全文获取类型
收费全文 | 3181篇 |
免费 | 81篇 |
专业分类
电工技术 | 38篇 |
综合类 | 4篇 |
化学工业 | 396篇 |
金属工艺 | 22篇 |
机械仪表 | 34篇 |
建筑科学 | 77篇 |
矿业工程 | 4篇 |
能源动力 | 40篇 |
轻工业 | 151篇 |
水利工程 | 23篇 |
石油天然气 | 3篇 |
无线电 | 283篇 |
一般工业技术 | 322篇 |
冶金工业 | 1390篇 |
原子能技术 | 18篇 |
自动化技术 | 457篇 |
出版年
2023年 | 10篇 |
2022年 | 17篇 |
2021年 | 32篇 |
2020年 | 17篇 |
2019年 | 28篇 |
2018年 | 33篇 |
2017年 | 46篇 |
2016年 | 43篇 |
2015年 | 45篇 |
2014年 | 68篇 |
2013年 | 114篇 |
2012年 | 98篇 |
2011年 | 111篇 |
2010年 | 91篇 |
2009年 | 100篇 |
2008年 | 113篇 |
2007年 | 83篇 |
2006年 | 96篇 |
2005年 | 83篇 |
2004年 | 78篇 |
2003年 | 77篇 |
2002年 | 54篇 |
2001年 | 32篇 |
2000年 | 30篇 |
1999年 | 69篇 |
1998年 | 369篇 |
1997年 | 200篇 |
1996年 | 169篇 |
1995年 | 87篇 |
1994年 | 101篇 |
1993年 | 104篇 |
1992年 | 38篇 |
1991年 | 45篇 |
1990年 | 32篇 |
1989年 | 34篇 |
1988年 | 40篇 |
1987年 | 42篇 |
1986年 | 38篇 |
1985年 | 43篇 |
1984年 | 16篇 |
1983年 | 19篇 |
1982年 | 22篇 |
1981年 | 23篇 |
1980年 | 19篇 |
1979年 | 14篇 |
1978年 | 14篇 |
1977年 | 37篇 |
1976年 | 108篇 |
1975年 | 18篇 |
1973年 | 13篇 |
排序方式: 共有3262条查询结果,搜索用时 31 毫秒
81.
A performance study of multiprocessor task scheduling algorithms 总被引:1,自引:0,他引:1
Multiprocessor task scheduling is an important and computationally difficult problem. A large number of algorithms were proposed
which represent various tradeoffs between the quality of the solution and the computational complexity and scalability of
the algorithm. Previous comparison studies have frequently operated with simplifying assumptions, such as independent tasks,
artificially generated problems or the assumption of zero communication delay. In this paper, we propose a comparison study
with realistic assumptions. Our target problems are two well known problems of linear algebra: LU decomposition and Gauss–Jordan
elimination. Both algorithms are naturally parallelizable but have heavy data dependencies. The communication delay will be
explicitly considered in the comparisons. In our study, we consider nine scheduling algorithms which are frequently used to
the best of our knowledge: min–min, chaining, A*, genetic algorithms, simulated annealing, tabu search, HLFET, ISH, and DSH with task duplication. Based on experimental results,
we present a detailed analysis of the scalability, advantages and disadvantages of each algorithm.
相似文献
Damla TurgutEmail: |
82.
About 20 years ago, Markus and Robey noted that most research on IT impacts had been guided by deterministic perspectives and had neglected to use an emergent perspective, which could account for contradictory findings. They further observed that most research in this area had been carried out using variance theories at the expense of process theories. Finally, they suggested that more emphasis on multilevel theory building would likely improve empirical reliability. In this paper, we reiterate the observations and suggestions made by Markus and Robey on the causal structure of IT impact theories and carry out an analysis of empirical research published in four major IS journals, Management Information Systems Quarterly (MISQ), Information Systems Research (ISR), the European Journal of Information Systems (EJIS), and Information and Organization (I&O), to assess compliance with those recommendations. Our final sample consisted of 161 theory-driven articles, accounting for approximately 21% of all the empirical articles published in these journals. Our results first reveal that 91% of the studies in MISQ, ISR, and EJIS focused on deterministic theories, while 63% of those in I&O adopted an emergent perspective. Furthermore, 91% of the articles in MISQ, ISR, and EJIS adopted a variance model; this compares with 71% from I&O that applied a process model. Lastly, mixed levels of analysis were found in 14% of all the surveyed articles. Implications of these findings for future research are discussed. 相似文献
83.
Megumi Shinozaki Masato Kusanagi Kazunori Umeda Guy Godin Marc Rioux 《Computer Vision and Image Understanding》2009,113(11):1170-1179
Most active optical range sensors record, simultaneously with the range image, the amount of light reflected at each measured surface location: this information forms what is called a range intensity image, also known as a reflectance image. This paper proposes a method that uses this type of image for the correction of the color information of a textured 3D model. This color information is usually obtained from color images acquired using a digital camera. The lighting condition for the color images are usually not controlled, thus this color information may not be accurate. On the other hand, the illumination condition for the range intensity image is known since it is obtained from a controlled lighting and observation configuration, as required for the purpose of active optical range measurement. The paper describes a method for combining the two sources of information, towards the goal of compensating for a reference range intensity image is first obtained by considering factors such as sensor properties, or distance and relative surface orientation of the measured surface. The color image of the corresponding surface portion is then corrected using this reference range intensity image. A B-spline interpolation technique is applied to reduce the noise of range intensity images. Finally, a method for the estimation of the illumination color is applied to compensate for the light source color. Experiments show the effectiveness of the correction method using range intensity images. 相似文献
84.
Ronen Gradwohl Moni Naor Benny Pinkas Guy N. Rothblum 《Theory of Computing Systems》2009,44(2):245-268
We consider cryptographic and physical zero-knowledge proof schemes for Sudoku, a popular combinatorial puzzle. We discuss
methods that allow one party, the prover, to convince another party, the verifier, that the prover has solved a Sudoku puzzle,
without revealing the solution to the verifier. The question of interest is how a prover can show: (i) that there is a solution
to the given puzzle, and (ii) that he knows the solution, while not giving away any information about the solution to the
verifier.
In this paper we consider several protocols that achieve these goals. Broadly speaking, the protocols are either cryptographic
or physical. By a cryptographic protocol we mean one in the usual model found in the foundations of cryptography literature.
In this model, two machines exchange messages, and the security of the protocol relies on computational hardness. By a physical
protocol we mean one that is implementable by humans using common objects, and preferably without the aid of computers. In
particular, our physical protocols utilize items such as scratch-off cards, similar to those used in lotteries, or even just
simple playing cards.
The cryptographic protocols are direct and efficient, and do not involve a reduction to other problems. The physical protocols
are meant to be understood by “lay-people” and implementable without the use of computers.
Research of R. Gradwohl was supported by US-Israel Binational Science Foundation Grant 2002246.
Research of M. Naor was supported in part by a grant from the Israel Science Foundation.
Research of B. Pinkas was supported in part by the Israel Science Foundation (grant number 860/06).
Research of G.N. Rothblum was supported by NSF grant CNS-0430450 and NSF grant CFF-0635297. 相似文献
85.
Bithalamic hyperintensity on T2-weighted MR: vascular causes and evaluation with MR angiography 总被引:1,自引:0,他引:1
PURPOSE: To determine whether MR angiography can be used to differentiate between the two vascular causes of bithalamic hyperintensity on T2-weighted MR images: "top of the basilar" artery occlusion and deep cerebral vein thrombosis. METHODS: A retrospective review identified six patients with bithalamic T2 hyperintensity of vascular causes. MR angiography was performed in four patients, MR angiography and conventional angiography in one patient, and conventional angiography in one patient. Data pertaining to clinical presentation and hospital course were collected. MR angiographic techniques were multislab overlapping three-dimensional time-of-flight, 2-D time-of-flight, and 2-D phase-contrast. RESULTS: Three cases of top of the basilar artery occlusion and three cases of deep cerebral vein thrombosis were recognized. In all cases, T2 hyperintensity in a vascular distribution suggested cerebral occlusive disease. Infarction involving the thalami and basal ganglia was present in two cases of deep cerebral vein thrombosis. Infarction of the thalami, mesodiencephalic region, and cerebellar hemispheres was present in two cases of basilar artery occlusion. Bithalamic infarction alone was seen in one case of deep cerebral vein thrombosis and one case of basilar artery occlusion. In the five cases in which MR angiography was used, this technique accurately distinguished the vessels involved (arterial or venous). CONCLUSION: MR angiography is a useful adjunct to MR imaging in the evaluation of bithalamic T2 hyperintensity. It does help distinguish between the two vascular causes: top of basilar artery occlusion and deep cerebral vein thrombosis. 相似文献
86.
87.
Ernest B. Cady Ann Lorek Yakito Takei John S. Wyatt Juliet M. Penrice A. David Edwards Donald Peebles Marzena Wylezinska Huw Owen-Reece Vincent Kirkbride Christopher E. Cooper Richard F. Aldridge Simon C. Roth Guy Brown David T. Delpy E. Osmund R. Reynolds 《Magma (New York, N.Y.)》1994,2(3):437-439
The aim of this study was to reproduce the delayed (secondary) cerebral energy failure previously described in birth-asphyxiated newborn infants and to investigate relationships between primary insult severity and the extent of the delayed energy failure. Phosphorus (31P) magnetic resonance spectroscopy (MRS) at 7 T was used to study the brains of 12 newborn piglets during an acute, reversible, cerebral hypoxic-ischemic episode which continued until nucleotide triphosphates (NTP) were depleted. After reperfusion and reoxygenation, spectroscopy was continued for 48 h. High-energy metabolite concentrations returned to near normal levels after the insult, but later they fell as delayed energy failure developed. The time integral of NTP depletion in the primary insult correlated strongly with the minimum [phosphocreatine (PCr)]/[inorganic orthophosphate (Pi)] observed 24–48 h after the insult. (Linear regression analysis gave slope –8.04 h–1; ordinate intercept=1.23;r=0.92;P<0.0001.) This model is currently being used to investigate the therapeutic potential of various cerebroprotective strategies including hypothermia. 相似文献
88.
Patrice Le Boudec François Sanchez Pierre-Luc FranÇois Jean-François Bayon Guy Michel StÉphan 《电信纪事》1994,49(3-4):178-192
The dynamics of the erbium doped fiber laser is analysed both experimentally and theoretically. This laser operates spontaneously in self-pulsing, in sinusoidal or in CW regime. Experiments have allowed to determine the control parameters : the cavity losses, the pumping rate and the ion pairs concentration. An antiphase dynamics is observed when the laser operates simultaneously at 1.55 µn and 1.536 µm. The self-pulsing behavior is attributed to a fast energy transfer which occurs between two neighboring ions (pair induced quenching). A simple model considering the active medium as a mixture of isolated ions and ions pairs is developped and leads to a good qualitative agreement with the experimental results. 相似文献
89.
The goal of this paper is twofold : at first, to present the stochastic timed Pétri nets model by emphasizing its ability to express the main characteristics of real time distributed systems (parallelism, synchronization by message exchange, time attributes and in particular time constraints) and to allow both qualitative and quantitative analysis (concept of randomized states graph); second, to show a modeling methodology based on this model that allows a rigorous modeling of theDqdb protocol (Qa access, bwb mechanism role,Pa access influence). A new contribution to theQa mechanism has been done (1). 相似文献
90.
Integrins exhibit reversible changes in their ability to bind ligands and these changes enable transient cell adhesion. We recently showed that leukocyte integrin CR3 (complement receptor type three, CD11b/CD18, alpha m beta 2) may be purified in a form that is either capable or incapable of binding soluble, monomeric ligand and that "inactive" CR3 may be rendered capable of binding ligand by addition of an anti-CR3 mAb known as KIM-127 (Cai and Wright, JBC. 270: 14358, 1995). Here, we demonstrate that active CR3 may be rendered inactive by treatment of immobilized receptor with EDTA. EDTA-treated CR3 failed to bind ligand even in the presence of mM Ca2+ and Mg2+, suggesting that EDTA-treatment caused a change in the receptor that is not readily reversed. EDTA-treated receptor did, however, bind ligand upon addition of KIM-127 plus Mg2+ with an affinity (17.8 +/- 4.5 nM) similar to untreated, active receptor (12.5 +/- 4.7 nM). EDTA-treated CR3 thus exhibits the properties of inactive CR3, in which the ligand binding site is cryptic but subject to exposure by KIM-127. A candidate for the cryptic ligand binding site is the I-domain, a Mg2+-binding region in the alpha chain of CR3. We found that monomeric C3bi binds directly to recombinant I-domain in a Mg(2+)-dependent fashion with an affinity of 300 +/- 113 nM. These results thus suggest that CR3 may be inactivated by removing tightly bound divalent cation from a cryptic site in CR3. 相似文献