全文获取类型
收费全文 | 1144篇 |
免费 | 81篇 |
专业分类
电工技术 | 22篇 |
化学工业 | 313篇 |
金属工艺 | 17篇 |
机械仪表 | 30篇 |
建筑科学 | 47篇 |
矿业工程 | 1篇 |
能源动力 | 30篇 |
轻工业 | 119篇 |
水利工程 | 5篇 |
石油天然气 | 2篇 |
武器工业 | 1篇 |
无线电 | 96篇 |
一般工业技术 | 184篇 |
冶金工业 | 70篇 |
原子能技术 | 6篇 |
自动化技术 | 282篇 |
出版年
2023年 | 6篇 |
2022年 | 51篇 |
2021年 | 52篇 |
2020年 | 36篇 |
2019年 | 35篇 |
2018年 | 38篇 |
2017年 | 22篇 |
2016年 | 48篇 |
2015年 | 45篇 |
2014年 | 37篇 |
2013年 | 75篇 |
2012年 | 60篇 |
2011年 | 84篇 |
2010年 | 60篇 |
2009年 | 64篇 |
2008年 | 53篇 |
2007年 | 50篇 |
2006年 | 44篇 |
2005年 | 41篇 |
2004年 | 30篇 |
2003年 | 37篇 |
2002年 | 28篇 |
2001年 | 22篇 |
2000年 | 12篇 |
1999年 | 15篇 |
1998年 | 18篇 |
1997年 | 11篇 |
1996年 | 12篇 |
1995年 | 17篇 |
1994年 | 20篇 |
1993年 | 7篇 |
1992年 | 7篇 |
1991年 | 3篇 |
1990年 | 3篇 |
1989年 | 6篇 |
1988年 | 5篇 |
1987年 | 2篇 |
1986年 | 6篇 |
1985年 | 7篇 |
1984年 | 9篇 |
1983年 | 6篇 |
1982年 | 6篇 |
1981年 | 7篇 |
1980年 | 4篇 |
1979年 | 4篇 |
1978年 | 4篇 |
1977年 | 2篇 |
1976年 | 7篇 |
1975年 | 2篇 |
1974年 | 2篇 |
排序方式: 共有1225条查询结果,搜索用时 15 毫秒
61.
Giorgio Delzanno 《Formal Methods in System Design》2003,23(3):257-301
We propose a new method for the parameterized verification of formal specifications of cache coherence protocols. The goal of parameterized verification is to establish system properties for an arbitrary number of caches. In order to achieve this purpose we define abstractions that allow us to reduce the original parameterized verification problem to a control state reachability problem for a system with integer data variables. Specifically, the methodology we propose consists of the following steps. We first define an abstraction in which we only keep track of the number of caches in a given state during the execution of a protocol. Then, we use linear arithmetic constraints to symbolically represent infinite sets of global states of the resulting abstract protocol. For reasons of efficiency, we relax the constraint operations by interpreting constraints over real numbers. Finally, we check parameterized safety properties of abstract protocols using symbolic backward reachability, a strategy that allows us to obtain sufficient conditions for termination for an interesting class of protocols. The latter problem can be solved by using the infinite-state model checker HyTech: Henzinger, Ho, and Wong-Toi, A model checker for hybrid systems, Proc. of the 9th International Conference on Computer Aided Verification (CAV'97), Lecture Notes in Computer Science, Springer, Haifa, Israel, 1997, Vol. 1254, pp. 460–463. HyTech handles linear arithmetic constraints using the polyhedra library of Halbwachs and Proy, Verification of real-time systems using linear relation analysis, Formal Methods in System Design, Vol. 11, No. 2, pp. 157–185, 1997. By using this methodology, we have automatically validated parameterized versions of widely implemented write-invalidate and write-update cache coherence protocols like Synapse, MESI, MOESI, Berkeley, Illinois, Firefly and Dragon (Handy, The Cache Memory Book, Academic Press, 1993). With this application, we have shown that symbolic model checking tools like HyTech, originally designed for the verification of hybrid systems, can be applied successfully to new classes of infinite-state systems of practical interest. 相似文献
62.
63.
A Technique for Extracting Sub-source Similarities from Information Sources Having Different Formats
In this paper we propose a semi-automatic technique for deriving the similarity degree between two portions of heterogeneous information sources (hereafter, sub-sources). The proposed technique consists in two phases: the first one selects the most promising pairs of sub-sources, whereas the second one computes the similarity degree relative to each promising pair. We show that the detection of sub-source similarities is a special case (and a very interesting one, for semi-structured information sources) of the more general problem of Scheme Match. In addition, we present a real example case to clarify the proposed technique, a set of experiments we have conducted to verify the quality of its results, a discussion about its computational complexity and its classification in the context of related literature. Finally, we discuss some possible applications which can benefit by derived similarities. 相似文献
64.
The paper deals with the optimisation of a tapered tubular steel component to be used as an energy-absorbing device in the front structure of a vehicle body. Aim of the optimisation problem is the minimisation of a load uniformity parameter evaluated as the ratio between the maximum and the average crushing loads. The optimisation problem takes into account two design variables describing a tapered geometrical configuration, the diameter of the component at one of its bounds and the tapering length. Two improved geometrical configurations have been found and have been experimentally tested to verify the numerical results with impact velocities up to 10 m/s. 相似文献
65.
Integrated methodology for forensic oil spill identification 总被引:3,自引:0,他引:3
Christensen JH Hansen AB Tomasi G Mortensen J Andersen O 《Environmental science & technology》2004,38(10):2912-2918
A new integrated methodology for forensic oil spill identification is presented. It consists of GC-MS analysis, chromatographic data processing, variable-outlier detection, multivariate data analysis, estimation of uncertainties, and statistical evaluation. The methodology was tested on four groups of diagnostic ratios composed of petroleum biomarkers and ratios within homologous PAH categories. Principal component analysis (PCA) was employed and enabled the simultaneous analysis of many diagnostic ratios. Weathering was taken into account by considering the sampling uncertainties estimated from replicate spill samples. Statistical evaluation ensured an objective matching of oil spill samples with suspected source oils as well as classification into positive match, probable match, and nonmatch. The data analysis is further refined if two or more source oils are classified as probable match by using weighted least squares fitting of the principal components, local PCA models, and additional information relevant to the spill case. The methodology correctly identified the source of two spill samples (i.e., crude oils from Oseberg East and Oseberg Field Centre) and distinguished them from closely related source oils. 相似文献
66.
Giorgio Vittadini Marco Fattore Pietro G. Lovaglio 《Computational statistics & data analysis》2007,51(12):5828-5846
A new approach for the estimation and the validation of a structural equation model with a formative-reflective scheme is presented. The basis of the paper is a proposal for overcoming a potential deficiency of PLS path modeling. In the PLS approach the reflective scheme assumed for the endogenous latent variables (LVs) is inverted; moreover, the model errors are not explicitly taken into account for the estimation of the endogenous LVs. The proposed approach utilizes all the relevant information in the formative manifest variables (MVs) providing solutions which respect the causal structure of the model. The estimation procedure is based on the optimization of the redundancy criterion. The new approach, entitled redundancy analysis approach to path modeling (RA-PM) is compared with both traditional PLS Path Modeling and LISREL methodology, on the basis of real and simulated data. 相似文献
67.
Thomas Silverston Olivier Fourmaux Alessio Botta Alberto Dainotti Antonio Pescapé Giorgio Ventre Kavé Salamatian 《Computer Networks》2009,53(4):470-484
The Internet is currently experiencing one of the most important challenges in terms of content distribution since its first uses as a medium for content delivery: users from passive downloaders and browsers are moving towards content producers and publishers. They often distribute and retrieve multimedia contents establishing network communities. This is the case of peer-to-peer IPTV communities.In this work we present a detailed study of P2P IPTV traffic, providing useful insights on both transport- and packet-level properties as well as on the behavior of the peers inside the network. In particular, we provide novel results on the (i) ports and protocols used; (ii) differences between signaling and video traffic; (iii) behavior of the traffic at different time scales; (iv) differences between TCP and UDP traffic; (v) traffic generated and received by peers; (vi) peers neighborhood and session duration. The knowledge gained thanks to this analysis is useful for several tasks, e.g. traffic identification, understanding the performance of different P2P IPTV technologies and the impact of such traffic on network nodes and links, and building more realistic models for simulations.1 相似文献
68.
Minority Games, Local Interactions, and Endogenous Networks 总被引:4,自引:0,他引:4
We study a local version of the Minority Game, where agents are placed on the nodes of a directed graph. Agents care about being in the minority of the group of agents they are currently linked to and employ myopic best-reply rules to choose their next-period state. We show that, in this benchmark case, the smaller the size of local networks, the larger long-run population-average payoffs. We then explore the collective behavior of the system when agents can: (i) assign weights to each link they hold and modify them over time in response to payoff signals; (ii) delete badly performing links (i.e., opponents) and replace them with randomly chosen ones. Simulations suggest that, when agents are allowed to weigh links but cannot delete/replace them, the system self-organizes into networked clusters that attain very high payoff values. These clustered configurations are not stable and can easily be disrupted, generating huge subsequent payoff drops. If, however, agents can (and are sufficiently willing to) discard badly performing connections, the system quickly converges to stable states where all agents get the highest payoff, independently of the size of the networks initially in place.JEL Classification:s C72, C73. 相似文献
69.
Masin Sergio C.; Mazzoni Giuliana; Vallortigara Giorgio 《Canadian Metallurgical Quarterly》1987,41(1):80
Examined whether the method of constant stimuli with the standard presented first produces a constant error that depends on adaptation level. 120 university students were shown 5 series of 5 pairs of standard and variable lines. They had to decide whether the standard or the variable was longer or shorter than the preceding variable, or standard, respectively. In order to establish when the constant error occurred, the point of subjective equality was determined for each response. It was found that the 1st response was nearly random. The constant error was present from the 2nd response, and its magnitude did not change in succeeding series, contrary to expectations from adaptation-level theory. (French abstract) (PsycINFO Database Record (c) 2010 APA, all rights reserved) 相似文献
70.
Zdena Tvarůžková Magda Tupá Pavel Jírů Alfonso Nastro Giorgio Giordano Ferruccio Trifiró 《Catalysis Letters》1989,2(6):369-374
The small pore zeolite HLZ 132 exhibits, in comparison with other zeolites, an increased selectivity for the transformation of methanol to ethylene in the reaction temperature range 350–500 °C: the weight ratio of C2H4 to C3H6 in the products ranges between 1 and 4 at WHSV=2 h–1. Besides the effect of the reactant shape selectivity this fact may be interpreted by the participation of the asymmetrical methoxy groups in the surface as well as by proton-donor centres of lower acidity which do not catalyze the oligomerization of ethylene but which do the more basic molecule of propylene, thereby generating polyene-type coke. 相似文献