全文获取类型
收费全文 | 72篇 |
免费 | 3篇 |
国内免费 | 9篇 |
专业分类
电工技术 | 2篇 |
综合类 | 1篇 |
化学工业 | 12篇 |
金属工艺 | 7篇 |
机械仪表 | 6篇 |
建筑科学 | 1篇 |
轻工业 | 2篇 |
无线电 | 5篇 |
一般工业技术 | 10篇 |
冶金工业 | 5篇 |
原子能技术 | 4篇 |
自动化技术 | 29篇 |
出版年
2019年 | 1篇 |
2018年 | 1篇 |
2015年 | 2篇 |
2014年 | 1篇 |
2013年 | 1篇 |
2011年 | 9篇 |
2010年 | 2篇 |
2009年 | 7篇 |
2008年 | 2篇 |
2007年 | 3篇 |
2006年 | 2篇 |
2005年 | 1篇 |
2004年 | 2篇 |
2003年 | 3篇 |
2002年 | 2篇 |
2001年 | 2篇 |
2000年 | 2篇 |
1999年 | 2篇 |
1998年 | 3篇 |
1997年 | 3篇 |
1996年 | 4篇 |
1995年 | 2篇 |
1994年 | 1篇 |
1992年 | 3篇 |
1991年 | 5篇 |
1990年 | 1篇 |
1989年 | 1篇 |
1988年 | 1篇 |
1987年 | 2篇 |
1984年 | 2篇 |
1983年 | 1篇 |
1982年 | 3篇 |
1979年 | 1篇 |
1978年 | 1篇 |
1977年 | 1篇 |
1976年 | 1篇 |
1975年 | 1篇 |
1974年 | 1篇 |
1972年 | 1篇 |
排序方式: 共有84条查询结果,搜索用时 984 毫秒
61.
High-temperature fatigue properties were investigated for a nickel-based superalloy 617 as a typical candidate material for high-temperature components using an advanced ultra super critical (A-USC) power plant. Creep-fatigue data obtained by strain-controlled tests at 700 ? C was analyzed for the superalloy 617 focused on position of hold at peak strain in comparison with continuously cycled tests. The fatigue life was the shortest with the hold tensile strain wave, which showed mainly intergranular fractu... 相似文献
62.
63.
Given a classC of serializable schedules, a cautiousC-scheduler is an on-line transaction scheduler that outputs schedules in classC and never resorts to rollbacks. Such a scheduler grants the current request if and only if the partial schedule it has granted so far, followed by the current request, can be extended to a schedule inC. A suitable extension is searched among the set of all possible sequences of the pending steps, which are predeclared by the transactions whose first requests have already arrived. If the partial schedule cannot be extended to a schedule inC, then the current request is delayed. An efficient cautiousCPSR-scheduler has been proposed by Casanova and Bernstein.This paper discusses cautiousWRW-scheduling, whereWRW is the largest polynomially recognizable subclass of serializable schedules currently known. Since cautiousWRW-scheduling is, in general, NP-complete as shown in this paper, we introduce, a subclass (namedWRW
#) ofWRW and discuss an efficient cautiousWRW
#-scheduler. We also show that the fixed point set of the cautiousWRW
#-scheduler properly containsCPSR. Therefore, ourWRW
#-scheduler allows more concurrency than anyCPSR- scheduler.This work was supported in part by the Natural Sciences and Engineering Research Council of Canada under Grant No. A5240 and in part by the Ministry of Education, Science and Culture of Japan under Scientific Research Grant-in-Aid. 相似文献
64.
T. Ibaraki T. K. Liu C. R. Baugh S. Muroga 《International journal of parallel programming》1972,1(1):75-92
This paper describes some techniques to improve the speed of the implicit enumeration method for solving zero-one integer programming problems. Among these techniques, the most powerful is the one of using a column vector which works as a tag for each inequality, indicating whether or not the inequality should be checked for the current partial solution. A new condition for underlining a variable and the concept of pseudo-underlining are also proposed. These techniques were implemented in the computer programil lip (ILLinois Integer Programming code). The computational results for different types of problems are discussed.This work is partly supported by NSF Grant No. GJ-503. 相似文献
65.
The problem of counting the number of cuts with the minimum cardinality in an undirected multigraph arises in various applications, such as testing the super-λ-ness of a graph, as described by F.T. Boesch (1986), and calculating upper and lower bounds on the probabilistic connectedness of a stochastic graph G in which edges are subject to failure. It is shown that the number |C ( G )| of cuts with the minimum cardinality λ(G ) in a multiple graph G =(V ,E ) can be computed in O (|E |+λ(G )|V |2 +λ(G )|C (G )||V |) time 相似文献
66.
A coterie, which is used to realize mutual exclusion in a distributed system is a family C of incomparable subsets such that every pair of subsets in C has at least one element in common. Associate with a family of subsets C a positive (i.e., monotone) Boolean function fc such that fc(x)=1 if the Boolean vector x is equal to or greater than the characteristic vector of some subset in C, and 0 otherwise. It is known that C is a coterie if and only if fc is dual-minor, and is a nondominated (ND) coterie if and only if fc is self-dual. We introduce an operator ρ, which transforms a positive self-dual function into another positive self-dual function, and the concept of almost-self-duality, which is a close approximation to self-duality and can be checked in polynomial time (the complexity of checking positive self-duality is currently unknown). After proving several interesting properties of them, we propose a simple algorithm to check whether a given positive function is self-dual or not. Although this is not a polynomial algorithm, it is practically efficient in most cases. Finally, we present an incrementally polynomial algorithm that generates all positive self-dual functions (ND coteries) by repeatedly applying p operations. Based on this algorithm, all ND coteries of up to seven variables are computed 相似文献
67.
In this paper, we address a fundamental problem related to the induction of Boolean logic: Given a set of data, represented as a set of binary “truen-vectors” (or “positive examples”) and a set of “falsen-vectors” (or “negative examples”), we establish a Boolean function (or an extension)f, so thatfis true (resp., false) in every given true (resp., false) vector. We shall further require that such an extension belongs to a certain specified class of functions, e.g., class of positive functions, class of Horn functions, and so on. The class of functions represents our a priori knowledge or hypothesis about the extensionf, which may be obtained from experience or from the analysis of mechanisms that may or may not cause the phenomena under consideration. The real-world data may contain errors, e.g., measurement and classification errors might come in when obtaining data, or there may be some other influential factors not represented as variables in the vectors. In such situations, we have to give up the goal of establishing an extension that is perfectly consistent with the given data, and we are satisfied with an extensionfhaving the minimum number of misclassifications. Both problems, i.e., the problem of finding an extension within a specified class of Boolean functions and the problem of finding a minimum error extension in that class, will be extensively studied in this paper. For certain classes we shall provide polynomial algorithms, and for other cases we prove their NP-hardness. 相似文献
68.
Toshihide Ibaraki 《International journal of parallel programming》1978,7(4):315-343
A new search strategy, called depth-m search, is proposed for branch-and-bound algorithms, wherem is a parameter to be set by the user. In particular, depth-1 search is equivalent to the conventional depth-first search, and depth- search is equivalent to the general heuristic search (including best-bound search as a special case). It is confirmed by computational experiment that the performance of depth-m search continuously changes from that, of depth-first search to that of heuristic search, whenm is changed from 1 to . The exact upper bound on the size of the required memory space is derived and shown to be bounded byO(nm), wheren is the problem size. Some methods for controllingm during computation are also proposed and compared, to carry out the entire computation within a given memory space bound. 相似文献
69.
The catalytic behaviour of potassium carbonate doped onto active carbon was investigated with respect to reduction of carbon dioxide. The distribution of potassium on the carbon surface was found by an X-ray microanalyzer to be uniform. The amount of oxygen trapped on the carbon surface during reaction was nearly proportional to the surface concentration of potassium. The catalytic activity with carbon doped with less than 2% potassium carbonate was proportional to the amount of trapped oxygen, while excessive doping by potassium was found to form trapped oxygen independently of the gasification of carbon. Disproportionation of carbon monoxide into carbon dioxide and carbon was found to take place readily at 700 °C, with carbon doped with 4.0 wt % potassium carbonate. 相似文献
70.
Endre Boros Takashi Horiyama Toshihide Ibaraki Kazuhisa Makino Mutsunori Yagiura 《Annals of Mathematics and Artificial Intelligence》2003,39(3):223-257
We consider data sets that consist of n-dimensional binary vectors representing positive and negative examples for some (possibly unknown) phenomenon. A subset S of the attributes (or variables) of such a data set is called a support set if the positive and negative examples can be distinguished by using only the attributes in S. In this paper we study the problem of finding small support sets, a frequently arising task in various fields, including knowledge discovery, data mining, learning theory, logical analysis of data, etc. We study the distribution of support sets in randomly generated data, and discuss why finding small support sets is important. We propose several measures of separation (real valued set functions over the subsets of attributes), formulate optimization models for finding the smallest subsets maximizing these measures, and devise efficient heuristic algorithms to solve these (typically NP-hard) optimization problems. We prove that several of the proposed heuristics have a guaranteed constant approximation ratio, and we report on computational experience comparing these heuristics with some others from the literature both on randomly generated and on real world data sets. 相似文献