首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   437篇
  免费   17篇
电工技术   2篇
综合类   1篇
化学工业   68篇
金属工艺   5篇
机械仪表   8篇
建筑科学   12篇
矿业工程   5篇
能源动力   13篇
轻工业   61篇
水利工程   4篇
石油天然气   2篇
无线电   48篇
一般工业技术   48篇
冶金工业   22篇
原子能技术   2篇
自动化技术   153篇
  2024年   1篇
  2023年   2篇
  2022年   11篇
  2021年   14篇
  2020年   14篇
  2019年   16篇
  2018年   14篇
  2017年   17篇
  2016年   16篇
  2015年   19篇
  2014年   18篇
  2013年   26篇
  2012年   26篇
  2011年   27篇
  2010年   30篇
  2009年   32篇
  2008年   20篇
  2007年   19篇
  2006年   18篇
  2005年   18篇
  2004年   15篇
  2003年   10篇
  2002年   10篇
  2001年   6篇
  2000年   3篇
  1999年   7篇
  1998年   11篇
  1997年   4篇
  1996年   3篇
  1995年   5篇
  1994年   5篇
  1993年   3篇
  1992年   1篇
  1991年   1篇
  1990年   2篇
  1989年   1篇
  1988年   3篇
  1984年   1篇
  1983年   1篇
  1982年   1篇
  1980年   1篇
  1976年   1篇
  1964年   1篇
排序方式: 共有454条查询结果,搜索用时 12 毫秒
31.
In this article we provide a theoretically informed empirical analysis of the introduction and use of information and communication technology (ICT) within the primary health care (PHC) sector of Mozambique. The theoretical lens for this analysis is developed from Manuel Castells' (1996, 1997, 2001) ideas on the network society and counter domination. These ideas help us to conceptualize the communicative action required to strengthen the PHC sector as a “counter network,” which has the normative aim to strengthen the health information system (HIS) as a key strategy to improve health care delivery. Taking an informational perspective, the role of communication is highlighted as playing an important constitutive basis in the strengthening of this network. These conceptual ideas are applied to the empirical analysis of an ongoing project (the Health Information Systems Programme or HISP), and to analyze some key constraints and strategies for strengthening these networks. This study makes key contributions to both the theoretical and practical domains of HIS in developing countries. © 2005 Wiley Periodicals, Inc.  相似文献   
32.
Context-based caching and routing for P2P web service discovery   总被引:1,自引:0,他引:1  
In modern heterogeneous environments, such as mobile, pervasive and ad-hoc networks, architectures based on web services offer an attractive solution for effective communication and inter-operation. In such dynamic and rapidly evolving environments, efficient web service discovery is an important task. Usually this task is based on the input/output parameters or other functional attributes, however this does not guarantee the validity or successful utilization of retrieved web services. Instead, non-functional attributes, such as device power features, computational resources and connectivity status, that characterize the context of both service providers and consumers play an important role to the quality and usability of discovery results. In this paper we introduce context-awareness in web service discovery, enabling the provision of the most appropriate services at the right location and time. We focus on context-based caching and routing for improving web service discovery in a mobile peer-to-peer environment. We conducted a thorough experimental study, using our prototype implementation based on the JXTA framework, while simulations are employed for testing the scalability of the approach. We illustrate the advantages that this approach offers, both by evaluating the context-based cache performance and by comparing the efficiency of location-based routing to broadcast-based approaches. Recommended by: Zakaria Maamar  相似文献   
33.
Three-dimensional linear instability analyses are presented of steady two-dimensional laminar flows in the lid-driven cavity defined by [15] and further analyzed in the present volume [1], as well as in a derivative of the same geometry. It is shown that in both of the geometries considered three-dimensional BiGlobal instability leads to deviation of the flow from the two-dimensional solution; the analysis results are used to define low- and high-Reynolds number solutions by reference to the flow physics. Critical conditions for linear global instability and neutral loops are presented in both geometries.  相似文献   
34.
35.
For the effective alignment of ontologies, the subsumption mappings between the elements of the source and target ontologies play a crucial role, as much as equivalence mappings do. This paper presents the “Classification-Based Learning of Subsumption Relations” (CSR) method for the alignment of ontologies. Given a pair of two ontologies, the objective of CSR is to learn patterns of features that provide evidence for the subsumption relation among concepts, and thus, decide whether a pair of concepts from these ontologies is related via a subsumption relation. This is achieved by means of a classification task, using state of the art supervised machine learning methods. The paper describes thoroughly the method, provides experimental results over an extended version of benchmarking series of both artificially created and real world cases, and discusses the potential of the method.  相似文献   
36.
37.
38.
Active Queue Management is a convenient way to administer the network load without increasing the complexity of end-user protocols. Current AQM techniques work in two ways; the router either drops some of its packets with a given probability or creates different queues with corresponding priorities. Head-to-Tail introduces a novel AQM approach: the packet rearrange scheme. Instead of dropping, HtT rearranges packets, moving them from the head of the queue to its tail. The additional queuing delay triggers a sending rate decrease and congestion events can be avoided. The HtT scheme avoids explicit packet drops and extensive retransmission delays. In this work, we detail the HtT algorithm and demonstrate when and how it outperforms current AQM implementations. We also approach analytically its impact on packet delay and conduct extensive simulations. Our experiments show that HtT achieves better results than Droptail and RED methods in terms of retransmitted packets and Goodput.  相似文献   
39.
A naturalistic field observation study is presented, exploring the experienced riders’ eye fixations on specific traffic objects and their relative s  相似文献   
40.
A graph G was defined in [16] as P4-reducible, if no vertex in G belongs to more than one chordless path on four vertices or P4. A graph G is defined in [15] as P4-sparse if no set of five vertices induces more than one P4, in G. P4-sparse graphs generalize both P4-reducible and the well known class of p4-free graphs or cographs. In an extended abstract in [11] the first author introduced a method using the modular decomposition tree of a graph as the framework for the resolution of algorithmic problems. This method was applied to the study of P4-sparse and extended P4-sparse graphs.

In this paper, we begin by presenting the complete information about the method used in [11]. We propose a unique tree representation of P4-sparse and a unique tree representation of P4-reducible graphs leading to a simple linear recognition algorithm for both classes of graphs. In this way we simplify and unify the solutions for these problems, presented in [16–19]. The tree representation of an n-vertex P4-sparse or a P4-reducible graph is the key for obtaining O(n) time algorithms for the weighted version of classical optimization problems solved in [20]. These problems are NP-complete on general graphs.

Finally, by relaxing the restriction concerning the exclusion of the C5 cycles from P4-sparse and P4-reducible graphs, we introduce the class of the extended P4-sparse and the class of the extendedP4-reducible graphs. We then show that a minimal amount of additional work suffices for extending most of our algorithms to these new classes of graphs.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号