首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1252篇
  免费   9篇
  国内免费   2篇
电工技术   4篇
化学工业   146篇
金属工艺   31篇
机械仪表   10篇
建筑科学   5篇
能源动力   19篇
轻工业   31篇
水利工程   1篇
石油天然气   1篇
无线电   108篇
一般工业技术   132篇
冶金工业   716篇
原子能技术   6篇
自动化技术   53篇
  2022年   14篇
  2021年   8篇
  2020年   6篇
  2019年   13篇
  2018年   12篇
  2017年   11篇
  2016年   7篇
  2015年   12篇
  2014年   11篇
  2013年   24篇
  2012年   22篇
  2011年   25篇
  2010年   20篇
  2009年   32篇
  2008年   22篇
  2007年   19篇
  2006年   21篇
  2005年   21篇
  2004年   13篇
  2003年   13篇
  2002年   24篇
  2001年   13篇
  2000年   13篇
  1999年   28篇
  1998年   225篇
  1997年   126篇
  1996年   81篇
  1995年   50篇
  1994年   42篇
  1993年   63篇
  1992年   15篇
  1991年   14篇
  1990年   6篇
  1989年   15篇
  1988年   13篇
  1987年   6篇
  1986年   14篇
  1985年   18篇
  1984年   10篇
  1983年   11篇
  1982年   8篇
  1980年   8篇
  1979年   7篇
  1978年   10篇
  1977年   21篇
  1976年   48篇
  1975年   9篇
  1973年   5篇
  1972年   6篇
  1971年   6篇
排序方式: 共有1263条查询结果,搜索用时 31 毫秒
61.
A distributed system is said to be fault‐tolerant if it is able to provide important services despite partial failures of the computers or software objects in the system. These systems are needed to support applications such as remote access and control, virtual mobile offices and wide area collaborative systems where there are chances of failures in the network and software objects. Fault‐tolerance is usually achieved by replicating the objects in the system. Traditional distributed applications constructed using Java RMI (remote method invocation) are not fault‐tolerant because of the lack of support of object replication. The objective of the present work is to design a remote method invocation that supports server object replication. To provide a fault‐tolerant service to the remote client objects, server objects are actively replicated. The problems associated with the method invocation in the context of active server object replication are presented and solutions are discussed and implemented. Copyright © 2001 John Wiley & Sons, Ltd.  相似文献   
62.
63.
Java-MaC: A Run-Time Assurance Approach for Java Programs   总被引:2,自引:1,他引:2  
We describe Java-MaC, a prototype implementation of the Monitoring and Checking (MaC) architecture for Java programs. The MaC architecture provides assurance that the target program is running correctly with respect to a formal requirements specification by monitoring and checking the execution of the target program at run-time. MaC bridges the gap between formal verification, which ensures the correctness of a design rather than an implementation, and testing, which does not provide formal guarantees about the correctness of the system.Use of formal requirement specifications in run-time monitoring and checking is the salient aspect of the MaC architecture. MaC is a lightweight formal method solution which works as a viable complement to the current heavyweight formal methods. In addition, analysis processes of the architecture including instrumentation of the target program, monitoring, and checking are performed fully automatically without human direction, which increases the accuracy of the analysis. Another important feature of the architecture is the clear separation between monitoring implementation-dependent low-level behaviors and checking high-level behaviors, which allows the reuse of a high-level requirement specification even when the target program implementation changes. Furthermore, this separation makes the architecture modular and allows the flexibility of incorporating third party tools into the architecture. The paper presents an overview of the MaC architecture and a prototype implementation Java-MaC.  相似文献   
64.
Stochastic automata models have been successfully used in the past for modeling learning systems. An automaton model with a variable structure reacts to inputs from a random environment by changing the probabilities of its actions. These changes are carried out using a reinforcement scheme in such a manner that the automaton evolves to a final structure which is satisfactory in some sense. Several reinforcement schemes have been proposed in the literature for updating the structure of automata [1–4]. Most of these are expedient schemes which in the limit yield structures which are better than a device that chooses the actions with equal probabilities irrespective of the environment's response. A few schemes have also been suggested recently which in the limit lead to a continuous selection of a single optimal action as the output of the automaton, when it operates in a stationary environment and are called optimal schemes [5–7]. The question naturally arises as to which of the schemes are to be preferred in practical applications. In view of the anticipated extensive use of learning schemes in multilevel decision-making systems this question of optimality versus expediency takes on particular significance. Consequently, a comparison has to be made not merely of individual automata schemes but also of the effectiveness of such schemes in situations involving several automata (e.g. stochastic games, multilevel systems).  相似文献   
65.
The effect of doping iron at the yttrium site in hexagonal KCaY(PO4)2 is studied for various concentrations ofx (0≤x≤1), of iron using Mössbauer and X-ray diffraction methods. For low iron concentrations, very little changes in structure are seen but atx≈0·1, onset of new peaks in the XRD pattern is observed. The Mössbauer study of the doped samples reveals that iron has a solubility of up to 2·5% in the parent phase with any excess iron precipitating out to form a new and unknown phase. From a detailed analysis of the X-ray diffraction pattern (corresponding tox=1) of the latter phase, it is found that this phase is rhombohedral with the possible space groupR3.  相似文献   
66.
We present a new method for estimating the edges in a piecewise smooth function from blurred and noisy Fourier data. The proposed method is constructed by combining the so called concentration factor edge detection method, which uses a finite number of Fourier coefficients to approximate the jump function of a piecewise smooth function, with compressed sensing ideas. Due to the global nature of the concentration factor method, Gibbs oscillations feature prominently near the jump discontinuities. This can cause the misidentification of edges when simple thresholding techniques are used. In fact, the true jump function is sparse, i.e. zero almost everywhere with non-zero values only at the edge locations. Hence we adopt an idea from compressed sensing and propose a method that uses a regularized deconvolution to remove the artifacts. Our new method is fast, in the sense that it only needs the solution of a single l 1 minimization. Numerical examples demonstrate the accuracy and robustness of the method in the presence of noise and blur.  相似文献   
67.
Literally, the word compliance suggests conformity in fulfilling official requirements. This paper presents the results of the analysis and design of a class of protocols called compliant cryptologic protocols (CCPs). The paper presents a notion for compliance in cryptosystems that is conducive as a cryptologic goal. CCPs are employed in security systems used by at least two mutually mistrusting sets of entities. The individuals in the sets of entities only trust the design of the security system and any trusted third party the security system may include. Such a security system can be thought of as a broker between the mistrusting sets of entities. Published online: 15 November 2002  相似文献   
68.
Virtualized datacenters and clouds are being increasingly considered for traditional High-Performance Computing (HPC) workloads that have typically targeted Grids and conventional HPC platforms. However, maximizing energy efficiency and utilization of datacenter resources, and minimizing undesired thermal behavior while ensuring application performance and other Quality of Service (QoS) guarantees for HPC applications requires careful consideration of important and extremely challenging tradeoffs. Virtual Machine (VM) migration is one of the most common techniques used to alleviate thermal anomalies (i.e., hotspots) in cloud datacenter servers as it reduces load and, hence, the server utilization. In this article, the benefits of using other techniques such as voltage scaling and pinning (traditionally used for reducing energy consumption) for thermal management over VM migrations are studied in detail. As no single technique is the most efficient to meet temperature/performance optimization goals in all situations, an autonomic approach that performs energy-efficient thermal management while ensuring the QoS delivered to the users is proposed. To address the problem of VM allocation that arises during VM migrations, an innovative application-centric energy-aware strategy for Virtual Machine (VM) allocation is proposed. The proposed strategy ensures high resource utilization and energy efficiency through VM consolidation while satisfying application QoS by exploiting knowledge obtained through application profiling along multiple dimensions (CPU, memory, and network bandwidth utilization). To support our arguments, we present the results obtained from an experimental evaluation on real hardware using HPC workloads under different scenarios.  相似文献   
69.
X-ray photoelectron spectroscopic studies on the activated pure CaNi5 alloy as well as the hydride formed at 1 atm pressure and room temperature, CaNi5H4.8, showed that on activation calcium segregates to the surface and forms the oxide, whereas most of the nickel on the surface is present in the metallic form. This indicates that the coexistance of the oxide phase and the metal phase is essential for the facile hydriding behaviour of CaNi5.  相似文献   
70.
The available data on the effect of neutron and α-particle irradiation on the superconducting properties and the low-temperature specific heat capacity of single- and polycrystalline V3Si were analyzed in a unified manner. It was found that the electron-phonon renormalization parameter λ does not vary simply proportionally to the bare density of electron states at the Fermi level as had been earlier conjectured by Dynes and Varma, nor does it vary in exactly the same manner as found by Fradin and Williamson to hold for a variety of vanadium-based A15 structure compounds and pseudobinary alloys. When the behavior of V3Si is compared with that of Nb3Sn, Nb3Al, and Nb3Ge, it is seen that the response to disorder of parameters of importance in the superconductivity of these compounds does not follow any simple, universal behavior.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号