首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1144篇
  免费   81篇
电工技术   22篇
化学工业   313篇
金属工艺   17篇
机械仪表   30篇
建筑科学   47篇
矿业工程   1篇
能源动力   30篇
轻工业   119篇
水利工程   5篇
石油天然气   2篇
武器工业   1篇
无线电   96篇
一般工业技术   184篇
冶金工业   70篇
原子能技术   6篇
自动化技术   282篇
  2023年   6篇
  2022年   51篇
  2021年   52篇
  2020年   36篇
  2019年   35篇
  2018年   38篇
  2017年   22篇
  2016年   48篇
  2015年   45篇
  2014年   37篇
  2013年   75篇
  2012年   60篇
  2011年   84篇
  2010年   60篇
  2009年   64篇
  2008年   53篇
  2007年   50篇
  2006年   44篇
  2005年   41篇
  2004年   30篇
  2003年   37篇
  2002年   28篇
  2001年   22篇
  2000年   12篇
  1999年   15篇
  1998年   18篇
  1997年   11篇
  1996年   12篇
  1995年   17篇
  1994年   20篇
  1993年   7篇
  1992年   7篇
  1991年   3篇
  1990年   3篇
  1989年   6篇
  1988年   5篇
  1987年   2篇
  1986年   6篇
  1985年   7篇
  1984年   9篇
  1983年   6篇
  1982年   6篇
  1981年   7篇
  1980年   4篇
  1979年   4篇
  1978年   4篇
  1977年   2篇
  1976年   7篇
  1975年   2篇
  1974年   2篇
排序方式: 共有1225条查询结果,搜索用时 15 毫秒
61.
Constraint-Based Verification of Parameterized Cache Coherence Protocols   总被引:1,自引:0,他引:1  
We propose a new method for the parameterized verification of formal specifications of cache coherence protocols. The goal of parameterized verification is to establish system properties for an arbitrary number of caches. In order to achieve this purpose we define abstractions that allow us to reduce the original parameterized verification problem to a control state reachability problem for a system with integer data variables. Specifically, the methodology we propose consists of the following steps. We first define an abstraction in which we only keep track of the number of caches in a given state during the execution of a protocol. Then, we use linear arithmetic constraints to symbolically represent infinite sets of global states of the resulting abstract protocol. For reasons of efficiency, we relax the constraint operations by interpreting constraints over real numbers. Finally, we check parameterized safety properties of abstract protocols using symbolic backward reachability, a strategy that allows us to obtain sufficient conditions for termination for an interesting class of protocols. The latter problem can be solved by using the infinite-state model checker HyTech: Henzinger, Ho, and Wong-Toi, A model checker for hybrid systems, Proc. of the 9th International Conference on Computer Aided Verification (CAV'97), Lecture Notes in Computer Science, Springer, Haifa, Israel, 1997, Vol. 1254, pp. 460–463. HyTech handles linear arithmetic constraints using the polyhedra library of Halbwachs and Proy, Verification of real-time systems using linear relation analysis, Formal Methods in System Design, Vol. 11, No. 2, pp. 157–185, 1997. By using this methodology, we have automatically validated parameterized versions of widely implemented write-invalidate and write-update cache coherence protocols like Synapse, MESI, MOESI, Berkeley, Illinois, Firefly and Dragon (Handy, The Cache Memory Book, Academic Press, 1993). With this application, we have shown that symbolic model checking tools like HyTech, originally designed for the verification of hybrid systems, can be applied successfully to new classes of infinite-state systems of practical interest.  相似文献   
62.
63.
In this paper we propose a semi-automatic technique for deriving the similarity degree between two portions of heterogeneous information sources (hereafter, sub-sources). The proposed technique consists in two phases: the first one selects the most promising pairs of sub-sources, whereas the second one computes the similarity degree relative to each promising pair. We show that the detection of sub-source similarities is a special case (and a very interesting one, for semi-structured information sources) of the more general problem of Scheme Match. In addition, we present a real example case to clarify the proposed technique, a set of experiments we have conducted to verify the quality of its results, a discussion about its computational complexity and its classification in the context of related literature. Finally, we discuss some possible applications which can benefit by derived similarities.  相似文献   
64.
The paper deals with the optimisation of a tapered tubular steel component to be used as an energy-absorbing device in the front structure of a vehicle body. Aim of the optimisation problem is the minimisation of a load uniformity parameter evaluated as the ratio between the maximum and the average crushing loads. The optimisation problem takes into account two design variables describing a tapered geometrical configuration, the diameter of the component at one of its bounds and the tapering length. Two improved geometrical configurations have been found and have been experimentally tested to verify the numerical results with impact velocities up to 10 m/s.  相似文献   
65.
Integrated methodology for forensic oil spill identification   总被引:3,自引:0,他引:3  
A new integrated methodology for forensic oil spill identification is presented. It consists of GC-MS analysis, chromatographic data processing, variable-outlier detection, multivariate data analysis, estimation of uncertainties, and statistical evaluation. The methodology was tested on four groups of diagnostic ratios composed of petroleum biomarkers and ratios within homologous PAH categories. Principal component analysis (PCA) was employed and enabled the simultaneous analysis of many diagnostic ratios. Weathering was taken into account by considering the sampling uncertainties estimated from replicate spill samples. Statistical evaluation ensured an objective matching of oil spill samples with suspected source oils as well as classification into positive match, probable match, and nonmatch. The data analysis is further refined if two or more source oils are classified as probable match by using weighted least squares fitting of the principal components, local PCA models, and additional information relevant to the spill case. The methodology correctly identified the source of two spill samples (i.e., crude oils from Oseberg East and Oseberg Field Centre) and distinguished them from closely related source oils.  相似文献   
66.
A new approach for the estimation and the validation of a structural equation model with a formative-reflective scheme is presented. The basis of the paper is a proposal for overcoming a potential deficiency of PLS path modeling. In the PLS approach the reflective scheme assumed for the endogenous latent variables (LVs) is inverted; moreover, the model errors are not explicitly taken into account for the estimation of the endogenous LVs. The proposed approach utilizes all the relevant information in the formative manifest variables (MVs) providing solutions which respect the causal structure of the model. The estimation procedure is based on the optimization of the redundancy criterion. The new approach, entitled redundancy analysis approach to path modeling (RA-PM) is compared with both traditional PLS Path Modeling and LISREL methodology, on the basis of real and simulated data.  相似文献   
67.
The Internet is currently experiencing one of the most important challenges in terms of content distribution since its first uses as a medium for content delivery: users from passive downloaders and browsers are moving towards content producers and publishers. They often distribute and retrieve multimedia contents establishing network communities. This is the case of peer-to-peer IPTV communities.In this work we present a detailed study of P2P IPTV traffic, providing useful insights on both transport- and packet-level properties as well as on the behavior of the peers inside the network. In particular, we provide novel results on the (i) ports and protocols used; (ii) differences between signaling and video traffic; (iii) behavior of the traffic at different time scales; (iv) differences between TCP and UDP traffic; (v) traffic generated and received by peers; (vi) peers neighborhood and session duration. The knowledge gained thanks to this analysis is useful for several tasks, e.g. traffic identification, understanding the performance of different P2P IPTV technologies and the impact of such traffic on network nodes and links, and building more realistic models for simulations.1  相似文献   
68.
Minority Games, Local Interactions, and Endogenous Networks   总被引:4,自引:0,他引:4  
We study a local version of the Minority Game, where agents are placed on the nodes of a directed graph. Agents care about being in the minority of the group of agents they are currently linked to and employ myopic best-reply rules to choose their next-period state. We show that, in this benchmark case, the smaller the size of local networks, the larger long-run population-average payoffs. We then explore the collective behavior of the system when agents can: (i) assign weights to each link they hold and modify them over time in response to payoff signals; (ii) delete badly performing links (i.e., opponents) and replace them with randomly chosen ones. Simulations suggest that, when agents are allowed to weigh links but cannot delete/replace them, the system self-organizes into networked clusters that attain very high payoff values. These clustered configurations are not stable and can easily be disrupted, generating huge subsequent payoff drops. If, however, agents can (and are sufficiently willing to) discard badly performing connections, the system quickly converges to stable states where all agents get the highest payoff, independently of the size of the networks initially in place.JEL Classification:s C72, C73.  相似文献   
69.
Examined whether the method of constant stimuli with the standard presented first produces a constant error that depends on adaptation level. 120 university students were shown 5 series of 5 pairs of standard and variable lines. They had to decide whether the standard or the variable was longer or shorter than the preceding variable, or standard, respectively. In order to establish when the constant error occurred, the point of subjective equality was determined for each response. It was found that the 1st response was nearly random. The constant error was present from the 2nd response, and its magnitude did not change in succeeding series, contrary to expectations from adaptation-level theory. (French abstract) (PsycINFO Database Record (c) 2010 APA, all rights reserved)  相似文献   
70.
The small pore zeolite HLZ 132 exhibits, in comparison with other zeolites, an increased selectivity for the transformation of methanol to ethylene in the reaction temperature range 350–500 °C: the weight ratio of C2H4 to C3H6 in the products ranges between 1 and 4 at WHSV=2 h–1. Besides the effect of the reactant shape selectivity this fact may be interpreted by the participation of the asymmetrical methoxy groups in the surface as well as by proton-donor centres of lower acidity which do not catalyze the oligomerization of ethylene but which do the more basic molecule of propylene, thereby generating polyene-type coke.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号