全文获取类型
收费全文 | 651篇 |
免费 | 37篇 |
专业分类
电工技术 | 5篇 |
综合类 | 2篇 |
化学工业 | 188篇 |
金属工艺 | 18篇 |
机械仪表 | 9篇 |
建筑科学 | 49篇 |
矿业工程 | 2篇 |
能源动力 | 17篇 |
轻工业 | 38篇 |
水利工程 | 2篇 |
无线电 | 52篇 |
一般工业技术 | 131篇 |
冶金工业 | 33篇 |
原子能技术 | 6篇 |
自动化技术 | 136篇 |
出版年
2023年 | 15篇 |
2022年 | 18篇 |
2021年 | 20篇 |
2020年 | 12篇 |
2019年 | 11篇 |
2018年 | 12篇 |
2017年 | 16篇 |
2016年 | 28篇 |
2015年 | 15篇 |
2014年 | 32篇 |
2013年 | 32篇 |
2012年 | 32篇 |
2011年 | 42篇 |
2010年 | 45篇 |
2009年 | 43篇 |
2008年 | 38篇 |
2007年 | 43篇 |
2006年 | 14篇 |
2005年 | 25篇 |
2004年 | 24篇 |
2003年 | 14篇 |
2002年 | 6篇 |
2001年 | 9篇 |
2000年 | 13篇 |
1999年 | 12篇 |
1998年 | 6篇 |
1997年 | 10篇 |
1996年 | 11篇 |
1995年 | 2篇 |
1994年 | 7篇 |
1993年 | 6篇 |
1992年 | 9篇 |
1991年 | 6篇 |
1990年 | 2篇 |
1989年 | 3篇 |
1988年 | 6篇 |
1987年 | 4篇 |
1986年 | 8篇 |
1985年 | 2篇 |
1983年 | 4篇 |
1982年 | 4篇 |
1981年 | 5篇 |
1980年 | 2篇 |
1979年 | 3篇 |
1978年 | 2篇 |
1977年 | 2篇 |
1976年 | 2篇 |
1974年 | 2篇 |
1966年 | 3篇 |
1964年 | 1篇 |
排序方式: 共有688条查询结果,搜索用时 15 毫秒
51.
We compare four tools regarding their suitability for teaching formal software verification, namely the Frege Program Prover,
the Key system, Perfect Developer, and the Prototype Verification System (PVS). We evaluate them on a suite of small programs, which are typical of courses dealing with Hoare-style verification, weakest
preconditions, or dynamic logic. Finally we report our experiences with using Perfect Developer in class. 相似文献
52.
Scott R Boss Laurie J Kirsch Ingo Angermeier Raymond A Shingler R Wayne Boss 《欧洲信息系统杂志》2009,18(2):151-164
Information security has become increasingly important to organizations. Despite the prevalence of technical security measures, individual employees remain the key link – and frequently the weakest link – in corporate defenses. When individuals choose to disregard security policies and procedures, the organization is at risk. How, then, can organizations motivate their employees to follow security guidelines? Using an organizational control lens, we build a model to explain individual information security precaution-taking behavior. Specific hypotheses are developed and tested using a field survey. We examine elements of control and introduce the concept of ‘mandatoriness,’ which we define as the degree to which individuals perceive that compliance with existing security policies and procedures is compulsory or expected by organizational management. We find that the acts of specifying policies and evaluating behaviors are effective in convincing individuals that security policies are mandatory. The perception of mandatoriness is effective in motivating individuals to take security precautions, thus if individuals believe that management watches, they will comply. 相似文献
53.
Hidden Markov models reproduce most of the stylized facts about daily series of returns. A notable exception is the inability of the models to reproduce one ubiquitous feature of such time series, namely the slow decay in the autocorrelation function of the squared returns. It is shown that this stylized fact can be described much better by means of hidden semi-Markov models. This is illustrated by examining the fit of two such models to 18 series of daily sector returns. 相似文献
54.
Michael Beetz Freek Stulp Piotr Esden-Tempski Andreas Fedrizzi Ulrich Klank Ingo Kresse Alexis Maldonado Federico Ruiz 《Autonomous Robots》2010,28(1):21-44
This article investigates methods for achieving more general manipulation capabilities for mobile manipulation platforms, which produce legible behavior in human living environments. To achieve generality and legibility, we combine two control mechanisms. First of all, experience- and observation-based learning of skills is applied to routine tasks, so that the repetitive and stereotypical character of everyday activity is exploited. Second, we use planning, reasoning, and search for novel tasks which have no stereotypical solution. We apply these ideas to the learning and use of action-related places, to the model-based visual recognition and localization of objects, and the learning and application of reaching strategies and motions from humans. We demonstrate the integration of these mechanisms into a single low-level control system for autonomous manipulation platforms. 相似文献
55.
A Comparison of Free BDDs and Transformed BDDs 总被引:2,自引:0,他引:2
Ordered binary decision diagrams (OBDDs) introduced by Bryant (IEEE Trans. on Computers, Vol. 35, pp. 677–691, 1986) have found a lot of applications in verification and CAD. Their use is limited if the OBDD size of the considered functions is too large. Therefore, a variety of generalized BDD models has been presented, among them FBDDs (free BDDs) and TBDDs (transformed BDDs). Here the quite tight relations between these models are revealed and their advantages and disadvantages are discussed. 相似文献
56.
Recent advances in the field of kernel-based machine learning methods allow fast processing of text using string kernels utilizing suffix arrays. kernlab provides both kernel methods’ infrastructure and a large collection of already implemented algorithms and includes an implementation of suffix-array-based string kernels. Along with the use of the text mining infrastructure provided by tm these packages provide R with functionality in processing, visualizing and grouping large collections of text data using kernel methods. The emphasis is on the performance of various types of string kernels at these tasks. 相似文献
57.
58.
Oliver Schreer Ingo Feldmann Isabel Alonso Mediavilla Pedro Concejero Abdul H. Sadka Mohammad Rafiq Swash Sergio Benini Riccardo Leonardi Tijana Janjusevic Ebroul Izquierdo 《Multimedia Tools and Applications》2010,48(1):23-49
Multimedia analysis and reuse of raw un-edited audio visual content known as rushes is gaining acceptance by a large number
of research labs and companies. A set of research projects are considering multimedia indexing, annotation, search and retrieval
in the context of European funded research, but only the FP6 project RUSHES is focusing on automatic semantic annotation,
indexing and retrieval of raw and un-edited audio-visual content. Even professional content creators and providers as well
as home-users are dealing with this type of content and therefore novel technologies for semantic search and retrieval are
required. In this paper, we present a summary of the most relevant achievements of the RUSHES project, focusing on specific
approaches for automatic annotation as well as the main features of the final RUSHES search engine. 相似文献
59.
60.
Many real-world problems are multi-objective optimization problems and evolutionary algorithms are quite successful on such problems. Since the task is to compute or approximate the Pareto front, multi-objective optimization problems are considered as more difficult than single-objective problems. One should not forget that the fitness vector with respect to more than one objective contains more information that in principle can direct the search of evolutionary algorithms. Therefore, it is possible that a single-objective problem can be solved more efficiently via a generalized multi-objective model of the problem. That this is indeed the case is proved by investigating the computation of minimum spanning trees.This work was supported by the Deutsche Forschungsgemeinschaft (DFG) as part of the Collaborative Research Center Computational Intelligence (SFB 531) and by the German-Israeli Foundation (GIF) in the project Robustness Aspects of Algorithms. 相似文献