全文获取类型
收费全文 | 247篇 |
免费 | 22篇 |
国内免费 | 20篇 |
专业分类
电工技术 | 4篇 |
综合类 | 17篇 |
化学工业 | 45篇 |
金属工艺 | 1篇 |
机械仪表 | 3篇 |
建筑科学 | 2篇 |
矿业工程 | 1篇 |
能源动力 | 2篇 |
轻工业 | 72篇 |
水利工程 | 1篇 |
石油天然气 | 3篇 |
无线电 | 22篇 |
一般工业技术 | 9篇 |
冶金工业 | 12篇 |
原子能技术 | 4篇 |
自动化技术 | 91篇 |
出版年
2024年 | 2篇 |
2023年 | 4篇 |
2022年 | 18篇 |
2021年 | 16篇 |
2020年 | 7篇 |
2019年 | 8篇 |
2018年 | 11篇 |
2017年 | 5篇 |
2016年 | 9篇 |
2015年 | 9篇 |
2014年 | 19篇 |
2013年 | 13篇 |
2012年 | 16篇 |
2011年 | 21篇 |
2010年 | 7篇 |
2009年 | 7篇 |
2008年 | 23篇 |
2007年 | 11篇 |
2006年 | 11篇 |
2005年 | 13篇 |
2004年 | 5篇 |
2003年 | 6篇 |
2002年 | 5篇 |
2001年 | 4篇 |
2000年 | 3篇 |
1999年 | 3篇 |
1998年 | 4篇 |
1997年 | 5篇 |
1996年 | 5篇 |
1995年 | 1篇 |
1994年 | 1篇 |
1993年 | 1篇 |
1992年 | 2篇 |
1991年 | 2篇 |
1990年 | 1篇 |
1988年 | 1篇 |
1987年 | 1篇 |
1986年 | 1篇 |
1982年 | 1篇 |
1981年 | 3篇 |
1978年 | 3篇 |
1975年 | 1篇 |
排序方式: 共有289条查询结果,搜索用时 31 毫秒
101.
102.
数据确定性删除是云存储安全的研究热点。目前云存储中分散式的数据确定性删除方案在密钥分量存储时没有考虑DHT((Distributed Hash Table)节点可信性,使得用户在授权时间内也存在无法访问自己敏感数据的问题。为此提出了一种基于信任值的云存储数据确定性删除方案,该方案的核心是对DHT节点进行可信度评价,密钥分量的存储选择可信度较高的节点。与已有的确定性删除方案相比,该方案仍然是利用DHT网络的动态特性实现密钥的定期删除,使得用户敏感数据能够在特定的一段时间之后自动销毁。不同的是,该方案在将密钥分量分发到DHT网络中时倾向于选择可信度高的节点进行交互,使得在密钥的过期时间戳之前从DHT网络中得到足够多的密钥分量来恢复出密钥的可能性大大提高,降低了用户在授权时间内无法访问自己敏感数据的概率。实验结果表明,该方案不仅可以有效地抑制恶意节点,还可以提高密钥分量提取成功率,从而增加用户在授权时间内访问自己敏感数据的成功率。 相似文献
103.
104.
We recall that optimal condensing of nearest neighbor data requires the construction of the Delaunay triangulation of the training set. We argue that, from the viewpoint of computational complexity, an iterative approach using a dynamic triangulation is most desirable. We describe two algorithms, Insert and Delete, which permit to maintain a dynamic Delaunay triangulation. 相似文献
105.
海洋地震资料预处理,两大难题就是噪音和多次波。常规的近道多次波压制有预测反褶积和SRME,中远道多次波压制有速度滤波等方法。然而在深水崎岖海底资料中,对于侧面反射、绕射多次波等等,常规的多次波压制方法往往失效,原因在于常规的多次波压制方法的理论多假设地震波是以二维双曲线方式传播,实际上地下地震波传播路径复杂,常规去多次方法有局限。另外对于噪音的压制,技术人员往往是头痛医头脚痛医脚,对不同的噪音采用不同的模块进行压制,即增加了处理步骤,也增加了损伤有效波的风险。本文研究了一种利用剔除拟合法并结合LIFT思想进行深水多次波和噪音压制技术,一次处理流程可以同时压制多种噪音和多种多次波,取得了良好的效果。 相似文献
106.
Given a graph, we define a base set to be a set of integers of size equal to the number of vertices in the graph. Given a graph and a base set, a labeling of the graph from the base set is an assignment of distinct integers from the base set to the vertices of the graph. The gap of an edge in a labeled graph is the absolute value of the difference between the labels of its endpoints. The gap of a labeled graph is the sum of the gaps of its edges.The maximum gap graph labeling problem takes as input a graph and a base set and maximizes the gap of the graph over all possible labelings from the base set. We show that this problem is NP-complete even when the base set is restricted to consecutive integers. We also show that this restricted case has polynomial time approximations that achieve a factor of 2/3 for trees, of 1/2 for bipartite graphs, and of 1/4 for general graphs, with a deterministic algorithm, while an expected factor of 1/3 for general graphs is achieved with a randomized algorithm. The case of general base sets is approximated within an expected factor of 1/16 for general graphs with a randomized polynomial time algorithm. We finally give a polynomial time algorithm that solves the maximum gap graph labeling problem for a graph that has bounded degree and bounded treewidth. The maximum graph labeling problem shows connections with the graceful tree conjecture. 相似文献
107.
The problem of missing data in building multidimensional composite indicators is a delicate problem which is often underrated. An imputation method particularly suitable for categorical data is proposed. This method is discussed in detail in the framework of nonlinear principal component analysis and compared to other missing data treatments which are commonly used in this analysis. Its performance vs. these other methods is evaluated throughout a simulation procedure performed on both an artificial case, varying the experimental conditions, and a real case. The proposed procedure is implemented using R1. 相似文献
108.
随着分布式计算的发展,分布式计算环境中的安全性问题变得越来越突出。基于RSA算法的分布式认证和分布式数据加密等安全性机制也取得了长足的发展。不过,这些机制中大部分是基于传统密码协议中参与者类型的假设:半诚实或恶意的。本文从假设参与者是理性的这一视角出发,设计了基于RSA欧拉函数秘密分享的RSA私钥的分布式计算协议。协议中所有的参与者均是理性的,他们以自我利益为驱动。所有的参与者均采取遵守协议的执行这一策略形成了纳什均衡,并且该策略是不能严格劣势剔除的。 相似文献
109.
Velo-cardio-facial syndrome (VCFS) is a neurogenetic disorder associated with very high risk for developing schizophrenia. More than half of affected individuals experience transient psychotic symptoms during childhood and a third may develop schizophrenia. Memory regulation deficits disturbing both the encoding and retrieval stages of memory represent core deficits in the cognitive profile associated with schizophrenia. In this study, the authors investigate memory regulation processes in 33 individuals with VCFS along with 33 age- and sex-matched control participants. By using a directed forgetting paradigm and a continuous recognition paradigm, the authors examined selective encoding and suppression of irrelevant contents during retrieval in VCFS. Group comparison analyses revealed comparable performances on selective encoding and recognition accuracy between the VCFS group and control group. However, individuals with VCFS were more likely to make false recognitions and showed deficits in the suppression of irrelevant contents. Results suggest that trait-like deficits of memory regulation in VCFS can be observed during the retrieval stage, while selective encoding remains efficient. Memory regulation processes during retrieval may constitute a trait deficit in the memory profile of individuals with VCFS and may contribute to the cognitive deficits underlying an increased risk for developing schizophrenia in this population. (PsycINFO Database Record (c) 2010 APA, all rights reserved) 相似文献
110.
Z.?A.?Al-KhanjariEmail author M.?R.?Woodward Haider?Ali?Ramadhan N.?S.?Kutti 《Software Quality Journal》2005,13(2):129-153
In software testing, developing effective debugging strategies is important to guarantee the reliability of software under
testing. A heuristic technique is to cause failure and therefore expose faults. Based on this approach mutation testing has
been found very useful technique in detecting faults. However, it suffers from two problems with successfully testing programs:
(1) requires extensive computing resources and (2) puts heavy demand on human resources. Later, empirical observations suggest
that critical slicing based on Statement Deletion (Sdl) mutation operator has been found the most effective technique in reducing
effort and the required computing resources in locating the program faults. The second problem of mutation testing may be
solved by automating the program testing with the help of software tools. Our study focuses on determining the effectiveness
of the critical slicing technique with the help of the Mothra Mutation Testing System in detecting program faults. This paper
presents the results showing the performance of Mothra Mutation Testing System through conducting critical slicing testing
on a selected suite of programs.
Zuhoor Abdullah Al-Khanjari is an assistant professor in the Computer Science Department at Sultan Qaboos University, Sultanate of Oman. She received
her BSc in mathematics and computing from Sultan Qaboos University, MSc and PhD in Computer Science (Software Engineering)
from the University of Liverpool, UK. Her research interests include software testing, database management, e-learning, human-computer
interaction, programming languages, intelligent search engines, and web data mining and development. ~Currently, she is the
coordinator of the software engineering research group in the Department of Computer Science, College of Science, Sultan Qaboos
University. She is also coordinating a program to develop e-learning based undergraduate teaching in the Department of Computer
Science. Currently she is holding the position of assistant dean for postgraduate studies and research in the College of Science,
Sultan Qaboos University, Sultanate of Oman.
Martin Woodward is a Senior Fellow in the Computer Science Department at the University of Liverpool in the UK. After obtaining BSc and Ph.D.
degrees in mathematics from the University of Nottingham, he was employed by the University of Oxford as a Research Assistant
on secondment to the UK Atomic Energy Authority at the Culham Laboratory. He has been at the University of Liverpool for many
years and initially worked on the so-called ‘Testbed’ project, helping to develop automated tools for software testing which
are now marketed successfully by a commercial organisation. His research interests include software testing techniques, the
relationship between formal methods and testing, and software visualisation. He has served as Editor of the journal ‘Software
Testing, Verification and Reliability’ for the past thirteen years.
Haider Ramadhan is an associate professor in the Computer Science Department at Sultan Qaboos University. He received his BS and MS in Computer
Science from University of North Carolina, and the PhD in Computer Science and AI from Sussex University. His research interests
include visualization of software, systems, and process, system engineering, human-computer interaction, intelligent search
engines, and Web data mining and development. Currently, he is the chairman of the Computer Science Department, College of
Science, Sultan Qaboos University, Sultanate of Oman.
Swamy Kutti
(N. S. Kutti) is an associate professor in the Computer Science Department at Sultan Qaboos University. He received his B.E. in Electronics
Engineering from the University of Madras, M.E. in Communication Engineering from Indian Institute of Science (Bangalore),
and the MSc in Computer Science from Monash University (Australia) and PhD in Computer Science from Deakin University (Australia).
His research interests include Real-Time Programming, Programming Languages, Program Testing and Verification, eLearning,
and Distributed Operating Systems. 相似文献