全文获取类型
收费全文 | 4439篇 |
免费 | 704篇 |
国内免费 | 506篇 |
专业分类
电工技术 | 446篇 |
综合类 | 277篇 |
化学工业 | 106篇 |
金属工艺 | 84篇 |
机械仪表 | 312篇 |
建筑科学 | 193篇 |
矿业工程 | 80篇 |
能源动力 | 83篇 |
轻工业 | 82篇 |
水利工程 | 123篇 |
石油天然气 | 80篇 |
武器工业 | 53篇 |
无线电 | 599篇 |
一般工业技术 | 409篇 |
冶金工业 | 80篇 |
原子能技术 | 101篇 |
自动化技术 | 2541篇 |
出版年
2024年 | 39篇 |
2023年 | 91篇 |
2022年 | 189篇 |
2021年 | 185篇 |
2020年 | 205篇 |
2019年 | 146篇 |
2018年 | 144篇 |
2017年 | 166篇 |
2016年 | 211篇 |
2015年 | 209篇 |
2014年 | 318篇 |
2013年 | 287篇 |
2012年 | 345篇 |
2011年 | 329篇 |
2010年 | 273篇 |
2009年 | 262篇 |
2008年 | 285篇 |
2007年 | 323篇 |
2006年 | 270篇 |
2005年 | 273篇 |
2004年 | 187篇 |
2003年 | 161篇 |
2002年 | 138篇 |
2001年 | 89篇 |
2000年 | 94篇 |
1999年 | 81篇 |
1998年 | 51篇 |
1997年 | 43篇 |
1996年 | 39篇 |
1995年 | 44篇 |
1994年 | 30篇 |
1993年 | 30篇 |
1992年 | 27篇 |
1991年 | 16篇 |
1990年 | 12篇 |
1989年 | 18篇 |
1988年 | 7篇 |
1987年 | 1篇 |
1986年 | 2篇 |
1985年 | 5篇 |
1984年 | 4篇 |
1983年 | 3篇 |
1982年 | 2篇 |
1980年 | 5篇 |
1979年 | 5篇 |
1975年 | 2篇 |
1963年 | 1篇 |
1961年 | 1篇 |
1951年 | 1篇 |
排序方式: 共有5649条查询结果,搜索用时 15 毫秒
81.
Jean-François Monin 《Formal Methods in System Design》2000,17(3):221-243
Conformance control for ATM cells is based on a real-time reactive algorithm which delivers a value depending on inputs from the network. This value must always fit with a well defined theoretical value. We present here the correctness proof of the algorithm standardized for the ATM transfer capability called ABR. The proof turned out to produce a key argument during the standardization process of ABR. 相似文献
82.
Nikolaj S. Bjørner Anca Browne Michael A. Colón Bernd Finkbeiner Zohar Manna Henny B. Sipma Tomás E. Uribe 《Formal Methods in System Design》2000,16(3):227-270
We review a number of formal verification techniques supported by STeP, the Stanford Temporal Prover, describing how the tool can be used to verify properties of several versions of the Bakery Mutual exclusion algorithm for mutual exclusion. We verify the classic two-process algorithm and simple variants, as well as an atomic parameterized version. The methods used include deductive verification rules, verification diagrams, automatic invariant generation, and finite-state model checking and abstraction. 相似文献
83.
84.
Doron Drusinsky James Bret Michael Man-Tak Shing 《Innovations in Systems and Software Engineering》2008,4(2):161-168
This paper presents a framework for augmenting independent validation and verification (IV&V) of software systems with computer-based
IV&V techniques. The framework allows an IV&V team to capture its own understanding of the application as well as the expected
behavior of any proposed system for solving the underlying problem by using an executable system reference model, which uses formal assertions to specify mission- and safety-critical behaviors. The framework uses execution-based model
checking to validate the correctness of the assertions and to verify the correctness and adequacy of the system under test. 相似文献
85.
A Comparison of Free BDDs and Transformed BDDs 总被引:2,自引:0,他引:2
Ordered binary decision diagrams (OBDDs) introduced by Bryant (IEEE Trans. on Computers, Vol. 35, pp. 677–691, 1986) have found a lot of applications in verification and CAD. Their use is limited if the OBDD size of the considered functions is too large. Therefore, a variety of generalized BDD models has been presented, among them FBDDs (free BDDs) and TBDDs (transformed BDDs). Here the quite tight relations between these models are revealed and their advantages and disadvantages are discussed. 相似文献
86.
Bounded Model Checking Using Satisfiability Solving 总被引:10,自引:1,他引:9
Edmund Clarke Armin Biere Richard Raimi Yunshan Zhu 《Formal Methods in System Design》2001,19(1):7-34
The phrase model checking refers to algorithms for exploring the state space of a transition system to determine if it obeys a specification of its intended behavior. These algorithms can perform exhaustive verification in a highly automatic manner, and, thus, have attracted much interest in industry. Model checking programs are now being commercially marketed. However, model checking has been held back by the state explosion problem, which is the problem that the number of states in a system grows exponentially in the number of system components. Much research has been devoted to ameliorating this problem.In this tutorial, we first give a brief overview of the history of model checking to date, and then focus on recent techniques that combine model checking with satisfiability solving. These techniques, known as bounded model checking, do a very fast exploration of the state space, and for some types of problems seem to offer large performance improvements over previous approaches. We review experiments with bounded model checking on both public domain and industrial designs, and propose a methodology for applying the technique in industry for invariance checking. We then summarize the pros and cons of this new technology and discuss future research efforts to extend its capabilities. 相似文献
87.
Real-time systems are becoming increasingly widespread, often in safety-critical applications. It is therefore crucial that these systems be correct; however, there are few automated tools for analyzing concurrency and timing properties of these systems. The PARTS toolset uses a Petri-net-based reachability analysis to analyze program specifications written in an Ada-83 subset. Our simple time Petri nets are specifically aimed at facilitating real-time analysis. In order to control the state-explosion problem, PARTS employs several optimization techniques aimed at state-space reduction. In this paper we discuss our approach and we report on extensive experiments with several examples of real-time specifications based on Ada 83. When possible, we also compare our experimental results with results obtained by other approaches to real-time analysis. 相似文献
88.
In this paper I describe how confidence in a software inspection can be obtained through calculating an estimate of its effectiveness. The method uses a Bayesian Belief Network to model the software inspection process and calculates the inference on how effective a particular inspection was. This technique was selected as it provides a means of initialising the model with inspectors' experience and has the ability to learn and optimise performance. This technique provides answers to some of the questions and limitations raised by current models used to predict inspection effectiveness. The application of the model to a major software project is discussed, covering the initial practitioner survey, model initialisation, model calibration and verification results obtained. 相似文献
89.
To determine the maximum separation between events for nonrepetitive systems with max and linear constraints, there are the
“iterative tightening from above” (ITA) approach and the “iterative tightening from below” (ITB) approach. Since such systems
can be formulated as systems constrained by min–max inequalities, this paper gives an algorithm named MMIMaxSep for solving min–max inequalities. The algorithm is a generalization and a mathematically elegant reformulation of Yen et
al.’s MaxSeparation algorithm which uses the ITB approach. Our numerical experiments indicate that MMIMaxSep is very efficient. Moreover, MMIMaxSep has a unique advantage of being able to directly handle tree-represented min–max functions, and its complexity is closely
related to the complexity of computing cycle time of min–max functions.
相似文献
Yiping ChengEmail: |
90.