首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1793篇
  免费   143篇
  国内免费   82篇
电工技术   76篇
综合类   200篇
化学工业   77篇
金属工艺   12篇
机械仪表   37篇
建筑科学   139篇
矿业工程   33篇
能源动力   36篇
轻工业   75篇
水利工程   30篇
石油天然气   8篇
武器工业   15篇
无线电   188篇
一般工业技术   129篇
冶金工业   202篇
原子能技术   10篇
自动化技术   751篇
  2024年   16篇
  2023年   22篇
  2022年   65篇
  2021年   68篇
  2020年   60篇
  2019年   52篇
  2018年   38篇
  2017年   57篇
  2016年   90篇
  2015年   62篇
  2014年   127篇
  2013年   112篇
  2012年   110篇
  2011年   157篇
  2010年   104篇
  2009年   109篇
  2008年   115篇
  2007年   100篇
  2006年   87篇
  2005年   76篇
  2004年   71篇
  2003年   59篇
  2002年   63篇
  2001年   40篇
  2000年   38篇
  1999年   23篇
  1998年   14篇
  1997年   21篇
  1996年   10篇
  1995年   8篇
  1994年   3篇
  1993年   3篇
  1992年   3篇
  1991年   2篇
  1990年   3篇
  1989年   2篇
  1985年   2篇
  1982年   2篇
  1976年   1篇
  1967年   1篇
  1966年   1篇
  1965年   1篇
  1964年   1篇
  1963年   4篇
  1962年   1篇
  1961年   2篇
  1959年   3篇
  1958年   2篇
  1957年   2篇
  1954年   1篇
排序方式: 共有2018条查询结果,搜索用时 15 毫秒
71.
张东摩  朱朝晖  陈世福 《软件学报》2000,11(9):1276-1282
基于可能模型方法 ( possible m odel approach,简称 PMA) ,提出了面向行动的信念更新的概念 ,证明了在信息完备的情境演算系统中 ,一个一阶公式在情境 s下成立当且仅当它属于情境 s下的信念集 .这一结果为有效避免情境演算推理中二阶归纳公理的使用提供了一条可行的途径 ,也为基于意向驱动的 agent模型的建立以及面向 agent的程序设计语言 AOPL ID( agent-oriented programm ing language with intention driver)的提出提供了必要的理论基础.  相似文献   
72.
多媒体协同环境Ashram的设计与实现   总被引:1,自引:0,他引:1  
设计并实现了一个多媒体协同环境Ashram系统。Ashram系统采用半复制式体系结构,具有友好的界面和简单的操作方式,支持多媒体的协同感知。文章对它的关键技术从工作空间感知和基于角色的访问控制方面作了着重的阐述,之后又对它的实现技术做了详细的讨论,力图给出一个详尽的解决方案。  相似文献   
73.
《离散数学》是计算机类专业中一门重要的专业基础课程。该文以培养学生逻辑思维能力、综合知识应用能力、提高学生实践能力为目的,作者结合自己的教学实践,对离散数学教学的现状做了全面的分析,并从教学环节、教学方式、教学思想等方面提出在专业教学中改进的对策和措施。  相似文献   
74.
计算机实验教学是计算机课程教学的重要环节,通过计算机实验教学和学生上机实践操作,学生才能更好地理解和掌握计算机的知识。本文从当前学生在实验过程中存在的问题出发,分析了增强学生的主体意识的方法,提出了只有增强学生的主体意识才能切实有效地提高计算机实验教学质量的想法。  相似文献   
75.
A common challenge in many situations of computer-supported collaborative learning is increasing the willingness of those involved to share their knowledge with other group members. As a prototypical situation of computer-supported information exchange, a shared-database setting was chosen for the current study. This information-exchange situation represented a social dilemma: while the contribution of information to a shared database induced costs and provided no benefit for the individual, the entire group suffered when all members decided to withhold information. In order to alleviate the information-exchange dilemma, a group-awareness tool was employed. It was hypothesized that participants would use group awareness for self-presentational purposes. For the examination of this assumption, the personality variable ‘protective self-presentation’ (PSP) was measured. An interaction effect of group awareness and PSP was found: when an awareness tool provided information concerning the contribution behavior of each individual, this tool was used as a self-presentation opportunity. In order to understand this effect in more detail, single items of the PSP-scale were analyzed.  相似文献   
76.
A.  M.  A.  M.  A.  M.  R. Mayrhofer 《Pervasive and Mobile Computing》2008,4(3):448-479
An integrated, autonomous stick-on computing platform is proposed, consisting of (i) the Peer-it stick-on, multi-sensor, multi-actuator computer hardware, (ii) the Peer-it component-based software framework, and (iii) the Peer-it profile markup language PeerML, supporting spontaneous interaction among such platforms. The platform implements Peer-to-Peer computing principles in a self-contained, miniaturized, universal and scalable way, giving raise for application scenarios where the real-world artefacts like e.g. machines, tools or appliances–literally every thing–equipped with Peer-it technology can operate in spontaneously interacting, goal-oriented ensembles.Technically, preferences (like capabilities and goals) and context (like time, geo-position, owner, environmental conditions, etc.) of peers are kept as a profile encoded in PeerML in the local memory of Peer-its, and carried along wherever they move in space. Once peers come into spatial proximity of each other, profiles are exchanged via wireless communication, and the “similarity” of preferences is analyzed. In the case of “matching” preferences, an associated application is notified on both peers.Besides a fully functional autonomous hardware platform integrating multiple sensors, actuator arrays and wireless communication technologies, the Peer-it stick-on computer, a low-memory footprint, OSGi compliant Peer-it software framework has been implemented. We demonstrate in a flexible manufacturing systems (FMS) scenario, how the Peer-it technology can improve over centralized FMSs with respect to fault tolerance, scalability, flexibility in reconfiguration, productivity and efficiency.  相似文献   
77.
We provide evidence of the feasibility and effectiveness of a middleware architecture for mobile devices (MoDs), which employs dense distributions of small computerized entities for providing fault-tolerant location-aware services. We do so by describing exemplary implementations based on radio frequency identification as an enabling technology. Firstly, we present prototypical implementations of the hardware abstraction layer and of selected core middleware services. The latter enable a MoD to store and retrieve data and position information in physical places in a fault-tolerant manner, and to identify places based on a location abstraction which is robust against failure of individual tags. Secondly, we investigate the feasibility of some higher-level services and applications by developing and evaluating prototypical systems for tracing and tracking, self-positioning, and collaborative map-making.
Jürgen BohnEmail:
  相似文献   
78.
As computer infrastructures become more complex, security models must provide means to handle more flexible and dynamic requirements. In the Organization Based Access Control (OrBAC) model, it is possible to express such requirements using the notion of context. In OrBAC, each security rule (permission, prohibition, obligation or dispensation) only applies in a given context. A context is viewed as an extra condition that must be satisfied to activate a given security rule. In this paper, we present a taxonomy of different types of context and investigate the data the information system must manage in order to deal with these different contexts. We then explain how to model and evaluate them in the OrBAC model.
Nora Cuppens-BoulahiaEmail:
  相似文献   
79.
One of the cornerstones of expert performance in complex domains is the ability to perceive problem situations in terms of their task-relevant semantic properties. One such class of properties consists of phenomena that are defined in terms of patterns of change over time, i.e., events. A basic pre-requisite for working towards tools to support event recognition is a method for understanding the events that expert practitioners find meaningful in a given field of practice. In this article we present the modified unit marking procedure (mUMP), a technique adapted from work on social perception to facilitate identification of the meaningful phenomena which observers attend to in a dynamic data array. The mUMP and associated data analysis techniques are presented with examples from a first of a kind study where they were used to elicit and understand the events practitioners found meaningful in a scenario from an actual complex work domain.
David D. WoodsEmail:
  相似文献   
80.
Substantial research has been devoted to the modelling of the small-world phenomenon that arises in nature as well as human society. Earlier work has focused on the static properties of various small-world models. To examine the routing aspects, Kleinberg proposes a model based on a d-dimensional toroidal lattice with long-range links chosen at random according to the d-harmonic distribution. Kleinberg shows that, by using only local information, the greedy routing algorithm performs in O(lg^2 n) expected number of hops. We extend Kleinberg's small-world model by allowing each node x to have two more random links to nodes chosen uniformly and randomly within (lg n)2/d Manhattan distance from x. Based on this extended model, we then propose an oblivious algorithm that can route messages between any two nodes in O(lg n) expected number of hops. Our routing algorithm keeps only O((lgn)β+1) bits of information on each node, where 1 〈 β 〈 2, thus being scalable w.r.t, the network size. To our knowledge, our result is the first to achieve the optimal routing complexity while still keeping a poly-logarithmic number of bits of information stored on each node in the small-world networks.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号