首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   2987篇
  免费   233篇
  国内免费   11篇
电工技术   51篇
综合类   18篇
化学工业   562篇
金属工艺   56篇
机械仪表   68篇
建筑科学   167篇
矿业工程   12篇
能源动力   85篇
轻工业   214篇
水利工程   31篇
石油天然气   30篇
无线电   343篇
一般工业技术   612篇
冶金工业   343篇
原子能技术   17篇
自动化技术   622篇
  2023年   40篇
  2022年   57篇
  2021年   109篇
  2020年   80篇
  2019年   91篇
  2018年   104篇
  2017年   87篇
  2016年   116篇
  2015年   102篇
  2014年   123篇
  2013年   226篇
  2012年   144篇
  2011年   241篇
  2010年   149篇
  2009年   169篇
  2008年   166篇
  2007年   177篇
  2006年   131篇
  2005年   97篇
  2004年   59篇
  2003年   56篇
  2002年   56篇
  2001年   47篇
  2000年   44篇
  1999年   33篇
  1998年   67篇
  1997年   50篇
  1996年   30篇
  1995年   29篇
  1994年   32篇
  1993年   19篇
  1992年   20篇
  1991年   12篇
  1990年   18篇
  1989年   22篇
  1988年   17篇
  1987年   15篇
  1986年   9篇
  1985年   18篇
  1984年   13篇
  1983年   14篇
  1982年   15篇
  1981年   14篇
  1980年   9篇
  1979年   10篇
  1978年   7篇
  1977年   9篇
  1976年   13篇
  1975年   12篇
  1974年   13篇
排序方式: 共有3231条查询结果,搜索用时 125 毫秒
71.
To address the two most critical issues in P2P file-sharing systems: efficient information discovery and authentic data acquisition, we propose a Gnutella-like file-sharing protocol termed Adaptive Gnutella Protocol (AGP) that not only improves the querying efficiency in a P2P network but also enhances the quality of search results at the same time. The reputation scheme in the proposed AGP evaluates the credibility of peers based on their contributions to P2P services and subsequently clusters nodes together according to their reputation and shared content, essentially transforming the P2P overlay network into a topology with collaborative and reputed nodes as its core. By detecting malicious peers as well as free-riders and eventually pushing them to the edge of the overlay network, our AGP propagates search queries mainly within the core of the topology, accelerating the information discovery process. Furthermore, the clustering of nodes based on authentic and similar content in our AGP also improves the quality of search results. We have implemented the AGP with the PeerSim simulation engine and conducted thorough experiments on diverse network topologies and various mixtures of honest/dishonest nodes to demonstrate improvements in topology transformation, query efficiency, and search quality by our AGP.
Alex DelisEmail:

Ioannis Pogkas   received his BS in Computer Science in 2007 and is currently pursuing postgraduate studies at the Department of Informatics and Telecommunications of the Univesrity of Athens. His research interests focus on search, reputation andtopology adaptation mechanisms in peer-to-peer networks. He is also interested in embedded and operating systems. Vassil Kriakov   received his B.S. and M.S. from Polytechnic University in 2001 and is now completing his doctoral studies at the Polytechnic Institute of New York University (NYU-Poly). His PhD research has been partially sponsored by a US Department of Education GAANN Graduate Fellowship. His research interests include distributed spatio-temporal data indexing, correlations in high-frequency data streams, and data management in grid and peer-to-peer networks. Zhongqiang Chen   is a senior software engineer at Yahoo! He holds a PhD in Computer Science and MS degrees in both Computer Science and Electrical Engineering all from Polytechnic University in Brooklyn, NY. He is a Computer Engineering MS and BS graduate of Tsinghua University, Beijing, P.R. China. He is interested in network security, information retrieval, and distributed computing and is the recipient of the 2004 Wilkes Award for outstanding paper contribution in The Computer Journal. Alex Delis   is a Professor of Computer Science at the University of Athens. He holds a PhD and an MS from the University of Maryland College Park as well as a Diploma in Computer Engineering from the University of Patras. His research interests are in distributed computing systems, networked information systems, databases and information security. He is a member of IEEE Computer Society, the ACM and the Technical Chamber of Greece.  相似文献   
72.
Li  Wei  Joseph Raj  Alex Noel  Tjahjadi  Tardi  Zhuang  Zhemin 《Applied Intelligence》2022,52(13):15164-15176
Applied Intelligence - The retina is one of the most developed sensing organs in the human body. However, the knowledge on the coding and decoding of the retinal neurons are still rather limited....  相似文献   
73.
74.
In this research, we model a job shop that produces a set of discrete parts in a make-to-stock setting. The intent of the research is to develop a planning model to determine the optimal tactical policies that minimise the relevant manufacturing costs subject to workload variability and capacity limits. We consider two tactical decisions, namely the production lot size for each part and the planned lead time for each work station. We model the relevant manufacturing costs, entailing production overtime costs and inventory-related costs, as functions of these tactical decisions. We formulate a non-linear optimisation model and implement it in the Excel spreadsheet. We test the model with actual factory data from our research sponsor. The results are consistent with our intuition and demonstrate the potential value from jointly optimising over these tactical policies.  相似文献   
75.
76.
Image variability that is impossible or difficult to restore by intra-image processing, such as the variability caused by occlusions, significantly reduces the performance of image-recognition methods. To address this issue, we propose that the pixels associated with large distances obtained by inter-image pixel-by-pixels comparisons should be considered as inter-image outliers and should be removed from the similarity calculation used for the image classification. When this method is combined with the template-matching method for image recognition, it leads to state-of-the-art recognition performance: 91% with AR database that includes occluded face images, 90% with PUT database that includes pose variations of face images and 100% with EYale B database that includes images with large illumination variation.  相似文献   
77.
A critical problem in mobile ad hoc wireless sensor networks is each node’s awareness of its position relative to the network. This problem is known as localization. In this paper, we introduce a variant of this problem, directional localization, where each node must be aware of both its position and orientation relative to its neighbors. Directional localization is relevant for applications that require uniform area coverage and coherent movement. Using global positioning systems for localization in large scale sensor networks may be impractical in enclosed spaces, and might not be cost effective. In addition, a set of pre-existing anchors with globally known positions may not always be available. In this context, we propose two distributed algorithms based on directional localization that facilitate the collaborative movement of nodes in a sensor network without the need for global positioning systems, seed nodes or a pre-existing infrastructure such as anchors with known positions. Our first algorithm, GPS-free Directed Localization (GDL) assumes the availability of a simple digital compass on each sensor node. We relax this requirement in our second algorithm termed GPS- and Compass-free Directed Localization (GCDL). Through experimentation, we demonstrate that our algorithms scale well for large numbers of nodes and provide convergent localization over time, despite errors introduced by motion actuators and distance measurements. In addition, we introduce mechanisms to preserve swarm formation during directed sensor network mobility. Our simulations confirm that, in a number of realistic scenarios, our algorithms provide for a mobile sensor network that preserves its formation over time, irrespective of speed and distance traveled. We also present our method to organize the sensor nodes in a polygonal geometric shape of our choice even in noisy environments, and investigate the possible uses of this approach in search-and-rescue type of missions.  相似文献   
78.
This work investigates the problem of combining deficient evidence for the purpose of quality assessment. The main focus of the work is modeling vagueness, ambiguity, and local nonspecificity in information within a unified approach. We introduce an extended fuzzy Dempster–Shafer scheme based on the simultaneous use of fuzzy interval‐grade and interval‐valued belief degree (IGIB). The latter facilitates modeling of uncertainties in terms of local ignorance associated with expert knowledge, whereas the former allows for handling the lack of information on belief degree assignments. Also, generalized fuzzy sets can be readily transformed into the proposed fuzzy IGIB structure. The reasoning for quality assessment is performed by solving nonlinear optimization problems on fuzzy Dempster–Shafer paradigm for the fuzzy IGIB structure. The application of the proposed inference method is investigated by designing a reasoning scheme for water quality monitoring and validated through the experimental data available for different sampling points in a water distribution network. © 2011 Wiley Periodicals, Inc.  相似文献   
79.
This paper presents a new algorithm for implementing a reconfigurable distributed shared memory in an asynchronous dynamic network. The algorithm guarantees atomic consistency (linearizability) in all executions in the presence of arbitrary crash failures of the processing nodes, message delays, and message loss. The algorithm incorporates a classic quorum-based algorithm for read/write operations, and an optimized consensus protocol, based on Fast Paxos for reconfiguration, and achieves the design goals of: (i) allowing read and write operations to complete rapidly and (ii) providing long-term fault-tolerance through reconfiguration, a process that evolves the quorum configurations used by the read and write operations. The resulting algorithm tolerates dynamism. We formally prove our algorithm to be correct, we present its performance and compare it to existing reconfigurable memories, and we evaluate experimentally the cost of its reconfiguration mechanism.  相似文献   
80.
A new elegant and simple algorithm for mutual exclusion of N processes is proposed. It only requires shared variables in a memory model where shared variables need not be accessed atomically. We prove mutual exclusion by reformulating the algorithm as a transition system (automaton), and applying simulation of automata. The proof has been verified with the higher-order interactive theorem prover PVS. Under an additional atomicity assumption, the algorithm is starvation free, and we conjecture that no competing process is passed by any other process more than once. This conjecture was verified by model checking for systems with at most five processes.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号