全文获取类型
收费全文 | 450篇 |
免费 | 16篇 |
国内免费 | 16篇 |
专业分类
电工技术 | 3篇 |
综合类 | 6篇 |
化学工业 | 5篇 |
金属工艺 | 20篇 |
机械仪表 | 33篇 |
建筑科学 | 31篇 |
矿业工程 | 3篇 |
能源动力 | 3篇 |
轻工业 | 7篇 |
水利工程 | 5篇 |
石油天然气 | 12篇 |
武器工业 | 1篇 |
无线电 | 28篇 |
一般工业技术 | 17篇 |
冶金工业 | 7篇 |
原子能技术 | 1篇 |
自动化技术 | 300篇 |
出版年
2023年 | 1篇 |
2022年 | 1篇 |
2021年 | 2篇 |
2020年 | 1篇 |
2019年 | 3篇 |
2017年 | 3篇 |
2016年 | 4篇 |
2015年 | 6篇 |
2014年 | 18篇 |
2013年 | 11篇 |
2012年 | 23篇 |
2011年 | 23篇 |
2010年 | 17篇 |
2009年 | 32篇 |
2008年 | 34篇 |
2007年 | 28篇 |
2006年 | 35篇 |
2005年 | 27篇 |
2004年 | 23篇 |
2003年 | 19篇 |
2002年 | 24篇 |
2001年 | 12篇 |
2000年 | 20篇 |
1999年 | 16篇 |
1998年 | 16篇 |
1997年 | 14篇 |
1996年 | 7篇 |
1995年 | 7篇 |
1994年 | 14篇 |
1993年 | 9篇 |
1992年 | 13篇 |
1991年 | 2篇 |
1990年 | 1篇 |
1989年 | 2篇 |
1988年 | 4篇 |
1987年 | 1篇 |
1986年 | 2篇 |
1985年 | 2篇 |
1984年 | 2篇 |
1983年 | 1篇 |
1981年 | 1篇 |
1980年 | 1篇 |
排序方式: 共有482条查询结果,搜索用时 15 毫秒
11.
Carroll Morgan 《Science of Computer Programming》2009,74(8):629-653
Stepwise refinement is a crucial conceptual tool for system development, encouraging program construction via a number of separate correctness-preserving stages which ideally can be understood in isolation. A crucial conceptual component of security is an adversary’s ignorance of concealed information. We suggest a novel method of combining these two ideas.Our suggestion is based on a mathematical definition of “ignorance-preserving” refinement that extends classical refinement by limiting an adversary’s access to concealed information: moving from specification to implementation should never increase that access. The novelty is the way we achieve this in the context of sequential programs.Specifically we give an operational model (and detailed justification for it), a basic sequential programming language and its operational semantics in that model, a “logic of ignorance” interpreted over the same model, then a program-logical semantics bringing those together — and finally we use the logic to establish, via refinement, the correctness of a real (though small) protocol: Rivest’s Oblivious Transfer. A previous report? treated Chaum’s Dining Cryptographers similarly.In passing we solve the Refinement Paradox for sequential programs. 相似文献
12.
13.
Fault based testing aims at detecting hypothesized faults based on specifications or program source. There are some fault
based techniques for testing Boolean expressions which are commonly used to model conditions in specifications as well as
logical decisions in program source. The MUMCUT strategy has been proposed to generate test cases from Boolean expressions.
Moreover, it detects eight common types of hypothesized faults provided that the original expression is in irredundant disjunctive
normal form, IDNF. Software practitioners are more likely to write the conditions and logical decisions in general form rather
than IDNF. Hence, it is interesting to investigate the fault detecting capability of the MUMCUT strategy with respect to general
form Boolean expressions. In this article, we perform empirical studies to investigate the fault detection capability of the
MUMCUT strategy with respect to general form Boolean expressions as well as mutated expressions. A mutated expression can
be obtained from the original given Boolean expression by making a syntactic change based on a particular type of fault.
T. Y. Chen obtained his BSc and MPhil from the University of Hong Kong, MSc and DIC from the Imperial College of Science and Technology, PhD from the University of Melbourne. He is currently a Professor of Software Engineering at the Swinburne University of Technology. Prior to joining Swinburne, he has taught at the University of Hong Kong and the University of Melbourne. His research interests include software testing, debugging, maintenance, and validation of requirements. M. F. Lau received the Ph.D. degree in Software Engineering from the University of Melbourne, Australia. He is currently a Senior Lecturer in the Faculty of Information and Communication Technologies, Swinburne University of Technology, Australia. His research publications have appeared in various scholarly journals, including ACM Transactions on Software Engineering and Methodology, The Journal of Systems and Software, The Computer Journal, Software Testing, Verification and Reliability, Information and Software Technology, Information Sciences, and Information Processing Letters. His research interests include software testing, software quality, software specification and computers in education. K. Y. Sim received his Bachelor of Engineering in Electrical, Electronics and Systems from the National University of Malaysia in 1999 and the Master of Computer Science from the University of Malaya, Malaysia in 2001. Currently, he is a Senior Lecturer in the School of Engineering, Swinburne University of Technology, Sarawak Campus, Malaysia. His current research interests include software testing and information security. C. A. Sun received the PhD degree in Computer Software and Theory in 2002 from Beijing University of Aeronautics and Astronautics, China; the bachelor degree in Computer and Its application in 1997 from University of Science and Technology Beijing, China. He is currently an Assistant Professor in the School of Computer and Information Technology, Beijing Jiaotong University, China. His research areas are software testing, software architecture and service-oriented computing. He has published about 40 referred papers in the above areas. He is an IEEE member. 相似文献
M. F. LauEmail: |
T. Y. Chen obtained his BSc and MPhil from the University of Hong Kong, MSc and DIC from the Imperial College of Science and Technology, PhD from the University of Melbourne. He is currently a Professor of Software Engineering at the Swinburne University of Technology. Prior to joining Swinburne, he has taught at the University of Hong Kong and the University of Melbourne. His research interests include software testing, debugging, maintenance, and validation of requirements. M. F. Lau received the Ph.D. degree in Software Engineering from the University of Melbourne, Australia. He is currently a Senior Lecturer in the Faculty of Information and Communication Technologies, Swinburne University of Technology, Australia. His research publications have appeared in various scholarly journals, including ACM Transactions on Software Engineering and Methodology, The Journal of Systems and Software, The Computer Journal, Software Testing, Verification and Reliability, Information and Software Technology, Information Sciences, and Information Processing Letters. His research interests include software testing, software quality, software specification and computers in education. K. Y. Sim received his Bachelor of Engineering in Electrical, Electronics and Systems from the National University of Malaysia in 1999 and the Master of Computer Science from the University of Malaya, Malaysia in 2001. Currently, he is a Senior Lecturer in the School of Engineering, Swinburne University of Technology, Sarawak Campus, Malaysia. His current research interests include software testing and information security. C. A. Sun received the PhD degree in Computer Software and Theory in 2002 from Beijing University of Aeronautics and Astronautics, China; the bachelor degree in Computer and Its application in 1997 from University of Science and Technology Beijing, China. He is currently an Assistant Professor in the School of Computer and Information Technology, Beijing Jiaotong University, China. His research areas are software testing, software architecture and service-oriented computing. He has published about 40 referred papers in the above areas. He is an IEEE member. 相似文献
14.
15.
In this paper we give a formal definition of the requirements translation language Behavior Trees. This language has been used with success in industry to systematically translate large, complex, and often erroneous requirements documents into a structured model of the system. It contains a mixture of state-based manipulations, synchronisation, message passing, and parallel, conditional, and iterative control structures. The formal semantics of a Behavior Tree is given via a translation to a version of Hoare’s process algebra CSP, extended with state-based constructs such as guards and updates, and a message passing facility similar to that used in publish/subscribe protocols. We first provide the extension of CSP and its operational semantics, which preserves the meaning of the original CSP operators, and then the Behavior Tree notation and its translation into the extended version of CSP. 相似文献
16.
PV查斯坦福机构开发的强大的规约。验证系统,它的适用领域广泛,在概要介绍PVS的构成。功能后,着重分析了PVS的规约语言,验证系统的特点,以及使得PVS灵活,强大的设计决策和内在机制。 相似文献
17.
The paper addresses a notion of configuring systems, constructing them from specified component parts with specified sharing.
This notion is independent of any underlying specification language and has been abstractly identified with the taking of
colimits in category theory. Mathematically it is known that these can be expressed by presheaves and the present paper applies
this idea to configuration.
We interpret the category theory informally as follows. Suppose ? is a category whose objects are interpreted as specifications,
and for which each morphism u : X→Y is interpreted as contravariant ‘instance reduction’, reducing instances of specification Y to instances of X. Then a presheaf P: Set ?op represents a collection of instances that is closed under reduction. We develop an algebraic account of presheaves in which
we present configurations by generators (for components) and relations (for shared reducts), and we outline a proposed configuration
language based on the techniques. Oriat uses diagrams to express colimits of specifications, and we show that Oriat's category
Diag(?) of finite diagrams is equivalent to the category of finitely presented presheaves over ?.
Received May 1998 / Accepted in revised form August 2000 相似文献
18.
Assessing the quality of use case descriptions 总被引:1,自引:0,他引:1
19.
H. Courteney 《Cognition, Technology & Work》2000,2(3):142-153
Cognitive engineering has developed enormously over the last fifteen years. Yet, despite many excellent research projects
and publications, its full potential has not been embraced into mainstream system design. This paper will examine the reasons
for this failure and argue that the problem is not simply inertia or lack of education. There are strong organisational influences
that cause resistance to this particular approach. The discipline itself has characteristics that make it fragile in the modern
corporate structure. In addition, the cognitive engineers themselves are not blameless in the equation. They appear to have
done exactly what they criticise the engineering community for doing: they have packaged their product in a manner that is
not ‘user friendly’ to its target population, not structured to suit its application, and not output in the format required.
Suggestions will be made to rectify the situation: a list of actions is proposed for practising cognitive engineers to make
their product more likely to enjoy widespread uptake. 相似文献
20.
目前,OPC技术在过程控制系统中获得了广泛的应用,但OPC技术以Microsoft公司的OLE/COM技术为基础,应用基本上仍然局限在Windows系统平台,而目前企业级的上层应用系统大多采用的是J2EE体系结构,如何在J2EE体系结构下应用OPC技术这将是本文要讨论的问题。本文探讨了Java与OPC相结合的技术,并构建了一种基于OPC和Java技术的分布式远程监控系统。这种系统具有良好的开放性、可扩展性和平台无关性特点。 相似文献