全文获取类型
收费全文 | 2462篇 |
免费 | 387篇 |
国内免费 | 282篇 |
专业分类
电工技术 | 166篇 |
技术理论 | 1篇 |
综合类 | 257篇 |
化学工业 | 112篇 |
金属工艺 | 7篇 |
机械仪表 | 92篇 |
建筑科学 | 32篇 |
矿业工程 | 26篇 |
能源动力 | 9篇 |
轻工业 | 34篇 |
水利工程 | 17篇 |
石油天然气 | 35篇 |
武器工业 | 23篇 |
无线电 | 1299篇 |
一般工业技术 | 113篇 |
冶金工业 | 24篇 |
原子能技术 | 21篇 |
自动化技术 | 863篇 |
出版年
2024年 | 9篇 |
2023年 | 26篇 |
2022年 | 82篇 |
2021年 | 86篇 |
2020年 | 77篇 |
2019年 | 76篇 |
2018年 | 77篇 |
2017年 | 81篇 |
2016年 | 105篇 |
2015年 | 119篇 |
2014年 | 156篇 |
2013年 | 173篇 |
2012年 | 238篇 |
2011年 | 224篇 |
2010年 | 173篇 |
2009年 | 183篇 |
2008年 | 177篇 |
2007年 | 186篇 |
2006年 | 144篇 |
2005年 | 144篇 |
2004年 | 137篇 |
2003年 | 114篇 |
2002年 | 78篇 |
2001年 | 62篇 |
2000年 | 42篇 |
1999年 | 31篇 |
1998年 | 17篇 |
1997年 | 21篇 |
1996年 | 13篇 |
1995年 | 26篇 |
1994年 | 11篇 |
1993年 | 9篇 |
1992年 | 10篇 |
1991年 | 6篇 |
1990年 | 5篇 |
1989年 | 3篇 |
1988年 | 3篇 |
1987年 | 3篇 |
1986年 | 1篇 |
1985年 | 1篇 |
1977年 | 1篇 |
1959年 | 1篇 |
排序方式: 共有3131条查询结果,搜索用时 125 毫秒
51.
52.
53.
光纤Bragg光栅折射率调制特性研究 总被引:1,自引:0,他引:1
在光纤Bragg光栅(FBG)中两个正反向模式之间会发生耦合,要了解光纤光栅的物理特性,提高反射率的精度,就需要深入研究光纤光栅的耦合模理论.通过光纤Bragg光栅的耦合方程,研究在不同的折射率调制深度的情况之下光纤反射谱变化,并用Matlab做仿真实验,结果发现光栅长度取2,5,10 mm,弱光栅、中度光栅、强光栅在折射率变化0.000 1时的反射谱带宽最大值分别是2.015 0×10-11,5.276 7×10-11,9.2143 ×10-11.计算表明:在固定光栅长度情况下,每0.000 1折射率变化所导致的反射谱带宽变化值在任意反射带中都相对稳定,其中,弱光栅反射谱最小,中度光栅反射谱次之,强光栅反射谱最大. 相似文献
54.
Emmanouil KafetzakisAuthor Vitae Kimon KontovasilisAuthor Vitae Ioannis StavrakakisAuthor Vitae 《Performance Evaluation》2011,68(7):614-628
Many network applications rely on stochastic QoS guarantees. With respect to loss-related performance, the effective bandwidth/capacity theory has proved useful for calculating loss probabilities in queues with complex input and server processes and for formulating simple admission control tests to ensure associated QoS guarantees. This success has motivated the application of the theory for delay-related QoS too. However, up until now this application has been justified only heuristically for queues with variable service rate. The paper fills this gap by establishing rigorously that the effective bandwidth/capacity theory may be used for the asymptotically correct calculation and enforcement of delay tail-probabilities in systems with variable rate servers too. Subsequently, the paper applies the general results to IEEE 802.11 WLANs, by representing each IEEE 802.11 station as an On/Off server and employing the effective capacity function for this model. Comparison of analytical results with simulation validates the effectiveness of the On/Off IEEE 802.11 model for delay-related QoS, complementing earlier results on loss-related performance. 相似文献
55.
基于动态规划的网络带宽分配机制 总被引:1,自引:0,他引:1
传统分组网络承载时分复用业务存在延时、抖动、报文到达次序不一致等问题。利用城域以太网面向连接的特性,提出了一种由用户为具体业务提出带宽申请,运营商根据共享带宽的大小和用户的优先级,利用动态规划的方法在以太网隧道中预留带宽的机制。提高了带宽利用率的同时,兼顾用户之间的公平性。实验结果表明,这种机制可以充分利用带宽资源,并且将带宽公平地分配给各用户。 相似文献
56.
57.
1.引言如何分析、评价并行程序的性能是并行计算的一个重要研究问题。RAM模型为串行算法分析提供了理论基础。据此,我们可以用big-O模型来分析其算法的复杂性。但是,在并行环境下,由于处理机之间增加了通信,使得并行程序及算法分析问题更加复杂。如何在并行程序和计算机结构之间建立一种联系?许多人 相似文献
58.
本文讨论了一种基于网络报文对的网络瓶颈带宽测度技术的原理及实现时一些问题的解决方案,给出了各种典型网络环境下的测试结果,并分析了这种测试方法的潜在误差。 相似文献
59.
In this paper we report new results of our continuous effort on analyzing the impact of incentive mechanisms on user behavior
in BitTorrent. In this second measurement and analysis study we find that free riders’ population has significantly increased
comparing to our previous measurement study. We relate this increase to the advance in end-users’ connection speeds and to
users’ increased knowledge in BitTorrent. We also categorize free riders based on the behavior they exhibit in multiple-torrent
system into three types: cheaters, strategic and lucky peers. Furthermore, refuting the findings of other studies, we show
that peers who exploit the system in BitTorrent are both high bandwidth capacity peers and low bandwidth capacity peers. Moreover,
we argue that the Tit-for-Tat mechanism does not discriminate peers based on their bandwidth capacities and that it reacts
successfully against inter-class bandwidth capacity strategic peers. Finally, we propose a memory-backoff approach to the
optimistic unchoke policy that reduces the volume of free riding in BitTorrent.
Manaf Zghaibeh is a PhD candidate at Stevens Institute of Technology, focusing on P2P economics. He holds a Master’s Degree in Telecommunications Management from Stevens and a Bachelor’s Degree in Electrical Engineering from Damascus University. He has been a teaching assistant at NYU since 2002. Fotios Harmantzis is an Assistant Professor at the School of Technology Management at Stevens Institute of Technology. He holds a B.Sc. and M.Sc. in Computer Science from the University of Crete, a MSE in Systems Engineering from the University of Pennsylvania, a Finance MBA from Toronto/NYU, and a PhD in Electrical and Computer Engineering from the University of Toronto. Dr. Harmantzis’ research and teaching interests include mathematics of finance and risk, valuations of investments under uncertainty and economics of IT and telecom. His research work has been presented in several scientific conferences and journals. He has professional experience in the US, Canada and Europe, in the financial services, asset management and consulting business. 相似文献
Fotios C. Harmantzis (Corresponding author)Email: |
Manaf Zghaibeh is a PhD candidate at Stevens Institute of Technology, focusing on P2P economics. He holds a Master’s Degree in Telecommunications Management from Stevens and a Bachelor’s Degree in Electrical Engineering from Damascus University. He has been a teaching assistant at NYU since 2002. Fotios Harmantzis is an Assistant Professor at the School of Technology Management at Stevens Institute of Technology. He holds a B.Sc. and M.Sc. in Computer Science from the University of Crete, a MSE in Systems Engineering from the University of Pennsylvania, a Finance MBA from Toronto/NYU, and a PhD in Electrical and Computer Engineering from the University of Toronto. Dr. Harmantzis’ research and teaching interests include mathematics of finance and risk, valuations of investments under uncertainty and economics of IT and telecom. His research work has been presented in several scientific conferences and journals. He has professional experience in the US, Canada and Europe, in the financial services, asset management and consulting business. 相似文献
60.
The problem of minimizing the access time of a requested multimedia (MM) document on a network based environment is addressed. A generalized version of this problem is formulated and retrieval strategies that minimize the access time of the user-requested MM document from a pool of MM servers are proposed. To this end, we design single-installment and multi-installment MM document retrieval strategies, through which the minimization of access time can be carried out. The main idea is to utilize more than one MM server in downloading the requested document. Each server assumes the responsibility of uploading a predetermined portion of the entire document in a particular order. Single- and multi-installment strategies differ in the number of disjoint document pieces each server sends to the client. We first introduce a directed flow graph (DFG) model to represent the retrieval process and generate a set of recursive equations using this DFG. Then, we derive closed-form solutions for the portions of the MM document downloaded from the various servers and the corresponding access time. We present rigorous analysis for these two strategies and show their performance under MPEG-I and MPEG-II video streams playback rates. Their behavior under different network bandwidths is also examined, revealing in-depth information about their expected performance. We also show that in the case of a multi-installment strategy, the access time can be completely controlled by fine tuning the number of installments. Since the number of installments is software tunable, the adaptive nature of the strategies to different channel bandwidths is also demonstrated. Important trade-off studies with respect to the number of servers involved in the retrieval process and the number of installments are presented. In the case of a heterogeneous network employing a single-installment strategy, we prove that the access time is independent of the server sequence used. Illustrative examples are provided for ease of understanding. 相似文献