首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1762篇
  免费   81篇
  国内免费   3篇
电工技术   22篇
综合类   2篇
化学工业   318篇
金属工艺   27篇
机械仪表   27篇
建筑科学   96篇
矿业工程   1篇
能源动力   48篇
轻工业   113篇
水利工程   18篇
石油天然气   2篇
无线电   129篇
一般工业技术   439篇
冶金工业   315篇
原子能技术   12篇
自动化技术   277篇
  2023年   10篇
  2022年   25篇
  2021年   41篇
  2020年   20篇
  2019年   30篇
  2018年   37篇
  2017年   31篇
  2016年   38篇
  2015年   45篇
  2014年   70篇
  2013年   92篇
  2012年   100篇
  2011年   140篇
  2010年   96篇
  2009年   87篇
  2008年   115篇
  2007年   130篇
  2006年   93篇
  2005年   96篇
  2004年   63篇
  2003年   55篇
  2002年   48篇
  2001年   35篇
  2000年   19篇
  1999年   30篇
  1998年   42篇
  1997年   28篇
  1996年   20篇
  1995年   18篇
  1994年   19篇
  1993年   15篇
  1992年   16篇
  1991年   5篇
  1990年   18篇
  1989年   16篇
  1988年   15篇
  1987年   11篇
  1986年   6篇
  1985年   5篇
  1984年   6篇
  1983年   6篇
  1982年   8篇
  1981年   6篇
  1979年   4篇
  1978年   5篇
  1977年   6篇
  1976年   5篇
  1966年   4篇
  1964年   2篇
  1963年   2篇
排序方式: 共有1846条查询结果,搜索用时 31 毫秒
41.
Reconstructing boundaries along material interfaces from volume fractions is a difficult problem, especially because the under‐resolved nature of the input data allows for many correct interpretations. Worse, algorithms widely accepted as appropriate for simulation are inappropriate for visualization. In this paper, we describe a new algorithm that is specifically intended for reconstructing material interfaces for visualization and analysis requirements. The algorithm performs well with respect to memory footprint and execution time, has desirable properties in various accuracy metrics, and also produces smooth surfaces with few artifacts, even when faced with more than two materials per cell.  相似文献   
42.
Instant messaging (IM) has become a popular and important mode of staying in touch for teens and young adults. It allows for easy, frequent and lightweight interaction that contributes to building and sustaining friendships, as well as coordinating social activities. Despite the initial appeal of IM, however, some have found it too distracting and have changed their usage or abandoned it. I interviewed 21 former users of IM about their adoption, usage and eventual abandonment of the technology. Results show that participants were initially attracted to features of IM that enabled them to maximize their use of leisure time via easy and frequent interaction with their friends, but that, in a different usage context, these same features became distracting and annoying. Participants adapted their behavior to avoid these drawbacks, but IM did not support these adaptations effectively. In particular, IM did not allow for control over interruptions, which became more important as their contact lists grew and social time became scarce; and they ultimately abandoned the technology. These results point to a need for understanding use beyond adoption, and a theoretical and practical focus on understanding the adaptation and changing utility that accompany long-term usage of technologies.  相似文献   
43.
This paper describes the architecture and implementation of a distributed autonomous gardening system with applications in urban/indoor precision agriculture. The garden is a mesh network of robots and plants. The gardening robots are mobile manipulators with an eye-in-hand camera. They are capable of locating plants in the garden, watering them, and locating and grasping fruit. The plants are potted cherry tomatoes enhanced with sensors and computation to monitor their well-being (e.g. soil humidity, state of fruits) and with networking to communicate servicing requests to the robots. By embedding sensing, computation, and communication into the pots, task allocation in the system is de-centrally coordinated, which makes the system scalable and robust against the failure of a centralized agent. We describe the architecture of this system and present experimental results for navigation, object recognition, and manipulation as well as challenges that lie ahead toward autonomous precision agriculture with multi-robot teams.  相似文献   
44.
This paper studies the conditions under which peer-to-peer (P2P) technology may be beneficial in providing IPTV services over typical network architectures. It has three major contributions. First, we contrast two network models used to study the performance of such a system: a commonly used logical “Internet as a cloud” model and a “physical” model that reflects the characteristics of the underlying network. Specifically, we show that the cloud model overlooks important architectural aspects of the network and may drastically overstate the benefits of P2P technology. Second, we propose an algorithm called Zebra that pre-stripes content across multiple peers during idle hours to speed up P2P content delivery in an IPTV environment with limited upload bandwidth. We also perform simulations to measure Zebra’s effectiveness at reducing load on the content server during peak hours. Third, we provide a cost-benefit analysis of P2P video content delivery, focusing on the profit trade-offs for different pricing/incentive models rather than purely on capacity maximization. In particular, we find that under high volume of video demand, a P2P built-in incentive model performs better than any other model, while the conventional no-P2P model generates more profits when the request rate is low. The flat-reward model generally falls in between the usage-based model and the built-in model in terms of profitability except for low request rates. We also find that built-in and flat-reward models are more profitable than the usage-based model for a wide range of subscriber community sizes. Funding for J. Rahe’s research has been provided by AT&T Labs, the State of California under the MICR Oprogram, and by the Toshiba Corporation. Zhen Xiao is partially supported by China MOST project (2006BAH02A10).  相似文献   
45.
We present two formalisations of the Business Process Modelling Notation (BPMN). In particular, we introduce a semantic model for BPMN in the process algebra CSP; we then study an augmentation of this model in which we introduce relative timing information, allowing one to specify timing constraints on concurrent activities. By exploiting CSP refinement, we are able to show some relationships between the timed and the untimed models. We then describe a novel empirical studies’ model, and the transformation to BPMN, allowing one to apply our formal semantics for analysing different kinds of workflows. To provide a better facility for describing behaviour specification about a BPMN diagram, we also present a pattern-based approach using which a workflow designer could specify properties which could otherwise be difficult to express. Our approach is specifically designed to allow behavioural properties of BPMN diagrams to be mechanically verified via automatic model checking as provided by the FDR tool. We use two examples to illustrate our approach.  相似文献   
46.
47.
Previously we provided two formal behavioural semantics for the Business Process Modelling Notation (BPMN) in the process algebra CSP. By exploiting CSP’s refinement orderings, developers may formally compare their BPMN models. However, BPMN is not a specification language, and it is difficult and sometimes impossible to use it to construct behavioural properties against which other BPMN models may be verified. This paper considers a pattern-based approach to expressing behavioural properties. We describe a property specification language PL for capturing a generalisation of Dwyer et al.’s Property Specification Patterns, and present a translation from PL into a bounded, positive fragment of linear temporal logic, which can then be automatically translated into CSP for simple refinement checking. We present a detailed example studying the behavioural properties of an airline ticket reservation business process. Using the same example we also describe some recent results on expressing behavioural compatibility within our semantic models. These results lead to a compositional approach for ensuring deadlock freedom of interacting business processes.  相似文献   
48.
A circular-arc model ℳ is a circle C together with a collection A\mathcal{A} of arcs of C. If A\mathcal{A} satisfies the Helly Property then ℳ is a Helly circular-arc model. A (Helly) circular-arc graph is the intersection graph of a (Helly) circular-arc model. Circular-arc graphs and their subclasses have been the object of a great deal of attention in the literature. Linear-time recognition algorithms have been described both for the general class and for some of its subclasses. However, for Helly circular-arc graphs, the best recognition algorithm is that by Gavril, whose complexity is O(n 3). In this article, we describe different characterizations for Helly circular-arc graphs, including a characterization by forbidden induced subgraphs for the class. The characterizations lead to a linear-time recognition algorithm for recognizing graphs of this class. The algorithm also produces certificates for a negative answer, by exhibiting a forbidden subgraph of it, within this same bound.  相似文献   
49.
50.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号