全文获取类型
收费全文 | 22595篇 |
免费 | 3298篇 |
国内免费 | 2694篇 |
专业分类
电工技术 | 2010篇 |
技术理论 | 6篇 |
综合类 | 2024篇 |
化学工业 | 394篇 |
金属工艺 | 264篇 |
机械仪表 | 1844篇 |
建筑科学 | 456篇 |
矿业工程 | 277篇 |
能源动力 | 245篇 |
轻工业 | 122篇 |
水利工程 | 216篇 |
石油天然气 | 228篇 |
武器工业 | 154篇 |
无线电 | 3877篇 |
一般工业技术 | 1189篇 |
冶金工业 | 182篇 |
原子能技术 | 133篇 |
自动化技术 | 14966篇 |
出版年
2024年 | 172篇 |
2023年 | 481篇 |
2022年 | 671篇 |
2021年 | 833篇 |
2020年 | 914篇 |
2019年 | 701篇 |
2018年 | 724篇 |
2017年 | 943篇 |
2016年 | 1076篇 |
2015年 | 1292篇 |
2014年 | 1883篇 |
2013年 | 1709篇 |
2012年 | 1989篇 |
2011年 | 1889篇 |
2010年 | 1261篇 |
2009年 | 1275篇 |
2008年 | 1403篇 |
2007年 | 1563篇 |
2006年 | 1224篇 |
2005年 | 1155篇 |
2004年 | 976篇 |
2003年 | 834篇 |
2002年 | 634篇 |
2001年 | 540篇 |
2000年 | 437篇 |
1999年 | 350篇 |
1998年 | 259篇 |
1997年 | 250篇 |
1996年 | 204篇 |
1995年 | 178篇 |
1994年 | 163篇 |
1993年 | 114篇 |
1992年 | 122篇 |
1991年 | 60篇 |
1990年 | 50篇 |
1989年 | 50篇 |
1988年 | 45篇 |
1987年 | 30篇 |
1986年 | 22篇 |
1985年 | 24篇 |
1984年 | 19篇 |
1983年 | 14篇 |
1982年 | 7篇 |
1981年 | 6篇 |
1980年 | 9篇 |
1979年 | 8篇 |
1977年 | 8篇 |
1976年 | 5篇 |
1975年 | 3篇 |
1972年 | 2篇 |
排序方式: 共有10000条查询结果,搜索用时 26 毫秒
101.
Clusters and grids of workstations provide available resources for data mining processes. To exploit these resources, new distributed algorithms are necessary, particularly concerning the way to distribute data and to use this partition. We present a clustering algorithm dubbed Progressive Clustering that provides an “intelligent” distribution of data on grids. The usefulness of this algorithm is shown for several distributed datamining tasks. 相似文献
102.
Precise timing and asynchronous I/O are appealing features for many applications. Unix kernels provide such features on a per‐process basis, using signals to communicate asynchronous events to applications. Per‐process signals and timers are grossly inadequate for complex multithreaded applications that require per‐thread signals and timers that operate at finer granularity. To respond to this need, we present a scheme that integrates asynchronous (Unix) signals with user‐level threads, using the ARIADNE system as a platform. This is done with a view towards support for portable, multithreaded, and multiprotocol distributed applications, namely the CLAM (connectionless, lightweight, and multiway) communications library. In the same context, we propose the use of continuations as an efficient mechanism for reducing thread context‐switching and busy‐wait overheads in multithreaded protocols. Our proposal for integrating timers and signal‐handling mechanisms not only solves problems related to race conditions, but also offers an efficient and flexible interface for timing and signalling threads. Copyright © 2006 John Wiley & Sons, Ltd. 相似文献
103.
并行软件开发环境的研究已日益成为并行计算和并行处理的重点。本文简介了可移植的消息传递环境PVM,讨论了以此为目标的图形监视环境XPVM,阐明XPVM环境与实际需要的PVM并行调试环境之间的差距,并在此基础上探讨了并行调试环境开发中的技术难点及其设计要求。 相似文献
104.
Jean-Christophe Autrique 《Computers & Structures》2007,85(9):518-525
This work is devoted to a study of a conjugated infinite element method for Helmholtz problems in exterior domains. A formulation of this method with Lagrange multipliers defined on (semi-)infinite space is presented and analyzed in a domain decomposition context. The implementation aspects of this method in a parallel industrial acoustic software (SYSNOISE) are described in details. Numerical results show the computational efficiency of this method on acoustic scattering problems. 相似文献
105.
Volker Turau 《Information Processing Letters》2007,103(3):88-93
This paper presents distributed self-stabilizing algorithms for the maximal independent and the minimal dominating set problems. Using an unfair distributed scheduler the algorithms stabilizes in at most max{3n−5,2n} resp. 9n moves. All previously known algorithms required O(n2) moves. 相似文献
106.
The concept of combinatorial objects is formalized. It allows strict definition of a combinatorial optimization problem (COP).
An efficient metaheuristic method to solve COPs (H-method) is considered. It includes stochastic local search algorithms as
a built-in procedure. A parallel implementation of the H-method is set forth and analyzed. The results from a numerical experiment
and solution of some well-known COPs on personal computers and on the SKIT cluster supercomputer are presented.
The study was supported by INTAS (Project 06-1000017-8909).
__________
Translated from Kibernetika i Sistemnyi Analiz, No. 6, pp. 70–79, November–December 2007. 相似文献
107.
A common debugging strategy involves reexecuting a program (on a given input) over and over, each time gaining more information about bugs. Such techniques can fail on message-passing parallel programs. Because of nondeterminacy, different runs on the given input may produce different results. This nonrepeatability is a serious debugging problem, since an execution cannot always be reproduced to track down bugs. This paper presents a technique for tracing and replaying message-passing programs. By tracing the order in which messages are delivered, a reexecution can be forced to deliver messages in their original order, reproducing the original execution. To reduce the overhead of such a scheme, we show that the delivery'order of only messages involved inraces need be traced (and not every message). Our technique makes run-time decisions to detect and trace racing messages and is usuallyoptimal in the sense that the minimal number of racing messages is traced. Experiments indicate that only 1% of the messages are often traced, gaining a reduction of two orders of magnitude over traditional techniques that trace every message. These traces allow an execution to be reproduced any number of times for debugging. Our work is novel in that we adaptively decide what to trace, and trace only those messages that introduce nondeterminacy. With our strategy, large reductions in trace size allow long-running programs to be replayed that were previously unmanageable. In addition, the reduced tracing requirements alleviate tracing bottle-necks, allowing executions to be debugged with substantially lower execution time overhead.This work was supported in part by National Science Foundation grants CCR-8815928 and CCR-9100968, Office of Naval Research grant N00014-89-J-1222, and a grant from Sequent Computer Systems, Inc. 相似文献
108.
In this study, experimental and three-dimensional numerical studies were performed to investigate the effects of plate spacing and temperature difference on natural convection between isothermally heated upward-facing lower horizontal plate and externally insulated horizontal upper plate. Air is used as the heat transfer medium. Rayleigh number varied in the 1108–2.339 × 105 range. Several numerical simulations for three-dimensional steady laminar and turbulent flows heat transfer were carried out using a commercial CFD code Fluent 6.2. Results have shown that there is a good agreement between the numerical and present experimental results as well as with available data in literature. 相似文献
109.
Guang R. Gao 《Parallel Computing》1987,4(3):305-321
A new method of classification for numerical stability of parallel algorithms is proposed based on the theoretical foundation of forward error analysis. It partitions the algorithms according to their asymptotic stability—a measure introduced to relate the limiting behavior of the stability to the size of the problem. Using this method, the stability aspect of the pipelined solution technique for first-order and second-order linear recurrences—the core of a tridiagonal linear equation solver—is studied. In particular, it shows that the pipelined solution method of the first-order linear recurrences has the same degree of stability as the commonly used sequential evaluation algorithms. The stability problems of sequential and pipelined solution methods of the second-order linear recurrences are also studied. 相似文献
110.
A. Chin 《Algorithmica》1994,12(2-3):170-181
Consider the problem of efficiently simulating the shared-memory parallel random access machine (PRAM) model on massively parallel architectures with physically distributed memory. To prevent network congestion and memory bank contention, it may be advantageous to hash the shared memory address space. The decision on whether or not to use hashing depends on (1) the communication latency in the network and (2) the locality of memory accesses in the algorithm.We relate this decision directly to algorithmic issues by studying the complexity of hashing in the Block PRAM model of Aggarwal, Chandra, and Snir, a shared-memory model of parallel computation which accounts for communication locality. For this model, we exhibit a universal family of hash functions having optimal locality. The complexity of applying these hash functions to the shared address space of the Block PRAM (i.e., by permuting data elements) is asymptotically equivalent to the complexity of performing a square matrix transpose, and this result is best possible for all pairwise independent universal hash families. These complexity bounds provide theoretical evidence that hashing and randomized routing need not destroy communication locality, addressing an open question of Valiant.This work was started when the author was a student at Oxford University, supported by a National Science Foundation Graduate Fellowship and a Rhodes Scholarship. Any opinions, findings, conclusions, or recommendations expressed in this publication are those of the author and do not necessarily reflect the views of the National Science Foundation or the Rhodes Trust. 相似文献