全文获取类型
收费全文 | 1627篇 |
免费 | 71篇 |
国内免费 | 3篇 |
专业分类
电工技术 | 34篇 |
化学工业 | 349篇 |
金属工艺 | 41篇 |
机械仪表 | 50篇 |
建筑科学 | 21篇 |
矿业工程 | 5篇 |
能源动力 | 127篇 |
轻工业 | 142篇 |
水利工程 | 45篇 |
石油天然气 | 4篇 |
无线电 | 171篇 |
一般工业技术 | 268篇 |
冶金工业 | 93篇 |
原子能技术 | 9篇 |
自动化技术 | 342篇 |
出版年
2024年 | 6篇 |
2023年 | 36篇 |
2022年 | 63篇 |
2021年 | 63篇 |
2020年 | 42篇 |
2019年 | 58篇 |
2018年 | 82篇 |
2017年 | 60篇 |
2016年 | 76篇 |
2015年 | 53篇 |
2014年 | 72篇 |
2013年 | 130篇 |
2012年 | 66篇 |
2011年 | 106篇 |
2010年 | 80篇 |
2009年 | 90篇 |
2008年 | 66篇 |
2007年 | 71篇 |
2006年 | 52篇 |
2005年 | 41篇 |
2004年 | 30篇 |
2003年 | 35篇 |
2002年 | 27篇 |
2001年 | 18篇 |
2000年 | 19篇 |
1999年 | 14篇 |
1998年 | 24篇 |
1997年 | 28篇 |
1996年 | 15篇 |
1995年 | 22篇 |
1994年 | 13篇 |
1993年 | 8篇 |
1992年 | 16篇 |
1991年 | 12篇 |
1990年 | 12篇 |
1989年 | 13篇 |
1988年 | 14篇 |
1987年 | 6篇 |
1986年 | 6篇 |
1985年 | 6篇 |
1984年 | 6篇 |
1983年 | 5篇 |
1982年 | 8篇 |
1981年 | 3篇 |
1980年 | 4篇 |
1979年 | 6篇 |
1977年 | 4篇 |
1976年 | 7篇 |
1974年 | 2篇 |
1972年 | 3篇 |
排序方式: 共有1701条查询结果,搜索用时 15 毫秒
81.
Among the web application server resources, the most critical for their performance are those that are held exclusively by a service request for the duration of its execution (or some significant part of it). Such exclusively held server resources become performance bottleneck points, with failures to obtain such a resource constituting a major portion of request rejections under server overload conditions. In this paper, we propose a methodology that computes the optimal pool sizes for two such critical resources: web server threads and database connections. Our methodology uses information about incoming request flow and about fine‐grained server resource utilization by service requests of different types, obtained through offline and online request profiling. In our methodology, we advocate (and show its benefits) the use of a database connection pooling mechanism that caches database connections for the duration of a service request execution (so‐called request‐wide database connection caching). We evaluate our methodology by testing it on the TPC‐W web application. Our method is able to accurately compute the optimal number of server threads and database connections, and the value of sustainable request throughput computed by the method always lies within a 5% margin of the actual value determined experimentally. Copyright © 2010 John Wiley & Sons, Ltd. 相似文献
82.
A. K. Saraf P. R. Choudhury B. Roy B. Sarma S. Vijay S. Choudhury 《International journal of remote sensing》2013,34(24):5759-5770
Digital elevation model (DEM) is a storehouse of a variety of hydrological information along with terrain characteristics. In recent years, automatic extraction of drainage network from DEM with the help of Geographical Information System (GIS) has become possible and is now being practised the world over for hydrological studies. In the present study, a comparative analysis of the drainage network derived from DEM and drainage extracted from surveyed topographical maps has been carried out. A comparative analysis based on nearest neighbour analysis on an intersection theme of two drainage networks showed that there is clustering (randomness<1) existing at places which show potential groundwater recharge zones. The suitable groundwater recharge zones identified in the drainage comparative analysis also show good correlation with the suitable recharge maps derived from remote sensing and GIS based procedure. In this study, two different watersheds (a) Dwarkeshwar in Bankura district, West Bengal, India, and (b) Kethan in Vidisha districts of Madhya Pradesh, India have been taken to analyse for identification of suitable groundwater recharge zones. The drainage comparative analysis approach developed and tested successfully in the present study is quick and reliable for the identification of suitable groundwater recharge zones particularly in a hard rock terrain. 相似文献
83.
Shambhu Prasad Suraj Nayak Vamshi Vijay Rajib Mall 《Innovations in Systems and Software Engineering》2016,12(4):263-278
Simulink and Stateflow (SL/SF) models are being widely used to design and develop embedded systems. Often the SL/SF models of embedded controllers turn out to be large and consist of many subsystems and hierarchies. When such a system is maintained, it becomes difficult to manually analyse the model to identify the impacted elements due to the existence of several explicit and implicit dependencies among the model elements. To automate the analysis of an SL/SF model, we propose a metamodel to capture various types of dependencies existing across the basic blocks. We have named this metamodel Simulink dependency graph (SLDG). We investigate the use of SLDG in change impact visualization and regression test selection. We have developed a prototype tool by implementing our approach for the aforementioned applications. 相似文献
84.
85.
Yan Wang Kwei-Jay Lin Duncan S. Wong Vijay Varadharajan 《Service Oriented Computing and Applications》2009,3(2):129-146
In service-oriented computing (SOC) environments, service clients interact with service providers for services or transactions.
From the point view of service clients, the trust status of a service provider is a critical issue to consider, particularly
when the service provider is unknown to them. Typically, the trust evaluation is based on the feedback on the service quality
provided by service clients. In this paper, we first present a trust management framework that is event-driven and rule-based.
In this framework, trust computation is based on formulae. But rules are defined to determine which formula to use and what
arguments to use, according to the event occurred during the transaction or service. In addition, we propose some trust evaluation
metrics and a formula for trust computation. The formula is designed to be adaptable to different application domains by setting
suitable arguments. Particularly, the proposed model addresses the incremental characteristics of trust establishment process.
Furthermore, we propose a fuzzy logic based approach for determining reputation ranks that particularly differentiates new
service providers and old (long-existing) ones. This is further incentive to new service providers and penalize poor quality
services from service providers. Finally, a set of empirical studies has been conducted to study the properties of the proposed
approaches, and the method to control the trust changes in both trust increment and decrement cases. The proposed framework
is adaptable for different domains and complex trust evaluation systems.
相似文献
Vijay VaradharajanEmail: |
86.
Huddar Mahesh G. Sannakki Sanjeev S. Rajpurohit Vijay S. 《Multimedia Tools and Applications》2021,80(9):13059-13076
Multimedia Tools and Applications - Due to the availability of an enormous amount of multimodal content on the social web and its applications, automatic sentiment analysis, and emotion detection... 相似文献
87.
G. Manimaran C. Siva Ram Murthy Machiraju Vijay Krithi Ramamritham 《Journal of Parallel and Distributed Computing》1997,44(2):365
The scheduling of tasks in multiprocessor real-time systems has attracted many researchers in the recent past. Tasks in these systems have deadlines to be met, and most of the real-time scheduling algorithms use worst case computation times to schedule these tasks. Many resources will be left unused if the tasks are dispatched purely based on the schedule produced by these scheduling algorithms, since most of the tasks will take less time to execute than their respective worst case computation times. Resource reclaiming refers to the problem of reclaiming the resources left unused by a real-time task when it takes less time to execute than its worst case computation time. In this paper, we propose two algorithms to reclaim these resources from real-time tasks that are constrained by precedence relations and resource requirements, in shared memory multiprocessor systems. We introduce a notion called a restriction vector for each task which captures its resource and precedence constraints with other tasks. This will help not only in the efficient implementation of the algorithms, but also in obtaining an improvement in performance over the reclaiming algorithms proposed in earlier work [[2]]. We compare our resource reclaiming algorithms with the earlier algorithms and, by experimental studies, show that they reclaim more resources, thereby increasing the guarantee ratio (the ratio of the number of tasks guaranteed to meet their deadlines to the number of tasks that have arrived), which is the basic requirement of any resource reclaiming algorithm. From our simulation studies, we demonstrate that complex reclaiming algorithms with high reclaiming overheads do not lead to an improvement in the guarantee ratio. 相似文献
88.
Automata theory, algorithmic deduction and abstract interpretation provide the foundation behind three approaches to implementing program verifiers. This article is a first step towards a mathematical translation between these approaches. By extending Büchi’s theorem, we show that reachability in a control flow graph can be encoded as satisfiability in an extension of the weak, monadic, second-order logic of one successor. Abstract interpreters are, in a precise sense, sound but incomplete solvers for such formulae. The three components of an abstract interpreter: the lattice, transformers and iteration algorithm, respectively represent a fragment of a first-order theory, deduction in that theory, and second-order constraint propagation. By inverting the Lindenbaum–Tarski construction, we show that lattices used in practice are subclassical first-order theories. 相似文献
89.
On a stochastic sensor selection algorithm with applications in sensor scheduling and sensor coverage 总被引:1,自引:0,他引:1
Vijay Gupta Author Vitae Timothy H. Chung Author Vitae Author Vitae Richard M. Murray Author Vitae 《Automatica》2006,42(2):251-260
In this note we consider the following problem. Suppose a set of sensors is jointly trying to estimate a process. One sensor takes a measurement at every time step and the measurements are then exchanged among all the sensors. What is the sensor schedule that results in the minimum error covariance? We describe a stochastic sensor selection strategy that is easy to implement and is computationally tractable. The problem described above comes up in many domains out of which we discuss two. In the sensor selection problem, there are multiple sensors that cannot operate simultaneously (e.g., sonars in the same frequency band). Thus measurements need to be scheduled. In the sensor coverage problem, a geographical area needs to be covered by mobile sensors each with limited range. Thus from every position, the sensors obtain a different view-point of the area and the sensors need to optimize their trajectories. The algorithm is applied to these problems and illustrated through simple examples. 相似文献
90.
Given a graph with edges colored Red and Blue, we study the problem of sampling and approximately counting the number of matchings with exactly k
Red edges. We solve the problem of estimating the number of perfect matchings with exactly k
Red edges for dense graphs. We study a Markov chain on the space of all matchings of a graph that favors matchings with k
Red edges. We show that it is rapidly mixing using non-traditional canonical paths that can backtrack. We show that this chain
can be used to sample matchings in the 2-dimensional toroidal lattice of any fixed size ℓ with k
Red edges, where the horizontal edges are Red and the vertical edges are Blue.
An extended abstract appeared in J.R. Correa, A. Hevia and M.A. Kiwi (eds.) Proceedings of the 7th Latin American Theoretical Informatics Symposium, LNCS 3887, pp. 190–201, Springer, 2006.
N. Bhatnagar’s and D. Randall’s research was supported in part by NSF grants CCR-0515105 and DMS-0505505.
V.V. Vazirani’s research was supported in part by NSF grants 0311541, 0220343 and CCR-0515186.
N. Bhatnagar’s and E. Vigoda’s research was supported in part by NSF grant CCR-0455666. 相似文献