全文获取类型
收费全文 | 1044篇 |
免费 | 55篇 |
专业分类
电工技术 | 13篇 |
化学工业 | 205篇 |
金属工艺 | 46篇 |
机械仪表 | 20篇 |
建筑科学 | 39篇 |
矿业工程 | 1篇 |
能源动力 | 43篇 |
轻工业 | 60篇 |
水利工程 | 3篇 |
无线电 | 100篇 |
一般工业技术 | 195篇 |
冶金工业 | 159篇 |
原子能技术 | 12篇 |
自动化技术 | 203篇 |
出版年
2024年 | 2篇 |
2023年 | 16篇 |
2022年 | 25篇 |
2021年 | 37篇 |
2020年 | 25篇 |
2019年 | 22篇 |
2018年 | 33篇 |
2017年 | 45篇 |
2016年 | 41篇 |
2015年 | 28篇 |
2014年 | 36篇 |
2013年 | 60篇 |
2012年 | 80篇 |
2011年 | 78篇 |
2010年 | 58篇 |
2009年 | 63篇 |
2008年 | 68篇 |
2007年 | 44篇 |
2006年 | 35篇 |
2005年 | 30篇 |
2004年 | 22篇 |
2003年 | 19篇 |
2002年 | 9篇 |
2001年 | 7篇 |
2000年 | 11篇 |
1999年 | 9篇 |
1998年 | 41篇 |
1997年 | 25篇 |
1996年 | 14篇 |
1995年 | 8篇 |
1994年 | 10篇 |
1993年 | 8篇 |
1992年 | 4篇 |
1991年 | 8篇 |
1990年 | 7篇 |
1989年 | 6篇 |
1988年 | 3篇 |
1987年 | 9篇 |
1986年 | 7篇 |
1985年 | 4篇 |
1984年 | 5篇 |
1983年 | 2篇 |
1982年 | 3篇 |
1981年 | 4篇 |
1980年 | 4篇 |
1979年 | 3篇 |
1977年 | 2篇 |
1976年 | 7篇 |
1973年 | 3篇 |
1967年 | 2篇 |
排序方式: 共有1099条查询结果,搜索用时 15 毫秒
981.
Detecting latency‐related problems in production environments is usually carried out at the application level with custom instrumentation. This is enough to detect high latencies in instrumented applications but does not provide all the information required to understand the source of the latency and is dependent on manually deployed instrumentation. The abnormal latencies usually start in the operating system kernel because of contention on physical resources or locks. Hence, finding the root cause of a latency may require a kernel trace. This trace can easily represent hundreds of thousands of events per second. In this paper, we propose and evaluate a methodology, efficient algorithms, and concurrent data structures to detect and analyze latency problems that occur at the kernel level. We introduce a new kernel‐based approach that enables developers and administrators to efficiently track latency problems in production and trigger actions when abnormal conditions are detected. The result of this study is a working scalable latency tracker and an efficient approach to perform stateful tracing in production. Copyright © 2016 John Wiley & Sons, Ltd. 相似文献
982.
Mathieu Sanchez Oleg Fryazinov Pierre‐Alain Fayolle Alexander Pasko 《Computer Graphics Forum》2015,34(6):277-288
Signed distance fields obtained from polygonal meshes are commonly used in various applications. However, they can have C1 discontinuities causing creases to appear when applying operations such as blending or metamorphosis. The focus of this work is to efficiently evaluate the signed distance function and to apply a smoothing filter to it while preserving the shape of the initial mesh. The resulting function is smooth almost everywhere, while preserving the exact shape of the polygonal mesh. Due to its low complexity, the proposed filtering technique remains fast compared to its main alternatives providing C1‐continuous distance field approximation. Several applications are presented such as blending, metamorphosis and heterogeneous modelling with polygonal meshes. 相似文献
983.
Mathieu Tracol 《Theoretical computer science》2011,412(12-14):1154-1168
984.
Morad Benyoucef Hakim Alj Mathieu Vézeau Rudolf K. Keller 《Electronic Commerce Research》2001,1(3):277-299
Combined Negotiations are a novel and general type of negotiation, in which the user is interested in many goods or services and consequently engages in many negotiations at the same time. The negotiations are independent of each other, whereas the goods or services are typically interdependent. Using currently available technology for electronic negotiations, the user conducts each negotiation separately, and has the burden of coordinating and reconciling them. The inherent complexity of combined negotiations in B2C as well as B2B e-commerce calls for software support.In our research, we aim to devise a Combined Negotiation Support System (CNSS) to help the user conduct all the negotiations at the same time. The CNSS enables the user to control and monitor the progress of the negotiations, makes sure that the specified dependencies are respected, and applies user-defined strategy rules. We have designed such a CNSS which we call CONSENSUS. The architecture of CONSENSUS relies on workflow technology, negotiating software agents, and rule engine technology. The originality of this architecture lies in the fact that the user of CONSENSUS models the combined negotiation at build time using a workflow that captures the sequencing of the individual negotiations and the dependencies between them. At runtime, software agents are assigned to individual negotiations, and they participate in the combined negotiation as actors in the workflow. The user can monitor the progress of the combined negotiation as a whole, and the progress of individual negotiations via dedicated graphical user interfaces. We rely on rule engine technology to enable the agents to use negotiation strategies.The paper introduces combined negotiations with a usage scenario. Then, combined negotiations are detailed, along with the approach taken to cope with their complexity. Afterwards, we describe the functionality a CNSS should provide, and present the architecture of CONSENSUS, together with a discussion of the underlying concepts and technologies. Furthermore, we report on our prototype implementation of CONSENSUS and illustrate it with an example. A discussion of related and future work concludes the paper. 相似文献
985.
Ferreira GB Overbergh L van Etten E Lage K D'Hertog W Hansen DA Maris M Moreau Y Workman CT Waelkens E Mathieu C 《Proteomics. Clinical applications》2008,2(9):1349-1360
Dendritic cells (DCs) are unique antigen presenting cells, which upon maturation change from a specialized antigen‐capturing cell towards a professional antigen presenting cells. In this study, a 2‐D DIGE analysis of immature and mature DCs was performed, to identify proteins changing in expression upon maturation. The protein expression profile of immature and mature DCs, derived from CD14+ peripheral blood monocytes was investigated using two pH ranges (pH 4–7 and 6–9) (n = 4). Ninety one differentially expressed spots (p<0.01) were detected, from which we identified 74 spots (81.32%) corresponding to 41 different proteins. The proteins identified play a role in diverse processes, such as antigen processing/presentation, vesicle transport and cytoskeleton remodeling. In addition, a protein interaction network contained 29 (out of 41) proteins, suggesting that, although they functionally originate from distinct classes, these proteins are acting as a protein‐interactome. In conclusion, the proteins shown here to be altered in expression upon maturation are in line with the morphological and functional changes observed during the maturation process, providing a better understanding of the processes involved. This will open new avenues for investigating treatment regimens for immune‐associated disorders. 相似文献
986.
A new and portable electronic device called the "Digital Phagometer" is described for the time based counting of spontaneous swallowing. This device is composed of a piezoelectric sensor and a digital event counter/ recorder which can be downloaded to any IBM-compatible PC. The sensor of Digital Phagometer is placed and fixed on the coniotomy region between the cricoid and thyroid cartilage. In this way, it is capable of sensing each upward and downward movement of the larynx produced by spontaneous movement as a function of time. Spontaneous swallowing was measured 1-4 h after lunch in 21 normal subjects and 21 patients with Parkinson's disease (PD). The mean frequency of spontaneous swallowing was 0.8 counts/min in PD patients and 1.18 counts/ min in normal subjects (p < 0.05). During the intake of 200 ml water, the mean frequency of voluntary swallowing did not differ significantly between the two groups (24.6 counts/min in normals vs. 22.3 counts/min in PD patients), but the time necessary to swallow the same volume of water was longer in the PD group. 相似文献
987.
This paper presents a set of distributed algorithms that support an Intrusion Detection System (IDS) model for Mobile Ad hoc NETworks (MANETs). The development of mobile networks has implicated the need of new IDS models in order to deal with new security issues in these communication environments. More conventional models have difficulties to deal with malicious components in MANETs. In this paper, we describe the proposed IDS model, focusing on distributed algorithms and their computational costs. The proposal employs fault tolerance techniques and cryptographic mechanisms to detect and deal with malicious or faulty nodes. The model is analyzed along with related works. Unlike studies in the references, the proposed IDS model admits intrusions and malice in their own algorithms. In this paper, we also present test results obtained with an implementation of the proposed model. 相似文献
988.
Fernando de Goes Beibei Liu Max Budninskiy Yiying Tong Mathieu Desbrun 《Computer Graphics Forum》2014,33(5):13-24
Geometry processing has made ample use of discrete representations of tangent vector fields and antisymmetric tensors (i.e., forms) on triangulations. Symmetric 2‐tensors, while crucial in the definition of inner products and elliptic operators, have received only limited attention. They are often discretized by first defining a coordinate system per vertex, edge or face, then storing their components in this frame field. In this paper, we introduce a representation of arbitrary 2‐tensor fields on triangle meshes. We leverage a coordinate‐free decomposition of continuous 2‐tensors in the plane to construct a finite‐dimensional encoding of tensor fields through scalar values on oriented simplices of a manifold triangulation. We also provide closed‐form expressions of pairing, inner product, and trace for this discrete representation of tensor fields, and formulate a discrete covariant derivative and a discrete Lie bracket. Our approach extends discrete/finite‐element exterior calculus, recovers familiar operators such as the weighted Laplacian operator, and defines discrete notions of divergence‐free, curl‐free, and traceless tensors–thus offering a numerical framework for discrete tensor calculus on triangulations. We finally demonstrate the robustness and accuracy of our operators on analytical examples, before applying them to the computation of anisotropic geodesic distances on discrete surfaces. 相似文献
989.
990.
Michel Mathieu 《电信纪事》1982,37(5-6):267-271
The present paper deals with protection methods of high quality digital sound signals in presence of transmission errors. They are strongly related to the coding and the bit rate reduction methods used in the digital treatment of sound signals. Therefore, the first part is assigned to these aspects. Part 2 describes a procedure for a subjective evaluation of the impairments caused on digital sound signals by transmission errors. This procedure was used during tests realised in the ccett.Part 3 summarizes the main results of these tests and proposes a strategy for the protection which ensures a satisfying compromise between quality and simplicity. 相似文献