全文获取类型
收费全文 | 637篇 |
免费 | 31篇 |
国内免费 | 35篇 |
专业分类
电工技术 | 5篇 |
综合类 | 24篇 |
化学工业 | 35篇 |
金属工艺 | 18篇 |
机械仪表 | 18篇 |
建筑科学 | 41篇 |
矿业工程 | 11篇 |
能源动力 | 8篇 |
轻工业 | 2篇 |
水利工程 | 39篇 |
石油天然气 | 7篇 |
武器工业 | 3篇 |
无线电 | 121篇 |
一般工业技术 | 17篇 |
冶金工业 | 30篇 |
原子能技术 | 1篇 |
自动化技术 | 323篇 |
出版年
2023年 | 3篇 |
2022年 | 3篇 |
2021年 | 4篇 |
2020年 | 8篇 |
2019年 | 5篇 |
2018年 | 10篇 |
2017年 | 16篇 |
2016年 | 18篇 |
2015年 | 12篇 |
2014年 | 22篇 |
2013年 | 30篇 |
2012年 | 32篇 |
2011年 | 47篇 |
2010年 | 31篇 |
2009年 | 50篇 |
2008年 | 45篇 |
2007年 | 62篇 |
2006年 | 43篇 |
2005年 | 42篇 |
2004年 | 42篇 |
2003年 | 40篇 |
2002年 | 20篇 |
2001年 | 18篇 |
2000年 | 20篇 |
1999年 | 8篇 |
1998年 | 10篇 |
1997年 | 12篇 |
1996年 | 7篇 |
1995年 | 6篇 |
1994年 | 9篇 |
1993年 | 4篇 |
1992年 | 6篇 |
1991年 | 1篇 |
1990年 | 3篇 |
1989年 | 8篇 |
1988年 | 1篇 |
1987年 | 2篇 |
1986年 | 1篇 |
1985年 | 1篇 |
1977年 | 1篇 |
排序方式: 共有703条查询结果,搜索用时 625 毫秒
11.
Anytime algorithms have been proposed for many different applications, e.g., in data mining. Their strengths are the ability
to first provide a result after a very short initialization and second to improve their result with additional time. Therefore,
anytime algorithms have so far been used when the available processing time varies, e.g., on varying data streams. In this
paper we propose to employ anytime algorithms on constant data streams, i.e., for tasks with constant time allowance. We introduce
two approaches that harness the strengths of anytime algorithms on constant data streams and thereby improve the over all
quality of the result with respect to the corresponding budget algorithm. We derive formulas for the expected performance
gain and demonstrate the effectiveness of our novel approaches using existing anytime algorithms on benchmark data sets. 相似文献
12.
13.
In numerous modern stream ciphers, the internal state consists of a large array of pseudo-random words, while the output key-stream is a relatively simple function of the state. It has been heuristically shown in several situations [3], [8], [9], [10], [11] and [14] that this structure may lead to distinguishing attacks on the cipher. In this note we present a more rigorous treatment of this structural attack. First, we present a rigorous proof of the main probabilistic claim behind it in the basic cases. We then apply it concretely to the cipher sn3 [12], and demonstrate that the heuristic assumptions of the attack are remarkably precise in more complicated cases. 相似文献
14.
Prakash Ramanan 《Journal of Computer and System Sciences》2009,75(8):465-485
We consider the XPath evaluation problem: Evaluate an XPath query Q on a streaming XML document D; i.e., determine the set Q(D) of document elements selected by Q. We mainly consider Conjunctive XPath queries that involve only the child and descendant axes. Previously known in-memory algorithms for this problem use O(|D|) space and O(|Q||D|) time. Several previously known algorithms for the streaming version use Ω(dn) space and Ω(dn|D|) time in the worst case; d denotes the depth of D, and n denotes the number of location steps in Q. Their exponential space requirement could well exceed the O(|D|) space used by the in-memory algorithms. We present an efficient algorithm that uses O(d|Q|+nc) space and O((|Q|+dn)|D|) time in the worst case; c denotes the maximum number of elements of D that can be candidates for output, at any one instant. For some worst case Q and D, the memory space used by our algorithm matches our lower bound proved in a different paper; so, our algorithm uses optimal memory space in the worst case. 相似文献
15.
QUAD: A multivariate stream cipher with provable security 总被引:1,自引:0,他引:1
16.
17.
Enterprise Communication Systems are designed in such a way to maximise the efficiency of communication and collaboration within the enterprise. With users becoming mobile, the Internet of Things (IoT) can play a crucial role in this process, but is far from being seamlessly integrated into modern online communications. In this paper, we present a semantic infrastructure for gathering, integrating and reasoning upon heterogeneous, distributed and continuously changing data streams by means of semantic technologies and rule-based inference. Our solution exploits semantics to go beyond today’s ad-hoc integration and processing of heterogeneous data sources for static and streaming data. It provides flexible and efficient processing techniques that can transform low-level data into high-level abstractions and actionable knowledge, bridging the gap between IoT and online Enterprise Communication Systems. We document the technologies used for acquisition and semantic enrichment of sensor data, continuous semantic query processing for integration and filtering, as well as stream reasoning for decision support. Our main contributions are the following, (i) we define and deploy a semantic processing pipeline for IoT-enabled Communication Systems, which builds upon existing systems for semantic data acquisition, continuous query processing and stream reasoning, detailing the implementation of each component of our framework; (ii) we present a rich semantic information model for representing and linking IoT data, social data and personal data in the Enterprise Communication scenario, by reusing and extending existing standard semantic models; (iii) we define and develop an expressive stream reasoning component as part of our framework, based on continuous query processing and non-monotonic reasoning for semantic streams, (iv) we conduct experiments to comparatively evaluate the performance of our data acquisition and semantic annotation layer based on OpenIoT, and the performance of our expressive reasoning layer in the scenario of Enterprise Communication. 相似文献
18.
Chien-Ping Chou Author VitaeKuen-Fang JeaAuthor Vitae Heng-Hsun Liao Author Vitae 《Journal of Systems and Software》2011,84(6):993-1007
Query matching on XML streams is challenging work for querying efficiency when the amount of queried stream data is huge and the data can be streamed in continuously. In this paper, the method Syntactic Twig-Query Matching (STQM) is proposed to process queries on an XML stream and return the query results continuously and immediately. STQM matches twig queries on the XML stream in a syntactic manner by using a lexical analyzer and a parser, both of which are built from our lexical-rules and grammar-rules generators according to the user's queries and document schema, respectively. For query matching, the lexical analyzer scans the incoming XML stream and the parser recognizes XML structures for retrieving every twig-query result from the XML stream. Moreover, STQM obtains query results without a post-phase for excluding false positives, which are common in many streaming query methods. Through the experimental results, we found that STQM matches the twig query efficiently and also has good scalability both in the queried data size and the branch degree of the twig query. The proposed method takes less execution time than that of a sequence-based approach, which is widely accepted as a proper solution to the XML stream query. 相似文献
19.
数据库服务器与WWW之间的一种集成设计 总被引:2,自引:0,他引:2
本文根据WWW用户和数据库用户各自对数据访问的特点不同,提出了一种将数据库服务器与WWW集成的结构。该集成结构中既提供了基于超文本的导航浏览功能访问数据库系统,又支持用户直接利用数据库系统本身的查询界面,快速查询数据对象。 相似文献
20.