 |
机械仪表 | 12篇 |
建筑科学 | 34篇 |
矿业工程 | 1篇 |
能源动力 | 49篇 |
轻工业 | 55篇 |
水利工程 | 10篇 |
石油天然气 | 3篇 |
无线电 | 137篇 |
一般工业技术 | 125篇 |
冶金工业 | 59篇 |
原子能技术 | 1篇 |
自动化技术 | 292篇 |
出版年
2023年 | 7篇 |
2022年 | 33篇 |
2021年 | 40篇 |
2020年 | 29篇 |
2019年 | 25篇 |
2018年 | 33篇 |
2017年 | 40篇 |
2016年 | 45篇 |
2015年 | 27篇 |
2014年 | 53篇 |
2013年 | 63篇 |
2012年 | 45篇 |
2011年 | 69篇 |
2010年 | 59篇 |
2009年 | 56篇 |
2008年 | 42篇 |
2007年 | 57篇 |
2006年 | 32篇 |
2005年 | 23篇 |
2004年 | 18篇 |
2003年 | 13篇 |
2002年 | 15篇 |
2001年 | 12篇 |
2000年 | 6篇 |
1999年 | 12篇 |
1998年 | 24篇 |
1997年 | 14篇 |
1996年 | 11篇 |
1995年 | 6篇 |
1994年 | 10篇 |
1993年 | 11篇 |
1992年 | 2篇 |
1991年 | 2篇 |
1990年 | 4篇 |
1989年 | 3篇 |
1988年 | 6篇 |
1987年 | 2篇 |
1985年 | 5篇 |
1984年 | 3篇 |
1983年 | 3篇 |
1982年 | 3篇 |
1981年 | 3篇 |
1980年 | 1篇 |
1979年 | 1篇 |
1978年 | 2篇 |
1977年 | 2篇 |
1976年 | 2篇 |
排序方式: 共有974条查询结果,搜索用时 15 毫秒
21.
Evripidis Bampis Dimitrios Letsios Ioannis Milis Georgios Zois 《Theory of Computing Systems》2016,58(2):304-321
We consider the power-aware problem of scheduling non-preemptively a set of jobs on a single speed-scalable processor so as to minimize the maximum lateness, under a given budget of energy. In the offline setting, our main contribution is a combinatorial polynomial time algorithm for the case in which the jobs have common release dates. In the presence of arbitrary release dates, we show that the problem becomes strongly \(\mathcal {N}\mathcal {P}\)-hard. Moreover, we show that there is no O(1)-competitive deterministic algorithm for the online setting in which the jobs arrive over time. Then, we turn our attention to an aggregated variant of the problem, where the objective is to find a schedule minimizing a linear combination of maximum lateness and energy. As we show, our results for the budget variant can be adapted to derive a similar polynomial time algorithm and an \(\mathcal {N}\mathcal {P}\)-hardness proof for the aggregated variant in the offline setting, with common and arbitrary release dates respectively. More interestingly, for the online case, we propose a 2-competitive algorithm. 相似文献
22.
Marios Anagnostopoulos Georgios Kambourakis Stefanos Gritzalis 《International Journal of Information Security》2016,15(5):455-473
It is without a doubt that botnets pose a growing threat to the Internet, with DDoS attacks of any kind carried out by botnets to be on the rise. Nowadays, botmasters rely on advanced Command and Control (C&C) infrastructures to achieve their goals and most importantly to remain undetected. This work introduces two novel botnet architectures that consist only of mobile devices and evaluates both their impact in terms of DNS amplification and TCP flooding attacks, and their cost pertaining to the maintenance of the C&C channel. The first one puts forward the idea of using a continually changing mobile HTTP proxy in front of the botherder, while the other capitalizes on DNS protocol as a covert channel for coordinating the botnet. That is, for the latter, the messages exchanged among the bots and the herder appear as legitimate DNS transactions. Also, a third architecture is described and assessed, which is basically an optimized variation of the first one. Namely, it utilizes a mixed layout where all the attacking bots are mobile, but the proxy machines are typical PCs not involved in the actual attack. For the DNS amplification attack, which is by nature more powerful, we report an amplification factor that fluctuates between 32.7 and 34.1. Also, regarding the imposed C&C cost, we assert that it is minimal (about 0.25 Mbps) per bot in the worst case happening momentarily when the bot learns about the parameters of the attack. 相似文献
23.
Iosif Vranakis Anastasia Papadioti Yannis Tselentis Anna Psaroulaki Georgios Tsiotis 《Proteomics. Clinical applications》2013,7(1-2):193-204
Coxiella burnetii, the causative agent of Q fever, is an intracellular bacterium and a potential weapon for bioterrorism. The widespread throughout the world, zoonosis is manifested clinically as a self-limited febrile illness, as pneumonia (acute Q fever) or as a chronic illness with endocarditis being its major complication. The recent Netherlands Q fever outbreak has driven the bacterium from a relatively cryptic, underappreciated, “niche” microorganism on the sideline of bacteriology, to one of possibly great impact on public health. Advances in the study of this microorganism proceeded slowly, primarily due to the, until recently, obligatory intracellular nature of the pathogen that in its virulent phase I must be manipulated under biosafety level-3 conditions. Proteomic studies, in particular, have generated a vast amount of information concerning several aspects of the bacterium such as virulence factors, detection/diagnostic and immunogenic biomarkers, inter-/intraspecies variation, resistance to antibiotics, and secreted effector proteins with significant clinical impact. The phenomenon observed following the genomics era, that of generation and accumulation of huge amount of data that ultimately end up unexploited on several databases, begins to emerge in the proteomics field as well. This review will focus on the advances in the field of C. burnetii proteomics through MS, attempting in parallel to utilize some of the proteomics findings by suggesting future directions for the improvement of Q fever diagnosis and therapy. 相似文献
24.
Dan Chen Roland Ewald Georgios K. Theodoropoulos Ton Oguara Brian Logan 《Journal of Systems and Software》2008,81(12):2345-2360
Distributed simulation has emerged as an important instrument for studying large-scale complex systems. Such systems inherently consist of a large number of components, which operate in a large shared state space interacting with it in highly dynamic and unpredictable ways. Optimising access to the shared state space is crucial for achieving efficient simulation executions. Data accesses may take two forms: locating data according to a set of attribute value ranges (range query) or locating a particular state variable from the given identifier (ID query and update). This paper proposes two alternative routing approaches, namely the address-based approach, which locates data according to their address information, and the range-based approach, whose operation is based on looking up attribute value range information along the paths to the destinations. The two algorithms are discussed and analysed in the context of PDES-MAS, a framework for the distributed simulation of multi-agent systems, which uses a hierarchical infrastructure to manage the shared state space. The paper introduces a generic meta-simulation framework which is used to perform a quantitative comparative analysis of the proposed algorithms under various circumstances. 相似文献
25.
Hybrid TDMA (Time Division Multiple Access) with heuristic traffic shaping (HyTDMA/HTS) is a new collisionless MAC protocol for efficiently managing the traffic of a heavy loaded broadcast LAN. The protocol employs techniques that enable it to perform better than both fixed assignment protocols like TDMA as well as dynamic bandwidth allocation protocols like LTDMA. HyTDMA/HTS can smoothly operate in diverse traffic environments of very high loads and bursty traffic, and it can still maintain maximum shared medium utilization while maintaining low packet delay times. Built into the protocol is also a simple yet effective heuristic mechanism that regulates the traffic of hosts flooding the network with an excessive number of packets larger than the average. 相似文献
26.
27.
Dimitrios Tzovaras Konstantinos Moustakas Georgios Nikolakis Michael G. Strintzis 《Personal and Ubiquitous Computing》2009,13(1):51-58
This paper presents a mixed reality tool developed for the training of the visually impaired based on haptic and auditory
feedback. The proposed approach focuses on the development of a highly interactive and extensible Haptic Mixed Reality training
system that allows visually impaired to navigate into real size Virtual Reality environments. The system is based on the use
of the CyberGrasp™ haptic device. An efficient collision detection algorithm based on superquadrics is also integrated into
the system so as to allow real time collision detection in complex environments. A set of evaluation tests is designed in
order to identify the importance of haptic, auditory and multimodal feedback and to compare the MR cane against the existing
Virtual Reality cane simulation system. 相似文献
28.
Anwar Syed Muhammad Irmakci Ismail Torigian Drew A. Jambawalikar Sachin Papadakis Georgios Z. Akgun Can Ellermann Jutta Akcakaya Mehmet Bagci Ulas 《Journal of Signal Processing Systems》2022,94(5):497-510
Journal of Signal Processing Systems - Segmentation of thigh tissues (muscle, fat, inter-muscular adipose tissue (IMAT), bone, and bone marrow) from magnetic resonance imaging (MRI) scans is useful... 相似文献
29.
Christos Bouras Apostolos Gkamas Georgios Kioumourtzis 《Journal of Network and Systems Management》2011,19(2):143-177
In this paper, we present Adaptive Smooth Simulcast Protocol (ASSP) for simulcast transmission of multimedia data over best-effort
networks. ASSP is a new multiple-rate protocol that implements a single rate TCP-friendly protocol as the underlying congestion
control mechanism for each simulcast stream. The key attributes of ASSP are: (a) TCP-friendly behavior, (b) adaptive per-stream
transmission rates, (c) adaptive scalability to large sets of receivers and (d) smooth transmission rates that are suitable
for multimedia applications. We evaluate the performance of ASSP under an integrated simulation environment which combines
the measurements of both network and video performance metrics. We also compare ASSP against other proposed solutions and
the results demonstrate that the performance of ASSP is significantly better than the tested solutions. Finally, ASSP is a
practical solution with very low implementation complexity for video transmission over best-effort networks. 相似文献
30.
This paper describes DLEJena, a practical reasoner for the OWL 2 RL profile that combines the forward-chaining rule engine of Jena and the Pellet DL reasoner. This combination is based on rule templates, instantiating at run-time a set of ABox OWL 2 RL/RDF Jena rules dedicated to a particular TBox that is handled by Pellet. The goal of DLEJena is to handle efficiently, through instantiated rules, the OWL 2 RL ontologies under direct semantics, where classes and properties cannot be at the same time individuals. The TBox semantics are treated by Pellet, reusing in that way efficient and sophisticated TBox DL reasoning algorithms. The experimental evaluation shows that DLEJena achieves more scalable ABox reasoning than the direct implementation of the OWL 2 RL/RDF rule set in the Jena’s production rule engine, which is the main target of the system. DLEJena can be also used as a generic framework for applying an arbitrary number of entailments beyond the OWL 2 RL profile. 相似文献