首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   2709篇
  免费   104篇
  国内免费   1篇
电工技术   41篇
综合类   1篇
化学工业   807篇
金属工艺   55篇
机械仪表   51篇
建筑科学   103篇
矿业工程   3篇
能源动力   81篇
轻工业   225篇
水利工程   12篇
石油天然气   6篇
无线电   311篇
一般工业技术   487篇
冶金工业   258篇
原子能技术   18篇
自动化技术   355篇
  2022年   30篇
  2021年   68篇
  2020年   19篇
  2019年   34篇
  2018年   55篇
  2017年   47篇
  2016年   65篇
  2015年   31篇
  2014年   66篇
  2013年   136篇
  2012年   127篇
  2011年   156篇
  2010年   103篇
  2009年   126篇
  2008年   134篇
  2007年   127篇
  2006年   99篇
  2005年   83篇
  2004年   76篇
  2003年   76篇
  2002年   85篇
  2001年   45篇
  2000年   44篇
  1999年   52篇
  1998年   77篇
  1997年   67篇
  1996年   56篇
  1995年   42篇
  1994年   40篇
  1993年   38篇
  1992年   40篇
  1991年   39篇
  1990年   36篇
  1989年   30篇
  1988年   29篇
  1987年   30篇
  1986年   25篇
  1985年   43篇
  1984年   34篇
  1983年   23篇
  1982年   30篇
  1981年   22篇
  1980年   20篇
  1979年   29篇
  1978年   25篇
  1977年   25篇
  1976年   24篇
  1975年   23篇
  1974年   14篇
  1973年   19篇
排序方式: 共有2814条查询结果,搜索用时 46 毫秒
81.
Cellular automata may be viewed as a modelization of synchronous parallel computation. Even in the one-dimensional case, they are known as capable of universal computations. The usual proof uses a simulation of a universal Turing machine. In this paper, we present how a one-dimensional cellular automata can simulate any recursive function in such a way that composition of computations occurs as soon as possible. In addition, this allows us to show that one-dimensional cellular automata may simulate asynchronous computations.This work was supported by the Programme de Recherches Coordonnées Mathématiques et Informatique and the Esprit Basic Research Action Algebraic and Syntactical Methods in Computer Science.  相似文献   
82.
A semantics of introspection in a reflective prototype-based language   总被引:1,自引:0,他引:1  
In Malenfant et al. [19], we have described a reflective model for a prototype-based language based on thelookup o apply reflective introspection protocol. In this paper, we augment our previous protocol by converting it to handle continuations reified as first-class objects. First-class continuations provide much more control over the current computation; during the introspection phase fired by message sending, they make it possible not only to change the behavior of the program for that message but also for the entire future computation. In this paper, we provide this introspection protocol with a formal semantics. This result is obtained by exhibiting a mapping from program configurations to priority rewrite systems (PRS) as well as a mapping from message expressions to ground first-order terms used to query the PRS. Other advantages of this approach are: to ensure the termination of the introspection using the smallest set of formally justified conditions and to provide a clear declarative account of this reflective protocol. The PRS also appears as a meta-level to the base language, independent of the implementation, but from which we derive fundamental clues to obtain an efficient language processor. By our new model, we finally highlight the link between reflection in object-oriented languages and the one originally proposed by 3-Lisp [24], although object-orientation provides reusability to reflection, making it easier to use.  相似文献   
83.
We present in this article a way to produce test suites applied to the POSIX mini-challenge based on a behavioral model of a file system manager written in UML/OCL. We illustrate the limitations of a fully automated test generation approach, which justifies the use of test scenarios as a complement to a functional testing approach. Scenarios are expressed through regular expressions describing sequences of operations, possibly punctuated by intermediate states that have to be reached by the execution of the model. Scenarios are unfolded into extended sequences of operations that are played on the model using symbolic animation techniques. We experimented our approach by testing the conformance of two different file systems w.r.t. the POSIX standard: a recent Linux distribution and a customized Java implementation of POSIX used to evaluate the relevance of our approach and its complementarity with a structural test generation approach.  相似文献   
84.
We present in this paper a model for indexing and querying web pages, based on the hierarchical decomposition of pages into blocks. Splitting up a page into blocks has several advantages in terms of page design, indexing and querying such as (i) blocks of a page most similar to a query may be returned instead of the page as a whole (ii) the importance of a block can be taken into account, as well as (iii) the permeability of the blocks to neighbor blocks: a block b is said to be permeable to a block b?? in the same page if b?? content (text, image, etc.) can be (partially) inherited by b upon indexing. An engine implementing this model is described including: the transformation of web pages into blocks hierarchies, the definition of a dedicated language to express indexing rules and the storage of indexed blocks into an XML repository. The model is assessed on a dataset of electronic news, and a dataset drawn from web pages of the ImagEval campaign where it improves by 16% the mean average precision of the baseline.  相似文献   
85.
86.
Four main frameworks for intercompany relationships (SCOR, CPFR, ISA95 and OAG) are discussed and compared. The link between the frameworks and different supply chain integration applications such as ERP, CRM and VMI are pictured. Finally the state-of-the-art, future state and challenges of the supply chain integration applications are discussed. It is concluded that the main challenge with respect to frameworks supporting business systems integration is to extend them with implementation functionality to better support business system application development. An example of this is customer requirement fulfillment processes such as product development and order fulfillment. Not only do they cross the borders of the company's departments (sales, logistics, purchasing, etc) but also various companies in the supply chain. In spite of this development, business integration across systems and borders are still not matured and to a large extend based on human interaction.  相似文献   
87.
This paper shows how to apply discrete time non-homogeneous semi-Markov processes (DTNHSMP) with an age index to credit risk. The idea is to consider the credit risk problem as a reliability model indexed by the age and in this way, many semi-Markov results could be adapted to describe credit risk problem. The default state is seen as a “non working state”. As the semi-Markov process is a generalization of Markov process, the presented model can be seen as a more general migration model. In fact, in semi-Markov environment the distribution function (d.f.) of the waiting time before a transition can be of any type and without the strong constraints of the Markov model. Furthermore, some results on the asymptotic behavior of the presented model are given. This permits the construction of the d.f. of the default random variable for each “working state”. An example, constructed manipulating some Standard & Poor’s (S&P) data, is presented.  相似文献   
88.
In this study, we propose to evaluate the potential of Raman spectroscopy (RS) to assess renal tumours at surgery. Different classes of Raman renal spectra acquired during a clinical protocol are discriminated using support vector machines classifiers. The influence on the classification scores of various preprocessing steps generally involved in RS are also investigated and evaluated in the particular context of renal tumour characterization. Encouraging results show the interest of RS to evaluate kidney cancer and suggest the potential of this technique as a surgical assistance during partial nephrectomy.  相似文献   
89.
90.
This article sets out to identify the typical risky situations experienced by novice motorcyclists in the real world just after licensing. The procedure consists of a follow-up of six novices during their first two months of riding with their own motorbike instrumented with cameras. The novices completed logbooks on a daily basis in order to identify the risky situations they encountered, and were given face-to-face interviews to identify the context and their shortcomings during the reported events. Data show a large number of road configurations considered as risky by the riders (248 occurrences), especially during the first two weeks. The results revealed that a lack of hazard perception skills contributed to the majority of these incidents. These situations were grouped together to form clusters of typical incident scenarios on the basis of their similarities. The most frequent scenario corresponds to a lane change in dense traffic (15% of all incidents). The discussion shows how this has enhanced our understanding of novice riders’ behaviour and how the findings can improve training and licensing. Lastly, the main methodological limitations of the study and some guidelines for improving future naturalistic riding studies are presented.

Practitioner Summary:

This article aims to identify the risky situations of novice motorcyclists in real roads. Two hundred forty-eight events were recorded and 13 incident scenarios identified. Results revealed that a lack of hazard perception contributed to the majority of these events. The most frequent scenario corresponds to a lane change in dense traffic.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号