首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   45513篇
  免费   5237篇
  国内免费   3439篇
电工技术   3588篇
技术理论   8篇
综合类   6664篇
化学工业   3319篇
金属工艺   1138篇
机械仪表   2808篇
建筑科学   4411篇
矿业工程   1749篇
能源动力   1471篇
轻工业   1034篇
水利工程   1330篇
石油天然气   1593篇
武器工业   721篇
无线电   4365篇
一般工业技术   4981篇
冶金工业   2437篇
原子能技术   366篇
自动化技术   12206篇
  2024年   211篇
  2023年   773篇
  2022年   1130篇
  2021年   1397篇
  2020年   1593篇
  2019年   1407篇
  2018年   1434篇
  2017年   1587篇
  2016年   1733篇
  2015年   1836篇
  2014年   2778篇
  2013年   3101篇
  2012年   3056篇
  2011年   3403篇
  2010年   2695篇
  2009年   2805篇
  2008年   2815篇
  2007年   3001篇
  2006年   2757篇
  2005年   2359篇
  2004年   1918篇
  2003年   1581篇
  2002年   1366篇
  2001年   1122篇
  2000年   929篇
  1999年   805篇
  1998年   632篇
  1997年   544篇
  1996年   472篇
  1995年   446篇
  1994年   358篇
  1993年   318篇
  1992年   298篇
  1991年   199篇
  1990年   172篇
  1989年   186篇
  1988年   135篇
  1987年   73篇
  1986年   96篇
  1985年   72篇
  1984年   68篇
  1983年   52篇
  1982年   56篇
  1981年   43篇
  1980年   33篇
  1979年   31篇
  1978年   29篇
  1977年   26篇
  1964年   28篇
  1955年   35篇
排序方式: 共有10000条查询结果,搜索用时 140 毫秒
961.
This paper describes an analytical formulation to compute quantitative feedback theory (QFT) bounds in one‐degree‐of‐freedom feedback control problems. The new approach is based on envelope curves and shows that a QFT control specification can be expressed as a family of circumferences. Then, the controller bound is defined by the envelope curve of this family and can be obtained as an analytical function. This offers the possibility of studying the QFT bounds in an analytical way with several useful properties. Gridding methods are avoided, resulting in a lower computational effort procedure. The new formulation improves the accuracy of previous methods and allows the designer to calculate multivalued bounds. Copyright © 2009 John Wiley & Sons, Ltd.  相似文献   
962.
C.O.  B.F.   《Digital Signal Processing》2009,19(6):968-977
We consider the problem of tracking a “smart” target. That is, a target that is aware it is being tracked and modifies its behaviour accordingly. To track such targets effectively it is necessary to modify the behaviour of the tracking sensor in response to the target. We consider that the best framework for such a problem is that of a mathematical game. In this paper, we consider an idealised version of this problem that illustrates some of the issues that can occur when attempting to track a smart target and the utility of a game theoretic framework.  相似文献   
963.
Software measurement is considered important in improving the software process. However, teaching software measurement remains a challenging issue. Although, games and simulations are regarded powerful tools for learning, their learning effectiveness is not rigorously established. This paper describes the results of an explorative study to investigate the learning effectiveness of a game prototype on software measurement in order to make an initial judgment about its potential as an educational tool as well as to analyze its appropriateness, engagement and strengths & weaknesses as guidance for further evolution. Within the study, a series of experiments was conducted in parallel in three master courses in Brazil. Results of the study reveal that the participants consider the content and structure of the game appropriate, but no indication for a significant difference on learning effectiveness could be shown.
Djone KochanskiEmail:
  相似文献   
964.
Decentralized Reputation Systems have recently emerged as a prominent method of establishing trust among self-interested agents in online environments. A key issue is the efficient aggregation of data in the system; several approaches have been proposed, but they are plagued by major shortcomings. We put forward a novel, decentralized data management scheme grounded in gossip-based algorithms. Rumor mongering is known to possess algorithmic advantages, and indeed, our framework inherits many of their salient features: scalability, robustness, a global perspective, and simplicity. We demonstrate that our scheme motivates agents to maintain a very high reputation, by showing that the higher an agent’s reputation is above the threshold set by its peers, the more transactions it would be able to complete within a certain time unit. We analyze the relation between the amount by which an agent’s average reputation exceeds the threshold and the time required to close a deal. This analysis is carried out both theoretically, and empirically through a simulation system called GossipTrustSim. Finally, we show that our approach is inherently impervious to certain kinds of attacks. A preliminary version of this article appeared in the proceedings of IJCAI 2007.  相似文献   
965.
An important problem in agent verification is a lack of proper understanding of the relation between agent programs on the one hand and agent logics on the other. Understanding this relation would help to establish that an agent programming language is both conceptually well-founded and well-behaved, as well as yield a way to reason about agent programs by means of agent logics. As a step toward bridging this gap, we study several issues that need to be resolved in order to establish a precise mathematical relation between a modal agent logic and an agent programming language specified by means of an operational semantics. In this paper, we present an agent programming theory that provides both an agent programming language as well as a corresponding agent verification logic to verify agent programs. The theory is developed in stages to show, first, how a modal semantics can be grounded in a state-based semantics, and, second, how denotational semantics can be used to define the mathematical relation connecting the logic and agent programming language. Additionally, it is shown how to integrate declarative goals and add precompiled plans to the programming theory. In particular, we discuss the use of the concept of higher-order goals in our theory. Other issues such as a complete axiomatization and the complexity of decision procedures for the verification logic are not the focus of this paper and remain for future investigation. Part of this research was carried out while the first author was affiliated with the Nijmegen Institute for Cognition and Information, Radboud University Nijmegen.  相似文献   
966.
Manufacturing systems produce their products by making use of three main strategies: make-to-order, make-to-stock and hybrid (combination of MTO and MTS strategies) systems. Hence, several products must be considered and partitioned in terms of many different conflicting criteria, leading to a large set of subjective or ambiguous data. Thus, an effective evaluation approach is essential to improve decision quality. In this paper a comprehensive decision, making structure is proposed to choose the proper strategy for producing the products. It consists of a novel hybrid methodology, which combines analytical hierarchy process (AHP) and technique for order performance by similarity to ideal solution (TOPSIS) for partitioning of products. In this study, the rating of each alternative regarding different criteria (throughout the TOPSIS technique) is described by means of linguistic variables. Furthermore, fuzzy AHP methodology is applied to determine the weights of evaluation criteria. At the end, the effectiveness of the proposed model is demonstrated through a case study.  相似文献   
967.
Collaborative technologies offer a range of new ways of supporting learning by enabling learners to share and exchange both ideas and their own digital products. This paper considers how best to exploit these opportunities from the perspective of learners’ needs. New technologies invariably excite a creative explosion of new ideas for ways of doing teaching and learning, although the technologies themselves are rarely designed with teaching and learning in mind. To get the best from them for education we need to start with the requirements of education, in terms of both learners’ and teachers’ needs. The argument put forward in this paper is to use what we know about what it takes to learn, and build this into a pedagogical framework with which to challenge digital technologies to deliver a genuinely enhanced learning experience.  相似文献   
968.
The main goal of this study is to apply a scientific quantitative approach to the investigation of contextual fit. This is approached mathematically within the framework of cognitive science and research on categorization and prototypes. Two experiments investigated two leading mathematical-cognitive approaches for explaining people’s judgment of contextual fit of a new building with an architectural/urban context: prototype approach and feature frequency approach. The basic concept is that people represent the built environment via architectural prototypes and/or frequencies of encountered architectural features. In the first experiment, a group of twelve participants performed rank order tasks on artificially created architectural patterns, for the purpose of psychological scaling. Perceptual distances among all patterns were mathematically determined. In the second experiment, three groups of architectural patterns were constructed to represent assumed architectural contexts. The prototype of each context was mathematically determined according to prototype cognitive model, and based on the distances calculated in the first experiment. Fifty-six students participated in the main experiment, in which they rank ordered a group of fifteen architectural patterns in terms of contextual fit to each of the three architectural contexts. Participants’ rank order data of the fifteen patterns were regressed on both the perceptual distances from prototypes, and numbers of features shared with each architectural context. Results indicated that both prototype and feature frequency approaches significantly accounted for important portions of participants’ judgments. However, participants tended to prefer one approach to the other according to context composition. Results have implications for both research on utilizing cognitive-mathematical models in architectural research and on urban design guidelines and control.  相似文献   
969.
970.
Trust management is an approach to scalable and flexible access control in decentralized systems. In trust management, a server often needs to evaluate a chain of credentials submitted by a client; this requires the server to perform multiple expensive digital signature verifications. In this paper, we study low-bandwidth Denial-of-Service (DoS) attacks that exploit the existence of trust management systems to deplete server resources. Although the threat of DoS attacks has been studied for some application-level protocols such as authentication protocols, we show that it is especially destructive for trust management systems. Exploiting the delegation feature in trust management languages, an attacker can forge a long credential chain to force a server to consume a large amount of computing resource. Using game theory as an analytic tool, we demonstrate that unprotected trust management servers will easily fall prey to a witty attacker who moves smartly. We report our empirical study of existing trust management systems, which manifests the gravity of this threat. We also propose a defense technique using credential caching, and show that it is effective in the presence of intelligent attackers. A preliminary version of this paper was presented at the Second IEEE International Conference on Security and Privacy in Communication Networks, Baltimore, MD, USA, August 2006.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号