首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   2705篇
  免费   110篇
  国内免费   4篇
电工技术   31篇
综合类   10篇
化学工业   327篇
金属工艺   17篇
机械仪表   67篇
建筑科学   169篇
矿业工程   1篇
能源动力   85篇
轻工业   171篇
水利工程   11篇
石油天然气   7篇
无线电   420篇
一般工业技术   473篇
冶金工业   459篇
原子能技术   16篇
自动化技术   555篇
  2023年   23篇
  2022年   25篇
  2021年   38篇
  2020年   39篇
  2019年   42篇
  2018年   57篇
  2017年   45篇
  2016年   81篇
  2015年   57篇
  2014年   70篇
  2013年   153篇
  2012年   98篇
  2011年   125篇
  2010年   102篇
  2009年   134篇
  2008年   145篇
  2007年   126篇
  2006年   128篇
  2005年   97篇
  2004年   89篇
  2003年   97篇
  2002年   66篇
  2001年   71篇
  2000年   79篇
  1999年   66篇
  1998年   148篇
  1997年   101篇
  1996年   82篇
  1995年   55篇
  1994年   43篇
  1993年   34篇
  1992年   29篇
  1991年   22篇
  1990年   30篇
  1989年   21篇
  1988年   25篇
  1987年   19篇
  1986年   20篇
  1985年   18篇
  1984年   13篇
  1983年   8篇
  1982年   8篇
  1981年   13篇
  1980年   10篇
  1979年   4篇
  1978年   10篇
  1977年   6篇
  1976年   15篇
  1975年   7篇
  1900年   3篇
排序方式: 共有2819条查询结果,搜索用时 453 毫秒
81.
In this paper, we address the containment control problem for multi-agent systems under heterogeneous unbounded communication delays with emphasis on the convergence rate analysis. Different from most works on multi-agent systems, we resort to a viewpoint from the area of positive delay systems. We first cast the containment control problem into the stability analysis of an associated error system. In order to capture the convergence rate, we introduce a nondecreasing positive function whose reciprocal represents the decay rate of the associated error system. Under the assumption that each follower has access to at least one leader and some mild hypotheses on the communication delays, an explicit condition is given to characterise the decay rate of the associated error system in terms of linear programming. In addition, we provide several special cases when the communication delays are restricted by linear, sublinear and logarithmic growth rates, respectively. Finally, through numerical examples, it is shown that the convergence rate is dominated by the delays being the highest order infinitely large quantity.  相似文献   
82.
83.
84.
An Internet-based negotiation server for e-commerce   总被引:6,自引:0,他引:6  
This paper describes the design and implementation of a replicable, Internet-based negotiation server for conducting bargaining-type negotiations between enterprises involved in e-commerce and e-business. Enterprises can be buyers and sellers of products/services or participants of a complex supply chain engaged in purchasing, planning, and scheduling. Multiple copies of our server can be installed to complement the services of Web servers. Each enterprise can install or select a trusted negotiation server to represent his/her interests. Web-based GUI tools are used during the build-time registration process to specify the requirements, constraints, and rules that represent negotiation policies and strategies, preference scoring of different data conditions, and aggregation methods for deriving a global cost-benefit score for the item(s) under negotiation. The registration information is used by the negotiation servers to automatically conduct bargaining type negotiations on behalf of their clients. In this paper, we present the architecture of our implementation as well as a framework for automated negotiations, and describe a number of communication primitives which are used in the underlying negotiation protocol. A constraint satisfaction processor (CSP) is used to evaluate a negotiation proposal or counterproposal against the registered requirements and constraints of a client company. In case of a constraint violation, an event is posted to trigger the execution of negotiation strategic rules, which either automatically relax the violated constraint, ask for human intervention, invoke an application, or perform other remedial operations. An Event-Trigger-Rule (ETR) server is used to manage events, triggers, and rules. Negotiation strategic rules can be added or modified at run-time. A cost-benefit analysis component is used to perform quantitative analysis of alternatives. The use of negotiation servers to conduct automated negotiation has been demonstrated in the context of an integrated supply chain scenario. Received: 30 October 2000 / Accepted: 12 January 2001 Published online: 2 August 2001  相似文献   
85.
In this brief, the problem of global asymptotic stability for delayed Hopfield neural networks (HNNs) is investigated. A new criterion of asymptotic stability is derived by introducing a new kind of Lyapunov-Krasovskii functional and is formulated in terms of a linear matrix inequality (LMI), which can be readily solved via standard software. This new criterion based on a delay fractioning approach proves to be much less conservative and the conservatism could be notably reduced by thinning the delay fractioning. An example is provided to show the effectiveness and the advantage of the proposed result.  相似文献   
86.
Interaction cost is an important but poorly understood factor in visualization design. We propose a framework of interaction costs inspired by Norman’s Seven Stages of Action to facilitate study. From 484 papers, we collected 61 interaction-related usability problems reported in 32 user studies and placed them into our framework of seven costs: (1) Decision costs to form goals; (2) System-power costs to form system operations; (3) Multiple input mode costs to form physical sequences; (4) Physical-motion costs to execute sequences; (5) Visual-cluttering costs to perceive state; (6) View-change costs to interpret perception; (7) State-change costs to evaluate interpretation. We also suggested ways to narrow the gulfs of execution (2–4) and evaluation (5–7) based on collected reports. Our framework suggests a need to consider decision costs (1) as the gulf of goal formation.  相似文献   
87.
In this paper a reusable multi-agent architecture for intelligent Websites is presented and illustrated for an electronic department store. The architecture has been designed and implemented using the compositional design method for multi-agent systems DESIRE. The agents within this architecture are based on a generic information broker agent model. It is shown how the architecture can be exploited to design an intelligent Website for insurance, developed in co-operation with the software company Ordina Utopics and an insurance company.  相似文献   
88.
In this paper, we study the bandwidth allocation problem for serving video requests in a mobile real-time video player system. One of the main issues to maintain the quality of services (QoS) in mobile video playback is to ensure sufficient number of video frames available at the client side while a video is being played. However, due to the limited bandwidth of a mobile network and variable workload streaming video, this is not easy to achieve in practice. In addition, the communication link between mobile clients and a video server is subject to frequent errors and temporary disconnection. In this paper, we propose to use the notion of buffered bandwidth in addition to the network bandwidth to support real-time playback of videos at mobile clients. Based on this, we designed a bandwidth allocation scheme called Cooperative Pre-Fetching (CP) in which the amount of bandwidth to be allocated to serve a video request depends on the current buffer level of the video at the client relative to the target buffer level of the client. In determining the target buffer level, we consider the errors in communication to the client as well as the other clients who are concurrently served by the system. The buffered video frames at the clients are then used to minimize the impact of error in communications on the overall QoS of video playbacks in the whole system.
Kam-Yiu Lam (Corresponding author)Email:
  相似文献   
89.
90.
Although the stringent requirements of some critical applications may require independent certification, the authors see software developer self-certification as a viable alternative in many other cases. They accept that using software certification laboratories (SCLs) may work well for certain software distribution models, but they cannot be applied to all types of software development. The approach has several drawbacks. For example, an SCL may work well for larger software houses that ship mass-marketed software applications to the public, but it is less satisfactory for smaller developers who make reusable components or safety-critical software or for developers who belong to the freeware community  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号