首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   3258篇
  免费   144篇
  国内免费   137篇
电工技术   64篇
综合类   165篇
化学工业   178篇
金属工艺   43篇
机械仪表   146篇
建筑科学   272篇
矿业工程   293篇
能源动力   162篇
轻工业   77篇
水利工程   50篇
石油天然气   147篇
武器工业   6篇
无线电   306篇
一般工业技术   92篇
冶金工业   132篇
原子能技术   6篇
自动化技术   1400篇
  2024年   6篇
  2023年   19篇
  2022年   48篇
  2021年   62篇
  2020年   57篇
  2019年   48篇
  2018年   59篇
  2017年   68篇
  2016年   85篇
  2015年   116篇
  2014年   196篇
  2013年   189篇
  2012年   176篇
  2011年   246篇
  2010年   161篇
  2009年   203篇
  2008年   197篇
  2007年   249篇
  2006年   253篇
  2005年   232篇
  2004年   151篇
  2003年   159篇
  2002年   96篇
  2001年   80篇
  2000年   80篇
  1999年   51篇
  1998年   55篇
  1997年   43篇
  1996年   21篇
  1995年   26篇
  1994年   18篇
  1993年   10篇
  1992年   14篇
  1991年   5篇
  1990年   6篇
  1989年   5篇
  1988年   7篇
  1987年   2篇
  1986年   3篇
  1985年   4篇
  1984年   8篇
  1983年   3篇
  1982年   3篇
  1981年   3篇
  1980年   2篇
  1978年   3篇
  1977年   4篇
  1976年   4篇
  1975年   1篇
  1974年   1篇
排序方式: 共有3539条查询结果,搜索用时 15 毫秒
71.
We consider a single machine scheduling problem with resource dependent release times that can be controlled by a non-increasing convex resource consumption function. The objective is to minimize the weighted total resource consumption and sum of job completion times with an initial release time greater than the total processing times. It is known that the problem is polynomially solvable in O(n4) with n the number of jobs.  相似文献   
72.
Online algorithms for advance resource reservations   总被引:2,自引:0,他引:2  
We consider the problem of providing QoS guarantees to Grid users through advance reservation of resources. Advance reservation mechanisms provide the ability to allocate resources to users based on agreed-upon QoS requirements and increase the predictability of a Grid system, yet incorporating such mechanisms into current Grid environments has proven to be a challenging task due to the resulting resource fragmentation. We use concepts from computational geometry to present a framework for tackling the resource fragmentation, and for formulating a suite of scheduling strategies. We also develop efficient implementations of the scheduling algorithms that scale to large Grids. We conduct a comprehensive performance evaluation study using simulation, and we present numerical results to demonstrate that our strategies perform well across several metrics that reflect both user- and system-specific goals. Our main contribution is a timely, practical, and efficient solution to the problem of scheduling resources in emerging on-demand computing environments.  相似文献   
73.
74.
A trust degree based access control in grid environments   总被引:1,自引:0,他引:1  
The purpose of grid computing is to enable coordinated resource sharing and support cooperative work between different domains in dynamic grid environments. In order to protect each participant’s privilege and security, a secure and efficient access control is essential. This paper presents a new approach of access mechanism based on trust relationships across domains. A new calculation method of trust in grid is proposed and the difference between intro-domain trust and inter-domain trust is analyzed. In addition, a novel access control framework combined with trust degree is given from this proposal. It is shown to be adaptive for both intro-domain and inter-domain conditions. Hence, a prototype system based on the proposed model is introduced; furthermore, it has been shown as a dynamic and fine-granularity access control method through performance analyses and has also been demonstrated as a suitable system for grid environments.  相似文献   
75.
The resource management is the central component of grid system. The analysis of the workload log file of LCG including the job arrival and the resource utilization daily cycle shows that the idle sites in the Grid are the source of load imbalance and energy waste. Here we focus on these two issues: balancing the workload by transferring jobs to idle sites at prime time to minimize the response time and maximize the resource utilization; power management by switch the idle sites to sleeping mode at non-prime time to minimize the energy consume. We form the M/G/1 queue model with server vacations, startup and closedown to analysis the performance metrics to instruct the design of load-balancing and energy-saving policies. We provide our Adaptive Receiver Initiated (ARI) load-balancing strategy and power-management policy for energy-saving. The simulation experiments prove the accuracy of our analysis and the comparisons results indicate our policies are largely suitable for large-scale heterogeneous grid environment.  相似文献   
76.
A Web server, when overloaded, shows a severe degradation of goodput initially, with the eventual settling of goodput as load increases further. Traditional performance models have failed to capture this behavior. In this paper, we propose an analytical model, which is a two-stage and layered queuing model of the Web server, which is able to reproduce this behavior. We do this by explicitly modelling the overhead processing, the user abandonment and retry behavior, and the contention for resources, for the FIFO and LIFO queuing disciplines. We show that LIFO provides better goodput in most overload situations. We compare our model predictions with experimental results from a test bed and find that our results match well with measurements.  相似文献   
77.
Probabilistic model checking for the quantification of DoS security threats   总被引:1,自引:0,他引:1  
Secure authentication features of communication and electronic commerce protocols involve computationally expensive and memory intensive cryptographic operations that have the potential to be turned into denial-of-service (DoS) exploits. Recent proposals attempt to improve DoS resistance by implementing a trade-off between the resources required for the potential victim(s) with the resources used by a prospective attacker. Such improvements have been proposed for the Internet Key Exchange (IKE), the Just Fast Keying (JFK) key agreement protocol and the Secure Sockets Layer (SSL/TLS) protocol. In present article, we introduce probabilistic model checking as an efficient tool-assisted approach for systematically quantifying DoS security threats. We model a security protocol with a fixed network topology using probabilistic specifications for the protocol participants. We attach into the protocol model, a probabilistic attacker model which performs DoS related actions with assigned cost values. The costs for the protocol participants and the attacker reflect the level of some resource expenditure (memory, processing capacity or communication bandwidth) for the associated actions. From the developed model we obtain a Discrete Time Markov Chain (DTMC) via property preserving discrete-time semantics. The DTMC model is verified using the PRISM model checker that produces probabilistic estimates for the analyzed DoS threat. In this way, it is possible to evaluate the level of resource expenditure for the attacker, beyond which the likelihood of widespread attack is reduced and subsequently to compare alternative design considerations for optimal resistance to the analyzed DoS threat. Our approach is validated through the analysis of the Host Identity Protocol (HIP). The HIP base-exchange is seen as a cryptographic key-exchange protocol with special features related to DoS protection. We analyze a serious DoS threat, for which we provide probabilistic estimates, as well as results for the associated attacker and participants' costs.  相似文献   
78.
In this paper, we present a novel resource brokering service for grid systems which considers authorization policies of the grid nodes in the process of selecting the resources to be assigned to a request. We argue such an integration is needed to avoid scheduling requests onto resources the policies of which do not authorize their execution. Our service, implemented in Globus as a part of Monitoring and Discovery Service (MDS), is based on the concept of fine-grained access control (FGAC) which enables participating grid nodes to specify fine-grained policies concerning the conditions under which grid clients can access their resources. Since the process of evaluating authorization policies, in addition to checking the resource requirements, can be a potential bottleneck for a large scale grid, we also analyze the problem of the efficient evaluation of FGAC policies. In this context, we present GroupByRule, a novel method for policy organization and compare its performance with other strategies.
E. BertinoEmail:
  相似文献   
79.
This paper presents a fuzzy system for controlling the fire command in a surface-to-surface engagement by assuming siege of friendly side by enemy forces. The system must be capable of interacting with a dynamic and uncertain battle world in a real-time manner. In siege situation, it is assumed that the enemy troops are advancing toward friendly side in different directions and the defence resources are limited and nonrenewable at a single platform. Thus, resource allocation problem in a real-time manner is an important and vital component of battle management until coming of auxiliary forces. This paper addresses the design of a fuzzy system as an efficient tool for real-time decision-making in order to optimize the defense resource allocation in engagement.  相似文献   
80.
在大部分系统中,资源都是有限供给的.因此,为了提高系统的性能,保证资源使用的效率与公平,必须对资源进行有效的管理.而合理分配资源和解决资源使用冲突是系统资源管理的核心问题.基于群决策方法提出了一个多Agent资源管理模型,以动态优先级的方式灵活地解决了系统资源分配与使用冲突问题.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号