首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   650篇
  免费   37篇
电工技术   5篇
综合类   2篇
化学工业   187篇
金属工艺   18篇
机械仪表   9篇
建筑科学   49篇
矿业工程   2篇
能源动力   17篇
轻工业   38篇
水利工程   2篇
无线电   52篇
一般工业技术   131篇
冶金工业   33篇
原子能技术   6篇
自动化技术   136篇
  2023年   15篇
  2022年   18篇
  2021年   20篇
  2020年   12篇
  2019年   11篇
  2018年   12篇
  2017年   16篇
  2016年   28篇
  2015年   15篇
  2014年   32篇
  2013年   32篇
  2012年   32篇
  2011年   42篇
  2010年   45篇
  2009年   43篇
  2008年   38篇
  2007年   43篇
  2006年   14篇
  2005年   25篇
  2004年   24篇
  2003年   14篇
  2002年   6篇
  2001年   9篇
  2000年   13篇
  1999年   12篇
  1998年   6篇
  1997年   10篇
  1996年   10篇
  1995年   2篇
  1994年   7篇
  1993年   6篇
  1992年   9篇
  1991年   6篇
  1990年   2篇
  1989年   3篇
  1988年   6篇
  1987年   4篇
  1986年   8篇
  1985年   2篇
  1983年   4篇
  1982年   4篇
  1981年   5篇
  1980年   2篇
  1979年   3篇
  1978年   2篇
  1977年   2篇
  1976年   2篇
  1974年   2篇
  1966年   3篇
  1964年   1篇
排序方式: 共有687条查询结果,搜索用时 15 毫秒
51.
We compare four tools regarding their suitability for teaching formal software verification, namely the Frege Program Prover, the Key system, Perfect Developer, and the Prototype Verification System (PVS). We evaluate them on a suite of small programs, which are typical of courses dealing with Hoare-style verification, weakest preconditions, or dynamic logic. Finally we report our experiences with using Perfect Developer in class.  相似文献   
52.
Information security has become increasingly important to organizations. Despite the prevalence of technical security measures, individual employees remain the key link – and frequently the weakest link – in corporate defenses. When individuals choose to disregard security policies and procedures, the organization is at risk. How, then, can organizations motivate their employees to follow security guidelines? Using an organizational control lens, we build a model to explain individual information security precaution-taking behavior. Specific hypotheses are developed and tested using a field survey. We examine elements of control and introduce the concept of ‘mandatoriness,’ which we define as the degree to which individuals perceive that compliance with existing security policies and procedures is compulsory or expected by organizational management. We find that the acts of specifying policies and evaluating behaviors are effective in convincing individuals that security policies are mandatory. The perception of mandatoriness is effective in motivating individuals to take security precautions, thus if individuals believe that management watches, they will comply.  相似文献   
53.
Stylized facts of financial time series and hidden semi-Markov models   总被引:1,自引:0,他引:1  
Hidden Markov models reproduce most of the stylized facts about daily series of returns. A notable exception is the inability of the models to reproduce one ubiquitous feature of such time series, namely the slow decay in the autocorrelation function of the squared returns. It is shown that this stylized fact can be described much better by means of hidden semi-Markov models. This is illustrated by examining the fit of two such models to 18 series of daily sector returns.  相似文献   
54.
This article investigates methods for achieving more general manipulation capabilities for mobile manipulation platforms, which produce legible behavior in human living environments. To achieve generality and legibility, we combine two control mechanisms. First of all, experience- and observation-based learning of skills is applied to routine tasks, so that the repetitive and stereotypical character of everyday activity is exploited. Second, we use planning, reasoning, and search for novel tasks which have no stereotypical solution. We apply these ideas to the learning and use of action-related places, to the model-based visual recognition and localization of objects, and the learning and application of reaching strategies and motions from humans. We demonstrate the integration of these mechanisms into a single low-level control system for autonomous manipulation platforms.  相似文献   
55.
A Comparison of Free BDDs and Transformed BDDs   总被引:2,自引:0,他引:2  
Ordered binary decision diagrams (OBDDs) introduced by Bryant (IEEE Trans. on Computers, Vol. 35, pp. 677–691, 1986) have found a lot of applications in verification and CAD. Their use is limited if the OBDD size of the considered functions is too large. Therefore, a variety of generalized BDD models has been presented, among them FBDDs (free BDDs) and TBDDs (transformed BDDs). Here the quite tight relations between these models are revealed and their advantages and disadvantages are discussed.  相似文献   
56.
Recent advances in the field of kernel-based machine learning methods allow fast processing of text using string kernels utilizing suffix arrays. kernlab provides both kernel methods’ infrastructure and a large collection of already implemented algorithms and includes an implementation of suffix-array-based string kernels. Along with the use of the text mining infrastructure provided by tm these packages provide R with functionality in processing, visualizing and grouping large collections of text data using kernel methods. The emphasis is on the performance of various types of string kernels at these tasks.  相似文献   
57.
58.
Multimedia analysis and reuse of raw un-edited audio visual content known as rushes is gaining acceptance by a large number of research labs and companies. A set of research projects are considering multimedia indexing, annotation, search and retrieval in the context of European funded research, but only the FP6 project RUSHES is focusing on automatic semantic annotation, indexing and retrieval of raw and un-edited audio-visual content. Even professional content creators and providers as well as home-users are dealing with this type of content and therefore novel technologies for semantic search and retrieval are required. In this paper, we present a summary of the most relevant achievements of the RUSHES project, focusing on specific approaches for automatic annotation as well as the main features of the final RUSHES search engine.  相似文献   
59.
60.
Many real-world problems are multi-objective optimization problems and evolutionary algorithms are quite successful on such problems. Since the task is to compute or approximate the Pareto front, multi-objective optimization problems are considered as more difficult than single-objective problems. One should not forget that the fitness vector with respect to more than one objective contains more information that in principle can direct the search of evolutionary algorithms. Therefore, it is possible that a single-objective problem can be solved more efficiently via a generalized multi-objective model of the problem. That this is indeed the case is proved by investigating the computation of minimum spanning trees.This work was supported by the Deutsche Forschungsgemeinschaft (DFG) as part of the Collaborative Research Center Computational Intelligence (SFB 531) and by the German-Israeli Foundation (GIF) in the project Robustness Aspects of Algorithms.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号