首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1050篇
  免费   12篇
  国内免费   3篇
电工技术   15篇
化学工业   229篇
金属工艺   35篇
机械仪表   17篇
建筑科学   40篇
矿业工程   7篇
能源动力   9篇
轻工业   123篇
水利工程   2篇
石油天然气   17篇
无线电   110篇
一般工业技术   148篇
冶金工业   135篇
原子能技术   6篇
自动化技术   172篇
  2021年   11篇
  2020年   12篇
  2019年   19篇
  2018年   31篇
  2017年   9篇
  2016年   18篇
  2015年   15篇
  2014年   16篇
  2013年   53篇
  2012年   19篇
  2011年   58篇
  2010年   51篇
  2009年   36篇
  2008年   52篇
  2007年   38篇
  2006年   23篇
  2005年   41篇
  2004年   27篇
  2003年   26篇
  2002年   27篇
  2001年   18篇
  2000年   10篇
  1999年   13篇
  1998年   26篇
  1997年   20篇
  1996年   18篇
  1995年   16篇
  1994年   13篇
  1993年   19篇
  1992年   27篇
  1991年   16篇
  1990年   18篇
  1989年   18篇
  1986年   10篇
  1985年   16篇
  1984年   10篇
  1983年   9篇
  1982年   9篇
  1981年   7篇
  1980年   10篇
  1979年   12篇
  1978年   7篇
  1977年   11篇
  1976年   15篇
  1974年   7篇
  1973年   10篇
  1971年   9篇
  1969年   7篇
  1963年   8篇
  1955年   11篇
排序方式: 共有1065条查询结果,搜索用时 15 毫秒
61.
Time operator describes the lifetime of quantum irreversible processes on the level of statistical states. The existence, interpretation, and properties of time operator are discussed and the master equation is derived. Time operator exists also in other dynamical systems with mixing properties. Models of non-Markovian processes with long memory having a time operator are discussed.  相似文献   
62.
We study the problem of designing state‐feedback controllers to track time‐varying state trajectories that may exhibit jumps. Both plants and controllers considered are modeled as hybrid dynamical systems, which are systems with both continuous and discrete dynamics, given in terms of a flow set, a flow map, a jump set, and a jump map. Using recently developed tools for the study of stability in hybrid systems, we recast the tracking problem as the task of asymptotically stabilizing a set, the tracking set, and derive conditions for the design of state‐feedback tracking controllers with the property that the jump times of the plant coincide with those of the given reference trajectories. The resulting tracking controllers guarantee that solutions of the plant starting close to the reference trajectory stay close to it and that the difference between each solution of the controlled plant and the reference trajectory converges to zero asymptotically. Constructive conditions for tracking control design in terms of LMIs are proposed for a class of hybrid systems with linear maps and input‐triggered jumps. The results are illustrated by various examples. Copyright © 2013 John Wiley & Sons, Ltd.  相似文献   
63.
Many replication protocols employ a threshold model when expressing failures they are able to tolerate. In this model, one assumes that no more than t out of n components can fail, which is a good representation when failures are independent and identically distributed (IID). In many real systems, however, failures are not IID, and a straightforward application of threshold protocols yields suboptimal results. Here, we examine the problem of transforming threshold protocols into survivor-set protocols tolerating dependent failures. Our main goal is to show the equivalence between the threshold model and the core/survivor set model. Toward this goal, we develop techniques to transform threshold protocols into survivor set ones. Our techniques do not require authentication, self-verification or encryption. Our results show in one case that we can transform a threshold protocol to a subset by spreading a number of processes across processors. This technique treats a given threshold algorithm as a black box, and consequently can transform any threshold algorithm. However, it has the disadvantage that the transformation is not possible for all sets of survivor sets. The second technique instead focuses on transforming voters: functions that evaluate to a value out of a set of tallied values in a replication protocol. Voters are an essential part of many fault-tolerant protocols, and we show a universal way of transforming them. With such a transformation we expect that a large number of protocols in the literature can be directly transformed with our technique. It is still an open problem, however, if the two models are equivalent, and our results constitute an important first step in this direction.  相似文献   
64.
In this paper two different approaches to the design of a reconfigurable Tate pairing hardware accelerator are presented. The first uses macro components based on a large, fixed number of underlying Galois Field arithmetic units in parallel to minimise the computation time. The second is an area efficient approach based on a small, variable number of underlying components. Both architectures are prototyped on an FPGA. Timing results for each architecture with various different design parameters are presented.  相似文献   
65.
In many scenarios, a database instance violates a given set of integrity constraints. In such cases, it is often required to repair the database, that is, to restore its consistency. A primary motif behind the repairing approaches is the principle of minimal change, which is the aspiration to keep the recovered data as faithful as possible to the original (inconsistent) database. In this paper, we represent this qualitative principle quantitatively, in terms of distance functions and some underlying metrics, and so introduce a general framework for repairing inconsistent databases by distance-based considerations. The uniform way of representing repairs and their semantics clarifies the essence behind several approaches to consistency restoration in database systems, helps to compare the underlying formalisms, and relates them to existing methods of defining belief revision operators, merging data sets, and integrating information systems.   相似文献   
66.
We propose a biologically inspired system which computes on double structures of mobile strings by means of rewriting rules that have a biotechnological implementation, by resembling DNA computations. Its computational universality may be straight deduced from a few formal language theoretical results of one of the authors. Such a DNA-like computational device is naturally described by a membrane system which concludes the paper.  相似文献   
67.
In [Kleijn, J., Team Automata for CSCW – A Survey –, Petri Net Technology for Communication-Based Systems—Advances in Petri Nets, LNCS 2472, Springer, 2003, 295–320], Kleijn presented a survey of the use of team automata for the specification and analysis of phenomena from the field of computer supported cooperative work, in particular notions related to groupware systems. In this paper we present a survey of the use of team automata for the specification and analysis of some issues from the field of security. In particular, we show how team automata can adequately be used to model and verify various access control policies, multicast/broadcast communication protocols, and general (cryptographic) communication protocols.  相似文献   
68.
Today, to create and to simulate a virtual anatomical version of a subject is useful in the decision process of surgical treatments. The muscular activity is one of the factors which can contribute to abnormal movements such as in spasticity or static contracture. In this paper, we propose a numerical solution, based on the Finite Element (FE) method, able to estimate muscles deformations during contraction. Organized around a finite element solver and a volumetric environment, this solution is made of all the modeling and simulation processes from the discretization of the studied domain to the visualization of the results. The choices of materials and properties of the FE model are also presented such as the hyperelasticity, the contention model based on inter-meshes neighboring nodes pairing, and the estimation of nodal forces based on the subject-specific muscular forces and action lines.
Nicolas PronostEmail:
  相似文献   
69.
Recently, there has been an increasing interest in directed probabilistic logical models and a variety of formalisms for describing such models has been proposed. Although many authors provide high-level arguments to show that in principle models in their formalism can be learned from data, most of the proposed learning algorithms have not yet been studied in detail. We introduce an algorithm, generalized ordering-search, to learn both structure and conditional probability distributions (CPDs) of directed probabilistic logical models. The algorithm is based on the ordering-search algorithm for Bayesian networks. We use relational probability trees as a representation for the CPDs. We present experiments on a genetics domain, blocks world domains and the Cora dataset. Editors: Stephen Muggleton, Ramon Otero, Simon Colton.  相似文献   
70.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号