首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   2515篇
  免费   118篇
  国内免费   7篇
电工技术   33篇
综合类   3篇
化学工业   647篇
金属工艺   33篇
机械仪表   79篇
建筑科学   78篇
矿业工程   4篇
能源动力   119篇
轻工业   276篇
水利工程   17篇
石油天然气   9篇
无线电   201篇
一般工业技术   414篇
冶金工业   148篇
原子能技术   16篇
自动化技术   563篇
  2024年   6篇
  2023年   38篇
  2022年   93篇
  2021年   85篇
  2020年   89篇
  2019年   82篇
  2018年   105篇
  2017年   91篇
  2016年   104篇
  2015年   80篇
  2014年   130篇
  2013年   184篇
  2012年   191篇
  2011年   196篇
  2010年   151篇
  2009年   118篇
  2008年   114篇
  2007年   97篇
  2006年   91篇
  2005年   49篇
  2004年   69篇
  2003年   59篇
  2002年   46篇
  2001年   28篇
  2000年   27篇
  1999年   16篇
  1998年   47篇
  1997年   41篇
  1996年   20篇
  1995年   15篇
  1994年   18篇
  1993年   16篇
  1992年   12篇
  1991年   4篇
  1990年   9篇
  1989年   13篇
  1988年   3篇
  1987年   11篇
  1986年   12篇
  1985年   12篇
  1984年   11篇
  1983年   11篇
  1982年   5篇
  1981年   6篇
  1980年   5篇
  1979年   4篇
  1978年   6篇
  1977年   4篇
  1976年   5篇
  1974年   3篇
排序方式: 共有2640条查询结果,搜索用时 0 毫秒
11.
This paper focuses on a bi-objective experimental evaluation of online scheduling in the Infrastructure as a Service model of Cloud computing regarding income and power consumption objectives. In this model, customers have the choice between different service levels. Each service level is associated with a price per unit of job execution time, and a slack factor that determines the maximal time span to deliver the requested amount of computing resources. The system, via the scheduling algorithms, is responsible to guarantee the corresponding quality of service for all accepted jobs. Since we do not consider any optimistic scheduling approach, a job cannot be accepted if its service guarantee will not be observed assuming that all accepted jobs receive the requested resources. In this article, we analyze several scheduling algorithms with different cloud configurations and workloads, considering the maximization of the provider income and minimization of the total power consumption of a schedule. We distinguish algorithms depending on the type and amount of information they require: knowledge free, energy-aware, and speed-aware. First, to provide effective guidance in choosing a good strategy, we present a joint analysis of two conflicting goals based on the degradation in performance. The study addresses the behavior of each strategy under each metric. We assess the performance of different scheduling algorithms by determining a set of non-dominated solutions that approximate the Pareto optimal set. We use a set coverage metric to compare the scheduling algorithms in terms of Pareto dominance. We claim that a rather simple scheduling approach can provide the best energy and income trade-offs. This scheduling algorithm performs well in different scenarios with a variety of workloads and cloud configurations.  相似文献   
12.
This work describes a neural network based architecture that represents and estimates object motion in videos. This architecture addresses multiple computer vision tasks such as image segmentation, object representation or characterization, motion analysis and tracking. The use of a neural network architecture allows for the simultaneous estimation of global and local motion and the representation of deformable objects. This architecture also avoids the problem of finding corresponding features while tracking moving objects. Due to the parallel nature of neural networks, the architecture has been implemented on GPUs that allows the system to meet a set of requirements such as: time constraints management, robustness, high processing speed and re-configurability. Experiments are presented that demonstrate the validity of our architecture to solve problems of mobile agents tracking and motion analysis.  相似文献   
13.
14.
15.
Silver-based products have been proven to be effective in retarding and preventing bacterial growth since ancient times. In the field of restorative dentistry, the use of silver ions/nanoparticles has been explored to counteract bacterial infections, as silver can destroy bacterial cell walls by reacting with membrane proteins. However, it is also cytotoxic towards eukaryotic cells, which are capable of internalizing nanoparticles. In this work, we investigated the biological effects of Chitlac-nAg, a colloidal system based on a modified chitosan (Chitlac), administered for 24–48?h to a co-culture of primary human gingival fibroblasts and Streptococcus mitis in the presence of saliva, developed to mimic the microenvironment of the oral cavity. We sought to determine its efficiency to combat oral hygiene-related diseases without affecting eukaryotic cells. Cytotoxicity, reactive oxygen species production, apoptosis induction, nanoparticles uptake, and lysosome and autophagosome metabolism were evaluated. In vitro results show that Chitlac-nAg does not exert cytotoxic effects on human gingival fibroblasts, which seem to survive through a homoeostasis mechanism involving autophagy. That suggests that the novel biomaterial Chitlac-nAg could be a promising tool in the field of dentistry.  相似文献   
16.
Exploring the power of shared memory communication objects and models, and the limits of distributed computability are among the most exciting research areas of distributed computing. In that spirit, this paper focuses on a problem that has received considerable interest since its introduction in 1987, namely the renaming problem. It was the first non-trivial problem known to be solvable in an asynchronous distributed system despite process failures. Many algorithms for renaming and variants of renaming have been proposed, and sophisticated lower bounds have been proved, that have been a source of new ideas of general interest to distributed computing. It has consequently acquired a paradigm status in distributed fault-tolerant computing.In the renaming problem, processes start with unique initial names taken from a large name space, then deciding new names such that no two processes decide the same new name and the new names are from a name space that is as small as possible.This paper presents an introduction to the renaming problem in shared memory systems, for non-expert readers. It describes both algorithms and lower bounds. Also, it discusses strong connections relating renaming and other important distributed problems such as set agreement and symmetry breaking.  相似文献   
17.
At present, many countries allow citizens or entities to interact with the government outside the telematic environment through a legal representative who is granted powers of representation. However, if the interaction takes place through the Internet, only primitive mechanisms of representation are available, and these are mainly based on non-dynamic offline processes that do not enable quick and easy identity delegation. This paper proposes a system of dynamic delegation of identity between two generic entities that can solve the problem of delegated access to the telematic services provided by public authorities. The solution herein is based on the generation of a delegation token created from a proxy certificate that allows the delegating entity to delegate identity to another on the basis of a subset of its attributes as delegator, while also establishing in the delegation token itself restrictions on the services accessible to the delegated entity and the validity period of delegation. Further, the paper presents the mechanisms needed to either revoke a delegation token or to check whether a delegation token has been revoked. Implications for theory and practice and suggestions for future research are discussed.  相似文献   
18.
This paper introduces and investigates the k-simultaneous consensus task: each process participates at the same time in k independent consensus instances until it decides in any one of them. It is shown that the k-simultaneous consensus task is equivalent to the k-set agreement task in the wait-free read/write shared memory model, and furthermore k-simultaneous consensus possesses properties that k-set does not. In particular we show that the multivalued version and the binary version of the k-simultaneous consensus task are wait-free equivalent. These equivalences are independent of the number of processes. Interestingly, this provides us with a new characterization of the k-set agreement task that is based on the fundamental binary consensus problem.  相似文献   
19.
Multimedia analysis and reuse of raw un-edited audio visual content known as rushes is gaining acceptance by a large number of research labs and companies. A set of research projects are considering multimedia indexing, annotation, search and retrieval in the context of European funded research, but only the FP6 project RUSHES is focusing on automatic semantic annotation, indexing and retrieval of raw and un-edited audio-visual content. Even professional content creators and providers as well as home-users are dealing with this type of content and therefore novel technologies for semantic search and retrieval are required. In this paper, we present a summary of the most relevant achievements of the RUSHES project, focusing on specific approaches for automatic annotation as well as the main features of the final RUSHES search engine.  相似文献   
20.
The temperature dependence of the green upconverted emission from the two thermally coupled 2H11/2 and 4S3/2 levels of the Er3+ ion in a fluorotellurite glass has been analyzed as a function of the optically active ion concentration in order to check its availability as a temperature sensor. The infrared-to-green upconverted emission have been observed by the naked eyes after a cw laser diode excitation at 800 nm. The fluorescence intensity ratio between the thermally coupled emitting levels as well as the temperature sensitivity has been experimentally obtained up to 540 K. A better behaviour as a temperature sensor has been obtained for the less Er3+ concentrated glass with a maximum sensitivity of 54 × 10−4 K−1 at 540 K, one of the highest found in rare-earth doped transparent materials.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号