首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1627篇
  免费   71篇
  国内免费   3篇
电工技术   34篇
化学工业   349篇
金属工艺   41篇
机械仪表   50篇
建筑科学   21篇
矿业工程   5篇
能源动力   127篇
轻工业   142篇
水利工程   45篇
石油天然气   4篇
无线电   171篇
一般工业技术   268篇
冶金工业   93篇
原子能技术   9篇
自动化技术   342篇
  2024年   6篇
  2023年   36篇
  2022年   63篇
  2021年   63篇
  2020年   42篇
  2019年   58篇
  2018年   82篇
  2017年   60篇
  2016年   76篇
  2015年   53篇
  2014年   72篇
  2013年   130篇
  2012年   66篇
  2011年   106篇
  2010年   80篇
  2009年   90篇
  2008年   66篇
  2007年   71篇
  2006年   52篇
  2005年   41篇
  2004年   30篇
  2003年   35篇
  2002年   27篇
  2001年   18篇
  2000年   19篇
  1999年   14篇
  1998年   24篇
  1997年   28篇
  1996年   15篇
  1995年   22篇
  1994年   13篇
  1993年   8篇
  1992年   16篇
  1991年   12篇
  1990年   12篇
  1989年   13篇
  1988年   14篇
  1987年   6篇
  1986年   6篇
  1985年   6篇
  1984年   6篇
  1983年   5篇
  1982年   8篇
  1981年   3篇
  1980年   4篇
  1979年   6篇
  1977年   4篇
  1976年   7篇
  1974年   2篇
  1972年   3篇
排序方式: 共有1701条查询结果,搜索用时 15 毫秒
81.
Among the web application server resources, the most critical for their performance are those that are held exclusively by a service request for the duration of its execution (or some significant part of it). Such exclusively held server resources become performance bottleneck points, with failures to obtain such a resource constituting a major portion of request rejections under server overload conditions. In this paper, we propose a methodology that computes the optimal pool sizes for two such critical resources: web server threads and database connections. Our methodology uses information about incoming request flow and about fine‐grained server resource utilization by service requests of different types, obtained through offline and online request profiling. In our methodology, we advocate (and show its benefits) the use of a database connection pooling mechanism that caches database connections for the duration of a service request execution (so‐called request‐wide database connection caching). We evaluate our methodology by testing it on the TPC‐W web application. Our method is able to accurately compute the optimal number of server threads and database connections, and the value of sustainable request throughput computed by the method always lies within a 5% margin of the actual value determined experimentally. Copyright © 2010 John Wiley & Sons, Ltd.  相似文献   
82.
Digital elevation model (DEM) is a storehouse of a variety of hydrological information along with terrain characteristics. In recent years, automatic extraction of drainage network from DEM with the help of Geographical Information System (GIS) has become possible and is now being practised the world over for hydrological studies. In the present study, a comparative analysis of the drainage network derived from DEM and drainage extracted from surveyed topographical maps has been carried out. A comparative analysis based on nearest neighbour analysis on an intersection theme of two drainage networks showed that there is clustering (randomness<1) existing at places which show potential groundwater recharge zones. The suitable groundwater recharge zones identified in the drainage comparative analysis also show good correlation with the suitable recharge maps derived from remote sensing and GIS based procedure. In this study, two different watersheds (a) Dwarkeshwar in Bankura district, West Bengal, India, and (b) Kethan in Vidisha districts of Madhya Pradesh, India have been taken to analyse for identification of suitable groundwater recharge zones. The drainage comparative analysis approach developed and tested successfully in the present study is quick and reliable for the identification of suitable groundwater recharge zones particularly in a hard rock terrain.  相似文献   
83.
Simulink and Stateflow (SL/SF) models are being widely used to design and develop embedded systems. Often the SL/SF models of embedded controllers turn out to be large and consist of many subsystems and hierarchies. When such a system is maintained, it becomes difficult to manually analyse the model to identify the impacted elements due to the existence of several explicit and implicit dependencies among the model elements. To automate the analysis of an SL/SF model, we propose a metamodel to capture various types of dependencies existing across the basic blocks. We have named this metamodel Simulink dependency graph (SLDG). We investigate the use of SLDG in change impact visualization and regression test selection. We have developed a prototype tool by implementing our approach for the aforementioned applications.  相似文献   
84.
85.
In service-oriented computing (SOC) environments, service clients interact with service providers for services or transactions. From the point view of service clients, the trust status of a service provider is a critical issue to consider, particularly when the service provider is unknown to them. Typically, the trust evaluation is based on the feedback on the service quality provided by service clients. In this paper, we first present a trust management framework that is event-driven and rule-based. In this framework, trust computation is based on formulae. But rules are defined to determine which formula to use and what arguments to use, according to the event occurred during the transaction or service. In addition, we propose some trust evaluation metrics and a formula for trust computation. The formula is designed to be adaptable to different application domains by setting suitable arguments. Particularly, the proposed model addresses the incremental characteristics of trust establishment process. Furthermore, we propose a fuzzy logic based approach for determining reputation ranks that particularly differentiates new service providers and old (long-existing) ones. This is further incentive to new service providers and penalize poor quality services from service providers. Finally, a set of empirical studies has been conducted to study the properties of the proposed approaches, and the method to control the trust changes in both trust increment and decrement cases. The proposed framework is adaptable for different domains and complex trust evaluation systems.
Vijay VaradharajanEmail:
  相似文献   
86.
Multimedia Tools and Applications - Due to the availability of an enormous amount of multimodal content on the social web and its applications, automatic sentiment analysis, and emotion detection...  相似文献   
87.
The scheduling of tasks in multiprocessor real-time systems has attracted many researchers in the recent past. Tasks in these systems have deadlines to be met, and most of the real-time scheduling algorithms use worst case computation times to schedule these tasks. Many resources will be left unused if the tasks are dispatched purely based on the schedule produced by these scheduling algorithms, since most of the tasks will take less time to execute than their respective worst case computation times. Resource reclaiming refers to the problem of reclaiming the resources left unused by a real-time task when it takes less time to execute than its worst case computation time. In this paper, we propose two algorithms to reclaim these resources from real-time tasks that are constrained by precedence relations and resource requirements, in shared memory multiprocessor systems. We introduce a notion called a restriction vector for each task which captures its resource and precedence constraints with other tasks. This will help not only in the efficient implementation of the algorithms, but also in obtaining an improvement in performance over the reclaiming algorithms proposed in earlier work [[2]]. We compare our resource reclaiming algorithms with the earlier algorithms and, by experimental studies, show that they reclaim more resources, thereby increasing the guarantee ratio (the ratio of the number of tasks guaranteed to meet their deadlines to the number of tasks that have arrived), which is the basic requirement of any resource reclaiming algorithm. From our simulation studies, we demonstrate that complex reclaiming algorithms with high reclaiming overheads do not lead to an improvement in the guarantee ratio.  相似文献   
88.
Automata theory, algorithmic deduction and abstract interpretation provide the foundation behind three approaches to implementing program verifiers. This article is a first step towards a mathematical translation between these approaches. By extending Büchi’s theorem, we show that reachability in a control flow graph can be encoded as satisfiability in an extension of the weak, monadic, second-order logic of one successor. Abstract interpreters are, in a precise sense, sound but incomplete solvers for such formulae. The three components of an abstract interpreter: the lattice, transformers and iteration algorithm, respectively represent a fragment of a first-order theory, deduction in that theory, and second-order constraint propagation. By inverting the Lindenbaum–Tarski construction, we show that lattices used in practice are subclassical first-order theories.  相似文献   
89.
In this note we consider the following problem. Suppose a set of sensors is jointly trying to estimate a process. One sensor takes a measurement at every time step and the measurements are then exchanged among all the sensors. What is the sensor schedule that results in the minimum error covariance? We describe a stochastic sensor selection strategy that is easy to implement and is computationally tractable. The problem described above comes up in many domains out of which we discuss two. In the sensor selection problem, there are multiple sensors that cannot operate simultaneously (e.g., sonars in the same frequency band). Thus measurements need to be scheduled. In the sensor coverage problem, a geographical area needs to be covered by mobile sensors each with limited range. Thus from every position, the sensors obtain a different view-point of the area and the sensors need to optimize their trajectories. The algorithm is applied to these problems and illustrated through simple examples.  相似文献   
90.
Given a graph with edges colored Red and Blue, we study the problem of sampling and approximately counting the number of matchings with exactly k Red edges. We solve the problem of estimating the number of perfect matchings with exactly k Red edges for dense graphs. We study a Markov chain on the space of all matchings of a graph that favors matchings with k Red edges. We show that it is rapidly mixing using non-traditional canonical paths that can backtrack. We show that this chain can be used to sample matchings in the 2-dimensional toroidal lattice of any fixed size with k Red edges, where the horizontal edges are Red and the vertical edges are Blue. An extended abstract appeared in J.R. Correa, A. Hevia and M.A. Kiwi (eds.) Proceedings of the 7th Latin American Theoretical Informatics Symposium, LNCS 3887, pp. 190–201, Springer, 2006. N. Bhatnagar’s and D. Randall’s research was supported in part by NSF grants CCR-0515105 and DMS-0505505. V.V. Vazirani’s research was supported in part by NSF grants 0311541, 0220343 and CCR-0515186. N. Bhatnagar’s and E. Vigoda’s research was supported in part by NSF grant CCR-0455666.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号