首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   5705篇
  免费   368篇
  国内免费   11篇
电工技术   111篇
综合类   9篇
化学工业   1625篇
金属工艺   82篇
机械仪表   167篇
建筑科学   219篇
矿业工程   5篇
能源动力   194篇
轻工业   552篇
水利工程   41篇
石油天然气   23篇
无线电   474篇
一般工业技术   939篇
冶金工业   285篇
原子能技术   32篇
自动化技术   1326篇
  2024年   6篇
  2023年   85篇
  2022年   252篇
  2021年   324篇
  2020年   175篇
  2019年   201篇
  2018年   207篇
  2017年   206篇
  2016年   250篇
  2015年   213篇
  2014年   271篇
  2013年   453篇
  2012年   396篇
  2011年   458篇
  2010年   341篇
  2009年   332篇
  2008年   295篇
  2007年   254篇
  2006年   214篇
  2005年   152篇
  2004年   124篇
  2003年   94篇
  2002年   89篇
  2001年   65篇
  2000年   56篇
  1999年   61篇
  1998年   88篇
  1997年   69篇
  1996年   58篇
  1995年   29篇
  1994年   37篇
  1993年   31篇
  1992年   14篇
  1991年   12篇
  1990年   14篇
  1989年   12篇
  1988年   10篇
  1987年   14篇
  1986年   6篇
  1985年   13篇
  1984年   10篇
  1983年   18篇
  1982年   10篇
  1981年   6篇
  1980年   9篇
  1979年   9篇
  1978年   6篇
  1977年   10篇
  1975年   5篇
  1971年   6篇
排序方式: 共有6084条查询结果,搜索用时 15 毫秒
81.
82.
Internet measured data collected via passive measurement are analyzed to obtain localization information on nodes by clustering (i.e., grouping together) nodes that exhibit similar network path properties. Since traditional clustering algorithms fail to correctly identify clusters of homogeneous nodes, we propose the NetCluster novel framework, suited to analyze Internet measurement datasets. We show that the proposed framework correctly analyzes synthetically generated traces. Finally, we apply it to real traces collected at the access link of Politecnico di Torino campus LAN and discuss the network characteristics as seen at the vantage point.  相似文献   
83.
Malware is one of the main threats to the Internet security in general, and to commercial transactions in particular. However, given the high level of sophistication reached by malware (e.g. usage of encrypted payload and obfuscation techniques), malware detection tools and techniques still call for effective and efficient solutions. In this paper, we address a specific, dreadful, and widely diffused financial malware: Zeus.The contributions of this paper are manifold: first, we propose a technique to break the encrypted malware communications, extracting the keystream used to encrypt such communications; second, we provide a generalization of the proposed keystream extraction technique. Further, we propose Cronus, an IDS that specifically targets Zeus malware. The implementation of Cronus has been experimentally tested on a production network, and its high quality performance and effectiveness are discussed. Finally, we highlight some principles underlying malware—and Zeus in particular—that could pave the way for further investigation in this field.  相似文献   
84.
85.
Current advancements in pervasive technologies allow users to create and share an increasing amount of whereabouts data. Thus, some rich datasets on human mobility are becoming available on the web. In this paper we extracted approximately 790,000 mobility traces from a web-based repository of GPS tracks—the Nokia Sports Tracker Service. Using data mining mechanisms, we show that this data can be analyzed to uncover daily routines and interesting schemes in the use of public spaces. We first show that our approach supports large-scale analysis of people’s whereabouts by comparing behavioral patterns across cities. Then, using Kernel Density Estimation, we present a mechanism to identify popular sport areas in individual cities. This kind of analysis allows us to highlight human-centered geographies that can support a wide range of applications ranging from location-based services to urban planning.  相似文献   
86.
In this paper we describe how we have introduced workflows into the working practices of a community for whom the concept of workflows is very new, namely the heliophysics community. Heliophysics is a branch of astrophysics which studies the Sun and the interactions between the Sun and the planets, by tracking solar events as they travel throughout the Solar system. Heliophysics produces two major challenges for workflow technology. Firstly it is a systems science where research is currently developed by many different communities who need reliable data models and metadata to be able to work together. Thus it has major challenges in the semantics of workflows. Secondly, the problem of time is critical in heliophysics; the workflows must take account of the propagation of events outwards from the sun. They have to address the four dimensional nature of space and time in terms of the indexing of data. We discuss how we have built an environment for Heliophysics workflows building on and extending the Taverna workflow system and utilising the myExperiment site for sharing workflows. We also describe how we have integrated the workflows into the existing practices of the communities involved in Heliophysics by developing a web portal which can hide the technical details from the users, who can concentrate on the data from their scientific point of view rather than on the methods used to integrate and process the data. This work has been developed in the EU Framework 7 project HELIO, and is being disseminated to the worldwide Heliophysics community, since Heliophysics requires integration of effort on a global scale.  相似文献   
87.
Stereo Light Probe   总被引:1,自引:0,他引:1  
In this paper we present a practical, simple and robust method to acquire the spatially‐varying illumination of a real‐world scene. The basic idea of the proposed method is to acquire the radiance distribution of the scene using high‐dynamic range images of two reflective balls. The use of two light probes instead of a single one allows to estimate, not only the direction and intensity of the light sources, but also the actual position in space of the light sources. To robustly achieve this goal we first rectify the two input spherical images, then, using a region‐based stereo matching algorithm, we establish correspondences and compute the position of each light. The radiance distribution so obtained can be used for augmented reality applications, photo‐realistic rendering and accurate reflectance properties estimation. The accuracy and the effectiveness of the method have been tested by measuring the computed light position and rendering synthetic version of a real object in the same scene. The comparison with standard method that uses a simple spherical lighting environment is also shown.  相似文献   
88.
Mathematical simulation has been widely used in biomedical and biological sciences. In the case of the surface electromyographic (SEMG) activity, some models have been proposed aiming to study muscle contraction strategies that are used during different tasks and conditions. Most of SEMG simulators are based on energy modulation of a Gaussian noise. This work proposes a novel simulator in which the user-defined parameters are associated with the motor units (MUs) recruitment and their firing rate. Comparison between the mean spectrum of real SEMG signals collected in isometric contraction of the muscle biceps brachii and the mean spectrum obtained from simulated SEMG signals showed a good agreement, pointing the proposed simulator seems to be capable to generate consistent electromyographic signals in time and frequency domains and that can be used in many studies, in particular in the evaluation of automatic methods aimed to detect muscular contraction.  相似文献   
89.
Applications of Bayesian networks in systems biology are computationally demanding due to the large number of model parameters. Conventional MCMC schemes based on proposal moves in structure space tend to be too slow in mixing and convergence, and have recently been superseded by proposal moves in the space of node orders. A disadvantage of the latter approach is the intrinsic inability to specify the prior probability on network structures explicitly. The relative paucity of different experimental conditions in contemporary systems biology implies a strong influence of the prior probability on the posterior probability and, hence, the outcome of inference. Consequently, the paradigm of performing MCMC proposal moves in order rather than structure space is not entirely satisfactory. In the present article, we propose a new and more extensive edge reversal move in the original structure space, and we show that this significantly improves the convergence of the classical structure MCMC scheme.  相似文献   
90.
Software agents’ ability to interact within different open systems, designed by different groups, presupposes an agreement on an unambiguous definition of a set of concepts, used to describe the context of the interaction and the communication language the agents can use. Agents’ interactions ought to allow for reliable expectations on the possible evolution of the system; however, in open systems interacting agents may not conform to predefined specifications. A possible solution is to define interaction environments including a normative component, with suitable rules to regulate the behaviour of agents. To tackle this problem we propose an application-independent metamodel of artificial institutions that can be used to define open multiagent systems. In our view an artificial institution is made up by an ontology that models the social context of the interaction, a set of authorizations to act on the institutional context, a set of linguistic conventions for the performance of institutional actions and a system of norms that are necessary to constrain the agents’ actions.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号