首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   6669篇
  免费   453篇
  国内免费   9篇
电工技术   78篇
综合类   2篇
化学工业   1931篇
金属工艺   112篇
机械仪表   203篇
建筑科学   287篇
矿业工程   24篇
能源动力   261篇
轻工业   978篇
水利工程   61篇
石油天然气   35篇
无线电   415篇
一般工业技术   1039篇
冶金工业   308篇
原子能技术   47篇
自动化技术   1350篇
  2024年   22篇
  2023年   96篇
  2022年   272篇
  2021年   310篇
  2020年   208篇
  2019年   231篇
  2018年   277篇
  2017年   291篇
  2016年   280篇
  2015年   233篇
  2014年   312篇
  2013年   568篇
  2012年   445篇
  2011年   547篇
  2010年   372篇
  2009年   406篇
  2008年   339篇
  2007年   312篇
  2006年   263篇
  2005年   196篇
  2004年   146篇
  2003年   165篇
  2002年   136篇
  2001年   77篇
  2000年   83篇
  1999年   64篇
  1998年   50篇
  1997年   55篇
  1996年   51篇
  1995年   39篇
  1994年   30篇
  1993年   27篇
  1992年   15篇
  1991年   21篇
  1990年   12篇
  1989年   19篇
  1988年   11篇
  1987年   11篇
  1986年   11篇
  1985年   14篇
  1984年   9篇
  1983年   8篇
  1982年   14篇
  1981年   6篇
  1980年   9篇
  1979年   10篇
  1978年   19篇
  1976年   8篇
  1975年   5篇
  1973年   5篇
排序方式: 共有7131条查询结果,搜索用时 9 毫秒
91.
92.
Automated virtual camera control has been widely used in animation and interactive virtual environments. We have developed a multiple sparse camera based free view video system prototype that allows users to control the position and orientation of a virtual camera, enabling the observation of a real scene in three dimensions (3D) from any desired viewpoint. Automatic camera control can be activated to follow selected objects by the user. Our method combines a simple geometric model of the scene composed of planes (virtual environment), augmented with visual information from the cameras and pre-computed tracking information of moving targets to generate novel perspective corrected 3D views of the virtual camera and moving objects. To achieve real-time rendering performance, view-dependent textured mapped billboards are used to render the moving objects at their correct locations and foreground masks are used to remove the moving objects from the projected video streams. The current prototype runs on a PC with a common graphics card and can generate virtual 2D views from three cameras of resolution 768×576 with several moving objects at about 11 fps.  相似文献   
93.
Wireless technologies, under the “Anywhere, Anytime” paradigm, offer users the promise of being always attached to the network. Mobile devices enabled with multiple wireless technologies make possible to maintain seamless connectivity in highly dynamic scenarios such as vehicular networks (VNs), switching from one wireless network to another by using vertical handover techniques (VHO). In this paper we present an overview of VHO techniques, along with the main algorithms, protocols and tools proposed in the literature. In addition we suggest the most appropriate VHO techniques to efficiently communicate in VN environments considering the particular characteristics of this type of networks.  相似文献   
94.
95.
Building visualization and analysis pipelines is a large hurdle in the adoption of visualization and workflow systems by domain scientists. In this paper, we propose techniques to help users construct pipelines by consensus--automatically suggesting completions based on a database of previously created pipelines. In particular, we compute correspondences between existing pipeline subgraphs from the database, and use these to predict sets of likely pipeline additions to a given partial pipeline. By presenting these predictions in a carefully designed interface, users can create visualizations and other data products more efficiently because they can augment their normal work patterns with the suggested completions. We present an implementation of our technique in a publicly-available, open-source scientific workflow system and demonstrate efficiency gains in real-world situations.  相似文献   
96.
While there have been advances in visualization systems, particularly in multi-view visualizations and visual exploration, the process of building visualizations remains a major bottleneck in data exploration. We show that provenance metadata collected during the creation of pipelines can be reused to suggest similar content in related visualizations and guide semi-automated changes. We introduce the idea of query-by-example in the context of an ensemble of visualizations, and the use of analogies as first-class operations in a system to guide scalable interactions. We describe an implementation of these techniques in VisTrails, a publicly-available, open-source system.  相似文献   
97.
Learning vector quantization with training data selection   总被引:2,自引:0,他引:2  
In this paper, we propose a method that selects a subset of the training data points to update LVQ prototypes. The main goal is to conduct the prototypes to converge at a more convenient location, diminishing misclassification errors. The method selects an update set composed by a subset of points considered to be at the risk of being captured by another class prototype. We associate the proposed methodology to a weighted norm, instead of the Euclidean, in order to establish different levels of relevance for the input attributes. The technique was implemented on a controlled experiment and on Web available data sets.  相似文献   
98.
We consider weighted finite transducers over arbitrary groups, that is finite transducers having a counter in which, at any step, a value of the group is stored but no information regarding the content of this counter is available until the computation is finished. The computation is valid if the counter value is the neutral element of the group. We generalize here some results from [8] and [17]. Received: 28 January 2001 / 5 June 2001  相似文献   
99.
Highly discriminative statistical features for email classification   总被引:2,自引:2,他引:0  
This paper reports on email classification and filtering, more specifically on spam versus ham and phishing versus spam classification, based on content features. We test the validity of several novel statistical feature extraction methods. The methods rely on dimensionality reduction in order to retain the most informative and discriminative features. We successfully test our methods under two schemas. The first one is a classic classification scenario using a 10-fold cross-validation technique for several corpora, including four ground truth standard corpora: Ling-Spam, SpamAssassin, PU1, and a subset of the TREC 2007 spam corpus, and one proprietary corpus. In the second schema, we test the anticipatory properties of our extracted features and classification models with two proprietary datasets, formed by phishing and spam emails sorted by date, and with the public TREC 2007 spam corpus. The contributions of our work are an exhaustive comparison of several feature selection and extraction methods in the frame of email classification on different benchmarking corpora, and the evidence that especially the technique of biased discriminant analysis offers better discriminative features for the classification, gives stable classification results notwithstanding the amount of features chosen, and robustly retains their discriminative value over time and data setups. These findings are especially useful in a commercial setting, where short profile rules are built based on a limited number of features for filtering emails.  相似文献   
100.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号