首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   6814篇
  免费   132篇
  国内免费   1篇
电工技术   60篇
综合类   3篇
化学工业   959篇
金属工艺   51篇
机械仪表   55篇
建筑科学   324篇
矿业工程   86篇
能源动力   104篇
轻工业   613篇
水利工程   61篇
石油天然气   11篇
无线电   356篇
一般工业技术   790篇
冶金工业   2781篇
原子能技术   19篇
自动化技术   674篇
  2022年   43篇
  2021年   78篇
  2020年   45篇
  2019年   55篇
  2018年   64篇
  2017年   81篇
  2016年   94篇
  2015年   70篇
  2014年   81篇
  2013年   290篇
  2012年   194篇
  2011年   253篇
  2010年   212篇
  2009年   216篇
  2008年   280篇
  2007年   275篇
  2006年   201篇
  2005年   232篇
  2004年   175篇
  2003年   213篇
  2002年   188篇
  2001年   147篇
  2000年   130篇
  1999年   156篇
  1998年   376篇
  1997年   232篇
  1996年   232篇
  1995年   162篇
  1994年   170篇
  1993年   201篇
  1992年   155篇
  1991年   83篇
  1990年   140篇
  1989年   122篇
  1988年   110篇
  1987年   112篇
  1986年   108篇
  1985年   110篇
  1984年   87篇
  1983年   69篇
  1982年   68篇
  1981年   75篇
  1980年   51篇
  1979年   80篇
  1978年   47篇
  1977年   59篇
  1976年   83篇
  1975年   36篇
  1974年   33篇
  1973年   45篇
排序方式: 共有6947条查询结果,搜索用时 15 毫秒
101.
Many network applications requires access to most up-to-date information. An update event makes the corresponding cached data item obsolete, and cache hits due to obsolete data items become simply useless to those applications. Frequently accessed but infrequently updated data items should get higher preference while caching, and infrequently accessed but frequently updated items should have lower preference. Such items may not be cached at all or should be evicted from the cache to accommodate items with higher preference. In wireless networks, remote data access is typically more expensive than in wired networks. Hence, an efficient caching scheme considers both data access and update patterns can better reduce data transmissions in wireless networks. In this paper, we propose a step-wise optimal update-based replacement policy, called the Update-based Step-wise Optimal (USO) policy, for wireless data networks to optimize transmission cost by increasing effective hit ratio. Our cache replacement policy is based on the idea of giving preference to frequently accessed but infrequently updated data, and is supported by an analytical model with quantitative analysis. We also present results from our extensive simulations. We demonstrate that (1) the analytical model is validated by the simulation results and (2) the proposed scheme outperforms the Least Frequently Used (LFU) scheme in terms of effective hit ratio and communication cost.  相似文献   
102.
Abstract

The ability to use and interpret algebraic variables as generalized numbers and changing quantities is fundamental to the learning of calculus. This study considers the use of variables in these advanced ways as a component of algebraic thinking. College introductory calculus students' (n = 174) written responses to algebra problems requiring the use and interpretation of variables as changing quantities were examined for evidence of algebraic and arithmetic thinking. A framework was developed to describe and categorize examples of algebraic, transitional, and arithmetic thinking reflected in these students' uses of variables. The extent to which students' responses showed evidence of algebraic or arithmetic thinking was quantified and related to their course grades. Only one third of the responses of these entering calculus students were identified as representative of algebraic thinking. This study extends previous research by showing that evidence of algebraic thinking in students' work was positively related to successful performance in calculus.  相似文献   
103.
Estimation of Defects Based on Defect Decay Model: ED^{3}M   总被引:1,自引:0,他引:1  
An accurate prediction of the number of defects in a software product during system testing contributes not only to the management of the system testing process but also to the estimation of the product's required maintenance. Here, a new approach called ED3M is presented that computes an estimate of the total number of defects in an ongoing testing process. ED3M is based on estimation theory. Unlike many existing approaches the technique presented here does not depend on historical data from previous projects or any assumptions about the requirements and/or testers' productivity. It is a completely automated approach that relies only on the data collected during an ongoing testing process. This is a key advantage of the ED3M approach, as it makes it widely applicable in different testing environments. Here, the ED3M approach has been evaluated using five data sets from large industrial projects and two data sets from the literature. In addition, a performance analysis has been conducted using simulated data sets to explore its behavior using different models for the input data. The results are very promising; they indicate the ED3M approach provides accurate estimates with as fast or better convergence time in comparison to well-known alternative techniques, while only using defect data as the input.  相似文献   
104.
In this paper, the duality in differential form is developed between a 3D primal surface and its dual manifold formed by the surface's tangent planes, i.e., each tangent plane of the primal surface is represented as a four-dimensional vector which constitutes a point on the dual manifold. The iterated dual theorem shows that each tangent plane of the dual manifold corresponds to a point on the original 3D surface, i.e., the dual of the dual goes back to the primal. This theorem can be directly used to reconstruct 3D surface from image edges by estimating the dual manifold from these edges. In this paper we further develop the work in our original conference papers resulting in the robust differential dual operator. We argue that the operator makes good use of the information available in the image data, by using both points of intensity discontinuity and their edge directions; we provide a simple physical interpretation of what the abstract algorithm is actually estimating and why it makes sense in terms of estimation accuracy; our algorithm operates on all edges in the images, including silhouette edges, self occlusion edges, and texture edges, without distinguishing their types (thus resulting in improved accuracy and handling locally concave surface estimation if texture edges are present); the algorithm automatically handles various degeneracies; and the algorithm incorporates new methodologies for implementing the required operations such as appropriately relating edges in pairs of images, evaluating and using the algorithm's sensitivity to noise to determine the accuracy of an estimated 3D point. Experiments with both synthetic and real images demonstrate that the operator is accurate, robust to degeneracies and noise, and general for reconstructing free-form objects from occluding edges and texture edges detected in calibrated images or video sequences.  相似文献   
105.
Software developers often need to understand a large body of unfamiliar code with little or no documentation, no experts to consult, and little time to do it. A post appeared in January 2008 on Slashdot, a technology news Web site, asking for tools and techniques that could help. This article analyzes 301 often passionate and sometimes articulate responses to this query, including the themes and the associated tool recommendations. The most common suggestions were to use a code navigation tool, use a design recovery tool, use a debugger to step through the code, create a runtime trace, use problem-based learning, ask people for help, study the code from top down, and print out all the code. This analysis presents an intriguing snapshot of how software developers in industry go about comprehending big code.  相似文献   
106.
Asimov’s “three laws of robotics” and machine metaethics   总被引:1,自引:1,他引:0  
Using Asimov’s “Bicentennial Man” as a springboard, a number of metaethical issues concerning the emerging field of machine ethics are discussed. Although the ultimate goal of machine ethics is to create autonomous ethical machines, this presents a number of challenges. A good way to begin the task of making ethics computable is to create a program that enables a machine to act an ethical advisor to human beings. This project, unlike creating an autonomous ethical machine, will not require that we make a judgment about the ethical status of the machine itself, a judgment that will be particularly difficult to make. Finally, it is argued that Asimov’s “three laws of robotics” are an unsatisfactory basis for machine ethics, regardless of the status of the machine.
Susan Leigh AndersonEmail:
  相似文献   
107.
There is an increasing use of computer media for negotiations. However, the use of computer-mediated channels increases the hostile expressions of emotion, termed flaming. Although researchers agree that flaming has important effects on negotiation, predictions concerning these effects are inconsistent, suggesting a need for further investigation. We address this need by extending current flaming and negotiation research in two ways. First, we identify two different types of flaming: that which is motivated by perceptions concerning the negotiating opponent (e.g., he/she is unfair) and that which is motivated by perceptions concerning the negotiating context (e.g., the communication channel is too slow). Second, we differentiate between the effects of flaming on the concession behaviors of the flame sender and the flame recipient, and the effects of these behaviors on negotiated agreement. Via a laboratory study, we demonstrate that flames directed at the negotiation opponent slightly decrease the likelihood of reaching an agreement, and when an agreement is reached, it result in outcomes significantly favoring the flame recipient rather than the flame sender. In contrast, flames directed at the negotiation context significantly increase the likelihood of agreement, although outcomes still favor the flame recipient over the flame sender. These results suggest that flame senders are generally worse off than flame recipients, which provides an important basis for the strategic use of flaming in negotiations.  相似文献   
108.
Triangulation is the means by which an alternate perspective is used to validate, challenge or extend existing findings. It is frequently used when the field of study is difficult, demanding or contentious and presence research meets all of these criteria. We distinguish between the use of hard and soft triangulation—the former emphasising the challenging of findings, the latter being more confirmatory in character. Having reviewed a substantial number of presence papers, we conclude that strong triangulation is not widely used while soft triangulation is routinely employed. We demonstrate the usefulness of hard triangulation by contrasting an ontological analysis of in-ness with an empirical study of (computer) game playing. We conclude that presence research would be well served by the wider use of hard triangulation and for the reporting of anomalous and ill-fitting results.
Susan TurnerEmail:
  相似文献   
109.
Eosinophils (EOSs) are granular leukocytes that have significant roles in many inflammatory and immunoregulatory responses, especially asthma and allergic diseases. We have undertaken a fairly comprehensive proteomic analysis of purified peripheral blood EOSs from normal human donors primarily employing 2‐DE with protein spot identification by MALDI‐MS. Protein subfractionation methods employed included IEF (Zoom® Fractionator) and subcellular fractionation using differential protein solubilization. We have identified 3141 proteins, which had Mascot expectation scores of 10?3 or less. Of these 426 were unique and non‐redundant of which 231 were novel proteins not previously reported to occur in EOSs. Ingenuity Pathway Analysis showed that some 70% of the non‐redundant proteins could be subdivided into categories that are clearly related to currently known EOS biological activities. Cytoskeletal and associated proteins predominated among the proteins identified. Extensive protein posttranslational modifications were evident, many of which have not been previously reported that reflected the dynamic character of the EOS. This data set of eosinophilic proteins will prove valuable in comparative studies of disease versus normal states and for studies of gender differences and polymorphic variation among individuals.  相似文献   
110.
The paper discusses a series of driving trials that were conducted to investigate postural stability of disabled drivers and to assess the effectiveness of a representative sample of support aids. Twenty-three disabled drivers with varying levels of physical disability and seven non disabled drivers participated in the study. The test car was equipped with transducers to measure vehicle velocity and acceleration (longitudinal and lateral), steering wheel movement and torque, and the bracing forces exerted by the driver on the steering wheel. Video cameras were installed to record postural support strategies and displacement of the driver and to record deviation of the car from the specified path. Subjective data regarding driver attitudes and acceptance were also collected through the administration of questionnaires. Findings from the study showed that support aids significantly improved driving performance and reduced physical exertion to maintain an upright driving position for disabled drivers. However, ergonomics design aspects regarding the ease of use and acceptance of the support aids by the end users were identified as obstacles to their sustained use in everyday driving.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号