首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1161篇
  免费   71篇
  国内免费   47篇
电工技术   10篇
综合类   132篇
化学工业   8篇
金属工艺   14篇
机械仪表   36篇
建筑科学   5篇
矿业工程   2篇
能源动力   7篇
轻工业   17篇
水利工程   1篇
石油天然气   3篇
武器工业   5篇
无线电   71篇
一般工业技术   70篇
冶金工业   12篇
自动化技术   886篇
  2024年   3篇
  2023年   21篇
  2022年   19篇
  2021年   16篇
  2020年   11篇
  2019年   18篇
  2018年   14篇
  2017年   30篇
  2016年   27篇
  2015年   41篇
  2014年   39篇
  2013年   66篇
  2012年   69篇
  2011年   77篇
  2010年   48篇
  2009年   82篇
  2008年   72篇
  2007年   57篇
  2006年   67篇
  2005年   43篇
  2004年   51篇
  2003年   61篇
  2002年   45篇
  2001年   28篇
  2000年   28篇
  1999年   17篇
  1998年   21篇
  1997年   23篇
  1996年   20篇
  1995年   21篇
  1994年   17篇
  1993年   29篇
  1992年   14篇
  1991年   13篇
  1990年   7篇
  1989年   9篇
  1988年   7篇
  1987年   5篇
  1984年   4篇
  1983年   5篇
  1982年   2篇
  1981年   2篇
  1980年   4篇
  1979年   6篇
  1978年   3篇
  1977年   3篇
  1976年   4篇
  1975年   2篇
  1974年   2篇
  1973年   2篇
排序方式: 共有1279条查询结果,搜索用时 312 毫秒
71.
In this paper we provide an explicit way to compute asymptotically almost sure upper bounds on the bisection width of random dd-regular graphs, for any value of dd. The upper bounds are obtained from the analysis of the performance of a randomized greedy algorithm to find bisections of dd-regular graphs. We provide bounds for 5≤d≤125d12. We also give empirical values of the size of the bisection found by the algorithm for some small values of dd and compare them with numerical approximations of our theoretical bounds. Our analysis also gives asymptotic lower bounds for the size of the maximum bisection.  相似文献   
72.
73.
We use automata-theoretic approach to analyze properties of Fibonacci words. The directed acyclic subword graph (dawg) is a useful deterministic automaton accepting all suffixes of the word. We show that dawg's of Fibonacci words have particularly simple structure. Our main result is a unifying framework for a large collection of relatively simple properties of Fibonacci words. The simple structure of dawgs of Fibonacci words gives in many cases simplified alternative proofs and new interpretation of several well-known properties of Fibonacci words. In particular, the structure of lengths of paths corresponds to a number-theoretic characterization of occurrences of any subword. Using the structural properties of dawg's it can be easily shown that for a string ww we can check if ww is a subword of a Fibonacci word in time O(|w|)O(|w|) and O(1)O(1) space. Compact dawg's of Fibonacci words show a very regular structure of their suffix trees and show how the suffix tree for the Fibonacci word grows (extending the leaves in a very simple way) into the suffix tree for the next Fibonacci word.  相似文献   
74.
Dipen Moitra 《Algorithmica》1991,6(1):624-657
Given a black-and-white image, represented by an array of n × n binary-valued pixels, we wish to cover the black pixels with aminimal set of (possibly overlapping) maximal squares. It was recently shown that obtaining aminimum square cover for a polygonal binary image with holes is NP-hard. We derive an optimal parallel algorithm for theminimal square cover problem, which for any desired computation timeT in [logn,n] runs on an EREW-PRAM with (n/T) processors. The cornerstone of our algorithm is a novel data structure, the cover graph, which compactly represents the covering relationships between the maximal squares of the image. The size of the cover graph is linear in the number of pixels. This algorithm has applications to problems in VLSI mask generation, incremental update of raster displays, and image compression.The research reported here forms part of the author's doctoral dissertion, submitted to Cornell University in May 1989. This work was partially supported by NSF Grant DC1-86-02256, IBM Agreement 12060043, and ONR Contract N00014-83-K-0640. A preliminary version of this paper was presented at the 26th Annual Allerton Conference on Communications, Control, and Computing, Monticello, IL, September 28–30, 1988.  相似文献   
75.
对于由k个完全二部图K2,m1,K2,m2,…,K2,mk(其中k,n,m1,m2,…,mk为大于1的正整数)经过不同的粘接方法而得到的链图T1、链图T2、链图T5的优美性进行了研究。在此基础上对由链图T1和长为n的路Pn的一个端点粘接得到的链图T3和链图T2与长为n的路Pn的一个端点粘接得到的链图T4的优美性进行了研究。用构造的方法给出了这几类图的优美标号,得出这些图都是优美图。这样将m1,m2,…,mk的值均为2的范围扩大到大于1的正整数,从而拓宽了优美图及其应用的道路。最后提出了将链图T1、T2、T3、T4、T5分别首尾粘接而得到的一些图是优美图的猜想。  相似文献   
76.
77.
《国际计算机数学杂志》2012,89(3-4):207-220
The number of internal stability or independence number of an undirected graph has many important applications. Computationally it belongs to the class of intractable problems known as NP-Hard. In this paper we develop a tree search algorithm to determine the ndependence number of an undirected graph. Extensive computational experience on 2400 randomly generated graphs ranging from 20% to 90% densities and from 50 to 200 vertice has shown that the proposed algorithm is very effective.  相似文献   
78.
《国际计算机数学杂志》2012,89(17):3570-3576
A graph G of size q is odd graceful, if there is an injection φ from V(G) to {0, 1, 2, …, 2q?1} such that, when each edge xy is assigned the label or weight |f(x)?f(y)|, the resulting edge labels are {1, 3, 5, …, 2q?1}. This definition was introduced in 1991 by Gnanajothi [3], who proved that the graphs obtained by joining a single pendant edge to each vertex of C n are odd graceful, if n is even. In this paper, we generalize Gnanajothi's result on cycles by showing that the graphs obtained by joining m pendant edges to each vertex of C n are odd graceful if n is even. We also prove that the subdivision of ladders S(L n ) (the graphs obtained by subdividing every edge of L n exactly once) is odd graceful.  相似文献   
79.
A H-shape is a tree with exactly two of its vertices having maximal degree 3. In this paper, we show that 2≤λ1 (H)<√ 5, where λ1 (H) is the spectral radius of H.  相似文献   
80.
《国际计算机数学杂志》2012,89(7):1334-1357
We prove that to any partial function ? defined on a finite set, there corresponds an infinite class of graphs that could be generated by a graph grammar such that each graph in the class represents the function in the sense that evaluation of the function at any point x of its domain can be simulated by finding the unique extension of a partial vertex colouring of the graph specified by x. We show that in the proposed setup, generating such simulator graphs as well as finding the colouring extensions can be computed effectively in polynomial time. We also discuss some applications of this scenario in producing instances of the graph colouring problem near its phase transition that can be applied in a cryptographic setting.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号