首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1500篇
  免费   44篇
  国内免费   3篇
电工技术   15篇
综合类   9篇
化学工业   202篇
金属工艺   118篇
机械仪表   28篇
建筑科学   85篇
矿业工程   9篇
能源动力   21篇
轻工业   160篇
水利工程   4篇
石油天然气   8篇
无线电   174篇
一般工业技术   209篇
冶金工业   213篇
原子能技术   6篇
自动化技术   286篇
  2023年   3篇
  2022年   11篇
  2021年   18篇
  2020年   19篇
  2019年   19篇
  2018年   23篇
  2017年   31篇
  2016年   24篇
  2015年   22篇
  2014年   37篇
  2013年   82篇
  2012年   59篇
  2011年   75篇
  2010年   72篇
  2009年   78篇
  2008年   93篇
  2007年   82篇
  2006年   83篇
  2005年   78篇
  2004年   55篇
  2003年   67篇
  2002年   55篇
  2001年   25篇
  2000年   24篇
  1999年   29篇
  1998年   38篇
  1997年   29篇
  1996年   37篇
  1995年   41篇
  1994年   21篇
  1993年   22篇
  1992年   17篇
  1991年   14篇
  1990年   16篇
  1989年   17篇
  1988年   9篇
  1987年   10篇
  1986年   14篇
  1985年   9篇
  1984年   7篇
  1983年   10篇
  1982年   6篇
  1980年   6篇
  1979年   3篇
  1978年   6篇
  1977年   10篇
  1976年   14篇
  1975年   5篇
  1974年   4篇
  1973年   6篇
排序方式: 共有1547条查询结果,搜索用时 15 毫秒
81.
82.
Phase formation and reaction during annealing in thin film couples of aluminum and palladium were studied by transmission electron microscopy, X-ray diffraction and Auger depth profiling techniques in the temperature range 200– 500°C. The known bulk phases of Al3Pd2, AlPd, Al3Pd5 and AlPd2 were confirmed and two additional aluminum-rich phases were tentatively identified as Al3Pd and Al4Pd. In all the samples studied the reactions were initiated by the formation of the β-AlPd phase, which was then followed by the formation of the Al3Pd2 phase. Subsequent reactions caused precipitation of AlPd2 particles if unreacted palladium was present, otherwise Al4Pd particles were precipitated. The reaction rate was usually reduced if single-crystal, instead of polycrystalline, palladium film was used.  相似文献   
83.
The notion of certificateless public-key encryption (CL-PKE) was introduced by Al-Riyami and Paterson in 2003 that avoids the drawbacks of both traditional PKI-based public-key encryption (i.e., establishing public-key infrastructure) and identity-based encryption (i.e., key escrow). So CL-PKE like identity-based encryption is certificate-free, and unlike identity-based encryption is key escrow-free. In this paper, we introduce simple and efficient CCA-secure CL-PKE based on (hierarchical) identity-based encryption. Our construction has both theoretical and practical interests. First, our generic transformation gives a new way of constructing CCA-secure CL-PKE. Second, instantiating our transformation using lattice-based primitives results in a more efficient CCA-secure CL-PKE than its counterpart introduced by Dent in 2008.  相似文献   
84.
A method of visual navigation by stereoimages for autonomous underwater vehicles is suggested. Two modifications of the method are considered. The first one is based on integration of measurement data of onboard navigation system with visual data. The second modification relies on the use of a six-cloud computation scheme. Results of computational experiments with model data are presented.  相似文献   
85.
Web Mining   总被引:1,自引:0,他引:1  
  相似文献   
86.
We present two efficient algorithms for the minimum-cost flow problem in which arc costs are piecewise-linear and convex. Our algorithms are based on novel algorithms of Orlin, which were developed for the case of linear arc costs. Our first algorithm uses the Edmonds-Karp scaling technique. Its complexity isO(M logU(m+n logM)) for a network withn vertices,m arcs, M linear cost segments, and an upper boundU on the supplies and the capacities. The second algorithm is a strongly polynomial version of the first, and it uses Tardos's idea of contraction. Its complexity isO(M logM(m+n logM)). Both algorithms improve by a factor of at leastM/m the complexity of directly applying existing algorithms to a transformed network in which arc costs are linear.The final stage of this work was performed while Ron Shamir was a visitor at DIMACS (Center for Discrete Mathematics and Theoretical Computer Science), Rutgers University. Supported in part by National Science Foundation Grant NSF-STC88-09648, and by Air Force Grants AFOSR-89-0512 and AFOSR-90-0008.  相似文献   
87.
Forward displacement solutions are presented for a class of spatial parallel manipulators. In particular, considered are manipulators consisting of a platform supported through passive spherical joints by three branches, each branch having three-revolute joints forming its main arm. Solutions are described for arbitrary main-arm layouts and for all possible cases of redundant (nine, eight, and seven sensors) and non-redundant (six sensors) sensing of branch main-arm joint displacements. It is demonstrated that closed-form forward displacement solutions can be found for all cases of redundant sensing. Furthermore, it is shown that a closed-form solution can be obtained for one of the two possible cases of non-redundant sensing of the main-arm joint displacements. The only case of joint displacement sensing not allowing a closed-form forward displacement solution is two joints sensed per branch, a case that can be expressed as a 16th-order polynomial of a single variable. Due to the importance of having efficient and failure-safe solutions for the forward displacement problem, it is suggested that appropriate redundancy in displacement sensing should be an important consideration in the design of parallel manipulation devices. © 1994 John Wiley & Sons, Inc.  相似文献   
88.
M Kearns  D Ron 《Neural computation》1999,11(6):1427-1453
In this article we prove sanity-check bounds for the error of the leave-one-out cross-validation estimate of the generalization error: that is, bounds showing that the worst-case error of this estimate is not much worse than that of the training error estimate. The name sanity check refers to the fact that although we often expect the leave-one-out estimate to perform considerably better than the training error estimate, we are here only seeking assurance that its performance will not be considerably worse. Perhaps surprisingly, such assurance has been given only for limited cases in the prior literature on cross-validation. Any nontrivial bound on the error of leave-one-out must rely on some notion of algorithmic stability. Previous bounds relied on the rather strong notion of hypothesis stability, whose application was primarily limited to nearest-neighbor and other local algorithms. Here we introduce the new and weaker notion of error stability and apply it to obtain sanity-check bounds for leave-one-out for other classes of learning algorithms, including training error minimization procedures and Bayesian algorithms. We also provide lower bounds demonstrating the necessity of some form of error stability for proving bounds on the error of the leave-one-out estimate, and the fact that for training error minimization algorithms, in the worst case such bounds must still depend on the Vapnik-Chervonenkis dimension of the hypothesis class.  相似文献   
89.
Competitive analysis of incentive compatible on-line auctions   总被引:4,自引:0,他引:4  
This paper studies auctions in a setting where the different bidders arrive at different times and the auction mechanism is required to make decisions about each bid as it is received. Such settings occur in computerized auctions of computational resources as well as in other settings. We call such auctions, on-line auctions.

We first characterize exactly on-line auctions that are incentive compatible, i.e. where rational bidders are always motivated to bid their true valuation. We then embark on a competitive worst-case analysis of incentive compatible on-line auctions. We obtain several results, the cleanest of which is an incentive compatible on-line auction for a large number of identical items. This auction has an optimal competitive ratio, both in terms of seller's revenue and in terms of the total social efficiency obtained.  相似文献   

90.
This paper discusses, in the context of computational modelling and simulation of cognition, the relevance of deeper structures in the control of behaviour. Such deeper structures include motivational control of behaviour, which provides underlying causes for actions, and also metacognitive control, which provides higher-order processes for monitoring and regulation. It is argued that such deeper structures are important and thus cannot be ignored in computational cognitive architectures. A general framework based on the Clarion cognitive architecture is outlined that emphasises the interaction amongst action selection, motivation, and metacognition. The upshot is that it is necessary to incorporate all essential processes; short of that, the understanding of cognition can only be incomplete.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号