全文获取类型
收费全文 | 659篇 |
免费 | 15篇 |
国内免费 | 1篇 |
专业分类
电工技术 | 6篇 |
化学工业 | 114篇 |
金属工艺 | 4篇 |
机械仪表 | 4篇 |
建筑科学 | 10篇 |
能源动力 | 34篇 |
轻工业 | 29篇 |
水利工程 | 4篇 |
无线电 | 106篇 |
一般工业技术 | 72篇 |
冶金工业 | 33篇 |
原子能技术 | 1篇 |
自动化技术 | 258篇 |
出版年
2024年 | 1篇 |
2023年 | 3篇 |
2022年 | 5篇 |
2021年 | 11篇 |
2020年 | 3篇 |
2019年 | 7篇 |
2018年 | 14篇 |
2017年 | 10篇 |
2016年 | 27篇 |
2015年 | 16篇 |
2014年 | 29篇 |
2013年 | 41篇 |
2012年 | 41篇 |
2011年 | 54篇 |
2010年 | 48篇 |
2009年 | 47篇 |
2008年 | 43篇 |
2007年 | 36篇 |
2006年 | 35篇 |
2005年 | 23篇 |
2004年 | 21篇 |
2003年 | 20篇 |
2002年 | 21篇 |
2001年 | 12篇 |
2000年 | 8篇 |
1999年 | 10篇 |
1998年 | 16篇 |
1997年 | 12篇 |
1996年 | 6篇 |
1995年 | 2篇 |
1994年 | 7篇 |
1993年 | 4篇 |
1992年 | 4篇 |
1990年 | 2篇 |
1989年 | 8篇 |
1987年 | 2篇 |
1986年 | 1篇 |
1985年 | 3篇 |
1984年 | 5篇 |
1983年 | 1篇 |
1981年 | 2篇 |
1979年 | 3篇 |
1978年 | 1篇 |
1977年 | 2篇 |
1976年 | 1篇 |
1975年 | 2篇 |
1973年 | 2篇 |
1972年 | 1篇 |
1971年 | 1篇 |
1970年 | 1篇 |
排序方式: 共有675条查询结果,搜索用时 17 毫秒
31.
Nikolaus Correll Nikos Arechiga Adrienne Bolger Mario Bollini Ben Charrow Adam Clayton Felipe Dominguez Kenneth Donahue Samuel Dyar Luke Johnson Huan Liu Alexander Patrikalakis Timothy Robertson Jeremy Smith Daniel Soltero Melissa Tanner Lauren White Daniela Rus 《Intelligent Service Robotics》2010,3(4):219-232
This paper describes the architecture and implementation of a distributed autonomous gardening system with applications in urban/indoor precision agriculture. The garden is a mesh network of robots and plants. The gardening robots are mobile manipulators with an eye-in-hand camera. They are capable of locating plants in the garden, watering them, and locating and grasping fruit. The plants are potted cherry tomatoes enhanced with sensors and computation to monitor their well-being (e.g. soil humidity, state of fruits) and with networking to communicate servicing requests to the robots. By embedding sensing, computation, and communication into the pots, task allocation in the system is de-centrally coordinated, which makes the system scalable and robust against the failure of a centralized agent. We describe the architecture of this system and present experimental results for navigation, object recognition, and manipulation as well as challenges that lie ahead toward autonomous precision agriculture with multi-robot teams. 相似文献
32.
Any application or service utilizing the Internet is exposed to both general Internet attacks and other specific ones. Most of the times the latter are exploiting a vulnerability or misconfiguration in the provided service and/or in the utilized protocol itself. Consequently, the employment of critical services, like Voice over IP (VoIP) services, over the Internet is vulnerable to such attacks and, on top of that, they offer a field for new attacks or variations of existing ones. Among the various threats–attacks that a service provider should consider are the flooding attacks, at the signaling level, which are very similar to those against TCP servers but have emerged at the application level of the Internet architecture. This paper examines flooding attacks against VoIP architectures that employ the Session Initiation Protocol (SIP) as their signaling protocol. The focus is on the design and implementation of the appropriate detection method. Specifically, a bloom filter based monitor is presented and a new metric, named session distance, is introduced in order to provide an effective protection scheme against flooding attacks. The proposed scheme is evaluated through experimental test bed architecture under different scenarios. The results of the evaluation demonstrate that the required time to detect such an attack is negligible and also that the number of false alarms is close to zero. 相似文献
33.
A survey and taxonomy on energy efficient resource allocation techniques for cloud computing systems
Abdul Hameed Alireza Khoshkbarforoushha Rajiv Ranjan Prem Prakash Jayaraman Joanna Kolodziej Pavan Balaji Sherali Zeadally Qutaibah Marwan Malluhi Nikos Tziritas Abhinav Vishnu Samee U. Khan Albert Zomaya 《Computing》2016,98(7):751-774
In a cloud computing paradigm, energy efficient allocation of different virtualized ICT resources (servers, storage disks, and networks, and the like) is a complex problem due to the presence of heterogeneous application (e.g., content delivery networks, MapReduce, web applications, and the like) workloads having contentious allocation requirements in terms of ICT resource capacities (e.g., network bandwidth, processing speed, response time, etc.). Several recent papers have tried to address the issue of improving energy efficiency in allocating cloud resources to applications with varying degree of success. However, to the best of our knowledge there is no published literature on this subject that clearly articulates the research problem and provides research taxonomy for succinct classification of existing techniques. Hence, the main aim of this paper is to identify open challenges associated with energy efficient resource allocation. In this regard, the study, first, outlines the problem and existing hardware and software-based techniques available for this purpose. Furthermore, available techniques already presented in the literature are summarized based on the energy-efficient research dimension taxonomy. The advantages and disadvantages of the existing techniques are comprehensively analyzed against the proposed research dimension taxonomy namely: resource adaption policy, objective function, allocation method, allocation operation, and interoperability. 相似文献
34.
Athanasios Karagiannidis Konstantinos Lagouvardos Vassiliki Kotroni Nikos Mazarakis 《International journal of remote sensing》2016,37(20):5001-5020
An analysis of selected spatiotemporal characteristics of isolated thunderstorms in relation to cloud-to-ground (CG) lightning over part of the eastern Mediterranean is performed. The purpose of the study is twofold: to better understand and improve the basic knowledge of the physical mechanisms of the phenomenon and to offer new means of nowcasting the lightning activity in such thunderstorms. Meteosat Second Generation (MSG) Rapid Scan Service (RSS) infrared imagery which offers the option of tracking the examined storms with a time frequency of 5 minutes is one of the two utilized datasets, the other being ZEUS very low frequency (VLF) lightning detection system’s CG discharge data. It was shown that a cloud top temperature of about ?20°C is required for the onset of lightning activity. A rapid drop of the cloud-top temperature of about 11°C in 5 minutes on average is observed a few minutes before or during lightning initiation. The maximization of the activity is usually quite close to the overall minimum cloud-top temperature of the cell. A temperature increase of 3.5°C from this overall minimum can mark the end of the activity, which is also associated to the time evolution of the cell’s horizontal extent. In fact, after the cell’s horizontal area stops to increase and/or starts to gradually diminish, CG lightning activity is expected to stop. 相似文献
35.
Papadakis N Bugeau A 《IEEE transactions on pattern analysis and machine intelligence》2011,33(1):144-157
This work presents a new method for tracking and segmenting along time-interacting objects within an image sequence. One major contribution of the paper is the formalization of the notion of visible and occluded parts. For each object, we aim at tracking these two parts. Assuming that the velocity of each object is driven by a dynamical law, predictions can be used to guide the successive estimations. Separating these predicted areas into good and bad parts with respect to the final segmentation and representing the objects with their visible and occluded parts permit handling partial and complete occlusions. To achieve this tracking, a label is assigned to each object and an energy function representing the multilabel problem is minimized via a graph cuts optimization. This energy contains terms based on image intensities which enable segmenting and regularizing the visible parts of the objects. It also includes terms dedicated to the management of the occluded and disappearing areas, which are defined on the areas of prediction of the objects. The results on several challenging sequences prove the strength of the proposed approach. 相似文献
36.
The problem of channel sharing by rate adaptive streams belonging to various classes is considered. Rate adaptation provides
the opportunity for accepting more connections by adapting the bandwidth of connections that are already in the system. However,
bandwidth adaptation must be employed in a careful manner in order to ensure that (a) bandwidth is allocated to various classes
in a fair manner (system perspective) and (b) bandwidth adaptation does not affect adversely the perceived user quality of
the connection (user quality). The system perspective aspect has been studied earlier. This paper focuses on the equally important
user perspective. It is proposed to quantify user Quality of Service (QoS) through measures capturing short and long-term
bandwidth fluctuations that can be implemented with the mechanisms of traffic regulators, widely used in networking for the
purpose of controlling the traffic entering or exiting a network node. Furthermore, it is indicated how to integrate the user
perspective metrics with the optimal algorithms for system performance metrics developed earlier by the authors. Simulation
results illustrate the effectiveness of the proposed framework.
Nikos G. Argiriou received the Diploma degree in Electrical Engineering from the Department of Electrical Engineering, Telecommunication Division, Aristotle University of Thessaloniki, Greece, in 1996. He worked as a researcher, on secure medical image transmission over networks, at the Image Processing Lab at the same university during 1996–1997. During 1998–2000 he was a researcher for the European Project Esprit Catserver concerning the use of advanced Quality of Service techniques in CATV networks. He received his Ph.D. degree at Aristotle University of Thessaloniki in 2007. His current research interests are in the development and implementation of QoS techniques for wired and wireless networks. Leonidas Georgiadis received the Diploma degree in Electrical Engineering from Aristotle University, Thessaloniki, Greece, in 1979, and his M.S. and Ph.D degrees both in Electrical Engineering from the University of Connecticut, in 1981 and 1986, respectively. From 1986 to 1987 he was Research Assistant Professor at the University of Virginia, Charlottesville. In 1987 he joined IBM T. J. Watson Research Center, Yorktown Heights as a Research Staff Member. Since October 1995, he has been with the Telecommunications Department of Aristotle University, Thessaloniki, Greece. His interests are in the area of wireless networks, high speed networks, routing, scheduling, congestion control, modeling and performance analysis. 相似文献
Leonidas GeorgiadisEmail: |
Nikos G. Argiriou received the Diploma degree in Electrical Engineering from the Department of Electrical Engineering, Telecommunication Division, Aristotle University of Thessaloniki, Greece, in 1996. He worked as a researcher, on secure medical image transmission over networks, at the Image Processing Lab at the same university during 1996–1997. During 1998–2000 he was a researcher for the European Project Esprit Catserver concerning the use of advanced Quality of Service techniques in CATV networks. He received his Ph.D. degree at Aristotle University of Thessaloniki in 2007. His current research interests are in the development and implementation of QoS techniques for wired and wireless networks. Leonidas Georgiadis received the Diploma degree in Electrical Engineering from Aristotle University, Thessaloniki, Greece, in 1979, and his M.S. and Ph.D degrees both in Electrical Engineering from the University of Connecticut, in 1981 and 1986, respectively. From 1986 to 1987 he was Research Assistant Professor at the University of Virginia, Charlottesville. In 1987 he joined IBM T. J. Watson Research Center, Yorktown Heights as a Research Staff Member. Since October 1995, he has been with the Telecommunications Department of Aristotle University, Thessaloniki, Greece. His interests are in the area of wireless networks, high speed networks, routing, scheduling, congestion control, modeling and performance analysis. 相似文献
37.
Man Lung Yiu Yufei Tao Nikos Mamoulis 《The VLDB Journal The International Journal on Very Large Data Bases》2008,17(3):379-400
Existing spatiotemporal indexes suffer from either large update cost or poor query performance, except for the B x -tree (the state-of-the-art), which consists of multiple B +-trees indexing the 1D values transformed from the (multi-dimensional) moving objects based on a space filling curve (Hilbert, in particular). This curve, however, does not consider object velocities, and as a result, query processing with a B x -tree retrieves a large number of false hits, which seriously compromises its efficiency. It is natural to wonder “can we obtain better performance by capturing also the velocity information, using a Hilbert curve of a higher dimensionality?”. This paper provides a positive answer by developing the B dual -tree, a novel spatiotemporal access method leveraging pure relational methodology. We show, with theoretical evidence, that the B dual -tree indeed outperforms the B x -tree in most circum- stances. Furthermore, our technique can effectively answer progressive spatiotemporal queries, which are poorly supported by B x -trees. 相似文献
38.
39.
40.
Three-dimensional face recognition in the presence of facial expressions: an annotated deformable model approach 总被引:1,自引:0,他引:1
Kakadiaris IA Passalis G Toderici G Murtuza MN Lu Y Karampatziakis N Theoharis T 《IEEE transactions on pattern analysis and machine intelligence》2007,29(4):640-649
In this paper, we present the computational tools and a hardware prototype for 3D face recognition. Full automation is provided through the use of advanced multistage alignment algorithms, resilience to facial expressions by employing a deformable model framework, and invariance to 3D capture devices through suitable preprocessing steps. In addition, scalability in both time and space is achieved by converting 3D facial scans into compact metadata. We present our results on the largest known, and now publicly available, face recognition grand challenge 3D facial database consisting of several thousand scans. To the best of our knowledge, this is the highest performance reported on the FRGC v2 database for the 3D modality 相似文献