全文获取类型
收费全文 | 2386篇 |
免费 | 115篇 |
国内免费 | 1篇 |
专业分类
电工技术 | 17篇 |
综合类 | 4篇 |
化学工业 | 531篇 |
金属工艺 | 40篇 |
机械仪表 | 53篇 |
建筑科学 | 218篇 |
矿业工程 | 1篇 |
能源动力 | 115篇 |
轻工业 | 265篇 |
水利工程 | 40篇 |
石油天然气 | 5篇 |
无线电 | 148篇 |
一般工业技术 | 449篇 |
冶金工业 | 132篇 |
原子能技术 | 18篇 |
自动化技术 | 466篇 |
出版年
2023年 | 25篇 |
2022年 | 40篇 |
2021年 | 54篇 |
2020年 | 43篇 |
2019年 | 52篇 |
2018年 | 63篇 |
2017年 | 55篇 |
2016年 | 67篇 |
2015年 | 61篇 |
2014年 | 89篇 |
2013年 | 169篇 |
2012年 | 142篇 |
2011年 | 161篇 |
2010年 | 138篇 |
2009年 | 120篇 |
2008年 | 145篇 |
2007年 | 125篇 |
2006年 | 114篇 |
2005年 | 105篇 |
2004年 | 96篇 |
2003年 | 74篇 |
2002年 | 81篇 |
2001年 | 34篇 |
2000年 | 31篇 |
1999年 | 34篇 |
1998年 | 40篇 |
1997年 | 27篇 |
1996年 | 26篇 |
1995年 | 21篇 |
1994年 | 25篇 |
1993年 | 24篇 |
1992年 | 15篇 |
1991年 | 10篇 |
1990年 | 8篇 |
1989年 | 11篇 |
1988年 | 9篇 |
1987年 | 11篇 |
1984年 | 9篇 |
1983年 | 6篇 |
1982年 | 8篇 |
1981年 | 6篇 |
1980年 | 6篇 |
1978年 | 8篇 |
1943年 | 16篇 |
1942年 | 12篇 |
1941年 | 8篇 |
1940年 | 8篇 |
1939年 | 7篇 |
1938年 | 5篇 |
1937年 | 5篇 |
排序方式: 共有2502条查询结果,搜索用时 328 毫秒
991.
Many important machine learning models, supervised and unsupervised, are based on simple Euclidean distance or orthogonal projection in a high dimensional feature space. When estimating such models from small training sets we face the problem that the span of the training data set input vectors is not the full input space. Hence, when applying the model to future data the model is effectively blind to the missed orthogonal subspace. This can lead to an inflated variance of hidden variables estimated in the training set and when the model is applied to test data we may find that the hidden variables follow a different probability law with less variance. While the problem and basic means to reconstruct and deflate are well understood in unsupervised learning, the case of supervised learning is less well understood. We here investigate the effect of variance inflation in supervised learning including the case of Support Vector Machines (SVMS) and we propose a non-parametric scheme to restore proper generalizability. We illustrate the algorithm and its ability to restore performance on a wide range of benchmark data sets. 相似文献
992.
Run‐time monitoring is an important technique to detect erroneous run‐time behaviors. Several techniques have been proposed to automatically generate monitors from specification languages to check temporal and real‐time properties. However, monitoring of probabilistic properties still requires manual generation. To overcome this problem, we define a formal property specification language called Probabilistic Timed Property Sequence Chart (PTPSC). PTPSC is a probabilistic and timed extension of the existing scenario‐based specification formalism Property Sequence Chart (PSC). We have defined a formal grammar‐based syntax and have implemented a syntax‐directed translator that can automatically generate a probabilistic monitor which combines timed B”uchi automata and a sequential statistical hypothesis test process. We validate the generated monitors with a set of experiments performed with our tool WS‐PSC Monitor. Copyright © 2011 John Wiley & Sons, Ltd. 相似文献
993.
Lars Völker Marcel NoeOliver P. Waldhorst Christoph WerleChristoph Sorge 《Computer Communications》2011,34(3):457-467
HTTPS enables secure access to web content and web-based services. Although supported by many content and service providers, HTTPS is oftentimes not enabled by default, as pointed out in an open letter sent to Google by security experts. In this article, we discuss if and how web users can protect themselves by using HTTPS instead of HTTP. We show that many websites allow for accessing content by HTTPS instead of HTTP. However, HTTPS access must be manually configured or requested by the user, or is impossible at all, e.g., for embedded objects. For this reason, we explore how to protect users transparently by automatically using HTTPS whenever possible. In order to enable this approach, one needs to determine whether using HTTPS yields the same content as using HTTP, even in the presence of dynamic websites incorporating advertisements and news. We show that this decision is possible for entire websites like amazon.com in short time by combining a fast content comparison algorithm, result caching, and observations on the structure of the website. Besides the concrete HTTP use case considered in this article, our results are of independent interest for any setting in which content can be accessed by various means. Finally, we present and discuss different approaches for implementing automated protection of HTTP connections. 相似文献
994.
A thermophilic anaerobic bacterium was isolated from a sublacustrine hydrothermal vent site in Lake Tanganyika (East Africa) with recorded fluid temperatures of 66-103 °C and pH values of 7.7-8.9. The bacterium (strain TR10) was rod-shaped, about 1 by 5 μm in size, and readily formed distal endospores. Based on the 16 S rDNA sequence the novel strain was homologous to Thermobrachium celere and Caloramator indicus, which are closely related. The novel strain was strictly anaerobic, fermentative and had a doubling time as short as 10 min during growth on complex substrates, such as yeast extract and peptone. The optimum temperature for growth was 60 °C, while minimum and maximum temperatures were 40 and 75 °C. The pH response was alkalitolerant with optimum pH at 7.4 and 8.5 depending on the growth medium. The distinct feature of rapid proliferation and endospore formation may allow the novel organism to exploit the temporarily fluctuating growth conditions in the hydrothermal vent environments of Lake Tanganyika. 相似文献
995.
Lars?Wohlrab Johannes?FürnkranzEmail author 《Journal of Intelligent Information Systems》2011,36(1):73-98
In this paper, we review possible strategies for handling missing values in separate-and-conquer rule learning algorithms,
and compare them experimentally on a large number of datasets. In particular through a careful study with data with controlled
levels of missing values we get additional insights on the strategies’ different biases w.r.t. attributes with missing values.
Somewhat surprisingly, a strategy that implements a strong bias against the use of attributes with missing values, exhibits
the best average performance on 24 datasets from the UCI repository. 相似文献
996.
Jonas Finnemann Jensen Kim Guldstrand Larsen Jiří Srba Lars Kaerlund Oestergaard 《International Journal on Software Tools for Technology Transfer (STTT)》2016,18(4):409-426
We present a symbolic extension of dependency graphs by Liu and Smolka in to model-check weighted Kripke structures against the computation tree logic with upper-bound weight constraints. Our extension introduces a new type of edges into dependency graphs and lifts the computation of fixed-points from boolean domain to nonnegative integers to cope with the weights. We present both global and local algorithms for the fixed-point computation on symbolic dependency graphs and argue for the advantages of our approach compared to the direct encoding of the model-checking problem into dependency graphs. We implement all algorithms in a publicly available tool and evaluate them on several experiments. The principal conclusion is that our local algorithm is the most efficient one with an order of magnitude improvement for model checking problems with a high number of “witnesses”. 相似文献
997.
Sarana Nutanong Rui Zhang Egemen Tanin Lars Kulik 《The VLDB Journal The International Journal on Very Large Data Bases》2010,19(3):307-332
The moving k nearest neighbor (MkNN) query continuously finds the k nearest neighbors of a moving query point. MkNN queries can be efficiently processed through the use of safe regions. In general, a safe region is a region within which
the query point can move without changing the query answer. This paper presents an incremental safe-region-based technique
for answering MkNN queries, called the V*-Diagram, as well as analysis and evaluation of its associated algorithm, V*-kNN. Traditional safe-region approaches compute a safe region based on the data objects but independent of the query location.
Our approach exploits the knowledge of the query location and the boundary of the search space in addition to the data objects.
As a result, V*-kNN has much smaller I/O and computation costs than existing methods. We further provide cost models to estimate the number
of data accesses for V*-kNN and a competitive technique, RIS-kNN. The V*-Diagram and V*-kNN are also applicable to the domain of spatial networks and we present algorithms to construct a spatial-network V*-Diagram.
Our experimental results show that V*-kNN significantly outperforms the competitive technique. The results also verify the accuracy of the cost models. 相似文献
998.
Spatial interpolation in wireless sensor networks: localized algorithms for variogram modeling and Kriging 总被引:2,自引:0,他引:2
Wireless sensor networks (WSNs) are rapidly emerging as the prominent technology for monitoring physical phenomena. However,
large scale WSNs are known to suffer from coverage holes, i.e., large regions of deployment area where no sensing coverage
can be provided. Such holes are the result of hardware failures, extensive costs for redeployment or the hostility of deployment
areas. Coverage holes can adversely affect the accurate representation of natural phenomena that are monitored by a WSN. In
this work, we propose to exploit the spatial correlation of physical phenomena to make monitoring systems more resilient to
coverage holes. We show that a phenomenon can be interpolated inside a coverage hole with a high level of accuracy from the
available nodal data given a model of its spatial correlation. However, due to energy limitations of sensor nodes it is imperative
to perform this interpolation in an energy efficient manner that minimizes communication among nodes. In this paper, we present
highly energy efficient methods for spatial interpolation in WSNs. First, we build a correlation model of the phenomenon being
monitored in a distributed manner. Then, a purely localized and distributed spatial interpolation scheme based on Kriging
interpolates the phenomenon inside coverage holes. We test the cost and accuracy of our scheme with extensive simulations
and show that it is significantly more energy efficient than global interpolations and remarkably more accurate than simple
averaging. 相似文献
999.
Hermansson M Artemenko K Ossipova E Eriksson H Lengqvist J Makrygiannakis D Catrina AI Nicholas AP Klareskog L Savitski M Zubarev RA Jakobsson PJ 《Proteomics. Clinical applications》2010,4(5):511-518
Purpose : Citrullination is a post‐translational modification of arginine residues to citrulline catalyzed by peptidyl arginine deiminases. Induced expression of citrullinated proteins are frequently detected in various inflammatory states including arthritis; however, direct detection of citrullination in arthritic samples has not been successfully performed in the past. Experimental design : Citrullination of human fibrinogen, a candidate autoantigen in arthritis, was studied. Accurate identification of citrullinated fibrinogen peptides from rheumatoid arthritis synovial tissue specimens was performed using accurate mass and retention time analysis. Results : A peptide with the sequence ESSSHHPGIAEFPSRGK corresponding to amino acids 559–575 of fibrinogen α‐chain was identified to be citrullinated with an occupancy rate between 1.4 and 2.5%. Citrullination of the peptide KREEAPSLRPAPPPISGGGYRARPAK corresponding to amino acids 52–77 of the fibrinogen β‐chain was identified with an occupancy rate of 1.2%. Conclusions and clinical relevance : We report a proof of principle study for the identification of citrullinated proteins and within them, identification of citrullination sites and quantification of their occupancies in synovial tissue from rheumatoid arthritis patients using high‐resolution MS. Detailed studies on which molecules are citrullinated in arthritis can provide information about their role in immune regulation and serve as novel biomarkers and potentially even as therapeutic targets. 相似文献
1000.
We consider the optimal makespan C(P, m, i) of an arbitrary set P of independent jobs scheduled with i preemptions on a multiprocessor with m identical processors. We compare the ratio for such makespans for i and j preemptions, respectively, where i < j. This ratio depends on P, but we are interested in the P that maximizes this ratio, i.e. we calculate a formula for the worst case ratio G(m, i, j) defined as
G(m,i,j)=max\fracC(P,m,i)C(P,m,j),{G(m,i,j)=\max \frac{C(P,m,i)}{C(P,m,j)},} where the maximum is taken over all sets P of independent jobs. 相似文献