全文获取类型
收费全文 | 36416篇 |
免费 | 2389篇 |
国内免费 | 859篇 |
专业分类
电工技术 | 1459篇 |
技术理论 | 1篇 |
综合类 | 1369篇 |
化学工业 | 5380篇 |
金属工艺 | 1688篇 |
机械仪表 | 1560篇 |
建筑科学 | 1900篇 |
矿业工程 | 578篇 |
能源动力 | 1035篇 |
轻工业 | 1874篇 |
水利工程 | 343篇 |
石油天然气 | 1340篇 |
武器工业 | 120篇 |
无线电 | 3846篇 |
一般工业技术 | 3877篇 |
冶金工业 | 1505篇 |
原子能技术 | 468篇 |
自动化技术 | 11321篇 |
出版年
2024年 | 82篇 |
2023年 | 440篇 |
2022年 | 737篇 |
2021年 | 1105篇 |
2020年 | 803篇 |
2019年 | 763篇 |
2018年 | 799篇 |
2017年 | 916篇 |
2016年 | 889篇 |
2015年 | 1052篇 |
2014年 | 1605篇 |
2013年 | 1938篇 |
2012年 | 2510篇 |
2011年 | 4219篇 |
2010年 | 2624篇 |
2009年 | 2518篇 |
2008年 | 2152篇 |
2007年 | 1895篇 |
2006年 | 1878篇 |
2005年 | 1801篇 |
2004年 | 1416篇 |
2003年 | 1392篇 |
2002年 | 1087篇 |
2001年 | 596篇 |
2000年 | 569篇 |
1999年 | 643篇 |
1998年 | 606篇 |
1997年 | 486篇 |
1996年 | 468篇 |
1995年 | 356篇 |
1994年 | 286篇 |
1993年 | 199篇 |
1992年 | 184篇 |
1991年 | 119篇 |
1990年 | 96篇 |
1989年 | 79篇 |
1988年 | 90篇 |
1987年 | 48篇 |
1986年 | 45篇 |
1985年 | 24篇 |
1984年 | 30篇 |
1983年 | 13篇 |
1982年 | 25篇 |
1981年 | 13篇 |
1980年 | 9篇 |
1979年 | 15篇 |
1978年 | 5篇 |
1977年 | 6篇 |
1976年 | 10篇 |
1965年 | 5篇 |
排序方式: 共有10000条查询结果,搜索用时 312 毫秒
971.
Santi CaballéAuthor Vitae Thanasis DaradoumisAuthor VitaeFatos XhafaAuthor Vitae Angel JuanAuthor Vitae 《Computers in human behavior》2011,27(4):1372-1381
Learning and knowledge building have become critical competences for people in the knowledge society era. In this paper, we propose a sociolinguistic dialogue model for understanding how learning evolves and how cognitive process is constructed in on-line discussions. The knowledge extracted from this model is used to assess participation behavior, knowledge building and performance. The ultimate purpose is to provide effective feedback, evaluation and monitoring to the discussion process. Seven hundred students from the Open University of Catalonia in Spain participated in this study. Results showed that learning and knowledge building may be greatly enhanced by presenting selected knowledge to learners as for their particular skills exhibited during interaction. In addition, this valuable provision of information is used as a meta cognitive tool for tutors and moderators for monitoring and evaluating the discussion process more conveniently. This contribution presents our conceptual model for interaction management as well as key design guidelines and evaluation results. Implications of this study are remarked and further research directions are proposed. 相似文献
972.
Juliana SutantoAuthor VitaeChee Wei PhangAuthor Vitae Chuan Hoo TanAuthor VitaeXianghua LuAuthor Vitae 《Information & Management》2011,48(1):19-26
Organizations use virtual-worlds to enhance group discussion; it allows an individual to decouple his or her rendered from actual behavior; resulting in others perceiving him or her to have two or more personalities. Building on self-regulation theory, we examined how satisfaction in the virtual-world was affected by these personality differences. A field study was conducted to attempt to understand this; it involved 297 students engaged in a virtual tutorial group using Second Life. We found that small variations in personality between the virtual and real world groups (such as being helpful, sociable, seeking recognition, or submissive) could lead to greater satisfaction of the discussion. 相似文献
973.
Ofir TurelAuthor Vitae 《Information & Management》2011,48(1):62-68
The use of online collaboration tools for virtual teamwork has been studied extensively, but mainly at the individual-level. We decided to examine the effect of macro-level factors (i.e., team attributes) and applied hierarchical linear modeling analysis to a sample of data collected from 96 individuals nested in 34 virtual teams. Our results suggested that the development of behavioral e-collaboration intentions by individual virtual team members was affected by their perceptions about the system, as described by individual-level IT use theories, and macro-level factors pertaining to the team. The collaboration technology was perceived to be less useful when employed to communicate with social loafers; and collective social loafing negatively influenced the teams’ potency assessments. After controlling for individual-level perceptions of system usefulness, team potency augmented team members’ intentions to use the online collaboration technology with similar teams. It also improved team performance. 相似文献
974.
While prior research has investigated the main effects of external factors on user perceptions of a new IT, little work has been into the interaction effect of external factors on user perceptions. In a longitudinal experimental study, we examined the effect of the quality of persuasive argument, user training, and first-hand use on user perceptions of the new technology over time. We found that the effect of argument quality on users’ perceived ease of use was greater when users had no training. However, we did not find the same effect occurred due to perceived usefulness. We also found that first-hand use changed users’ perceived usefulness more over time when users received high quality arguments or when they had no training. While we found that first-hand use changed users’ perceived ease of use more when users received high quality arguments, first-hand use did not change users’ perceived ease of use differently whether they had or had not received prior training. 相似文献
975.
Craig UlmerAuthor VitaeMaya GokhaleAuthor Vitae Brian GallagherAuthor VitaePhilip TopAuthor Vitae Tina Eliassi-RadAuthor Vitae 《Journal of Parallel and Distributed Computing》2011,71(2):225-235
This paper describes our approach to adapting a text document similarity classifier based on the Term Frequency Inverse Document Frequency (TFIDF) metric to two massively multi-core hardware platforms. The TFIDF classifier is used to detect web attacks in HTTP data. In our parallel hardware approaches, we design streaming, real time classifiers by simplifying the sequential algorithm and manipulating the classifier’s model to allow decision information to be represented compactly. Parallel implementations on the Tilera 64-core System on Chip and the Xilinx Virtex 5-LX FPGA are presented. For the Tilera, we employ a reduced state machine to recognize dictionary terms without requiring explicit tokenization, and achieve throughput of 37 MB/s at a slightly reduced accuracy. For the FPGA, we have developed a set of software tools to help automate the process of converting training data to synthesizable hardware and to provide a means of trading off between accuracy and resource utilization. The Xilinx Virtex 5-LX implementation requires 0.2% of the memory used by the original algorithm. At 166 MB/s (80X the software) the hardware implementation is able to achieve Gigabit network throughput at the same accuracy as the original algorithm. 相似文献
976.
Yongpeng ZhangAuthor VitaeFrank MuellerAuthor Vitae Xiaohui CuiAuthor Vitae 《Journal of Parallel and Distributed Computing》2011,71(2):211-224
Document clustering is a central method to mine massive amounts of data. Due to the explosion of raw documents generated on the Internet and the necessity to analyze them efficiently in various intelligent information systems, clustering techniques have reached their limitations on single processors. Instead of single processors, general-purpose multi-core chips are increasingly deployed in response to diminishing returns in single-processor speedup due to the frequency wall, but multi-core benefits only provide linear speedups while the number of documents in the Internet is growing exponentially. Accelerating hardware devices represent a novel promise for improving the performance for data-intensive problems such as document clustering. They offer more radical designs with a higher level of parallelism but adaptation to novel programming environments.In this paper, we assess the benefits of exploiting the computational power of graphics processing units (GPUs) to study two fundamental problems in document mining, namely to calculate the term frequency-inverse document frequency (TF-IDF) and cluster a large set of documents. We transform traditional algorithms into accelerated parallel counterparts that can be efficiently executed on many-core GPU architectures. We assess our implementations on various platforms, ranging from stand-alone GPU desktops to Beowulf-like clusters equipped with contemporary GPU cards. We observe at least one order of magnitude speedups over CPU-only desktops and clusters. This demonstrates the potential of exploiting GPU clusters to efficiently solve massive document mining problems. Such speedups combined with the scalability potential and accelerator-based parallelization are unique in the domain of document-based data mining, to the best of our knowledge. 相似文献
977.
Hyunhee Kim Author VitaeJihong KimAuthor Vitae 《Journal of Parallel and Distributed Computing》2011,71(12):1545-1557
This paper proposes a novel leakage management technique for applications with producer-consumer sharing patterns. Although previous research has proposed leakage management techniques by turning off inactive cache blocks, these techniques can be further improved by exploiting the various run-time characteristics of target applications in CMPs. By exploiting particular access sequences observed in producer-consumer sharing patterns and the spatial locality of shared buffers, our technique enables a more aggressive turn-off of L2 cache blocks of these buffers. Experimental results using a CMP simulator show that our proposed technique reduces the energy consumption of on-chip L2 caches, a shared bus, and off-chip memory by up to 31.3% over the existing cache leakage power management techniques with no significant performance loss. 相似文献
978.
Admission control mechanism and performance analysis based on stochastic automata networks formalism
Lynda MokdadAuthor Vitae 《Journal of Parallel and Distributed Computing》2011,71(4):594-602
IEEE 802.16 has been designed to support QoS (Quality of Service) in Wireless broadband Metropolitan Networks (WMAN), and specifically in the access networks. To achieve this, the IEEE 802.16.e amendment introduces the service differentiation by five service classes (UGS, ertPS, rtPS, nrtPS and BE). To maintain the QoS of active connections and to avoid any congestion in the network, an Admission Control (AC) is defined. AC aims to accept or reject a new connection according to the negotiated parameters and the availability of resources in the network. This mechanism is not standardized and let to the operators. We tackle this point, by proposing in this study a new Admission Control (AC) that improves the QoS of BE traffic by avoiding a strict bandwidth assignment of other traffics (rtPS and nrtPS) as is defined in major previous studies. The proposed mechanism is based on token bucket for rtPS, nrtPS and BE traffics in order to reduce lightly the number of accepted connections and to improve considerably the number of accepted BE connections. To evaluate the performance of the proposed scheme, we use PEPS (Performance Evaluation of Parallel Systems) which is a powerful tool based on models which can be described with Stochastic Automata Networks (SAN). PEPS can solve complex models with a large state space and with many synchronized events. Therefore, we show that this tool is suitable for wireless network, and specifically for the proposed scheme, toward numerical results we show as we expected that our proposed AC outperform the classical one by reducing lightly the performance of other service classes. 相似文献
979.
Mohammad HammoudAuthor Vitae Sangyeun ChoAuthor VitaeRami MelhemAuthor Vitae 《Journal of Parallel and Distributed Computing》2011,71(6):889-896
This paper describes Constrained Associative-Mapping-of-Tracking-Entries (C-AMTE), a scalable mechanism to facilitate flexible and efficient distributed cache management in large-scale chip multiprocessors (CMPs). C-AMTE enables fast locating of cache blocks in CMP cache schemes that employ one-to-one or one-to-many associative mappings. C-AMTE stores in per-core data structures tracking entries to avoid on-chip interconnect traffic outburst or long distance directory lookups. Simulation results using a full system simulator demonstrate that C-AMTE achieves improvement in cache access latency by up to 34.4%, close to that of a perfect location strategy. 相似文献
980.
Alexandre M. AmoryAuthor Vitae Cristiano LazzariAuthor Vitae 《Journal of Parallel and Distributed Computing》2011,71(5):675-686
Networks-on-Chip (NoCs) can be used for test data transportation during manufacturing tests. On one hand, NoC can avoid dedicated Test Access Mechanisms (TAMs), reducing long global wires, and potentially simplifying the layout. On the other hand, (a) it is not known how much wiring is saved by reusing NoCs as TAMs, (b) the impact of reuse-based approaches on test time is not clear, and (c) a computer aided test tool must be able to support different types of NoC designs. This paper presents a test environment where the designer can quickly evaluate wiring and test time for different test architectures. Moreover, this paper presents a new test scheduling algorithm for NoC TAMs which does not require any NoC timing detail and it can easily model NoCs of different topologies. The experimental results evaluate the proposed algorithm for NoC TAMs with an exiting algorithm for dedicated TAMs. The results demonstrate that, on average, 24% (up to 58%) of the total global wires can be eliminated if dedicated TAMs are not used. Considering the reduced amount of dedicated test resources with NoC TAM, the test time of NoC TAM is only, on average, 3.88% longer compared to dedicated TAMs. 相似文献