全文获取类型
收费全文 | 36416篇 |
免费 | 2389篇 |
国内免费 | 859篇 |
专业分类
电工技术 | 1459篇 |
技术理论 | 1篇 |
综合类 | 1369篇 |
化学工业 | 5380篇 |
金属工艺 | 1688篇 |
机械仪表 | 1560篇 |
建筑科学 | 1900篇 |
矿业工程 | 578篇 |
能源动力 | 1035篇 |
轻工业 | 1874篇 |
水利工程 | 343篇 |
石油天然气 | 1340篇 |
武器工业 | 120篇 |
无线电 | 3846篇 |
一般工业技术 | 3877篇 |
冶金工业 | 1505篇 |
原子能技术 | 468篇 |
自动化技术 | 11321篇 |
出版年
2024年 | 82篇 |
2023年 | 440篇 |
2022年 | 737篇 |
2021年 | 1105篇 |
2020年 | 803篇 |
2019年 | 763篇 |
2018年 | 799篇 |
2017年 | 916篇 |
2016年 | 889篇 |
2015年 | 1052篇 |
2014年 | 1605篇 |
2013年 | 1938篇 |
2012年 | 2510篇 |
2011年 | 4219篇 |
2010年 | 2624篇 |
2009年 | 2518篇 |
2008年 | 2152篇 |
2007年 | 1895篇 |
2006年 | 1878篇 |
2005年 | 1801篇 |
2004年 | 1416篇 |
2003年 | 1392篇 |
2002年 | 1087篇 |
2001年 | 596篇 |
2000年 | 569篇 |
1999年 | 643篇 |
1998年 | 606篇 |
1997年 | 486篇 |
1996年 | 468篇 |
1995年 | 356篇 |
1994年 | 286篇 |
1993年 | 199篇 |
1992年 | 184篇 |
1991年 | 119篇 |
1990年 | 96篇 |
1989年 | 79篇 |
1988年 | 90篇 |
1987年 | 48篇 |
1986年 | 45篇 |
1985年 | 24篇 |
1984年 | 30篇 |
1983年 | 13篇 |
1982年 | 25篇 |
1981年 | 13篇 |
1980年 | 9篇 |
1979年 | 15篇 |
1978年 | 5篇 |
1977年 | 6篇 |
1976年 | 10篇 |
1965年 | 5篇 |
排序方式: 共有10000条查询结果,搜索用时 500 毫秒
981.
César MarconAuthor VitaeNey CalazansAuthor Vitae Edson MorenoAuthor VitaeFernando MoraesAuthor Vitae Fabiano HesselAuthor VitaeAltamiro SusinAuthor Vitae 《Journal of Parallel and Distributed Computing》2011,71(5):714-728
This paper describes CAFES, an extensible, open-source framework supporting several tasks related to high-level modeling and design of applications employing complex intrachip communication infrastructures. CAFES comprises several built-in models, including application, communication architecture, energy consumption and timing models. It also includes a set of generic and specific algorithms and additional supporting tools, which jointly with the cited models allow the designer to describe and evaluate applications requirements and constraints on specified communication architectures. Several examples of the use of CAFES underline the usefulness of the framework. Some of these are approached in this paper: (i) a realistic application captured at high-level that has its computation time estimated after mapping at the clock cycle level; (ii) a multi-application system that is automatically mapped to a large intrachip network with related tasks occupying contiguous areas in the chip layout; (iii) a set of mapping algorithms explored to define trade-offs between run time and energy savings for small to large intrachip communication architectures. 相似文献
982.
Evgeni KrimerAuthor Vitae Isaac KeslassyAuthor Vitae 《Journal of Parallel and Distributed Computing》2011,71(5):687-699
Networks-on-chip (NoCs) are used in a growing number of SoCs and multi-core processors. Because messages compete for the NoC’s shared resources, quality of service and resource allocation are major concerns for system designers. In particular, a model for the properties of packet delivery through the network is desirable. We present a methodology for packet-level static timing analysis in NoCs. Our methodology quickly and accurately gauges the performance parameters of a virtual-channel wormhole NoC without simulation. The network model can handle any topology, link capacities, and buffer sizes. It provides per-flow delay analysis that is orders-of-magnitude faster than simulation while being significantly more accurate than prior static modeling techniques. Using a carefully derived and reduced Markov chain, the model can statically represent the dynamic network state. Usage of the model in a placement optimization problem is shown as an example application. 相似文献
983.
Lélia BlinAuthor Vitae Maria Gradinariu Potop-ButucaruAuthor Vitae Stephane RovedakisAuthor Vitae 《Journal of Parallel and Distributed Computing》2011,71(3):438-449
We propose a self-stabilizing algorithm for constructing a Minimum Degree Spanning Tree (MDST) in undirected networks. Starting from an arbitrary state, our algorithm is guaranteed to converge to a legitimate state describing a spanning tree whose maximum node degree is at most Δ∗+1, where Δ∗ is the minimum possible maximum degree of a spanning tree of the network.To the best of our knowledge, our algorithm is the first self-stabilizing solution for the construction of a minimum degree spanning tree in undirected graphs. The algorithm uses only local communications (nodes interact only with the neighbors at one hop distance). Moreover, the algorithm is designed to work in any asynchronous message passing network with reliable FIFO channels. Additionally, we use a fine grained atomicity model (i.e., the send/receive atomicity). The time complexity of our solution is O(mn2logn) where m is the number of edges and n is the number of nodes. The memory complexity is O(δlogn) in the send-receive atomicity model (δ is the maximal degree of the network). 相似文献
984.
Dong YuanAuthor Vitae Yun Yang Author VitaeXiao Liu Author Vitae Jinjun Chen Author Vitae 《Journal of Parallel and Distributed Computing》2011,71(2):316-332
Many scientific workflows are data intensive: large volumes of intermediate datasets are generated during their execution. Some valuable intermediate datasets need to be stored for sharing or reuse. Traditionally, they are selectively stored according to the system storage capacity, determined manually. As doing science on clouds has become popular nowadays, more intermediate datasets in scientific cloud workflows can be stored by different storage strategies based on a pay-as-you-go model. In this paper, we build an intermediate data dependency graph (IDG) from the data provenances in scientific workflows. With the IDG, deleted intermediate datasets can be regenerated, and as such we develop a novel algorithm that can find a minimum cost storage strategy for the intermediate datasets in scientific cloud workflow systems. The strategy achieves the best trade-off of computation cost and storage cost by automatically storing the most appropriate intermediate datasets in the cloud storage. This strategy can be utilised on demand as a minimum cost benchmark for all other intermediate dataset storage strategies in the cloud. We utilise Amazon clouds’ cost model and apply the algorithm to general random as well as specific astrophysics pulsar searching scientific workflows for evaluation. The results show that benchmarking effectively demonstrates the cost effectiveness over other representative storage strategies. 相似文献
985.
Ramtin ShamsAuthor Vitae Parastoo SadeghiAuthor Vitae 《Journal of Parallel and Distributed Computing》2011,71(4):584-593
A model for the computational cost of the finite-difference time-domain (FDTD) method irrespective of implementation details or the application domain is given. The model is used to formalize the problem of optimal distribution of computational load to an arbitrary set of resources across a heterogeneous cluster. We show that the problem can be formulated as a minimax optimization problem and derive analytic lower bounds for the computational cost. The work provides insight into optimal design of FDTD parallel software. Our formulation of the load distribution problem takes simultaneously into account the computational and communication costs. We demonstrate that significant performance gains, as much as 75%, can be achieved by proper load distribution. 相似文献
986.
Caroline ConcattoAuthor VitaeJoão AlmeidaAuthor Vitae Guilherme FachiniAuthor VitaeMarcos HervéAuthor Vitae Fernanda KastensmidtAuthor Vitae Érika CotaAuthor VitaeMarcelo LubaszewskiAuthor Vitae 《Journal of Parallel and Distributed Computing》2011,71(5):664-674
We propose an effective and low cost method to increase the yield and the lifetime of torus NoCs. The method consists in detecting and diagnosing NoC interconnect faults using BIST structures and activating alternative paths for the faulty links. Alternative paths use the inherent redundancy of the torus topology, thus leading to minimal performance, area, and power overhead. We assume an extended interconnect fault model comprising stuck-at and pairwise shorts within a single link or between any two links in the network. Experimental results for a 3×3 NoC show that the proposed approach can correctly diagnose 93% of all possible interconnect faults and can mitigate 42% of those faults (representing 94.4% of the solvable faults) with a worst case performance penalty of 8% and 1% of area overhead. We also demonstrate the scalability of the method by presenting its application to larger NoCs. 相似文献
987.
Online algorithms for advance resource reservations 总被引:2,自引:0,他引:2
C. CastilloAuthor Vitae G.N. RouskasAuthor Vitae 《Journal of Parallel and Distributed Computing》2011,71(7):963-973
We consider the problem of providing QoS guarantees to Grid users through advance reservation of resources. Advance reservation mechanisms provide the ability to allocate resources to users based on agreed-upon QoS requirements and increase the predictability of a Grid system, yet incorporating such mechanisms into current Grid environments has proven to be a challenging task due to the resulting resource fragmentation. We use concepts from computational geometry to present a framework for tackling the resource fragmentation, and for formulating a suite of scheduling strategies. We also develop efficient implementations of the scheduling algorithms that scale to large Grids. We conduct a comprehensive performance evaluation study using simulation, and we present numerical results to demonstrate that our strategies perform well across several metrics that reflect both user- and system-specific goals. Our main contribution is a timely, practical, and efficient solution to the problem of scheduling resources in emerging on-demand computing environments. 相似文献
988.
Christos AnagnostopoulosAuthor Vitae Stathes HadjiefthymiadesAuthor Vitae 《Journal of Parallel and Distributed Computing》2011,71(1):87-104
Contemporary distributed systems usually involve the spreading of information by means of ad-hoc dialogs between nodes (peers). This paradigm resembles the spreading of a virus in the biological perspective (epidemics). Such abstraction allows us to design and implement information dissemination schemes with increased efficiency. In addition, elementary information generated at a certain node can be further processed to obtain more specific, higher-level and more valuable information. Such information carries specific semantic value that can be further interpreted and exploited throughout the network. This is also reflected in the epidemical framework through the idea of virus transmutation which is a key component in our model. We establish an analytical framework for the study of a multi-epidemical information dissemination scheme in which diverse ‘transmuted epidemics’ are spread. We validate our analytical model through simulations. Key outcomes of this study include the assessment of the efficiency of the proposed scheme and the prediction of the characteristics of the spreading process (multi-epidemical prevalence and decay). 相似文献
989.
Jeng-Long ChiangAuthor VitaeYin-Yeh TsengAuthor Vitae Wen-Tsuen ChenAuthor Vitae 《Journal of Parallel and Distributed Computing》2011,71(6):879-888
BitTorrent is a popular peer-to-peer file sharing system and a target file shared through BitTorrent is partitioned into pieces and downloaded from multiple peers in parallel in order to shorten the download process. However, due to peer dynamics in P2P networks, rare pieces may be lost and thus lead to the so-called last piece problem. BitTorrent employs rarest-first piece selection algorithm to deal with this problem, but its efficacy is limited because each peer only has a local view of piece rareness. In this paper, we propose an Interest-Intended Piece Selection (IIPS) algorithm aiming at better alleviating the last piece problem while maintaining stable cooperation between peers. IIPS is named interest intended in that every IIPS peer favors pieces that, if downloaded, would increase the probability of being interesting to its cooperating peers. Simulation results show that IIPS achieves less occurrences of piece loss under tough conditions and slightly outperforms the BitTorrent’s rarest-first algorithm in terms of higher piece diversity. 相似文献
990.
Ka-Lok HungAuthor Vitae Brahim Bensaou Author Vitae 《Journal of Parallel and Distributed Computing》2011,71(9):1201-1214
Motivated by observations from real world wireless local area network (WLAN) deployments, we develop in this paper a novel analytical model to characterize the saturation throughput of an IEEE 802.11-based access point (AP) and stations under the influence of hidden terminals. Unlike existing models, our model can accommodate different numbers of hidden nodes without increasing the model complexity. Given any number of hidden nodes, only four constraints are needed to describe the interaction between stations and the AP with the consideration of both uplink and downlink traffic. Simulation evaluation shows that our model predicts network performance accurately over a wide range of network sizes and indicates the existence of a throughput starvation problem. To address this problem, based on our model, we formulate a bandwidth allocation problem to optimize the network throughput and fairness under some predefined requirements by systematically tuning the AP and stations contention windows. Simulation results show that the starvation problem is resolved with our approach, and the target throughput is met. 相似文献