全文获取类型
收费全文 | 3501篇 |
免费 | 204篇 |
国内免费 | 4篇 |
专业分类
电工技术 | 47篇 |
综合类 | 28篇 |
化学工业 | 990篇 |
金属工艺 | 90篇 |
机械仪表 | 73篇 |
建筑科学 | 236篇 |
矿业工程 | 8篇 |
能源动力 | 77篇 |
轻工业 | 206篇 |
水利工程 | 16篇 |
石油天然气 | 1篇 |
无线电 | 270篇 |
一般工业技术 | 719篇 |
冶金工业 | 161篇 |
原子能技术 | 30篇 |
自动化技术 | 757篇 |
出版年
2024年 | 6篇 |
2023年 | 57篇 |
2022年 | 89篇 |
2021年 | 140篇 |
2020年 | 110篇 |
2019年 | 119篇 |
2018年 | 115篇 |
2017年 | 125篇 |
2016年 | 152篇 |
2015年 | 120篇 |
2014年 | 191篇 |
2013年 | 231篇 |
2012年 | 224篇 |
2011年 | 299篇 |
2010年 | 208篇 |
2009年 | 183篇 |
2008年 | 204篇 |
2007年 | 178篇 |
2006年 | 142篇 |
2005年 | 120篇 |
2004年 | 75篇 |
2003年 | 69篇 |
2002年 | 66篇 |
2001年 | 34篇 |
2000年 | 53篇 |
1999年 | 45篇 |
1998年 | 57篇 |
1997年 | 27篇 |
1996年 | 29篇 |
1995年 | 31篇 |
1994年 | 18篇 |
1993年 | 26篇 |
1992年 | 19篇 |
1991年 | 16篇 |
1990年 | 14篇 |
1989年 | 15篇 |
1988年 | 17篇 |
1987年 | 10篇 |
1986年 | 5篇 |
1985年 | 11篇 |
1984年 | 5篇 |
1983年 | 5篇 |
1982年 | 4篇 |
1981年 | 6篇 |
1980年 | 5篇 |
1979年 | 6篇 |
1976年 | 6篇 |
1975年 | 5篇 |
1974年 | 4篇 |
1966年 | 3篇 |
排序方式: 共有3709条查询结果,搜索用时 15 毫秒
41.
The steady-state simplified P
N
approximation to the radiative transfer equation has been successfully applied to many problems involving radiation. Recently,
time-dependent simplified P
N
equations have been derived by an asymptotic analysis similar to the asymptotic derivation of the steady-state SP
N
equations (Frank et al. in J. Comput. Phys. 226:2289–2305, 2007). In this paper, we present computational results for the time-dependent SP
N
equations in two dimensions, obtained by using an adaptive finite element approach. Several numerical comparisons with other
existing models are shown. 相似文献
42.
Statistical relational learning of trust 总被引:1,自引:0,他引:1
The learning of trust and distrust is a crucial aspect of social interaction among autonomous, mentally-opaque agents. In
this work, we address the learning of trust based on past observations and context information. We argue that from the truster’s
point of view trust is best expressed as one of several relations that exist between the agent to be trusted (trustee) and
the state of the environment. Besides attributes expressing trustworthiness, additional relations might describe commitments
made by the trustee with regard to the current situation, like: a seller offers a certain price for a specific product. We
show how to implement and learn context-sensitive trust using statistical relational learning in form of a Dirichlet process
mixture model called Infinite Hidden Relational Trust Model (IHRTM). The practicability and effectiveness of our approach is evaluated empirically on user-ratings gathered from eBay.
Our results suggest that (i) the inherent clustering achieved in the algorithm allows the truster to characterize the structure
of a trust-situation and provides meaningful trust assessments; (ii) utilizing the collaborative filtering effect associated
with relational data does improve trust assessment performance; (iii) by learning faster and transferring knowledge more effectively
we improve cold start performance and can cope better with dynamic behavior in open multiagent systems. The later is demonstrated
with interactions recorded from a strategic two-player negotiation scenario. 相似文献
43.
Thomas Neumann Matthias Bender Sebastian Michel Ralf Schenkel Peter Triantafillou Gerhard Weikum 《Distributed and Parallel Databases》2009,26(1):3-27
Top-k query processing is a fundamental building block for efficient ranking in a large number of applications. Efficiency is a
central issue, especially for distributed settings, when the data is spread across different nodes in a network. This paper
introduces novel optimization methods for top-k aggregation queries in such distributed environments. The optimizations can be applied to all algorithms that fall into the
frameworks of the prior TPUT and KLEE methods. The optimizations address three degrees of freedom: 1) hierarchically grouping
input lists into top-k operator trees and optimizing the tree structure, 2) computing data-adaptive scan depths for different input sources, and
3) data-adaptive sampling of a small subset of input sources in scenarios with hundreds or thousands of query-relevant network
nodes. All optimizations are based on a statistical cost model that utilizes local synopses, e.g., in the form of histograms,
efficiently computed convolutions, and estimators based on order statistics. The paper presents comprehensive experiments,
with three different real-life datasets and using the ns-2 network simulator for a packet-level simulation of a large Internet-style
network. 相似文献
44.
Benjamin Köhler Uta Preim Matthias Grothoff Matthias Gutberlet Katharina Fischbach Bernhard Preim 《Computer Graphics Forum》2016,35(1):32-43
Four‐dimensional phase‐contrast magnetic resonance imaging (4D PC‐MRI) allows the non‐invasive acquisition of time‐resolved, 3D blood flow information. Stroke volumes (SVs) and regurgitation fractions (RFs) are two of the main measures to assess the cardiac function and severity of valvular pathologies. The flow rates in forward and backward direction through a plane above the aortic or pulmonary valve are required for their quantification. Unfortunately, the calculations are highly sensitive towards the plane's angulation since orthogonally passing flow is considered. This often leads to physiologically implausible results. In this work, a robust quantification method is introduced to overcome this problem. Collaborating radiologists and cardiologists were carefully observed while estimating SVs and RFs in various healthy volunteer and patient 4D PC‐MRI data sets with conventional quantification methods, that is, using a single plane above the valve that is freely movable along the centerline. By default it is aligned perpendicular to the vessel's centerline, but free angulation (rotation) is possible. This facilitated the automation of their approach which, in turn, allows to derive statistical information about the plane angulation sensitivity. Moreover, the experts expect a continuous decrease of the blood flow volume along the vessel course. Conventional methods are often unable to produce this behaviour. Thus, we present a procedure to fit a monotonous function that ensures such physiologically plausible results. In addition, this technique was adapted for the usage in branching vessels such as the pulmonary artery. The performed informal evaluation shows the capability of our method to support diagnosis; a parameter evaluation confirms the robustness. Vortex flow was identified as one of the main causes for quantification uncertainties. 相似文献
45.
Enterprise Architecture Management (EAM) is discussed in academia and industry as a vehicle to guide IT implementations, alignment, compliance assessment, or technology management. Still, a lack of knowledge prevails about how EAM can be successfully used, and how positive impact can be realized from EAM. To determine these factors, we identify EAM success factors and measures through literature reviews and exploratory interviews and propose a theoretical model that explains key factors and measures of EAM success. We test our model with data collected from a cross-sectional survey of 133 EAM practitioners. The results confirm the existence of an impact of four distinct EAM success factors, ‘EAM product quality’, ‘EAM infrastructure quality’, ‘EAM service delivery quality’, and ‘EAM organizational anchoring’, and two important EAM success measures, ‘intentions to use EAM’ and ‘Organizational and Project Benefits’ in a confirmatory analysis of the model. We found the construct ‘EAM organizational anchoring’ to be a core focal concept that mediated the effect of success factors such as ‘EAM infrastructure quality’ and ‘EAM service quality’ on the success measures. We also found that ‘EAM satisfaction’ was irrelevant to determining or measuring success. We discuss implications for theory and EAM practice. 相似文献
46.
An important question for the upcoming Semantic Web is how to best combine open world ontology languages, such as the OWL-based ones, with closed world rule-based languages. One of the most mature proposals for this combination is known as hybrid MKNF knowledge bases (Motik and Rosati, 2010 [52]), and it is based on an adaptation of the Stable Model Semantics to knowledge bases consisting of ontology axioms and rules. In this paper we propose a well-founded semantics for nondisjunctive hybrid MKNF knowledge bases that promises to provide better efficiency of reasoning, and that is compatible with both the OWL-based semantics and the traditional Well-Founded Semantics for logic programs. Moreover, our proposal allows for the detection of inconsistencies, possibly occurring in tightly integrated ontology axioms and rules, with only little additional effort. We also identify tractable fragments of the resulting language. 相似文献
47.
Emanuel Gull Philipp Werner Sebastian Fuchs Brigitte Surer Thomas Pruschke Matthias Troyer 《Computer Physics Communications》2011,182(4):1078-1082
Continuous-time quantum Monte Carlo impurity solvers are algorithms that sample the partition function of an impurity model using diagrammatic Monte Carlo techniques. The present paper describes codes that implement the interaction expansion algorithm originally developed by Rubtsov, Savkin, and Lichtenstein, as well as the hybridization expansion method developed by Werner, Millis, Troyer, et al. These impurity solvers are part of the ALPS-DMFT application package and are accompanied by an implementation of dynamical mean-field self-consistency equations for (single orbital single site) dynamical mean-field problems with arbitrary densities of states.
Program summary
Program title: dmftCatalogue identifier: AEIL_v1_0Program summary URL:http://cpc.cs.qub.ac.uk/summaries/AEIL_v1_0.htmlProgram obtainable from: CPC Program Library, Queen's University, Belfast, N. IrelandLicensing provisions: ALPS LIBRARY LICENSE version 1.1No. of lines in distributed program, including test data, etc.: 899 806No. of bytes in distributed program, including test data, etc.: 32 153 916Distribution format: tar.gzProgramming language: C++Operating system: The ALPS libraries have been tested on the following platforms and compilers:•
Linux with GNU Compiler Collection (g++ version 3.1 and higher), and Intel C++ Compiler (icc version 7.0 and higher) •
MacOS X with GNU Compiler (g++ Apple-version 3.1, 3.3 and 4.0) •
IBM AIX with Visual Age C++ (xlC version 6.0) and GNU (g++ version 3.1 and higher) compilers •
Compaq Tru64 UNIX with Compq C++ Compiler (cxx) •
SGI IRIX with MIPSpro C++ Compiler (CC) •
HP-UX with HP C++ Compiler (aCC) •
Windows with Cygwin or coLinux platforms and GNU Compiler Collection (g++ version 3.1 and higher)
[1]
A. Albuquerque, F. Alet, P. Corboz, et al., J. Magn. Magn. Mater. 310 (2007) 1187. [2]
http://arxiv.org/abs/1012.4474, Rev. Mod. Phys., in press.
48.
Matthias Jungmann Margarete Kopal Christoph ClauserThomas Berlage 《Computers & Geosciences》2011,37(4):541-553
Electrical borehole wall images represent micro-resistivity measurements at the borehole wall. The lithology reconstruction is often based on visual interpretation done by geologists. This analysis is very time-consuming and subjective. Different geologists may interpret the data differently. In this work, linear discriminant analysis (LDA) in combination with texture features is used for an automated lithology reconstruction of ODP (Ocean Drilling Program) borehole 1203A drilled during Leg 197. Six rock groups are identified by their textural properties in resistivity data obtained by a Formation MircoScanner (FMS). Although discriminant analysis can be used for multi-class classification, non-optimal decision criteria for certain groups could emerge. For this reason, we use a combination of 2-class (binary) classifiers to increase the overall classification accuracy. The generalization ability of the combined classifiers is evaluated and optimized on a testing dataset where a classification rate of more than 80% for each of the six rock groups is achieved. The combined, trained classifiers are then applied on the whole dataset obtaining a statistical reconstruction of the logged formation. Compared to a single multi-class classifier the combined binary classifiers show better classification results for certain rock groups and more stable results in larger intervals of equal rock type. 相似文献
49.
Matthias B. StuartAuthor Vitae Jens SparsøAuthor Vitae 《Microprocessors and Microsystems》2011,35(7):632-642
This paper presents an analytical method to derive the worst-case traffic pattern caused by a task graph mapped to a cache-coherent shared-memory system. Our analysis allows designers to rapidly evaluate the impact of different mappings of tasks to IP cores on the traffic pattern. The accuracy varies with the application’s data sharing pattern, and is around 65% in the average case and 1% in the best case when considering the traffic pattern as a whole. For individual connections, our method produces tight worst-case bandwidths. 相似文献
50.
Martin Seiler Denis Steinemann Jonas Spillmann Matthias Harders 《The Visual computer》2011,27(6-8):519-529
We present an adaptive octree based approach for interactive cutting of deformable objects. Our technique relies on efficient refine- and node split-operations. These are sufficient to robustly represent cuts in the mechanical simulation mesh. A high-resolution surface embedded into the octree is employed to represent a cut visually. Model modification is performed in the rest state of the object, which is accomplished by back-transformation of the blade geometry. This results in an improved robustness of our approach. Further, an efficient update of the correspondences between simulation elements and surface vertices is proposed. The robustness and efficiency of our approach is underlined in test examples as well as by integrating it into a prototype surgical simulator. 相似文献