全文获取类型
收费全文 | 882篇 |
免费 | 22篇 |
国内免费 | 25篇 |
专业分类
电工技术 | 12篇 |
综合类 | 17篇 |
化学工业 | 19篇 |
金属工艺 | 15篇 |
机械仪表 | 53篇 |
建筑科学 | 24篇 |
矿业工程 | 7篇 |
能源动力 | 13篇 |
轻工业 | 3篇 |
水利工程 | 2篇 |
石油天然气 | 7篇 |
武器工业 | 6篇 |
无线电 | 86篇 |
一般工业技术 | 82篇 |
冶金工业 | 16篇 |
原子能技术 | 37篇 |
自动化技术 | 530篇 |
出版年
2024年 | 1篇 |
2023年 | 3篇 |
2022年 | 8篇 |
2021年 | 13篇 |
2020年 | 13篇 |
2019年 | 6篇 |
2018年 | 1篇 |
2017年 | 22篇 |
2016年 | 18篇 |
2015年 | 23篇 |
2014年 | 45篇 |
2013年 | 33篇 |
2012年 | 33篇 |
2011年 | 66篇 |
2010年 | 49篇 |
2009年 | 43篇 |
2008年 | 56篇 |
2007年 | 83篇 |
2006年 | 81篇 |
2005年 | 56篇 |
2004年 | 40篇 |
2003年 | 37篇 |
2002年 | 26篇 |
2001年 | 22篇 |
2000年 | 31篇 |
1999年 | 19篇 |
1998年 | 20篇 |
1997年 | 20篇 |
1996年 | 5篇 |
1995年 | 7篇 |
1994年 | 13篇 |
1993年 | 3篇 |
1992年 | 9篇 |
1991年 | 4篇 |
1989年 | 5篇 |
1988年 | 1篇 |
1987年 | 1篇 |
1985年 | 1篇 |
1984年 | 1篇 |
1983年 | 4篇 |
1982年 | 3篇 |
1981年 | 1篇 |
1980年 | 1篇 |
1979年 | 1篇 |
1978年 | 1篇 |
排序方式: 共有929条查询结果,搜索用时 203 毫秒
111.
We present the first optimal parallel algorithms for the verification and sensitivity analysis of minimum spanning trees.
Our algorithms are deterministic and run inO(logn) time and require linear-work in the CREW PRAM model. These algorithms are used as a subroutine in the linear-work randomized
algorithm for finding minimum spanning trees of Cole, Klein, and Tarjan.
Research partially supported by a National Science Foundation Graduate Fellowship and by DIMACS (Center for Discrete Mathematics
and Theoretical Computer Science), a National Science Foundation Science and Technology Center, Grant No. NSF-STC88-09648.
Research at Princeton University was partially supported by the National Science Foundation, Grant No. CCR-8920505, the Office
of Naval Research, Contract No. N00014-91-J-1463, and by DIMACS (Center for Discrete Mathematics and Theoretical Computer
Science), a National Science Foundation Science and Technology Center, Grant No. NSF-STC88-09648. 相似文献
112.
This paper presents the findings of a survey of software tools built to assist in the verification and validation of knowledge-based systems. The tools were identified from literature sources from the period 1985-1995. The tool builders were contacted and asked to complete and return a survey that identified which testing and analysis techniques were utilised and covered by their tool. From these survey results it is possible to identify trends in tool development, technique coverage and areas for future research. 相似文献
113.
Bahareh Badban Wan Fokkink Jan Friso Groote Jun Pang Jaco van de Pol 《Formal Aspects of Computing》2005,17(3):342-388
We prove the correctness of a sliding window protocol with an arbitrary finite window size n and sequence numbers modulo 2n. The correctness consists of showing that the sliding window protocol is branching bisimilar to a queue of capacity 2n. The proof is given entirely on the basis of an axiomatic theory, and has been checked in the theorem prover PVS.
Received November 2004
Revised June 2005
Accepted July 2005 by J. V. Tucker 相似文献
114.
State-space caching revisited 总被引:2,自引:0,他引:2
Patrice Godefroid Gerard J. Holzmann Didier Pirottin 《Formal Methods in System Design》1995,7(3):227-241
State-space caching is a verification technique for finite-state concurrent systems. It performs an exhaustive exploration of the state space of the system being checked while storing only all states of just one execution sequence plus as many other previously visited states as available memory allows. So far, this technique has been of little practical significance: it allows one to reduce memory usage by only twoo to three times, before an unacceptable blow-up of the run-time overhead sets in. The explosion of the run-time requirements is due to redundant multiple explorations of unstored parts of the state space. Indeed, almost all states in the state space of concurrent systems are typically reached several times during the search.In this paper, we present a method to tackle the main cause of this prohibitive state matching: the exploration of all possible interleavings of concurrent executions of the system which all lead to the same state. Then, we show that, in many cases, with this method, most reachable states are visited only once during state-space exploration. This enables one not to store most of the states that have already been visited without incurring too much redundant explorations of parts of the state space, and makes therefore state-space caching a much more attractive verification method. As an example, we were able to competely explore a state space of 250,000 states while storing simultaneously no more than 500 states and with only a three-fold increas of the run-time requirements. 相似文献
115.
A formal error analysis of the order of approximation of a potential based boundary element method (BEM) for two-dimensional flows is performed in order to derive consistent approximations for the potential integrals. Two higher-order approaches satisfying consistency requirements to attain second and third order convergence in the potential are selected for numerical implementation. From the formal local expansions of the potential integrals the influence coefficients are derived and evaluated analytically. In order to assess the methods accuracy, the low and higher-order methods are applied to two-dimensional steady flows around analytical foils. A numerical error analysis is done and a comparison between their theoretical and numerical asymptotic order of accuracy performed.
The first author acknowledges the financial support granted by Fundação para a Ciência e a Tecnologia, Ph.D. grant PRAXISXXI/BD/2226/99. This work was done under the project PRAXIS/2/2.1/MAR/1723/95. 相似文献
116.
R.M. Aguilar V. Muoz M. Noda A. Bruno L. Moreno 《Expert systems with applications》2008,35(3):677-685
This paper presents the results of a verification and validation process for an intelligent system. The system being studied is an Intelligent Tutorial that employs fuzzy logic and multiagent systems. Software engineering techniques were used in the verification process, while the validation exploited both qualitative and quantitative techniques. 相似文献
117.
数字仿真模型的校核验证和测试 (一) 总被引:3,自引:3,他引:0
介绍数字仿真模型的校核、验证和测试的基本概念,并提出了些实际的实行方法。 相似文献
118.
119.
He Xinhua Gong Yunzhan 《电子科学学刊(英文版)》1996,13(1):68-73
This paper presents the techniques of verification and Test Generation(TG) for sequential machines (Finite State Machines, FSMs) based on state traversing of State Transition Graph(STG). The problems of traversing, redundancy and transition fault model are identified. In order to achieve high fault coverage collapsing testing is proposed. Further, the heuristic knowledge for speeding up verification and TG are described. 相似文献
120.
本文叙述221厂核设施退役工程的竣工验收辐射检测,内容涉及竣工验收辐射检测小组的职能和组织形式,验收检测标准,验收检测的实施及其主要结果。 相似文献