全文获取类型
收费全文 | 2710篇 |
免费 | 167篇 |
国内免费 | 3篇 |
专业分类
电工技术 | 32篇 |
综合类 | 5篇 |
化学工业 | 735篇 |
金属工艺 | 38篇 |
机械仪表 | 49篇 |
建筑科学 | 115篇 |
矿业工程 | 10篇 |
能源动力 | 105篇 |
轻工业 | 200篇 |
水利工程 | 29篇 |
石油天然气 | 5篇 |
无线电 | 244篇 |
一般工业技术 | 497篇 |
冶金工业 | 194篇 |
原子能技术 | 9篇 |
自动化技术 | 613篇 |
出版年
2024年 | 4篇 |
2023年 | 31篇 |
2022年 | 107篇 |
2021年 | 136篇 |
2020年 | 81篇 |
2019年 | 83篇 |
2018年 | 102篇 |
2017年 | 84篇 |
2016年 | 105篇 |
2015年 | 89篇 |
2014年 | 118篇 |
2013年 | 195篇 |
2012年 | 146篇 |
2011年 | 228篇 |
2010年 | 144篇 |
2009年 | 143篇 |
2008年 | 175篇 |
2007年 | 125篇 |
2006年 | 111篇 |
2005年 | 75篇 |
2004年 | 56篇 |
2003年 | 62篇 |
2002年 | 43篇 |
2001年 | 31篇 |
2000年 | 35篇 |
1999年 | 30篇 |
1998年 | 55篇 |
1997年 | 56篇 |
1996年 | 38篇 |
1995年 | 28篇 |
1994年 | 25篇 |
1993年 | 16篇 |
1992年 | 11篇 |
1991年 | 8篇 |
1990年 | 6篇 |
1989年 | 13篇 |
1988年 | 15篇 |
1987年 | 9篇 |
1986年 | 3篇 |
1985年 | 10篇 |
1984年 | 5篇 |
1983年 | 6篇 |
1982年 | 7篇 |
1981年 | 3篇 |
1980年 | 4篇 |
1978年 | 4篇 |
1977年 | 6篇 |
1976年 | 2篇 |
1975年 | 3篇 |
1974年 | 3篇 |
排序方式: 共有2880条查询结果,搜索用时 390 毫秒
51.
52.
Mischa Schmidt Jan Seedorf Stefano Napolitano Rosario G. Garroppo Andrea Cavaliere Thilo Ewald Armin Jahanpanah Zbigniew Kopertowski Marcin Pilarski Pawel Grochocki 《Peer-to-Peer Networking and Applications》2013,6(2):134-154
Application Layer Traffic Optimization (ALTO) has recently gained attention in the research and standardisation community as a way for a network operator to guide the peer selection process of distributed applications by providing network layer topology information. In particular P2P applications are expected to gain from ALTO, due to the many connections peers form among each other, often without taking network layer topology information into account. In this paper, we present results of an extensive intra-ISP trial with an ALTO-enhanced P2P filesharing software. In summary, our results show that—depending on the concrete setting and on the distribution of upload capacity in the network—ALTO enables an ISP to save operational costs significantly while not degrading application layer performance noticeably. In addition, based on our experience we are able to give advice to operators on how to save costs with ALTO while not sacrificing application layer performance at all. 相似文献
53.
54.
In this paper, we tackle the problem of opportunistic spectrum access in large-scale cognitive radio networks, where the unlicensed Secondary Users (SUs) access the frequency channels partially occupied by the licensed Primary Users (PUs). Each channel is characterized by an availability probability unknown to the SUs. We apply population game theory to model the spectrum access problem and develop distributed spectrum access policies based on imitation, a behavior rule widely applied in human societies consisting of imitating successful behaviors. We develop two imitation-based spectrum access policies based on the basic Proportional Imitation (PI) rule and the more advanced Double Imitation (DI) rule given that a SU can only imitate the other SUs operating on the same channel. A systematic theoretical analysis is presented for both policies on the induced imitation dynamics and the convergence properties of the proposed policies to the Nash equilibrium. Simple and natural, the proposed imitation-based spectrum access policies can be implemented distributedly based on solely local interactions and thus is especially suited in decentralized adaptive learning environments as cognitive radio networks. 相似文献
55.
Favaro P Soatto S Burger M Osher SJ 《IEEE transactions on pattern analysis and machine intelligence》2008,30(3):518-531
Defocus can be modeled as a diffusion process and represented mathematically using the heat equation, where image blur corresponds to the diffusion of heat. This analogy can be extended to non-planar scenes by allowing a space-varying diffusion coefficient. The inverse problem of reconstructing 3-D structure from blurred images corresponds to an "inverse diffusion" that is notoriously ill-posed. We show how to bypass this problem by using the notion of relative blur. Given two images, within each neighborhood, the amount of diffusion necessary to transform the sharper image into the blurrier one depends on the depth of the scene. This can be used to devise a global algorithm to estimate the depth profile of the scene without recovering the deblurred image, using only forward diffusion. 相似文献
56.
57.
Jeremy D. Jackson Anthony J. Yezzi Stefano Soatto 《International Journal of Computer Vision》2008,79(1):71-84
We propose a model of the shape, motion and appearance of a scene, seen through a sequence of images, that captures occlusions,
scene deformations, unconstrained viewpoint variations and changes in its radiance. This model is based on a collection of
overlapping layers that can move and deform, each supporting an intensity function that can change over time. We discuss the
generality and limitations of this model in relation to existing ones such as traditional optical flow or motion segmentation,
layers, deformable templates and deformotion. We then illustrate how this model can be used for inference of shape, motion,
deformation and appearance of the scene from a collection of images. The layering structure allows for automatic inpainting
of partially occluded regions. We illustrate the model on synthetic and real sequences where existing schemes fail, and show
how suitable choices of constants in the model yield existing schemes, from optical flow to motion segmentation and inpainting. 相似文献
58.
In this paper we focus on the aggregation of IDS alerts, an important component of the alert fusion process. We exploit fuzzy measures and fuzzy sets to design simple and robust alert aggregation algorithms. Exploiting fuzzy sets, we are able to robustly state whether or not two alerts are “close in time”, dealing with noisy and delayed detections. A performance metric for the evaluation of fusion systems is also proposed. Finally, we evaluate the fusion method with alert streams from anomaly-based IDS. 相似文献
59.
Anti-reflective (AR) boundary conditions (BC) have been introduced recently in connection with fast deblurring algorithms,
both in the case of signals and images. Here we extend such BCs to d dimensions (d ≥ 1) and we study in detail the algebra induced by the AR-BCs, with strongly symmetric point spread functions (PSF), both
from a structural and computational point of view. The use of the re-blurring idea and the computational features of the AR-algebra
allow us to apply Tikhonov-like techniques within O(n
d
log(n)) arithmetic operations, where n
d
is the number of pixels of the reconstructed object. Extensive numerical experimentation concerning 2D images and strongly
symmetric PSFs confirms the effectiveness of our proposal.
相似文献
60.
Journal of Electronic Testing - 相似文献