首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   159篇
  免费   6篇
  国内免费   3篇
电工技术   1篇
化学工业   11篇
金属工艺   2篇
机械仪表   1篇
建筑科学   6篇
能源动力   1篇
轻工业   4篇
水利工程   2篇
无线电   32篇
一般工业技术   33篇
冶金工业   19篇
自动化技术   56篇
  2023年   1篇
  2022年   3篇
  2020年   7篇
  2019年   2篇
  2018年   2篇
  2017年   4篇
  2016年   5篇
  2015年   5篇
  2014年   3篇
  2013年   8篇
  2012年   11篇
  2011年   11篇
  2010年   10篇
  2009年   7篇
  2008年   10篇
  2007年   15篇
  2006年   5篇
  2005年   1篇
  2004年   9篇
  2003年   2篇
  2002年   4篇
  2001年   5篇
  2000年   1篇
  1999年   3篇
  1997年   2篇
  1996年   1篇
  1995年   2篇
  1994年   4篇
  1993年   3篇
  1992年   3篇
  1991年   1篇
  1990年   3篇
  1989年   2篇
  1987年   3篇
  1986年   1篇
  1985年   2篇
  1983年   1篇
  1982年   2篇
  1974年   1篇
  1973年   2篇
  1970年   1篇
排序方式: 共有168条查询结果,搜索用时 15 毫秒
61.
Hypothesized that union members on strike will (a) give a higher evaluation of the union and of the leadership, (b) evaluate the benefit package more highly after the strike, (c) become more militant against the employer during the strike, (d) report more willingness to participate in union activities, and (e) show more intraunion cohesion during the strike. Random samples of members of 9 local unions (3 each from Ford, General Motors, and Chrysler) were surveyed on 4 occasions: before the 1976 bargaining, during the strike at Ford, after settlement of the national contract, and 7 mo after the strike ended. Usable responses from a questionnaire totaled 1,182 (405 strikers, 777 nonstrikers). With the exception of greater intraunion cohesion during the strike, all hypotheses were confirmed. (18 ref) (PsycINFO Database Record (c) 2010 APA, all rights reserved)  相似文献   
62.
This paper considers the problem of distributively constructing a minimum-weight spanning tree (MST) for graphs of constant diameter in the bounded-messages model, where each message can contain at most B bits for some parameter B. It is shown that the number of communication rounds necessary to compute an MST for graphs of diameter 4 or 3 can be as high as and , respectively. The asymptotic lower bounds hold for randomized algorithms as well. On the other hand, we observe that O(log n) communication rounds always suffice to compute an MST deterministically for graphs with diameter 2, when B = O(log n). These results complement a previously known lower bound of for graphs of diameter Ω(log n). An extended abstract of this work appears in Proceedings of 20th ACM Symposium on Principles of Distributed Computing, August 2001.  相似文献   
63.
We consider the distributed complexity of the stable matching problem (a.k.a. “stable marriage”). In this problem, the communication graph is undirected and bipartite, and each node ranks its neighbors. Given a matching of the nodes, a pair of unmatched nodes is called blocking if they prefer each other to their assigned match. A matching is called stable if it does not induce any blocking pair. In the distributed model, nodes exchange messages in each round over the communication links, until they find a stable matching. We show that if messages may contain at most B bits each, then any distributed algorithm that solves the stable matching problem requires ${\Omega(\sqrt{n/B\log n})}We consider the distributed complexity of the stable matching problem (a.k.a. “stable marriage”). In this problem, the communication graph is undirected and bipartite, and each node ranks its neighbors. Given a matching of the nodes, a pair of unmatched nodes is called blocking if they prefer each other to their assigned match. A matching is called stable if it does not induce any blocking pair. In the distributed model, nodes exchange messages in each round over the communication links, until they find a stable matching. We show that if messages may contain at most B bits each, then any distributed algorithm that solves the stable matching problem requires W(?{n/Blogn}){\Omega(\sqrt{n/B\log n})} communication rounds in the worst case, even for graphs of diameter O(log n), where n is the number of nodes in the graph. Furthermore, the lower bound holds even if we allow the output to contain O(?n){O(\sqrt n)} blocking pairs, and if a pair is considered blocking only if they like each other much more then their assigned match.  相似文献   
64.
We experimentally study the K2 algorithm in learning a Bayesian network (BN) classifier for image detection of cytogenetic abnormalities. Starting from an initial BN structure, the K2 algorithm searches the BN structure space and selects the structure maximizing the K2 metric. To improve the accuracy of the K2-based BN classifier, we investigate the K2 algorithm initial ordering, search procedure, and metric. We find that BN structures learned using random initial orderings, orderings based on expert knowledge, or a scatter criterion are comparable and lead to similar classification accuracies. Replacing the K2 search with hill-climbing search improves the accuracy as does the inclusion of hidden nodes in the BN structure. Also, we demonstrate that though the maximization of the K2 metric solicits structures providing improved inference, these structures contribute to only limited classification accuracy.  相似文献   
65.
Given a terrain and a point p on or above it, we wish to compute the region R p that is visible from p. We present a generic radar-like algorithm for computing an approximation of R p . The algorithm interpolates the visible region between two consecutive rays (emanating from p) whenever the rays are close enough; that is, whenever the difference between the sets of visible segments along the cross sections in the directions specified by the rays is below some threshold. Thus the density of the sampling by rays is sensitive to the shape of the visible region. We suggest a specific way to measure the resemblance (difference) and to interpolate the visible region between two consecutive rays. We also present an alternative algorithm, which uses circles of increasing radii centered at p instead of rays emanating from p. Both algorithms compute a representation of the (approximated) visible region that is especially suitable for is-visible-from-p queries, i.e., given a query point q on the terrain determine whether q is visible from p. Finally, we report on the experiments that we performed with these algorithms and with their corresponding fixed versions, using a natural error measure. Our main conclusion is that the radar-like algorithm is significantly better than the others.  相似文献   
66.
Fluidized bed freeze concentration is a novel technique that uses a fluidized bed heat exchanger (FBHE) to concentrate liquids through the process of freeze concentration. Ice formed on the cooled surface of the vertical heat exchanger is removed by particles fluidized inside the FBHE. In this paper, the operating conditions are reported for freeze concentration of saline solutions and milk in FBHE. The operation was tested with equilateral 4 mm and then 5 mm particles at different bed porosities, cooling rates and NaCl and milk concentrations. Experiments with NaCl solutions showed that the 5 mm particles were more aggressive than 4 mm in removing ice from the heat exchanger wall. Whilst particle size was considered responsible for this, the particle shape could have played a major role. A theoretical analysis on effect of FBHE parameters showed the size of particles to exert influence on FBHE performance. The result from experiments with skim milk and whole milk maintained the conclusions formed previously with NaCl experiments with regard to the effect of tested parameters on operational stability. However, the ice formed from milk was more difficult to remove than the ice formed from NaCl solutions. Whole milk showed even more resistance to ice removal. Skim milk was freeze concentrated from 13% to 27% TS content in these experiments. Installing a wash screen further improved the purity of separated ice.  相似文献   
67.
We consider scheduling information units called frames, each with a delivery deadline. Frames consist of packets, which arrive online in a roughly periodic fashion, and compete on allocation of transmission slots. A frame is deemed useful only if all its packets are delivered before its deadline. We focus on a “proportional” variant, where the value of each frame is proportional to its size, but the sizes and periods of the frames are arbitrary. We give a constant-competitive algorithm for this setting, assuming bounded jitter and some slack in the frames’ deadlines, the latter of which is necessary. Using standard techniques, our algorithm yields polylog-competitive algorithms for general instances with slack and bounded jitter.  相似文献   
68.
A highly accurate numerical scheme is presented for the Serre system of partial differential equations, which models the propagation of dispersive shallow water waves in the fully-nonlinear regime. The fully-discrete scheme utilizes the Galerkin / finite-element method based on smooth periodic splines in space, and an explicit fourth-order Runge–Kutta method in time. Computations compared with exact solitary and cnoidal wave solutions show that the scheme achieves the optimal orders of accuracy in space and time. These computations also show that the stability of this scheme does not impose very restrictive conditions on the temporal stepsize. In addition, solitary, cnoidal, and dispersive shock waves are studied in detail using this numerical scheme for the Serre system and compared with the ‘classical’ Boussinesq system for small-amplitude shallow water waves. The results show that the interaction of solitary waves in the Serre system is more inelastic. The efficacy of the numerical scheme for modeling dispersive shocks is shown by comparison with asymptotic results. These results have application to the modeling of shallow water waves of intermediate or large amplitude.  相似文献   
69.
70.
The phenomenon of overspecification and overdesign is well known in all industries: developing features that are not needed by the customer causes excess development efforts, missed due dates, terminated projects and higher lifecycle costs. The paper defines the phenomena, exploring inherent causes and prescribes solutions for both business-to-business and business-to-customer industries. It presents illustrative cases of overspecification and overdesign, proposes a self-assessment to determine the severity of these phenomena in an organization and resolves the conflicts driving these phenomena. Solutions suggested include adapting Simon’s satisficer approach, resolving the marketing conflict by focusing on the 20% of features that account for 80% of the value, breaking the assumption that overspecification is beneficial for future growth potential, resolving the product manager’s conflict via a global system view, implementing the 25/25 principle, freezing and stabilizing the specifications, constraining developer time to eliminate spontaneous overdesign, and piecemeal feature launch.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号