全文获取类型
收费全文 | 882篇 |
免费 | 22篇 |
国内免费 | 25篇 |
专业分类
电工技术 | 12篇 |
综合类 | 17篇 |
化学工业 | 19篇 |
金属工艺 | 15篇 |
机械仪表 | 53篇 |
建筑科学 | 24篇 |
矿业工程 | 7篇 |
能源动力 | 13篇 |
轻工业 | 3篇 |
水利工程 | 2篇 |
石油天然气 | 7篇 |
武器工业 | 6篇 |
无线电 | 86篇 |
一般工业技术 | 82篇 |
冶金工业 | 16篇 |
原子能技术 | 37篇 |
自动化技术 | 530篇 |
出版年
2024年 | 1篇 |
2023年 | 3篇 |
2022年 | 8篇 |
2021年 | 13篇 |
2020年 | 13篇 |
2019年 | 6篇 |
2018年 | 1篇 |
2017年 | 22篇 |
2016年 | 18篇 |
2015年 | 23篇 |
2014年 | 45篇 |
2013年 | 33篇 |
2012年 | 33篇 |
2011年 | 66篇 |
2010年 | 49篇 |
2009年 | 43篇 |
2008年 | 56篇 |
2007年 | 83篇 |
2006年 | 81篇 |
2005年 | 56篇 |
2004年 | 40篇 |
2003年 | 37篇 |
2002年 | 26篇 |
2001年 | 22篇 |
2000年 | 31篇 |
1999年 | 19篇 |
1998年 | 20篇 |
1997年 | 20篇 |
1996年 | 5篇 |
1995年 | 7篇 |
1994年 | 13篇 |
1993年 | 3篇 |
1992年 | 9篇 |
1991年 | 4篇 |
1989年 | 5篇 |
1988年 | 1篇 |
1987年 | 1篇 |
1985年 | 1篇 |
1984年 | 1篇 |
1983年 | 4篇 |
1982年 | 3篇 |
1981年 | 1篇 |
1980年 | 1篇 |
1979年 | 1篇 |
1978年 | 1篇 |
排序方式: 共有929条查询结果,搜索用时 93 毫秒
121.
122.
He Xinhua Gong Yunzhan 《电子科学学刊(英文版)》1996,13(1):68-73
This paper presents the techniques of verification and Test Generation(TG) for sequential machines (Finite State Machines, FSMs) based on state traversing of State Transition Graph(STG). The problems of traversing, redundancy and transition fault model are identified. In order to achieve high fault coverage collapsing testing is proposed. Further, the heuristic knowledge for speeding up verification and TG are described. 相似文献
123.
本文叙述221厂核设施退役工程的竣工验收辐射检测,内容涉及竣工验收辐射检测小组的职能和组织形式,验收检测标准,验收检测的实施及其主要结果。 相似文献
124.
Adams Kong Author Vitae King-Hong Cheung Author Vitae Author Vitae Mohamed Kamel Author Vitae Author Vitae 《Pattern recognition》2006,39(7):1359-1368
As a result of the growing demand for accurate and reliable personal authentication, biometric recognition, a substitute for or complement to existing authentication technologies, has attracted considerable attention. It has recently been reported that, along with its variants, BioHashing, a new technique that combines biometric features and a tokenized (pseudo-) random number (TRN), has achieved perfect accuracy, having zero equal error rates (EER) for faces, fingerprints and palmprints. There are, however, anomalies in this approach. These are identified in this paper, in which we systematically analyze the details of the approach and conclude that the claim of having achieved a zero EER is based upon an impractical hidden assumption. We simulate the claimants’ experiments and find that it is not possible to achieve their reported performance without the hidden assumption and that, indeed, the results are worse than when using the biometric alone. 相似文献
125.
A note on the attractor-property of infinite-state Markov chains 总被引:1,自引:0,他引:1
Christel Baier 《Information Processing Letters》2006,97(2):58-63
In the past 5 years, a series of verification algorithms has been proposed for infinite Markov chains that have a finite attractor, i.e., a set that will be visited infinitely often almost surely starting from any state. In this paper, we establish a sufficient criterion for the existence of an attractor. We show that if the states of a Markov chain can be given levels (positive integers) such that the expected next level for states at some level n>0 is less than n−Δ for some positive Δ, then the states at level 0 constitute an attractor for the chain. As an application, we obtain a direct proof that some probabilistic channel systems combining message losses with duplication and insertion errors have a finite attractor. 相似文献
126.
127.
Gerard J. Holzmann 《Software》1988,18(2):137-161
128.
分布实时系统的概率规范和证明形式化 总被引:1,自引:0,他引:1
1引言 随着数字系统变得越来越小、越来越便宜,它们用于物理过程控制和与物理过程互协作的机会将越来越多。互相协作的过程如果出现意外行为,后果将可能很严重。这种意外为不仅仅指程序和数字 相似文献
129.
Ralph F. Schauer 《Computers in Industry》1982,3(3):169-179
The article discusses the rationale used to make the decision to implement a constrained design capability for VLSI in Wang. A CAD/CAM system will be put in place that will permit product designers to achieve design and manufacturing turn-a-round times that are consistent with a product development cycle of 18 to 24 months. The functional requirements of the various subsystems are discussed as well as those for the excutive, the data base, and the audit capability. The latter capabilities are necessary to achieve a controlled constrained design environment. 相似文献
130.
A. C. Fleck 《Software》1982,12(7):627-640
The presentation of an abstract data type by a series of equational axioms has become an accepted specification mechanism. Verifying the correctness of such specifications has been recognized as a problem troubling their use. A means is presented for experimenting with a directly executable version of the axioms without having to choose representations for the data structures or describe algorithms for the operations. 相似文献