首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   2222篇
  免费   144篇
  国内免费   21篇
电工技术   46篇
综合类   8篇
化学工业   625篇
金属工艺   58篇
机械仪表   103篇
建筑科学   62篇
矿业工程   3篇
能源动力   118篇
轻工业   202篇
水利工程   39篇
石油天然气   25篇
武器工业   2篇
无线电   205篇
一般工业技术   394篇
冶金工业   107篇
原子能技术   24篇
自动化技术   366篇
  2024年   6篇
  2023年   65篇
  2022年   96篇
  2021年   153篇
  2020年   127篇
  2019年   151篇
  2018年   156篇
  2017年   133篇
  2016年   140篇
  2015年   95篇
  2014年   115篇
  2013年   200篇
  2012年   145篇
  2011年   136篇
  2010年   104篇
  2009年   120篇
  2008年   68篇
  2007年   62篇
  2006年   52篇
  2005年   32篇
  2004年   19篇
  2003年   19篇
  2002年   19篇
  2001年   11篇
  2000年   15篇
  1999年   13篇
  1998年   30篇
  1997年   14篇
  1996年   11篇
  1995年   15篇
  1994年   15篇
  1993年   8篇
  1992年   5篇
  1991年   4篇
  1990年   5篇
  1989年   3篇
  1987年   6篇
  1986年   1篇
  1984年   5篇
  1983年   1篇
  1982年   1篇
  1981年   5篇
  1980年   1篇
  1978年   1篇
  1977年   1篇
  1976年   1篇
  1970年   1篇
  1968年   1篇
排序方式: 共有2387条查询结果,搜索用时 15 毫秒
31.
32.
In Information Technology Service Management (ITSM), network management teams typically use an Incident Ticket System (ITS) as a tool to track, troubleshoot, and coordinate the resolution of network incidents that occur during the daily operation of the network. A well organized ITS may positively impact on the efficiency of the incident management process. Nevertheless, in many cases the handling of tickets by the management team is not completely systematic and may be incoherent and inefficient. This way, irrelevant or redundant tickets for the same incident may be issued, thus creating a redundancy in the system that leads to inefficiencies. In this paper, we suggest a model aimed to correlate redundant tickets in order to reduce the information to a single ticket per incident. We validate the proposed correlation model by evaluating it with two datasets taken from a real ticketing system of a telecommunications network company. Using this model as a basis, we also develop and evaluate a methodology that assesses the efficiency of the management team during the process of tickets creation and management. Based on it, we also get some insights on the performance of the different management groups involved in the ticket creation process. These analyses can be leveraged for improving both the management groups functioning and the policies for the tickets’ creation.  相似文献   
33.
Cloud computing is a methodology and not a technology. Adaptation of cloud computing services for robotic applications is relatively straightforward while adaptation of underlying ideas will require a new design attitude. Cloud computing is a cost-effective and dynamic business model. Currently cloud robotics is understood as a client server methodology which enables robots utilize resources and services placed at centralized servers. These cloud servers treat robots as any other client computer offering them platform, infrastructure, process or algorithm as a service. HTM5 is an OMG MDA based multi-view meta-model for agent oriented development of cloud robotic systems. HTM5 encourages design of peer-to-peer service ecosystems based on an open registry and matchmaking mechanism. In peer-to-peer cloud robotics, a robot can trade its hardware, software and functional resources as a service to other robots in the ecosystem. The peer-to-peer trade in such systems may be driven by contracts and relationships between its member agents. This article discusses trade-view model of HTM5 methodology and its use in developing a cloud robotic ecosystem that implements peer-to-peer, contract based economy. The article also presents a case study with experiments that implement distributed artificial intelligence and peer-to-peer service oriented trade on simulated and real robot colonies.  相似文献   
34.
35.
36.
37.
In this paper, we present faster than real-time implementation of a class of dense stereo vision algorithms on a low-power massively parallel SIMD architecture, the CSX700. With two cores, each with 96 Processing Elements, this SIMD architecture provides a peak computation power of 96 GFLOPS while consuming only 9 Watts, making it an excellent candidate for embedded computing applications. Exploiting full features of this architecture, we have developed schemes for an efficient parallel implementation with minimum of overhead. For the sum of squared differences (SSD) algorithm and for VGA (640 × 480) images with disparity ranges of 16 and 32, we achieve a performance of 179 and 94 frames per second (fps), respectively. For the HDTV (1,280 × 720) images with disparity ranges of 16 and 32, we achieve a performance of 67 and 35 fps, respectively. We have also implemented more accurate, and hence more computationally expensive variants of the SSD, and for most cases, particularly for VGA images, we have achieved faster than real-time performance. Our results clearly demonstrate that, by developing careful parallelization schemes, the CSX architecture can provide excellent performance and flexibility for various embedded vision applications.  相似文献   
38.
Organisations have invested in self‐service information systems (IS) to provide a direct interface for service delivery. Enriching the usage of these systems can provide organisations with immense benefits. However, limited research has been directed towards understanding post‐adoption IS usage behaviour in general and specifically in the context of self‐service IS. This study proposes post‐adoption IS usage behaviour as a broader concept constituting feature level usage of IS, integration of IS in the work system and exploration of new uses of IS. We evaluate how the new conceptualisation can be used to classify users at different stages of self‐service IS usage. Further, we examine user perceptions that differentiate among the users situated at different self‐service IS usage stages. Data were collected in the context of a self‐service Web‐based IS to validate the post‐adoption IS usage constructs and to examine the proposed thesis. The newly developed conceptual structure and measures for post‐adoption IS usage behaviour exhibit strong psychometric properties. The analysis shows three distinct post‐adoption IS usage stages and highlights that usefulness, user‐initiated learning, ease of use, satisfaction and voluntariness of use differentiate users at the different stages of post‐adoption IS usage. The results show that these variables aggregate into value confirmation and learning orientation as two higher‐level concepts. Further, we evaluate the predictive efficacy of the research model in classifying users into different post‐adoption self‐service IS usage stages. Implications are drawn for future research.  相似文献   
39.
As telecommunication networks evolve rapidly in terms of scalability, complexity, and heterogeneity, the efficiency of fault localization procedures and the accuracy in the detection of anomalous behaviors are becoming important factors that largely influence the decision making process in large management companies. For this reason, telecommunication companies are doing a big effort investing in new technologies and projects aimed at finding efficient management solutions. One of the challenging issues for network and system management operators is that of dealing with the huge amount of alerts generated by the managed systems and networks. In order to discover anomalous behaviors and speed up fault localization processes, alert correlation is one of the most popular resources. Although many different alert correlation techniques have been investigated, it is still an active research field. In this paper, a survey of the state of the art in alert correlation techniques is presented. Unlike other authors, we consider that the correlation process is a common problem for different fields in the industry. Thus, we focus on showing the broad influence of this problem. Additionally, we suggest an alert correlation architecture capable of modeling current and prospective proposals. Finally, we also review some of the most important commercial products currently available.  相似文献   
40.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号