全文获取类型
收费全文 | 1174篇 |
免费 | 70篇 |
国内免费 | 49篇 |
专业分类
电工技术 | 10篇 |
综合类 | 132篇 |
化学工业 | 8篇 |
金属工艺 | 14篇 |
机械仪表 | 36篇 |
建筑科学 | 5篇 |
矿业工程 | 2篇 |
能源动力 | 7篇 |
轻工业 | 17篇 |
水利工程 | 1篇 |
石油天然气 | 3篇 |
武器工业 | 5篇 |
无线电 | 74篇 |
一般工业技术 | 70篇 |
冶金工业 | 12篇 |
自动化技术 | 897篇 |
出版年
2024年 | 5篇 |
2023年 | 24篇 |
2022年 | 21篇 |
2021年 | 16篇 |
2020年 | 11篇 |
2019年 | 19篇 |
2018年 | 15篇 |
2017年 | 32篇 |
2016年 | 29篇 |
2015年 | 41篇 |
2014年 | 40篇 |
2013年 | 66篇 |
2012年 | 69篇 |
2011年 | 77篇 |
2010年 | 48篇 |
2009年 | 82篇 |
2008年 | 72篇 |
2007年 | 57篇 |
2006年 | 67篇 |
2005年 | 43篇 |
2004年 | 51篇 |
2003年 | 61篇 |
2002年 | 45篇 |
2001年 | 28篇 |
2000年 | 28篇 |
1999年 | 17篇 |
1998年 | 21篇 |
1997年 | 23篇 |
1996年 | 20篇 |
1995年 | 21篇 |
1994年 | 17篇 |
1993年 | 29篇 |
1992年 | 14篇 |
1991年 | 13篇 |
1990年 | 7篇 |
1989年 | 9篇 |
1988年 | 7篇 |
1987年 | 5篇 |
1984年 | 4篇 |
1983年 | 5篇 |
1982年 | 2篇 |
1981年 | 2篇 |
1980年 | 4篇 |
1979年 | 6篇 |
1978年 | 3篇 |
1977年 | 3篇 |
1976年 | 4篇 |
1975年 | 2篇 |
1974年 | 2篇 |
1973年 | 2篇 |
排序方式: 共有1293条查询结果,搜索用时 15 毫秒
51.
In this paper we provide an explicit way to compute asymptotically almost sure upper bounds on the bisection width of random d-regular graphs, for any value of d. The upper bounds are obtained from the analysis of the performance of a randomized greedy algorithm to find bisections of d-regular graphs. We provide bounds for 5≤d≤12. We also give empirical values of the size of the bisection found by the algorithm for some small values of d and compare them with numerical approximations of our theoretical bounds. Our analysis also gives asymptotic lower bounds for the size of the maximum bisection. 相似文献
52.
53.
We use automata-theoretic approach to analyze properties of Fibonacci words. The directed acyclic subword graph (dawg) is a useful deterministic automaton accepting all suffixes of the word. We show that dawg's of Fibonacci words have particularly simple structure. Our main result is a unifying framework for a large collection of relatively simple properties of Fibonacci words. The simple structure of dawgs of Fibonacci words gives in many cases simplified alternative proofs and new interpretation of several well-known properties of Fibonacci words. In particular, the structure of lengths of paths corresponds to a number-theoretic characterization of occurrences of any subword. Using the structural properties of dawg's it can be easily shown that for a string w we can check if w is a subword of a Fibonacci word in time O(|w|) and O(1) space. Compact dawg's of Fibonacci words show a very regular structure of their suffix trees and show how the suffix tree for the Fibonacci word grows (extending the leaves in a very simple way) into the suffix tree for the next Fibonacci word. 相似文献
54.
Dipen Moitra 《Algorithmica》1991,6(1):624-657
Given a black-and-white image, represented by an array of n × n binary-valued pixels, we wish to cover the black pixels with aminimal set of (possibly overlapping) maximal squares. It was recently shown that obtaining aminimum square cover for a polygonal binary image with holes is NP-hard. We derive an optimal parallel algorithm for theminimal square cover problem, which for any desired computation timeT in [logn,n] runs on an EREW-PRAM with (n/T) processors. The cornerstone of our algorithm is a novel data structure, the cover graph, which compactly represents the covering relationships between the maximal squares of the image. The size of the cover graph is linear in the number of pixels. This algorithm has applications to problems in VLSI mask generation, incremental update of raster displays, and image compression.The research reported here forms part of the author's doctoral dissertion, submitted to Cornell University in May 1989. This work was partially supported by NSF Grant DC1-86-02256, IBM Agreement 12060043, and ONR Contract N00014-83-K-0640. A preliminary version of this paper was presented at the 26th Annual Allerton Conference on Communications, Control, and Computing, Monticello, IL, September 28–30, 1988. 相似文献
55.
对于由k个完全二部图K2,m1,K2,m2,…,K2,mk(其中k,n,m1,m2,…,mk为大于1的正整数)经过不同的粘接方法而得到的链图T1、链图T2、链图T5的优美性进行了研究。在此基础上对由链图T1和长为n的路Pn的一个端点粘接得到的链图T3和链图T2与长为n的路Pn的一个端点粘接得到的链图T4的优美性进行了研究。用构造的方法给出了这几类图的优美标号,得出这些图都是优美图。这样将m1,m2,…,mk的值均为2的范围扩大到大于1的正整数,从而拓宽了优美图及其应用的道路。最后提出了将链图T1、T2、T3、T4、T5分别首尾粘接而得到的一些图是优美图的猜想。 相似文献
56.
57.
《国际计算机数学杂志》2012,89(3-4):207-220
The number of internal stability or independence number of an undirected graph has many important applications. Computationally it belongs to the class of intractable problems known as NP-Hard. In this paper we develop a tree search algorithm to determine the ndependence number of an undirected graph. Extensive computational experience on 2400 randomly generated graphs ranging from 20% to 90% densities and from 50 to 200 vertice has shown that the proposed algorithm is very effective. 相似文献
58.
《国际计算机数学杂志》2012,89(7):1334-1357
We prove that to any partial function ? defined on a finite set, there corresponds an infinite class of graphs that could be generated by a graph grammar such that each graph in the class represents the function in the sense that evaluation of the function at any point x of its domain can be simulated by finding the unique extension of a partial vertex colouring of the graph specified by x. We show that in the proposed setup, generating such simulator graphs as well as finding the colouring extensions can be computed effectively in polynomial time. We also discuss some applications of this scenario in producing instances of the graph colouring problem near its phase transition that can be applied in a cryptographic setting. 相似文献
59.
《国际计算机数学杂志》2012,89(9):1796-1808
In this article, we provide a matrix method in order to compute orbits of parallel and sequential dynamical systems on Boolean functions. In this sense, we develop algorithms for systems defined over directed (and undirected) graphs when the evolution operator is a general minterm or maxterm and, likewise, when it is constituted by independent local Boolean functions, so providing a new tool for the study of orbits of these dynamical systems. 相似文献
60.
Jason J. Jung 《Expert systems with applications》2012,39(3):3169-3173
There have been many kinds of association rule mining (ARM) algorithms, e.g., Apriori and FP-tree, to discover meaningful frequent patterns from a large dataset. Particularly, it is more difficult for such ARM algorithms to be applied for temporal databases which are continuously changing over time. Such algorithms are generally based on repeating time-consuming tasks, e.g., scanning databases. To deal with this problem, in this paper, we propose a constraint graph-based method for maintaining frequent patterns (FP) discovered from the temporal databases. Particularly, the constraint graph, which is represented as a set of constraint between two items, can be established by temporal persistency of the patterns. It means that some patterns can be used to build the constraint graph, when the patterns have been shown in a set of the FP. Two types of constraints can be generated by users and adaptation. Based on our scheme, we find that a large number of dataset has been efficiently reduced during mining process and the gathering information while updating. 相似文献