首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   2386篇
  免费   115篇
  国内免费   1篇
电工技术   17篇
综合类   4篇
化学工业   531篇
金属工艺   40篇
机械仪表   53篇
建筑科学   218篇
矿业工程   1篇
能源动力   115篇
轻工业   265篇
水利工程   40篇
石油天然气   5篇
无线电   148篇
一般工业技术   449篇
冶金工业   132篇
原子能技术   18篇
自动化技术   466篇
  2023年   25篇
  2022年   40篇
  2021年   54篇
  2020年   43篇
  2019年   52篇
  2018年   63篇
  2017年   55篇
  2016年   67篇
  2015年   61篇
  2014年   89篇
  2013年   169篇
  2012年   142篇
  2011年   161篇
  2010年   138篇
  2009年   120篇
  2008年   145篇
  2007年   125篇
  2006年   114篇
  2005年   105篇
  2004年   96篇
  2003年   74篇
  2002年   81篇
  2001年   34篇
  2000年   31篇
  1999年   34篇
  1998年   40篇
  1997年   27篇
  1996年   26篇
  1995年   21篇
  1994年   25篇
  1993年   24篇
  1992年   15篇
  1991年   10篇
  1990年   8篇
  1989年   11篇
  1988年   9篇
  1987年   11篇
  1984年   9篇
  1983年   6篇
  1982年   8篇
  1981年   6篇
  1980年   6篇
  1978年   8篇
  1943年   16篇
  1942年   12篇
  1941年   8篇
  1940年   8篇
  1939年   7篇
  1938年   5篇
  1937年   5篇
排序方式: 共有2502条查询结果,搜索用时 328 毫秒
991.
Many important machine learning models, supervised and unsupervised, are based on simple Euclidean distance or orthogonal projection in a high dimensional feature space. When estimating such models from small training sets we face the problem that the span of the training data set input vectors is not the full input space. Hence, when applying the model to future data the model is effectively blind to the missed orthogonal subspace. This can lead to an inflated variance of hidden variables estimated in the training set and when the model is applied to test data we may find that the hidden variables follow a different probability law with less variance. While the problem and basic means to reconstruct and deflate are well understood in unsupervised learning, the case of supervised learning is less well understood. We here investigate the effect of variance inflation in supervised learning including the case of Support Vector Machines (SVMS) and we propose a non-parametric scheme to restore proper generalizability. We illustrate the algorithm and its ability to restore performance on a wide range of benchmark data sets.  相似文献   
992.
Run‐time monitoring is an important technique to detect erroneous run‐time behaviors. Several techniques have been proposed to automatically generate monitors from specification languages to check temporal and real‐time properties. However, monitoring of probabilistic properties still requires manual generation. To overcome this problem, we define a formal property specification language called Probabilistic Timed Property Sequence Chart (PTPSC). PTPSC is a probabilistic and timed extension of the existing scenario‐based specification formalism Property Sequence Chart (PSC). We have defined a formal grammar‐based syntax and have implemented a syntax‐directed translator that can automatically generate a probabilistic monitor which combines timed B”uchi automata and a sequential statistical hypothesis test process. We validate the generated monitors with a set of experiments performed with our tool WS‐PSC Monitor. Copyright © 2011 John Wiley & Sons, Ltd.  相似文献   
993.
HTTPS enables secure access to web content and web-based services. Although supported by many content and service providers, HTTPS is oftentimes not enabled by default, as pointed out in an open letter sent to Google by security experts. In this article, we discuss if and how web users can protect themselves by using HTTPS instead of HTTP. We show that many websites allow for accessing content by HTTPS instead of HTTP. However, HTTPS access must be manually configured or requested by the user, or is impossible at all, e.g., for embedded objects. For this reason, we explore how to protect users transparently by automatically using HTTPS whenever possible. In order to enable this approach, one needs to determine whether using HTTPS yields the same content as using HTTP, even in the presence of dynamic websites incorporating advertisements and news. We show that this decision is possible for entire websites like amazon.com in short time by combining a fast content comparison algorithm, result caching, and observations on the structure of the website. Besides the concrete HTTP use case considered in this article, our results are of independent interest for any setting in which content can be accessed by various means. Finally, we present and discuss different approaches for implementing automated protection of HTTP connections.  相似文献   
994.
A thermophilic anaerobic bacterium was isolated from a sublacustrine hydrothermal vent site in Lake Tanganyika (East Africa) with recorded fluid temperatures of 66-103 °C and pH values of 7.7-8.9. The bacterium (strain TR10) was rod-shaped, about 1 by 5 μm in size, and readily formed distal endospores. Based on the 16 S rDNA sequence the novel strain was homologous to Thermobrachium celere and Caloramator indicus, which are closely related. The novel strain was strictly anaerobic, fermentative and had a doubling time as short as 10 min during growth on complex substrates, such as yeast extract and peptone. The optimum temperature for growth was 60 °C, while minimum and maximum temperatures were 40 and 75 °C. The pH response was alkalitolerant with optimum pH at 7.4 and 8.5 depending on the growth medium. The distinct feature of rapid proliferation and endospore formation may allow the novel organism to exploit the temporarily fluctuating growth conditions in the hydrothermal vent environments of Lake Tanganyika.  相似文献   
995.
In this paper, we review possible strategies for handling missing values in separate-and-conquer rule learning algorithms, and compare them experimentally on a large number of datasets. In particular through a careful study with data with controlled levels of missing values we get additional insights on the strategies’ different biases w.r.t. attributes with missing values. Somewhat surprisingly, a strategy that implements a strong bias against the use of attributes with missing values, exhibits the best average performance on 24 datasets from the UCI repository.  相似文献   
996.
We present a symbolic extension of dependency graphs by Liu and Smolka in to model-check weighted Kripke structures against the computation tree logic with upper-bound weight constraints. Our extension introduces a new type of edges into dependency graphs and lifts the computation of fixed-points from boolean domain to nonnegative integers to cope with the weights. We present both global and local algorithms for the fixed-point computation on symbolic dependency graphs and argue for the advantages of our approach compared to the direct encoding of the model-checking problem into dependency graphs. We implement all algorithms in a publicly available tool and evaluate them on several experiments. The principal conclusion is that our local algorithm is the most efficient one with an order of magnitude improvement for model checking problems with a high number of “witnesses”.  相似文献   
997.
The moving k nearest neighbor (MkNN) query continuously finds the k nearest neighbors of a moving query point. MkNN queries can be efficiently processed through the use of safe regions. In general, a safe region is a region within which the query point can move without changing the query answer. This paper presents an incremental safe-region-based technique for answering MkNN queries, called the V*-Diagram, as well as analysis and evaluation of its associated algorithm, V*-kNN. Traditional safe-region approaches compute a safe region based on the data objects but independent of the query location. Our approach exploits the knowledge of the query location and the boundary of the search space in addition to the data objects. As a result, V*-kNN has much smaller I/O and computation costs than existing methods. We further provide cost models to estimate the number of data accesses for V*-kNN and a competitive technique, RIS-kNN. The V*-Diagram and V*-kNN are also applicable to the domain of spatial networks and we present algorithms to construct a spatial-network V*-Diagram. Our experimental results show that V*-kNN significantly outperforms the competitive technique. The results also verify the accuracy of the cost models.  相似文献   
998.
Wireless sensor networks (WSNs) are rapidly emerging as the prominent technology for monitoring physical phenomena. However, large scale WSNs are known to suffer from coverage holes, i.e., large regions of deployment area where no sensing coverage can be provided. Such holes are the result of hardware failures, extensive costs for redeployment or the hostility of deployment areas. Coverage holes can adversely affect the accurate representation of natural phenomena that are monitored by a WSN. In this work, we propose to exploit the spatial correlation of physical phenomena to make monitoring systems more resilient to coverage holes. We show that a phenomenon can be interpolated inside a coverage hole with a high level of accuracy from the available nodal data given a model of its spatial correlation. However, due to energy limitations of sensor nodes it is imperative to perform this interpolation in an energy efficient manner that minimizes communication among nodes. In this paper, we present highly energy efficient methods for spatial interpolation in WSNs. First, we build a correlation model of the phenomenon being monitored in a distributed manner. Then, a purely localized and distributed spatial interpolation scheme based on Kriging interpolates the phenomenon inside coverage holes. We test the cost and accuracy of our scheme with extensive simulations and show that it is significantly more energy efficient than global interpolations and remarkably more accurate than simple averaging.  相似文献   
999.
Purpose : Citrullination is a post‐translational modification of arginine residues to citrulline catalyzed by peptidyl arginine deiminases. Induced expression of citrullinated proteins are frequently detected in various inflammatory states including arthritis; however, direct detection of citrullination in arthritic samples has not been successfully performed in the past. Experimental design : Citrullination of human fibrinogen, a candidate autoantigen in arthritis, was studied. Accurate identification of citrullinated fibrinogen peptides from rheumatoid arthritis synovial tissue specimens was performed using accurate mass and retention time analysis. Results : A peptide with the sequence ESSSHHPGIAEFPSRGK corresponding to amino acids 559–575 of fibrinogen α‐chain was identified to be citrullinated with an occupancy rate between 1.4 and 2.5%. Citrullination of the peptide KREEAPSLRPAPPPISGGGYRARPAK corresponding to amino acids 52–77 of the fibrinogen β‐chain was identified with an occupancy rate of 1.2%. Conclusions and clinical relevance : We report a proof of principle study for the identification of citrullinated proteins and within them, identification of citrullination sites and quantification of their occupancies in synovial tissue from rheumatoid arthritis patients using high‐resolution MS. Detailed studies on which molecules are citrullinated in arthritis can provide information about their role in immune regulation and serve as novel biomarkers and potentially even as therapeutic targets.  相似文献   
1000.
We consider the optimal makespan C(P, m, i) of an arbitrary set P of independent jobs scheduled with i preemptions on a multiprocessor with m identical processors. We compare the ratio for such makespans for i and j preemptions, respectively, where i < j. This ratio depends on P, but we are interested in the P that maximizes this ratio, i.e. we calculate a formula for the worst case ratio G(m, i, j) defined as G(m,i,j)=max\fracC(P,m,i)C(P,m,j),{G(m,i,j)=\max \frac{C(P,m,i)}{C(P,m,j)},} where the maximum is taken over all sets P of independent jobs.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号