首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   359篇
  免费   3篇
电工技术   8篇
化学工业   35篇
金属工艺   4篇
机械仪表   15篇
建筑科学   20篇
矿业工程   1篇
能源动力   3篇
轻工业   10篇
水利工程   4篇
石油天然气   1篇
无线电   18篇
一般工业技术   58篇
冶金工业   129篇
原子能技术   6篇
自动化技术   50篇
  2024年   1篇
  2022年   2篇
  2021年   5篇
  2020年   1篇
  2019年   1篇
  2018年   4篇
  2017年   1篇
  2016年   6篇
  2015年   5篇
  2014年   2篇
  2013年   4篇
  2012年   5篇
  2011年   14篇
  2010年   15篇
  2009年   8篇
  2008年   14篇
  2007年   9篇
  2006年   12篇
  2005年   12篇
  2004年   17篇
  2003年   7篇
  2002年   11篇
  2001年   8篇
  2000年   11篇
  1999年   11篇
  1998年   38篇
  1997年   19篇
  1996年   17篇
  1995年   12篇
  1994年   12篇
  1993年   14篇
  1991年   7篇
  1990年   5篇
  1989年   2篇
  1988年   4篇
  1987年   1篇
  1986年   1篇
  1985年   5篇
  1984年   3篇
  1983年   3篇
  1982年   1篇
  1981年   2篇
  1980年   1篇
  1978年   2篇
  1977年   11篇
  1976年   9篇
  1975年   3篇
  1974年   3篇
  1972年   1篇
排序方式: 共有362条查询结果,搜索用时 15 毫秒
11.
Many reverse engineering techniques for data structures rely on the knowledge of memory allocation routines. Typically, they interpose on the system’s malloc and free functions, and track each chunk of memory thus allocated as a data structure. However, many performance-critical applications implement their own custom memory allocators. Examples include webservers, database management systems, and compilers like gcc and clang. As a result, current binary analysis techniques for tracking data structures fail on such binaries. We present MemBrush, a new tool to detect memory allocation and deallocation functions in stripped binaries with high accuracy. We evaluated the technique on a large number of real world applications that use custom memory allocators. We demonstrate that MemBrush can detect allocators/deallocators with a high accuracy which is 52 out of 59 for allocators, and 29 out of 31 for deallocators in SPECINT 2006. As we show, we can furnish existing reverse engineering tools with detailed information about the memory management API, and as a result perform an analysis of the actual application specific data structures designed by the programmer. Our system uses dynamic analysis and detects memory allocation and deallocation routines by searching for functions that comply with a set of generic characteristics of allocators and deallocators.  相似文献   
12.
In this paper I introduce a formalism for natural language understandingbased on a computational implementation of Discourse RepresentationTheory. The formalism covers a wide variety of semantic phenomena(including scope and lexical ambiguities, anaphora and presupposition),is computationally attractive, and has a genuine inference component. Itcombines a well-established linguistic formalism (DRT) with advancedtechniques to deal with ambiguity (underspecification), and isinnovative in the use of first-order theorem proving techniques.The architecture of the formalism for natural language understandingthat I advocate consists of three levels of processing:underspecification, resolution, andinference. Each of these levels has a distinct function andtherefore employs a different kind of semantic representation. Themappings between these different representations define the interfacesbetween the levels.I show how underspecified semantic representations can be built in acompositional way (for a fragment of English Grammar) using standardtechniques borrowed from the -calculus, how inferences can becarried out on discourse representations using a translation tofirst-order logic, and how existing research prototypes (discourseprocessing and spoken-dialogue systems) implement the formalism.  相似文献   
13.
It is shown that the maximum-likelihood estimation or robust estimation of the Fourier coefficients may be preferable to Fourier transformation if the noise contains outliers or is otherwise not normally distributed. The reason is that, in that case, these estimators produce Fourier coefficient estimates and, therefore, system parameter estimates having a smaller variance  相似文献   
14.
This paper presents a low-latency algorithm designed for parallel computer architectures to compute the scalar multiplication of elliptic curve points based on approaches from cryptographic side-channel analysis. A graphics processing unit implementation using a standardized elliptic curve over a 224-bit prime field, complying with the new 112-bit security level, computes the scalar multiplication in 1.9?ms on the NVIDIA GTX 500 architecture family. The presented methods and implementation considerations can be applied to any parallel 32-bit architecture.  相似文献   
15.
Verb Phrase Ellipsis (VPE) has been studied in great depth in theoretical linguistics, but empirical studies of VPE are rare. We extend the few previous corpus studies with an annotated corpus of VPE in all 25 sections of the Wall Street Journal corpus (WSJ) distributed with the Penn Treebank. We annotated the raw files using a stand-off annotation scheme that codes the auxiliary verb triggering the elided verb phrase, the start and end of the antecedent, the syntactic type of antecedent (VP, TV, NP, PP or AP), and the type of syntactic pattern between the source and target clauses of the VPE and its antecedent. We found 487 instances of VPE (including predicative ellipsis, antecedent-contained deletion, comparative constructions, and pseudo-gapping) plus 67 cases of related phenomena such as do so anaphora. Inter-annotator agreement was high, with a 0.97 average F-score for three annotators for one section of the WSJ. Our annotation is theory neutral, and has better coverage than earlier efforts that relied on automatic methods, e.g. simply searching the parsed version of the Penn Treebank for empty VP’s achieves a high precision (0.95) but low recall (0.58) when compared with our manual annotation. The distribution of VPE source–target patterns deviates highly from the standard examples found in the theoretical linguistics literature on VPE, once more underlining the value of corpus studies. The resulting corpus will be useful for studying VPE phenomena as well as for evaluating natural language processing systems equipped with ellipsis resolution algorithms, and we propose evaluation measures for VPE detection and VPE antecedent selection. The stand-off annotation is freely available for research purposes.  相似文献   
16.
The Journal of Supercomputing - This study offers a neural network-based deep learning method for energy optimization modeling in electric vehicles (EV). The pre-processed driving cycle is...  相似文献   
17.
Recent progress in both low pretilt and high pretilt defect-free C1 surface stabilized ferroelectric liquid crystal (SSFLC) devices for e-paper application is reviewed. First, by using numerical calculation to investigate the balance between surface azimuthal anchoring energy and bulk elastic energy within the confined chevron layer geometry of C1 and C2, we found it is possible to achieve a zigzag-free C1 state by low azimuthal anchoring alignment with a low pretilt angle. The critical azimuthal anchoring coefficient for defect-free C1 state is calculated. Its relationship with elastic constants, chevron angle, and surface topography effect are also discussed. Second, by using 5° oblique SiO deposition alignment, a defect-free, large memory angle, high contrast ratio, and bistable C1 SSFLC display, which has potential for electronic paper applications has also been developed. The electro-optical properties and bistability of this device have been investigated. Various aspects of defect control are also discussed.  相似文献   
18.
19.
In many river basins, patterns of water withdrawals, deliveries, depletion, return flows, and reuse are prevalent. These cascading systems, often misunderstood, provide opportunities, but also threats to livelihoods and environment. Different ways of thinking about these cascading systems are required.  相似文献   
20.
Procol     
PROCOL is an object-oriented language with distributed delegation. It strongly supports concurrency: many objects may be active simultaneously, they execute in parallel unless engaged in communication. An object has exported operations, called Actions. Only one Action can be active at a time, however special interrupt Actions may interrupt regular Actions. Communication is performed via remote procedure call, or via a one-way synchronous message with short-time binding. In communications both client and server can be specified, either by object instance identifiers, or by type. Therefore client-server mappings may be 1-1,n-1, or 1-n, though only 1 message is transferred. PROCOL controls object access by an explicit per-object protocol. This protocol is a specification of the legality and serialization of the interaction between the object and its clients. It also provides for client type checking. The use of protocols in object communication fosters structured, safer and potentially verifiable information exchange between objects. The protocol also plays an important role as a partial interface specification. In addition it acts as a composition rule over client objects, representing relations with the client objects. PROCOL's communication binding is dynamic (run-time); it functions therefore naturally in a distributed, incremental and dynamic object environment. PROCOL also supports constraints, without compromising information hiding. An implementation is available in the form of aC extension.This author is supported by the Dutch Science Organization NWO  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号