首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   2184篇
  免费   64篇
  国内免费   4篇
电工技术   27篇
综合类   2篇
化学工业   560篇
金属工艺   44篇
机械仪表   35篇
建筑科学   80篇
矿业工程   1篇
能源动力   79篇
轻工业   251篇
水利工程   7篇
石油天然气   7篇
无线电   232篇
一般工业技术   411篇
冶金工业   62篇
原子能技术   36篇
自动化技术   418篇
  2024年   27篇
  2023年   26篇
  2022年   49篇
  2021年   69篇
  2020年   62篇
  2019年   62篇
  2018年   63篇
  2017年   72篇
  2016年   73篇
  2015年   79篇
  2014年   105篇
  2013年   160篇
  2012年   137篇
  2011年   221篇
  2010年   149篇
  2009年   136篇
  2008年   126篇
  2007年   87篇
  2006年   89篇
  2005年   79篇
  2004年   58篇
  2003年   63篇
  2002年   46篇
  2001年   24篇
  2000年   20篇
  1999年   30篇
  1998年   24篇
  1997年   12篇
  1996年   25篇
  1995年   6篇
  1994年   18篇
  1993年   16篇
  1992年   9篇
  1991年   5篇
  1990年   4篇
  1989年   1篇
  1988年   2篇
  1987年   2篇
  1986年   3篇
  1984年   3篇
  1983年   2篇
  1982年   1篇
  1980年   1篇
  1979年   1篇
  1977年   1篇
  1976年   2篇
  1975年   1篇
  1974年   1篇
排序方式: 共有2252条查询结果,搜索用时 0 毫秒
141.
Journal of Automated Reasoning - Algebraic datatypes, and among them lists and trees, have attracted a lot of interest in automated reasoning and Satisfiability Modulo Theories (SMT). Since its...  相似文献   
142.
This paper presents a new family of 2D curves and its extension to 3D surfaces, respectively, calledrationconics andratioquadrics that have been designed as alternatives to the well-known superconics and superquadrics. This new model is intended as an improvement to the original one on three main points: first, it involves lower computation cost and provides better numerical robustness; second, it offers higher order continuities (C 1/G 2 orC 2/G 2 instead ofC 0/G 0); and third, it provides a greater variety of shapes for the resulting curves and surfaces. All these improvements are obtained by replacing the signed power function involved in the formulation of superconics and superquadrics by linear or quadratic rational polynomials.  相似文献   
143.
A semantics of introspection in a reflective prototype-based language   总被引:1,自引:0,他引:1  
In Malenfant et al. [19], we have described a reflective model for a prototype-based language based on thelookup o apply reflective introspection protocol. In this paper, we augment our previous protocol by converting it to handle continuations reified as first-class objects. First-class continuations provide much more control over the current computation; during the introspection phase fired by message sending, they make it possible not only to change the behavior of the program for that message but also for the entire future computation. In this paper, we provide this introspection protocol with a formal semantics. This result is obtained by exhibiting a mapping from program configurations to priority rewrite systems (PRS) as well as a mapping from message expressions to ground first-order terms used to query the PRS. Other advantages of this approach are: to ensure the termination of the introspection using the smallest set of formally justified conditions and to provide a clear declarative account of this reflective protocol. The PRS also appears as a meta-level to the base language, independent of the implementation, but from which we derive fundamental clues to obtain an efficient language processor. By our new model, we finally highlight the link between reflection in object-oriented languages and the one originally proposed by 3-Lisp [24], although object-orientation provides reusability to reflection, making it easier to use.  相似文献   
144.
145.
Multimedia Tools and Applications - Microsoft has recently released a mixed reality headset called HoloLens. This semi-transparent visor headset allows the user who wears it to view the projection...  相似文献   
146.
In this paper, we propose two original and efficient approaches for enforcing singleton arc consistency. In the first one, the data structures used to enforce arc consistency are shared between all subproblems where a domain is reduced to a singleton. This new algorithm is not optimal but it requires far less space and is often more efficient in practice than the optimal algorithm SAC-Opt. In the second approach, we perform several runs of a greedy search (where at each step, arc consistency is maintained), possibly detecting the singleton arc consistency of several values in one run. It is an original illustration of applying inference (i.e., establishing singleton arc consistency) by search. Using a greedy search allows benefiting from the incrementality of arc consistency, learning relevant information from conflicts and, potentially finding solution(s) during the inference process. We present extensive experiments that show the benefit of our two approaches.  相似文献   
147.
148.
Advances in wireless sensing and actuation technology allow embedding significant amounts of application logic inside wireless sensor networks. Such active WSN applications are more autonomous, but are significantly more complex to implement. Event-based middleware lends itself to implementing these applications. It offers developers fine-grained control over how an individual node interacts with the other nodes of the network. However, this control comes at the cost of event handlers which lack composability and violate software engineering principles such as separation of concerns. In this paper, we present CrimeSPOT as a domain-specific language for programming WSN applications on top of event-driven middleware. Its node-centric features enable programming a node’s interactions through declarative rules rather than event handlers. Its network-centric features support reusing code within and among WSN applications. Unique to CrimeSPOT is its support for associating application-specific semantics with events that carry sensor readings. These preclude transposing existing approaches that address the shortcomings of event-based middleware to the domain of wireless sensor networks. We provide a comprehensive overview of the language and the implementation of its accompanying runtime. The latter comprises several extensions to the Rete forward chaining algorithm. We evaluate the expressiveness of the language and the overhead of its runtime using small, but representative active WSN applications.  相似文献   
149.
This paper deals with the optimization of a cross-docking system. It is modeled as a three-stage hybrid flowshop, in which shipments and orders are represented as batches. The first stage corresponds to the receiving docks, the second stage corresponds to the sorting stations, and the third stage corresponds to the shipping docks. The objective of the problem is to find a schedule that minimizes the completion time of the latest batch. In order to obtain good quality feasible solutions, we have developed several heuristic schemes depending on the main stage considered, and several rules to order the batches in this stage. Then, we propose a branch-and-bound algorithm that takes into account the decomposition of the problem into three stages. To evaluate the heuristics and to reduce the tree size during the branch-and-bound computation, we also propose lower bounds. Finally, the computational experiments are presented to demonstrate the efficiency of our heuristics. The results show that the exact approach can solve instances containing up to 9–10 batches in each stage (i.e., up to 100 jobs). In addition, our heuristics were evaluated over instances with up to 3000 jobs, and they can provide good quality feasible solutions in a few seconds (i.e., less than 2 s per heuristic).  相似文献   
150.
Recent advances in the design of interval observers have made it possible to ensure the non‐divergence of the computed state bounds from the stability of LTI systems under bounded inputs, with no need for additional monotony assumptions. Time‐varying changes of coordinates can be used to that purpose. Most of the related works result in either continuous‐time or discrete‐time interval dynamics. This paper proposes a constructive algorithm to compute the exact sampled response of a linear interval predictor under bounded inputs, gives a stability equivalence result and discusses the design of interval observers. The exact sampling requires held input bounds but the uncertain input itself needs not to be held. A numerical example exhibiting an oscillatory behavior illustrates the main results.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号