首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   413篇
  免费   9篇
电工技术   14篇
综合类   1篇
化学工业   50篇
金属工艺   3篇
机械仪表   7篇
建筑科学   17篇
能源动力   3篇
轻工业   43篇
水利工程   2篇
石油天然气   3篇
无线电   70篇
一般工业技术   38篇
冶金工业   74篇
原子能技术   5篇
自动化技术   92篇
  2021年   3篇
  2020年   4篇
  2019年   3篇
  2018年   4篇
  2016年   11篇
  2015年   5篇
  2014年   8篇
  2013年   36篇
  2012年   8篇
  2011年   16篇
  2010年   7篇
  2009年   22篇
  2008年   13篇
  2007年   27篇
  2006年   17篇
  2005年   16篇
  2004年   19篇
  2003年   10篇
  2002年   21篇
  2001年   6篇
  2000年   13篇
  1999年   12篇
  1998年   22篇
  1997年   19篇
  1996年   14篇
  1995年   6篇
  1994年   6篇
  1993年   7篇
  1992年   3篇
  1991年   3篇
  1990年   7篇
  1989年   2篇
  1988年   3篇
  1986年   6篇
  1985年   8篇
  1984年   3篇
  1983年   4篇
  1982年   3篇
  1981年   3篇
  1979年   2篇
  1978年   2篇
  1977年   3篇
  1976年   2篇
  1975年   2篇
  1974年   1篇
  1973年   1篇
  1972年   1篇
  1969年   2篇
  1963年   1篇
  1959年   1篇
排序方式: 共有422条查询结果,搜索用时 437 毫秒
381.
382.
Arguing that intricate concurrent programs satisfy their specifications can be difficult; recording understandable explanations is important for subsequent readers. Abstraction is a key tool even for sequential programs. The purpose here is to explore some abstractions that help readers (and writers) understand the design of concurrent programs. As an illustration, the paper presents a formal development of a non-trivial parallel program: Simpson’s implementation of asynchronous communication mechanisms. Although the correctness of this “4-slot algorithm” has been shown elsewhere, earlier proofs fail to offer much insight into the design. From an understandable (yet formal) design history of this one algorithm, the techniques employed in the explanation are teased out for wider application. Among these techniques is using a “fiction of atomicity” as an aid to understanding the initial steps of development. The rely-guarantee approach is, here, combined with notions of read/write frames and “phased” specifications; furthermore, the atomicity assumptions implied by the rely/guarantee conditions are achieved by clever choice of data representations.  相似文献   
383.
A Structural Proof of the Soundness of Rely/guarantee Rules   总被引:1,自引:0,他引:1  
Various forms of rely/guarantee conditions have been used torecord and reason about interference in ways that provide compositionaldevelopment methods for concurrent programs. This article illustratessuch a set of rules and proves their soundness. The underlyingconcurrent language allows fine-grained interleaving and nestedconcurrency; it is defined by an operational semantics; theproof that the rely/guarantee rules are consistent with thatsemantics (including termination) is by a structural induction.A key lemma which relates the states which can arise from theextra interference that results from taking a portion of theprogram out of context makes it possible to do the proofs withouthaving to perform induction over the computation history. Thislemma also offers a way to think about expressibility issuesaround auxiliary variables in rely/guarantee conditions.  相似文献   
384.
Online communities depend on the persistent contributions of heterogeneous users with diverse motivations and ways of participating. As these online communities exist over time, it is possible that users change the way in which they contribute to the site. Through interviews with 31 long-term members of a user-generated content community who have decreased their participation on the site, we examined the meaning that these users gave to their contribution and how their new participation patterns related to their initial motivations. We complement the reader-to-leader framework (Preece and Shneiderman: AIS Transactions on Human-Computer Interaction, vol. 1, no. 1, pp. 13–32, 2009) by propounding the concept of latent user to understand decreasing content contribution and user life-cycles in online communities. We showed that even though latent users decrease their content contribution, their participation becomes more selective and remained consistent with initial motivations to participate.  相似文献   
385.
This study explores the relationship between perceived bridging social capital and specific Facebook‐enabled communication behaviors using survey data from a sample of U.S. adults (N=614). We explore the role of a specific set of Facebook behaviors that support relationship maintenance and assess the extent to which demographic variables, time on site, total and “actual” Facebook Friends, and this new measure (Facebook Relationship Maintenance Behaviors) predict bridging social capital. Drawing upon scholarship on social capital and relationship maintenance, we discuss the role of social grooming and attention‐signaling activities in shaping perceived access to resources in one's network as measured by bridging social capital.  相似文献   
386.
Numerical simulation of stretch flange forming of Al–Mg sheet AA5182 was performed using the upper and lower bound constitutive models of Gurson–Tvergaard–Needleman (GTN) and Sun and Wang, respectively. Stress and strain-controlled nucleation rules are adopted for both models. The lower bound model of Sun and Wang has been extended to include the void coalescence criterion of Tvergaard and Needleman to form the so-called Sun–Tvergaard–Needleman (STN) model. Upper and lower bound formability predictions are combined to create a predictive formability band as actual formability lies between these limits. The resulting formability predictions are compared with experimental results and an appropriate void nucleation stress and strain suggested.  相似文献   
387.
The ‘Epistemic Uncertainty Workshop’ sponsored by Sandia National Laboratories was held in Albuquerque, New Mexico, on 6–7 August 2002. The workshop was organized around a set of Challenge Problems involving both epistemic and aleatory uncertainty that the workshop participants were invited to solve and discuss. This concluding article in a special issue of Reliability Engineering and System Safety based on the workshop discusses the intent of the Challenge Problems, summarizes some discussions from the workshop, and provides a technical comparison among the papers in this special issue. The Challenge Problems were computationally simple models that were intended as vehicles for the illustration and comparison of conceptual and numerical techniques for use in analyses that involve: (i) epistemic uncertainty, (ii) aggregation of multiple characterizations of epistemic uncertainty, (iii) combination of epistemic and aleatory uncertainty, and (iv) models with repeated parameters. There was considerable diversity of opinion at the workshop about both methods and fundamental issues, and yet substantial consensus about what the answers to the problems were, and even about how each of the four issues should be addressed. Among the technical approaches advanced were probability theory, Dempster–Shafer evidence theory, random sets, sets of probability measures, imprecise coherent probabilities, coherent lower previsions, probability boxes, possibility theory, fuzzy sets, joint distribution tableaux, polynomial chaos expansions, and info-gap models. Although some participants maintained that a purely probabilistic approach is fully capable of accounting for all forms of uncertainty, most agreed that the treatment of epistemic uncertainty introduces important considerations and that the issues underlying the Challenge Problems are legitimate and significant. Topics identified as meriting additional research include elicitation of uncertainty representations, aggregation of multiple uncertainty representations, dependence and independence, model uncertainty, solution of black-box problems, efficient sampling strategies for computation, and communication of analysis results.  相似文献   
388.
389.
390.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号