首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1863篇
  免费   90篇
  国内免费   5篇
电工技术   24篇
综合类   16篇
化学工业   567篇
金属工艺   38篇
机械仪表   31篇
建筑科学   138篇
矿业工程   3篇
能源动力   27篇
轻工业   169篇
水利工程   11篇
石油天然气   3篇
无线电   117篇
一般工业技术   385篇
冶金工业   67篇
原子能技术   16篇
自动化技术   346篇
  2023年   28篇
  2022年   49篇
  2021年   65篇
  2020年   36篇
  2019年   47篇
  2018年   43篇
  2017年   41篇
  2016年   52篇
  2015年   47篇
  2014年   73篇
  2013年   100篇
  2012年   89篇
  2011年   157篇
  2010年   100篇
  2009年   113篇
  2008年   102篇
  2007年   86篇
  2006年   85篇
  2005年   74篇
  2004年   69篇
  2003年   54篇
  2002年   51篇
  2001年   44篇
  2000年   42篇
  1999年   41篇
  1998年   27篇
  1997年   31篇
  1996年   17篇
  1995年   22篇
  1994年   26篇
  1993年   14篇
  1992年   10篇
  1991年   23篇
  1990年   13篇
  1989年   15篇
  1988年   7篇
  1987年   8篇
  1986年   4篇
  1985年   6篇
  1984年   10篇
  1983年   8篇
  1981年   3篇
  1980年   2篇
  1979年   2篇
  1978年   4篇
  1977年   4篇
  1976年   2篇
  1974年   2篇
  1967年   2篇
  1931年   3篇
排序方式: 共有1958条查询结果,搜索用时 0 毫秒
31.
In this paper, a comprehensive performance review of an MPI-based high-order three-dimensional spectral element method C++ toolbox is presented. The focus is put on the performance evaluation of several aspects with a particular emphasis on the parallel efficiency. The performance evaluation is analyzed with the help of a time prediction model based on a parameterization of the application and the hardware resources. Two tailor-made benchmark cases in computational fluid dynamics (CFD) are introduced and used to carry out this review, stressing the particular interest for clusters with up to thousands of cores. Some problems in the parallel implementation have been detected and corrected. The theoretical complexities with respect to the number of elements, to the polynomial degree, and to communication needs are correctly reproduced. It is concluded that this type of code has a nearly perfect speedup on machines with thousands of cores, and is ready to make the step to next-generation petaFLOP machines.  相似文献   
32.
Recent developments in the area of decentralized and infrastructureless systems opened avenues for novel applications. Along with these new technologies, new questions regarding their operational bounds in terms of e.g. scalability and security arose. Due to the sparse presence of real-world decentralized and infrastructureless systems, new protocols and applications have to be scrutinized by means of simulation, in (small-scale) testbeds, and by analytical models. In this paper, we discuss challenges of evaluating security mechanisms for mobile ad hoc networks and peer-to-peer systems. We focus on harmonizing predictions of analytical models and results obtained from simulation studies and testbed experiments.  相似文献   
33.
In the Horn theory based approach for cryptographic protocol analysis, cryptographic protocols and (Dolev?CYao) intruders are modeled by Horn theories and security analysis boils down to solving the derivation problem for Horn theories. This approach and the tools based on this approach, including ProVerif, have been very successful in the automatic analysis of cryptographic protocols. However, dealing with the algebraic properties of operators, such as the exclusive OR (XOR), which are frequently used in cryptographic protocols has been problematic. In particular, ProVerif cannot deal with XOR. In this paper, we show how to reduce the derivation problem for Horn theories with XOR to the XOR-free case. Our reduction works for an expressive class of Horn theories. A large class of intruder capabilities and protocols that employ the XOR operator can be modeled by these theories. Our reduction allows us to carry out protocol analysis using tools, such as ProVerif, that cannot deal with XOR, but are very efficient in the XOR-free case. We implemented our reduction and, in combination with ProVerif, used it for the fully automatic analysis of several protocols that employ the XOR operator. Among others, our analysis revealed a new attack on an IBM security module.  相似文献   
34.
We describe a Prolog-based approach to the development of language processors (such as preprocessors, frontends, evaluators, tools for software modification and analysis). The design of the corresponding environment Laptob for prological language processing is outlined. Language processor definitions in Laptob are basically Prolog programs. The programs might contain grammars, that is, we consider logic grammars. The programs can be typed, and they can be higher-order. The adaptation and composition of the logic programs themselves is supported by meta-programming. The environment offers tool support for efficient scanning, testing, and application development based on a make-system. We report on recent and ongoing applications of the Prolog-based approach.  相似文献   
35.
36.
We construct and analyze multigrid methods for discretized self-adjoint elliptic problems on triangular surfaces in ${\mathbb{R}^3}$ . The methods involve the same weights for restriction and prolongation as in the case of planar triangulations and therefore are easy to implement. We prove logarithmic bounds of the convergence rates with constants solely depending on the ellipticity, the smoothers and on the regularity of the triangles forming the triangular surface. Our theoretical results are illustrated by numerical computations.  相似文献   
37.
38.
Video visualization is a computation process that extracts meaningful information from original video data sets and conveys the extracted information to users in appropriate visual representations. This paper presents a broad treatment of the subject, following a typical research pipeline involving concept formulation, system development, a path-finding user study, and a field trial with real application data. In particular, we have conducted a fundamental study on the visualization of motion events in videos. We have, for the first time, deployed flow visualization techniques in video visualization. We have compared the effectiveness of different abstract visual representations of videos. We have conducted a user study to examine whether users are able to learn to recognize visual signatures of motions, and to assist in the evaluation of different visualization techniques. We have applied our understanding and the developed techniques to a set of application video clips. Our study has demonstrated that video visualization is both technically feasible and cost-effective. It has provided the first set of evidence confirming that ordinary users can be accustomed to the visual features depicted in video visualizations, and can learn to recognize visual signatures of a variety of motion events.  相似文献   
39.
Satisfying customer preferences via mass customization and mass production   总被引:1,自引:0,他引:1  
Two operational formats namely mass customization and mass production can be implemented to satisfy customer preference-based demand. The mass customization system consists of two stages: the initial build-to-stock phase and the final customize-to-order phase. The mass production system has a single stage: building products with pre-determined specifications to stock. In each case, the company makes decisions on the number of initial product variants, product specifications, production quantities and product pricing. Under a uniform customer preference distribution, the optimal number of base-product variants resembles the well known economic order quantity solution, and the optimal product specifications are equally spaced. We characterize three possible benefits of mass customization: (i) the gained surplus from offering each customer her ideal product; (ii) extra revenue from price discrimination; and (iii) reduced costs due to risk pooling under stochastic demand.  相似文献   
40.
This paper presents the results of a study that relied on trainable neural network classifiers to identify and remove bird-contaminated data from wind measurements recorded by a 1290-MHz wind profiler. A wind profiler is a Doppler radar system measuring the three-dimensional wind field. Migrating birds crossing the radar beam can lead to erroneous wind observations. Bird removal was performed by training conventional feedforward neural networks (FFNNs) and quantum neural networks (QNNs) to identify and remove bird-contaminated data recorded by a 1290-MHz wind profiler. A series of experiments evaluated several sets of input features extracted from wind profiler data, various FFNNs and QNNs of different sizes, and criteria employed for identifying birds in wind profiler data.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号