全文获取类型
收费全文 | 5467篇 |
免费 | 156篇 |
国内免费 | 32篇 |
专业分类
电工技术 | 58篇 |
综合类 | 20篇 |
化学工业 | 1075篇 |
金属工艺 | 356篇 |
机械仪表 | 84篇 |
建筑科学 | 150篇 |
矿业工程 | 26篇 |
能源动力 | 98篇 |
轻工业 | 1019篇 |
水利工程 | 36篇 |
石油天然气 | 11篇 |
无线电 | 340篇 |
一般工业技术 | 790篇 |
冶金工业 | 471篇 |
原子能技术 | 20篇 |
自动化技术 | 1101篇 |
出版年
2023年 | 35篇 |
2022年 | 71篇 |
2021年 | 103篇 |
2020年 | 72篇 |
2019年 | 58篇 |
2018年 | 171篇 |
2017年 | 182篇 |
2016年 | 225篇 |
2015年 | 190篇 |
2014年 | 180篇 |
2013年 | 266篇 |
2012年 | 300篇 |
2011年 | 833篇 |
2010年 | 259篇 |
2009年 | 242篇 |
2008年 | 239篇 |
2007年 | 203篇 |
2006年 | 179篇 |
2005年 | 134篇 |
2004年 | 120篇 |
2003年 | 102篇 |
2002年 | 108篇 |
2001年 | 58篇 |
2000年 | 51篇 |
1999年 | 66篇 |
1998年 | 133篇 |
1997年 | 88篇 |
1996年 | 71篇 |
1995年 | 37篇 |
1994年 | 34篇 |
1993年 | 35篇 |
1992年 | 21篇 |
1991年 | 18篇 |
1981年 | 17篇 |
1980年 | 19篇 |
1976年 | 25篇 |
1936年 | 29篇 |
1935年 | 32篇 |
1934年 | 21篇 |
1933年 | 22篇 |
1932年 | 16篇 |
1931年 | 25篇 |
1930年 | 24篇 |
1929年 | 20篇 |
1928年 | 46篇 |
1927年 | 36篇 |
1925年 | 23篇 |
1915年 | 16篇 |
1913年 | 49篇 |
1912年 | 28篇 |
排序方式: 共有5655条查询结果,搜索用时 15 毫秒
91.
J��r?me Schmid Jos�� A. Iglesias?Guiti��n Enrico Gobbetti Nadia Magnenat-Thalmann 《The Visual computer》2011,27(2):85-95
Despite the ability of current GPU processors to treat heavy parallel computation tasks, its use for solving medical image
segmentation problems is still not fully exploited and remains challenging. A lot of difficulties may arise related to, for
example, the different image modalities, noise and artifacts of source images, or the shape and appearance variability of
the structures to segment. Motivated by practical problems of image segmentation in the medical field, we present in this
paper a GPU framework based on explicit discrete deformable models, implemented over the NVidia CUDA architecture, aimed for
the segmentation of volumetric images. The framework supports the segmentation in parallel of different volumetric structures
as well as interaction during the segmentation process and real-time visualization of the intermediate results. Promising
results in terms of accuracy and speed on a real segmentation experiment have demonstrated the usability of the system. 相似文献
92.
Mario A. S. Lizi��r Marcelo F. Siqueira Joel Daniels II Claudio T. Silva L. Gustavo Nonato 《The Visual computer》2011,27(10):887-903
This paper describes a novel template-based meshing approach for generating good quality quadrilateral meshes from 2D digital
images. This approach builds upon an existing image-based mesh generation technique called Imeshp, which enables us to create a segmented triangle mesh from an image without the need for an image segmentation step. Our
approach generates a quadrilateral mesh using an indirect scheme, which converts the segmented triangle mesh created by the
initial steps of the Imesh technique into a quadrilateral one. The triangle-to-quadrilateral conversion makes use of template meshes of triangles. To
ensure good element quality, the conversion step is followed by a smoothing step, which is based on a new optimization-based
procedure. We show several examples of meshes generated by our approach, and present a thorough experimental evaluation of
the quality of the meshes given as examples. 相似文献
93.
Zolt��n Kir��ly 《Algorithmica》2011,60(1):3-20
We first consider the problem of finding a maximum size stable matching if incomplete lists and ties are both allowed, but ties are on one side only. For this problem we give a simple, linear time 3/2-approximation algorithm, improving on the best known approximation factor 5/3 of Irving and Manlove (J. Comb. Optim., doi:10.1007/s10878-007-9133-x, 2007). Next, we show how this extends to the Hospitals/Residents problem with the same ratio if the residents have strict orders. We also give a simple linear time algorithm for the general problem with approximation factor 5/3, improving the best known 15/8-approximation algorithm of Iwama, Miyazaki and Yamauchi (SODA ??07: Proceedings of the Eighteenth Annual ACM-SIAM Symposium on Discrete Algorithms, pp.?288?C297, 2007). For the cases considered in this paper it is NP-hard to approximate within a factor of 21/19 by the result of Halldórsson et?al. (ACM Transactions on Algorithms 3(3):30, 2007). Our algorithms not only give better approximation ratios than the cited ones, but are much simpler and run significantly faster. Also we may drop a restriction used in (J. Comb. Optim., doi:10.1007/s10878-007-9133-x, 2007) and the analysis is substantially more moderate. Preliminary versions of this paper appeared in (Király, Egres Technical Report TR-2008-04, www.cs.elte.hu/egres/, 2008; Király in Proceedings of MATCH-UP 2008: Matching Under Preferences??Algorithms and Complexity, Satellite Workshop of ICALP, July 6, 2008, Reykjavík, Iceland, pp.?36?C45, 2008; Király in ESA 2008, Lecture Notes in Computer Science, vol.?5193, pp.?623?C634, 2008). For the related results obtained thenceforth see Sect.?5. 相似文献
94.
This article describes a multiple feature data fusion applied to a particle filter for marker-less human motion capture (HMC) by using a single camera devoted to an assistant mobile robot. Particle filters have proved to be well suited to this robotic context. Like numerous approaches, the principle relies on the projection of the model's silhouette of the tracked human limbs and appearance features located on the model surface, to validate the particles (associated configurations) which correspond to the best model-to-image fits. Our particle filter based HMC system is improved and extended in two ways. First, our estimation process is based on the so-called AUXILIARY scheme which has been surprisingly seldom exploited for tracking purpose. This scheme is shown to outperform conventional particle filters as it limits drastically the well-known burst in term of particles when considering high dimensional state-space. The second line of investigation concerns data fusion. Data fusion is considered both in the importance and measurement functions with some degree of adaptability depending on the current human posture and the environmental context encountered by the robot. Implementation and experiments on indoor sequences acquired by an assistant mobile robot highlight the relevance and versatility of our HMC system. Extensions are finally discussed. 相似文献
95.
This paper deals with task scheduling, where each task is one particular iteration of a DO loop with partial loop-carried dependencies. Independent iterations of such loops can be scheduled in an order different from the one of classical serial execution, so as to increase program performance.The approach that we present is based both on the use of a directive added to the High Performance Fortran (HPF2) language, which specifies the dependencies between iterations, and on inspector/executor support, implemented in the CoLUMBO library, which builds the task graph and schedules tasks associated with iterations. We validate our approach by showing results achieved on an IBM SP2 for a sparse Cholesky factorization algorithm applied to real problems. 相似文献
96.
Frédéric Cuppens Nora Cuppens-Boulahia 《International Journal of Information Security》2008,7(4):285-305
As computer infrastructures become more complex, security models must provide means to handle more flexible and dynamic requirements.
In the Organization Based Access Control (OrBAC) model, it is possible to express such requirements using the notion of context.
In OrBAC, each security rule (permission, prohibition, obligation or dispensation) only applies in a given context. A context
is viewed as an extra condition that must be satisfied to activate a given security rule. In this paper, we present a taxonomy
of different types of context and investigate the data the information system must manage in order to deal with these different
contexts. We then explain how to model and evaluate them in the OrBAC model.
相似文献
Nora Cuppens-BoulahiaEmail: |
97.
Huafeng Yu Abdoulaye Gamatié Éric Rutten Jean-Luc Dekeyser 《Innovations in Systems and Software Engineering》2008,4(3):215-222
In this paper, we use the UML MARTE profile to model high-performance embedded systems (HPES) in the GASPARD2 framework. We address the design correctness issue on the UML model by using the formal validation tools associated with
synchronous languages, i.e., the SIGALI model checker, etc. This modeling and validation approach benefits from the advantages of UML as a standard, and from the
number of validation tools built around synchronous languages. In our context, model transformations act as a bridge between
UML and the chosen validation technologies. They are implemented according to a model-driven engineering approach. The modeling
and validation are illustrated using the multimedia functionality of a new-generation cellular phone. 相似文献
98.
Frédéric Mallet 《Innovations in Systems and Software Engineering》2008,4(3):309-314
The Object Management Group (OMG) unified modeling language (UML) profile for modeling and analysis of real-time and embedded
systems (MARTE) aims at using the general-purpose modeling language UML in the domain of real-time and embedded (RTE) systems.
To achieve this goal, it is absolutely required to introduce inside the mainly untimed UML an unambiguous time structure which
MARTE model elements can rely on to build precise models amenable to formal analysis. The MARTE Time model has defined such
a structure. We have also defined a non-normative concrete syntax called the clock constraint specification language (CCSL)
to demonstrate what can be done based on this structure. This paper gives a brief overview of this syntax and its formal semantics,
and shows how existing UML model elements can be used to apply this syntax in a graphical way and benefit from the semantics. 相似文献
99.
We consider the edit distance with moves on the class of words and the class of ordered trees. We first exhibit a simple tester
for the class of regular languages on words and generalize it to the class of ranked and unranked regular trees. We also show
that this distance problem is
-complete on ordered trees.
A preliminary version of this paper appeared in Proceedings of 31st International Colloquium on Automata, Languages and Programming, volume 3142 of Lecture Notes in Computer Science, pages 932–944, Springer, 2005. Work supported by ACI Sécurité Informatique: VERA of the French Ministry of research. 相似文献
100.