首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   2443篇
  免费   37篇
  国内免费   7篇
电工技术   21篇
综合类   1篇
化学工业   238篇
金属工艺   59篇
机械仪表   46篇
建筑科学   77篇
矿业工程   7篇
能源动力   26篇
轻工业   116篇
水利工程   21篇
石油天然气   9篇
无线电   120篇
一般工业技术   202篇
冶金工业   1305篇
原子能技术   28篇
自动化技术   211篇
  2021年   10篇
  2020年   12篇
  2019年   12篇
  2018年   20篇
  2017年   16篇
  2016年   30篇
  2015年   19篇
  2014年   18篇
  2013年   66篇
  2012年   37篇
  2011年   38篇
  2010年   35篇
  2009年   47篇
  2008年   54篇
  2007年   44篇
  2006年   40篇
  2005年   41篇
  2004年   29篇
  2003年   34篇
  2002年   23篇
  2001年   38篇
  2000年   39篇
  1999年   63篇
  1998年   405篇
  1997年   257篇
  1996年   192篇
  1995年   101篇
  1994年   88篇
  1993年   86篇
  1992年   17篇
  1991年   35篇
  1990年   31篇
  1989年   33篇
  1988年   23篇
  1987年   23篇
  1986年   35篇
  1985年   34篇
  1984年   22篇
  1983年   15篇
  1982年   26篇
  1981年   17篇
  1980年   31篇
  1979年   14篇
  1978年   11篇
  1977年   37篇
  1976年   84篇
  1975年   14篇
  1974年   10篇
  1973年   10篇
  1971年   9篇
排序方式: 共有2487条查询结果,搜索用时 15 毫秒
41.
This paper presents an automated and compositional procedure to solve the substitutability problem in the context of evolving software systems. Our solution contributes two techniques for checking correctness of software upgrades: (1) a technique based on simultaneous use of over-and under-approximations obtained via existential and universal abstractions; (2) a dynamic assume-guarantee reasoning algorithm—previously generated component assumptions are reused and altered on-the-fly to prove or disprove the global safety properties on the updated system. When upgrades are found to be non-substitutable, our solution generates constructive feedback to developers showing how to improve the components. The substitutability approach has been implemented and validated in the ComFoRT reasoning framework, and we report encouraging results on an industrial benchmark. This is an extended version of a paper, Dynamic Component Substitutability Analysis, published in the Proceedings of the Formal Methods 2005 Conference, Lecture Notes in Computer Science, vol. 3582, by the same authors. This research was sponsored by the National Science Foundation under grant nos. CNS-0411152, CCF-0429120, CCR-0121547, and CCR-0098072, the Semiconductor Research Corporation under grant no. TJ-1366, the US Army Research Office under grant no. DAAD19-01-1-0485, the Office of Naval Research under grant no. N00014-01-1-0796, the ICAST project and the Predictable Assembly from Certifiable Components (PACC) initiative at the Software Engineering Institute, Carnegie Mellon University. The views and conclusions contained in this document are those of the authors and should not be interpreted as representing the official policies, either expressed or implied, of any sponsoring institution, the US government or any other entity.  相似文献   
42.
The remote nature of telepresence scenarios can be seen as a strongpoint and also as a weakness. Although it enables the remote control of robots in dangerous or inaccessible environments, it necessarily involves some kind of communication mechanism for the transmission of control signals. This communication mechanism necessarily involves adverse network effects such as delay. Three mechanisms aimed at improving the effects of network delay are presented in this paper: (1) Motion prediction to partially compensate for network delays, (2) force prediction to learn a local force model, thereby reducing dependency on delayed force signals, and (3) haptic data compression to reduce the required bandwidth of high frequency data. The utilized motion prediction scheme was shown to improve operator performance, but had no influence on operator immersion. The force prediction provided haptic feedback through synchronous forces from the local model, thereby stabilizing the control loop. The developed haptic data compression scheme reduced the number of packets sent across the network by 90%, while improving the quality of the haptic feedback.  相似文献   
43.
Within a fungal species, a subset of individuals may have more than the minimal complement of chromosomes. If the extra chromosomes are composed primarily of DNA not found in all representatives of the species, they are most appropriately referred to as supernumerary chromosomes. The patterns of repeated DNA sequences on certain supernumerary chromosomes suggest that they have a different evolutionary history from the essential chromosomes in the same genome. Supernumerary chromosomes can carry functional genes and, in at least two fungal species, genes on such chromosomes play important roles in host-pathogen interactions. Supernumerary chromosomes that confer an adaptive advantage in certain habitats, such as the ability to cause disease on a specific host, may be referred to as "conditionally dispensable" chromosomes in order to reflect their importance in some, but not all, growth conditions. In addition to describing the structural and functional characteristics of known supernumerary chromosomes in fungi, this review discusses the relative merits of the terms that have been used to describe them, and establishes experimental criteria for their identification.  相似文献   
44.
Despite a general national decline in criminal activities in the 1990s, juvenile criminal offenses continue to increase, (including violent, property, and delinquency acts). In addition increased numbers of children are being held in juvenile jails. It is all but impossible for pediatric health providers to think that "their patients" and "their practices" are immune from the epidemic of crime that affects and is caused by "just kids."  相似文献   
45.

Introduction

Subjective workload measures are usually administered in a visual-manual format, either electronically or by paper and pencil. However, vocal responses to spoken queries may sometimes be preferable, for example when experimental manipulations require continuous manual responding or when participants have certain sensory/motor impairments. In the present study, we evaluated the acceptability of the hands-free administration of two subjective workload questionnaires - the NASA Task Load Index (NASA-TLX) and the Multiple Resources Questionnaire (MRQ) - in a surgical training environment where manual responding is often constrained.

Method

Sixty-four undergraduates performed fifteen 90-s trials of laparoscopic training tasks (five replications of 3 tasks - cannulation, ring transfer, and rope manipulation). Half of the participants provided workload ratings using a traditional paper-and-pencil version of the NASA-TLX and MRQ; the remainder used a vocal (hands-free) version of the questionnaires. A follow-up experiment extended the evaluation of the hands-free version to actual medical students in a Minimally Invasive Surgery (MIS) training facility.

Results

The NASA-TLX was scored in 2 ways - (1) the traditional procedure using participant-specific weights to combine its 6 subscales, and (2) a simplified procedure - the NASA Raw Task Load Index (NASA-RTLX) - using the unweighted mean of the subscale scores. Comparison of the scores obtained from the hands-free and written administration conditions yielded coefficients of equivalence of r = 0.85 (NASA-TLX) and r = 0.81 (NASA-RTLX). Equivalence estimates for the individual subscales ranged from r = 0.78 (“mental demand”) to r = 0.31 (“effort”). Both administration formats and scoring methods were equally sensitive to task and repetition effects. For the MRQ, the coefficient of equivalence for the hands-free and written versions was r = 0.96 when tested on undergraduates. However, the sensitivity of the hands-free MRQ to task demands (ηpartial2 = 0.138) was substantially less than that for the written version (ηpartial2 = 0.252). This potential shortcoming of the hands-free MRQ did not seem to generalize to medical students who showed robust task effects when using the hands-free MRQ (ηpartial2 = 0.396). A detailed analysis of the MRQ subscales also revealed differences that may be attributable to a “spillover” effect in which participants’ judgments about the demands of completing the questionnaires contaminated their judgments about the primary surgical training tasks.

Conclusion

Vocal versions of the NASA-TLX are acceptable alternatives to standard written formats when researchers wish to obtain global workload estimates. However, care should be used when interpreting the individual subscales if the object is to make comparisons between studies or conditions that use different administration modalities. For the MRQ, the vocal version was less sensitive to experimental manipulations than its written counterpart; however, when medical students rather than undergraduates used the vocal version, the instrument’s sensitivity increased well beyond that obtained with any other combination of administration modality and instrument in this study. Thus, the vocal version of the MRQ may be an acceptable workload assessment technique for selected populations, and it may even be a suitable substitute for the NASA-TLX.  相似文献   
46.
47.
Satellite images, along with oceanographic, meteorological, and whale aerial survey data, are used to illustrate aspects of ocean circulation associated with a bowhead whale feeding ‘hotspot’ near Barrow, Alaska. In response to weak winds, a strong front forms near the shelf-break along the southern edge of Barrow Canyon when the Alaska Coastal Current flows adjacent to the southern flank of Barrow Canyon or intrudes onto the western Beaufort shelf. This front is of particular local interest because it is indicative of aggregation and retention of zooplankton on the western Beaufort shelf and, as a result, is a locus for bowhead whales pausing to feed during their westward fall migration. Groups (4 or more individuals) of bowhead whales are primarily seen on the western Beaufort shelf following wind conditions that promote the formation of this front.  相似文献   
48.
New viruses spread faster than ever and current signature based detection do not protect against these unknown viruses. Behavior based detection is the currently preferred defense against unknown viruses. The drawback of behavior based detection is the ability only to detect specific classes of viruses or have successful detection under certain conditions plus false positives. This paper presents a characterization of virus replication which is the only virus characteristic guaranteed to be consistently present in all viruses. Two detection models based on virus replication are developed, one using operation sequence matching and the other using frequency measures. Regression analysis was generated for both models. A safe list is used to minimize false positives. In our testing using operation sequence matching, over 250 viruses were detected with 43 subsequences. There were minimal false negatives. The replication sequence of just one virus detected 130 viruses, 45% of all tested viruses. Our testing using frequency measures detected all test viruses with no false negatives. The paper shows that virus replication can be identified and used to detect known and unknown viruses.  相似文献   
49.
Bounded Model Checking Using Satisfiability Solving   总被引:10,自引:1,他引:9  
The phrase model checking refers to algorithms for exploring the state space of a transition system to determine if it obeys a specification of its intended behavior. These algorithms can perform exhaustive verification in a highly automatic manner, and, thus, have attracted much interest in industry. Model checking programs are now being commercially marketed. However, model checking has been held back by the state explosion problem, which is the problem that the number of states in a system grows exponentially in the number of system components. Much research has been devoted to ameliorating this problem.In this tutorial, we first give a brief overview of the history of model checking to date, and then focus on recent techniques that combine model checking with satisfiability solving. These techniques, known as bounded model checking, do a very fast exploration of the state space, and for some types of problems seem to offer large performance improvements over previous approaches. We review experiments with bounded model checking on both public domain and industrial designs, and propose a methodology for applying the technique in industry for invariance checking. We then summarize the pros and cons of this new technology and discuss future research efforts to extend its capabilities.  相似文献   
50.
Knowledge is increasingly recognized as the key resource of business. Digital networks provide access to vast amounts of data and information but knowledge management tools and systems are required to translate this in a meaningful way. Knowledge management initiatives are unlikely to be successful unless they are integrated with business strategy, and related to the development of the core capabilities of the organisation. Sharing the discovery and synthesis of intellectual activity involves the creation of knowledge communities of practice. There is much evidence of commercially inspired corporate initiatives in this direction across all industrial sectors: leveraging existing intellectual capital; sharing best practice across multiple locations; data mining to build customer relationships; and creating knowledge networks to allow state–of–the–art solutions in professional services.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号