首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   2710篇
  免费   167篇
  国内免费   3篇
电工技术   32篇
综合类   5篇
化学工业   735篇
金属工艺   38篇
机械仪表   49篇
建筑科学   115篇
矿业工程   10篇
能源动力   105篇
轻工业   200篇
水利工程   29篇
石油天然气   5篇
无线电   244篇
一般工业技术   497篇
冶金工业   194篇
原子能技术   9篇
自动化技术   613篇
  2024年   4篇
  2023年   31篇
  2022年   107篇
  2021年   136篇
  2020年   81篇
  2019年   83篇
  2018年   102篇
  2017年   84篇
  2016年   105篇
  2015年   89篇
  2014年   118篇
  2013年   195篇
  2012年   146篇
  2011年   228篇
  2010年   144篇
  2009年   143篇
  2008年   175篇
  2007年   125篇
  2006年   111篇
  2005年   75篇
  2004年   56篇
  2003年   62篇
  2002年   43篇
  2001年   31篇
  2000年   35篇
  1999年   30篇
  1998年   55篇
  1997年   56篇
  1996年   38篇
  1995年   28篇
  1994年   25篇
  1993年   16篇
  1992年   11篇
  1991年   8篇
  1990年   6篇
  1989年   13篇
  1988年   15篇
  1987年   9篇
  1986年   3篇
  1985年   10篇
  1984年   5篇
  1983年   6篇
  1982年   7篇
  1981年   3篇
  1980年   4篇
  1978年   4篇
  1977年   6篇
  1976年   2篇
  1975年   3篇
  1974年   3篇
排序方式: 共有2880条查询结果,搜索用时 390 毫秒
51.
52.
Application Layer Traffic Optimization (ALTO) has recently gained attention in the research and standardisation community as a way for a network operator to guide the peer selection process of distributed applications by providing network layer topology information. In particular P2P applications are expected to gain from ALTO, due to the many connections peers form among each other, often without taking network layer topology information into account. In this paper, we present results of an extensive intra-ISP trial with an ALTO-enhanced P2P filesharing software. In summary, our results show that—depending on the concrete setting and on the distribution of upload capacity in the network—ALTO enables an ISP to save operational costs significantly while not degrading application layer performance noticeably. In addition, based on our experience we are able to give advice to operators on how to save costs with ALTO while not sacrificing application layer performance at all.  相似文献   
53.
54.
In this paper, we tackle the problem of opportunistic spectrum access in large-scale cognitive radio networks, where the unlicensed Secondary Users (SUs) access the frequency channels partially occupied by the licensed Primary Users (PUs). Each channel is characterized by an availability probability unknown to the SUs. We apply population game theory to model the spectrum access problem and develop distributed spectrum access policies based on imitation, a behavior rule widely applied in human societies consisting of imitating successful behaviors. We develop two imitation-based spectrum access policies based on the basic Proportional Imitation (PI) rule and the more advanced Double Imitation (DI) rule given that a SU can only imitate the other SUs operating on the same channel. A systematic theoretical analysis is presented for both policies on the induced imitation dynamics and the convergence properties of the proposed policies to the Nash equilibrium. Simple and natural, the proposed imitation-based spectrum access policies can be implemented distributedly based on solely local interactions and thus is especially suited in decentralized adaptive learning environments as cognitive radio networks.  相似文献   
55.
Defocus can be modeled as a diffusion process and represented mathematically using the heat equation, where image blur corresponds to the diffusion of heat. This analogy can be extended to non-planar scenes by allowing a space-varying diffusion coefficient. The inverse problem of reconstructing 3-D structure from blurred images corresponds to an "inverse diffusion" that is notoriously ill-posed. We show how to bypass this problem by using the notion of relative blur. Given two images, within each neighborhood, the amount of diffusion necessary to transform the sharper image into the blurrier one depends on the depth of the scene. This can be used to devise a global algorithm to estimate the depth profile of the scene without recovering the deblurred image, using only forward diffusion.  相似文献   
56.
57.
We propose a model of the shape, motion and appearance of a scene, seen through a sequence of images, that captures occlusions, scene deformations, unconstrained viewpoint variations and changes in its radiance. This model is based on a collection of overlapping layers that can move and deform, each supporting an intensity function that can change over time. We discuss the generality and limitations of this model in relation to existing ones such as traditional optical flow or motion segmentation, layers, deformable templates and deformotion. We then illustrate how this model can be used for inference of shape, motion, deformation and appearance of the scene from a collection of images. The layering structure allows for automatic inpainting of partially occluded regions. We illustrate the model on synthetic and real sequences where existing schemes fail, and show how suitable choices of constants in the model yield existing schemes, from optical flow to motion segmentation and inpainting.  相似文献   
58.
In this paper we focus on the aggregation of IDS alerts, an important component of the alert fusion process. We exploit fuzzy measures and fuzzy sets to design simple and robust alert aggregation algorithms. Exploiting fuzzy sets, we are able to robustly state whether or not two alerts are “close in time”, dealing with noisy and delayed detections. A performance metric for the evaluation of fusion systems is also proposed. Finally, we evaluate the fusion method with alert streams from anomaly-based IDS.  相似文献   
59.
Anti-reflective (AR) boundary conditions (BC) have been introduced recently in connection with fast deblurring algorithms, both in the case of signals and images. Here we extend such BCs to d dimensions (d ≥ 1) and we study in detail the algebra induced by the AR-BCs, with strongly symmetric point spread functions (PSF), both from a structural and computational point of view. The use of the re-blurring idea and the computational features of the AR-algebra allow us to apply Tikhonov-like techniques within O(n d log(n)) arithmetic operations, where n d is the number of pixels of the reconstructed object. Extensive numerical experimentation concerning 2D images and strongly symmetric PSFs confirms the effectiveness of our proposal.   相似文献   
60.
Journal of Electronic Testing -  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号