首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   405篇
  免费   8篇
电工技术   1篇
化学工业   75篇
金属工艺   4篇
机械仪表   8篇
建筑科学   12篇
能源动力   5篇
轻工业   25篇
水利工程   2篇
石油天然气   2篇
无线电   28篇
一般工业技术   50篇
冶金工业   125篇
自动化技术   76篇
  2023年   7篇
  2022年   24篇
  2021年   23篇
  2020年   6篇
  2019年   10篇
  2018年   8篇
  2017年   8篇
  2016年   9篇
  2015年   8篇
  2014年   12篇
  2013年   16篇
  2012年   15篇
  2011年   22篇
  2010年   11篇
  2009年   16篇
  2008年   17篇
  2007年   11篇
  2006年   9篇
  2005年   17篇
  2004年   10篇
  2003年   3篇
  2002年   10篇
  2001年   5篇
  2000年   4篇
  1999年   14篇
  1998年   31篇
  1997年   15篇
  1996年   11篇
  1995年   13篇
  1994年   6篇
  1993年   9篇
  1992年   3篇
  1991年   7篇
  1990年   2篇
  1989年   1篇
  1988年   2篇
  1987年   1篇
  1986年   2篇
  1985年   2篇
  1983年   1篇
  1981年   2篇
  1980年   1篇
  1979年   1篇
  1977年   1篇
  1976年   2篇
  1974年   2篇
  1962年   1篇
  1961年   1篇
  1960年   1篇
排序方式: 共有413条查询结果,搜索用时 15 毫秒
11.
This paper presents an automated and compositional procedure to solve the substitutability problem in the context of evolving software systems. Our solution contributes two techniques for checking correctness of software upgrades: (1) a technique based on simultaneous use of over-and under-approximations obtained via existential and universal abstractions; (2) a dynamic assume-guarantee reasoning algorithm—previously generated component assumptions are reused and altered on-the-fly to prove or disprove the global safety properties on the updated system. When upgrades are found to be non-substitutable, our solution generates constructive feedback to developers showing how to improve the components. The substitutability approach has been implemented and validated in the ComFoRT reasoning framework, and we report encouraging results on an industrial benchmark. This is an extended version of a paper, Dynamic Component Substitutability Analysis, published in the Proceedings of the Formal Methods 2005 Conference, Lecture Notes in Computer Science, vol. 3582, by the same authors. This research was sponsored by the National Science Foundation under grant nos. CNS-0411152, CCF-0429120, CCR-0121547, and CCR-0098072, the Semiconductor Research Corporation under grant no. TJ-1366, the US Army Research Office under grant no. DAAD19-01-1-0485, the Office of Naval Research under grant no. N00014-01-1-0796, the ICAST project and the Predictable Assembly from Certifiable Components (PACC) initiative at the Software Engineering Institute, Carnegie Mellon University. The views and conclusions contained in this document are those of the authors and should not be interpreted as representing the official policies, either expressed or implied, of any sponsoring institution, the US government or any other entity.  相似文献   
12.
13.
This article describes an approach for the automated verification of mobile systems. Mobile systems are characterized by the explicit notion of location (e.g., sites where they run) and the ability to execute at different locations, yielding a number of security issues. To this aim, we formalize mobile systems as Labeled Kripke Structures, encapsulating the notion of location net that describes the hierarchical nesting of the threads constituting the system. Then, we formalize a generic security-policy specification language that includes rules for expressing and manipulating the code location. In contrast to many other approaches, our technique supports both access control and information flow specification. We developed a prototype framework for model checking of mobile systems. It works directly on the program code (in contrast to most traditional process-algebraic approaches that can model only limited details of mobile systems) and uses abstraction-refinement techniques, based also on location abstractions, to manage the program state space. We experimented with a number of mobile code benchmarks by verifying various security policies. The experimental results demonstrate the validity of the proposed mobile system modeling and policy specification formalisms and highlight the advantages of the model checking-based approach, which combines the validation of security properties with other checks, such as the validation of buffer overflows.  相似文献   
14.
The Dynamics of Syntactic Knowledge   总被引:1,自引:0,他引:1  
The syntactic approach to epistemic logic avoids the logicalomniscience problem by taking knowledge as primary rather thanas defined in terms of possible worlds. In this study, we combinethe syntactic approach with modal logic, using transition systemsto model reasoning. We use two syntactic epistemic modalities:‘knowing at least’ a set of formulae and ‘knowingat most’ a set of formulae. We are particularly interestedin models restricting the set of formulae known by an agentat a point in time to be finite. The resulting systems are investigatedfrom the point of view of axiomatization and complexity. Weshow how these logics can be used to formalise non-omniscientagents who know some inference rules, and study their relationshipto other systems of syntactic epistemic logics, such as Ågotnesand Walicki (2004, Proc. 2nd EUMAS, pp. 1–10), Alechinaet al. (2004, Proc. 3rd AAMAS, pp. 601–613), Duc (1997,J. Logic Comput., 7, 633–648).  相似文献   
15.
Previously, we demonstrated that the proton pump inhibitor, esomeprazole magnesium hydrate (MH), could have potential as a repurposed treatment against preeclampsia, a serious obstetric condition. In this study we investigate the difference in the preclinical effectiveness between 100 µM of esomeprazole MH and its hydration isomer, esomeprazole magnesium trihydrate (MTH). Here, we found that both treatments reduced secretion of sFLT-1 (anti-angiogenic factor) from primary cytotrophoblast, but only esomeprazole MH reduced sFLT-1 secretion from primary human umbilical vein endothelial cells (assessed via ELISA). Both drugs could mitigate expression of the endothelial dysfunction markers, vascular cell adhesion molecule-1 and endothelin-1 (via qPCR). Neither esomeprazole MH nor MTH quenched cytotrophoblast reactive oxygen species production in response to sodium azide (ROS assay). Finally, using wire myography, we demonstrated that both compounds were able to induce vasodilation of human omental arteries at 100 µM. Esomeprazole is safe to use in pregnancy and a candidate treatment for preeclampsia. Using primary human tissues and cells, we validated that esomeprazole is effective in enhancing vascular relaxation, and can reduce key factors associated with preeclampsia, including sFLT-1 and endothelial dysfunction. However, esomeprazole MH was more efficacious than esomeprazole MTH in our in vitro studies.  相似文献   
16.
In laboratory experiments, infants are sensitive to patterns of visual features that co-occur (e.g., Fiser & Aslin, 2002). Once infants learn the statistical regularities, however, what do they do with that knowledge? Moreover, which patterns do infants learn in the cluttered world outside of the laboratory? Across 4 experiments, we show that 9-month-olds use this sensitivity to make inferences about object properties. In Experiment 1, 9-month-old infants expected co-occurring visual features to remain fused (i.e., infants looked longer when co-occurring features split apart than when they stayed together). Forming such expectations can help identify integral object parts for object individuation, recognition, and categorization. In Experiment 2, we increased the task difficulty by presenting the test stimuli simultaneously with a different spatial layout from the familiarization trials to provide a more ecologically valid condition. Infants did not make similar inferences in this more distracting test condition. However, Experiment 3 showed that a social cue did allow inferences in this more difficult test condition, and Experiment 4 showed that social cues helped infants choose patterns among distractor patterns during learning as well as during test. These findings suggest that infants can use feature co-occurrence to learn about objects and that social cues shape such foundational learning in distraction-filled environments. (PsycINFO Database Record (c) 2011 APA, all rights reserved)  相似文献   
17.
We define bisimulations for temporal logic with Since and Until. This new notion is compared to existing notions of bisimulations, and then used to develop the basic model theory of temporal logic with Since and Until. Our results concern both invariance and definability. We conclude with a brief discussion of the wider applicability of our ideas.  相似文献   
18.
In this paper, the relationship between the Bezout and the set-theoretic approaches to left coprimeness is studied. It is shown that left coprimeness in the set-theoretic sense implies left coprimeness in the Bezout sense. In addition to these results, we investigate whether some properties for linear left coprime realizations carry over to the nonlinear case, for example we examine the relations between two left coprime realizations of the same system.  相似文献   
19.
Social Network Sites (SNSs) rely exclusively on user-generated content to offer engaging and rewarding experience to its members. As a result, stimulating user communication and self-disclosure is vital for the sustainability of SNSs. However, considering that the SNS users are increasingly culturally diverse, motivating this audience to self-disclose requires understanding of their cultural intricacies. Yet existing research offers only limited insights into the role of culture behind the motivation of SNS users to self-disclose. Building on the privacy calculus framework, this study explores the role of two cultural dimensions ?C individualism and uncertainty avoidance ?C in self-disclosure decisions of SNS users. Survey responses of US and German Facebook members are used as the basis for our analysis. Structural equation modeling and multi-group analysis results reveal the distinct role of culture in the cognitive patterns of SNS users. The authors find that trusting beliefs play a key role in the self-disclosure decisions of users from individualistic cultures. At the same time, uncertainty avoidance determines the impact of privacy concerns. This paper contributes to the theory by rejecting the universal nature of privacy calculus processes. The findings provide for an array of managerial implications for SNS providers as they strive to encourage content creation and sharing by their heterogeneous members.  相似文献   
20.
A series of dihydropyrimidinone-based antimalarial compounds were designed and synthesised based on the previously identified amide-based quinoline hybrids which showed good resistance reversal ability against the resistant strain of Plasmodium falciparum. The aromatic ring on the dihydropyrimidinone of the original hits was exchanged for a methyl group to bring the molecular weights below 500 Da and also determine the effect of the aromatic ring count on the resistance reversal ability of the hybrids. Apart from the previously used amide bond, the hybrid linker was also extended to the triazole linker. Although the triazole linker is synthetically easier to access, the use of an amide linker seems to have an activity advantage. The synthesised compounds in addition to the previously identified hits were subjected to molecular docking particularly targeting the orthosteric site of Plasmodium falciparum glutathione reductase (PfGR) protein. The ligand with the best binding interaction was rationally optimised to increase its suitability as a competitive inhibitor against the cofactor of the PfGR. Two of the optimised ligands showed better binding affinities than the cofactor while one of the two ligands displayed hydrophobically packed correlated hydrogen-bond which is very important in maintaining the ligand stability within the protein. In silico ADME predictions of the synthesised compounds indicate that these compounds possess good pharmacokinetic properties.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号