首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   36416篇
  免费   2389篇
  国内免费   859篇
电工技术   1459篇
技术理论   1篇
综合类   1369篇
化学工业   5380篇
金属工艺   1688篇
机械仪表   1560篇
建筑科学   1900篇
矿业工程   578篇
能源动力   1035篇
轻工业   1874篇
水利工程   343篇
石油天然气   1340篇
武器工业   120篇
无线电   3846篇
一般工业技术   3877篇
冶金工业   1505篇
原子能技术   468篇
自动化技术   11321篇
  2024年   82篇
  2023年   440篇
  2022年   737篇
  2021年   1105篇
  2020年   803篇
  2019年   763篇
  2018年   799篇
  2017年   916篇
  2016年   889篇
  2015年   1052篇
  2014年   1605篇
  2013年   1938篇
  2012年   2510篇
  2011年   4219篇
  2010年   2624篇
  2009年   2518篇
  2008年   2152篇
  2007年   1895篇
  2006年   1878篇
  2005年   1801篇
  2004年   1416篇
  2003年   1392篇
  2002年   1087篇
  2001年   596篇
  2000年   569篇
  1999年   643篇
  1998年   606篇
  1997年   486篇
  1996年   468篇
  1995年   356篇
  1994年   286篇
  1993年   199篇
  1992年   184篇
  1991年   119篇
  1990年   96篇
  1989年   79篇
  1988年   90篇
  1987年   48篇
  1986年   45篇
  1985年   24篇
  1984年   30篇
  1983年   13篇
  1982年   25篇
  1981年   13篇
  1980年   9篇
  1979年   15篇
  1978年   5篇
  1977年   6篇
  1976年   10篇
  1965年   5篇
排序方式: 共有10000条查询结果,搜索用时 312 毫秒
971.
Learning and knowledge building have become critical competences for people in the knowledge society era. In this paper, we propose a sociolinguistic dialogue model for understanding how learning evolves and how cognitive process is constructed in on-line discussions. The knowledge extracted from this model is used to assess participation behavior, knowledge building and performance. The ultimate purpose is to provide effective feedback, evaluation and monitoring to the discussion process. Seven hundred students from the Open University of Catalonia in Spain participated in this study. Results showed that learning and knowledge building may be greatly enhanced by presenting selected knowledge to learners as for their particular skills exhibited during interaction. In addition, this valuable provision of information is used as a meta cognitive tool for tutors and moderators for monitoring and evaluating the discussion process more conveniently. This contribution presents our conceptual model for interaction management as well as key design guidelines and evaluation results. Implications of this study are remarked and further research directions are proposed.  相似文献   
972.
Organizations use virtual-worlds to enhance group discussion; it allows an individual to decouple his or her rendered from actual behavior; resulting in others perceiving him or her to have two or more personalities. Building on self-regulation theory, we examined how satisfaction in the virtual-world was affected by these personality differences. A field study was conducted to attempt to understand this; it involved 297 students engaged in a virtual tutorial group using Second Life. We found that small variations in personality between the virtual and real world groups (such as being helpful, sociable, seeking recognition, or submissive) could lead to greater satisfaction of the discussion.  相似文献   
973.
The use of online collaboration tools for virtual teamwork has been studied extensively, but mainly at the individual-level. We decided to examine the effect of macro-level factors (i.e., team attributes) and applied hierarchical linear modeling analysis to a sample of data collected from 96 individuals nested in 34 virtual teams. Our results suggested that the development of behavioral e-collaboration intentions by individual virtual team members was affected by their perceptions about the system, as described by individual-level IT use theories, and macro-level factors pertaining to the team. The collaboration technology was perceived to be less useful when employed to communicate with social loafers; and collective social loafing negatively influenced the teams’ potency assessments. After controlling for individual-level perceptions of system usefulness, team potency augmented team members’ intentions to use the online collaboration technology with similar teams. It also improved team performance.  相似文献   
974.
While prior research has investigated the main effects of external factors on user perceptions of a new IT, little work has been into the interaction effect of external factors on user perceptions. In a longitudinal experimental study, we examined the effect of the quality of persuasive argument, user training, and first-hand use on user perceptions of the new technology over time. We found that the effect of argument quality on users’ perceived ease of use was greater when users had no training. However, we did not find the same effect occurred due to perceived usefulness. We also found that first-hand use changed users’ perceived usefulness more over time when users received high quality arguments or when they had no training. While we found that first-hand use changed users’ perceived ease of use more when users received high quality arguments, first-hand use did not change users’ perceived ease of use differently whether they had or had not received prior training.  相似文献   
975.
This paper describes our approach to adapting a text document similarity classifier based on the Term Frequency Inverse Document Frequency (TFIDF) metric to two massively multi-core hardware platforms. The TFIDF classifier is used to detect web attacks in HTTP data. In our parallel hardware approaches, we design streaming, real time classifiers by simplifying the sequential algorithm and manipulating the classifier’s model to allow decision information to be represented compactly. Parallel implementations on the Tilera 64-core System on Chip and the Xilinx Virtex 5-LX FPGA are presented. For the Tilera, we employ a reduced state machine to recognize dictionary terms without requiring explicit tokenization, and achieve throughput of 37 MB/s at a slightly reduced accuracy. For the FPGA, we have developed a set of software tools to help automate the process of converting training data to synthesizable hardware and to provide a means of trading off between accuracy and resource utilization. The Xilinx Virtex 5-LX implementation requires 0.2% of the memory used by the original algorithm. At 166 MB/s (80X the software) the hardware implementation is able to achieve Gigabit network throughput at the same accuracy as the original algorithm.  相似文献   
976.
Document clustering is a central method to mine massive amounts of data. Due to the explosion of raw documents generated on the Internet and the necessity to analyze them efficiently in various intelligent information systems, clustering techniques have reached their limitations on single processors. Instead of single processors, general-purpose multi-core chips are increasingly deployed in response to diminishing returns in single-processor speedup due to the frequency wall, but multi-core benefits only provide linear speedups while the number of documents in the Internet is growing exponentially. Accelerating hardware devices represent a novel promise for improving the performance for data-intensive problems such as document clustering. They offer more radical designs with a higher level of parallelism but adaptation to novel programming environments.In this paper, we assess the benefits of exploiting the computational power of graphics processing units (GPUs) to study two fundamental problems in document mining, namely to calculate the term frequency-inverse document frequency (TF-IDF) and cluster a large set of documents. We transform traditional algorithms into accelerated parallel counterparts that can be efficiently executed on many-core GPU architectures. We assess our implementations on various platforms, ranging from stand-alone GPU desktops to Beowulf-like clusters equipped with contemporary GPU cards. We observe at least one order of magnitude speedups over CPU-only desktops and clusters. This demonstrates the potential of exploiting GPU clusters to efficiently solve massive document mining problems. Such speedups combined with the scalability potential and accelerator-based parallelization are unique in the domain of document-based data mining, to the best of our knowledge.  相似文献   
977.
This paper proposes a novel leakage management technique for applications with producer-consumer sharing patterns. Although previous research has proposed leakage management techniques by turning off inactive cache blocks, these techniques can be further improved by exploiting the various run-time characteristics of target applications in CMPs. By exploiting particular access sequences observed in producer-consumer sharing patterns and the spatial locality of shared buffers, our technique enables a more aggressive turn-off of L2 cache blocks of these buffers. Experimental results using a CMP simulator show that our proposed technique reduces the energy consumption of on-chip L2 caches, a shared bus, and off-chip memory by up to 31.3% over the existing cache leakage power management techniques with no significant performance loss.  相似文献   
978.
IEEE 802.16 has been designed to support QoS (Quality of Service) in Wireless broadband Metropolitan Networks (WMAN), and specifically in the access networks. To achieve this, the IEEE 802.16.e amendment introduces the service differentiation by five service classes (UGS, ertPS, rtPS, nrtPS and BE). To maintain the QoS of active connections and to avoid any congestion in the network, an Admission Control (AC) is defined. AC aims to accept or reject a new connection according to the negotiated parameters and the availability of resources in the network. This mechanism is not standardized and let to the operators. We tackle this point, by proposing in this study a new Admission Control (AC) that improves the QoS of BE traffic by avoiding a strict bandwidth assignment of other traffics (rtPS and nrtPS) as is defined in major previous studies. The proposed mechanism is based on token bucket for rtPS, nrtPS and BE traffics in order to reduce lightly the number of accepted connections and to improve considerably the number of accepted BE connections. To evaluate the performance of the proposed scheme, we use PEPS (Performance Evaluation of Parallel Systems) which is a powerful tool based on models which can be described with Stochastic Automata Networks (SAN). PEPS can solve complex models with a large state space and with many synchronized events. Therefore, we show that this tool is suitable for wireless network, and specifically for the proposed scheme, toward numerical results we show as we expected that our proposed AC outperform the classical one by reducing lightly the performance of other service classes.  相似文献   
979.
This paper describes Constrained Associative-Mapping-of-Tracking-Entries (C-AMTE), a scalable mechanism to facilitate flexible and efficient distributed cache management in large-scale chip multiprocessors (CMPs). C-AMTE enables fast locating of cache blocks in CMP cache schemes that employ one-to-one or one-to-many associative mappings. C-AMTE stores in per-core data structures tracking entries to avoid on-chip interconnect traffic outburst or long distance directory lookups. Simulation results using a full system simulator demonstrate that C-AMTE achieves improvement in cache access latency by up to 34.4%, close to that of a perfect location strategy.  相似文献   
980.
Networks-on-Chip (NoCs) can be used for test data transportation during manufacturing tests. On one hand, NoC can avoid dedicated Test Access Mechanisms (TAMs), reducing long global wires, and potentially simplifying the layout. On the other hand, (a) it is not known how much wiring is saved by reusing NoCs as TAMs, (b) the impact of reuse-based approaches on test time is not clear, and (c) a computer aided test tool must be able to support different types of NoC designs. This paper presents a test environment where the designer can quickly evaluate wiring and test time for different test architectures. Moreover, this paper presents a new test scheduling algorithm for NoC TAMs which does not require any NoC timing detail and it can easily model NoCs of different topologies. The experimental results evaluate the proposed algorithm for NoC TAMs with an exiting algorithm for dedicated TAMs. The results demonstrate that, on average, 24% (up to 58%) of the total global wires can be eliminated if dedicated TAMs are not used. Considering the reduced amount of dedicated test resources with NoC TAM, the test time of NoC TAM is only, on average, 3.88% longer compared to dedicated TAMs.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号