首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   882篇
  免费   22篇
  国内免费   25篇
电工技术   12篇
综合类   17篇
化学工业   19篇
金属工艺   15篇
机械仪表   53篇
建筑科学   24篇
矿业工程   7篇
能源动力   13篇
轻工业   3篇
水利工程   2篇
石油天然气   7篇
武器工业   6篇
无线电   86篇
一般工业技术   82篇
冶金工业   16篇
原子能技术   37篇
自动化技术   530篇
  2024年   1篇
  2023年   3篇
  2022年   8篇
  2021年   13篇
  2020年   13篇
  2019年   6篇
  2018年   1篇
  2017年   22篇
  2016年   18篇
  2015年   23篇
  2014年   45篇
  2013年   33篇
  2012年   33篇
  2011年   66篇
  2010年   49篇
  2009年   43篇
  2008年   56篇
  2007年   83篇
  2006年   81篇
  2005年   56篇
  2004年   40篇
  2003年   37篇
  2002年   26篇
  2001年   22篇
  2000年   31篇
  1999年   19篇
  1998年   20篇
  1997年   20篇
  1996年   5篇
  1995年   7篇
  1994年   13篇
  1993年   3篇
  1992年   9篇
  1991年   4篇
  1989年   5篇
  1988年   1篇
  1987年   1篇
  1985年   1篇
  1984年   1篇
  1983年   4篇
  1982年   3篇
  1981年   1篇
  1980年   1篇
  1979年   1篇
  1978年   1篇
排序方式: 共有929条查询结果,搜索用时 93 毫秒
121.
薛英  朱江 《计测技术》1998,(6):11-13
总结了作者几年来从事进口经纬仪检定工作的部分体会,就存在的几个问题进行了讨论。  相似文献   
122.
This paper presents the techniques of verification and Test Generation(TG) for sequential machines (Finite State Machines, FSMs) based on state traversing of State Transition Graph(STG). The problems of traversing, redundancy and transition fault model are identified. In order to achieve high fault coverage collapsing testing is proposed. Further, the heuristic knowledge for speeding up verification and TG are described.  相似文献   
123.
黄治俭  腾慧洁 《辐射防护》1996,16(4):290-296
本文叙述221厂核设施退役工程的竣工验收辐射检测,内容涉及竣工验收辐射检测小组的职能和组织形式,验收检测标准,验收检测的实施及其主要结果。  相似文献   
124.
As a result of the growing demand for accurate and reliable personal authentication, biometric recognition, a substitute for or complement to existing authentication technologies, has attracted considerable attention. It has recently been reported that, along with its variants, BioHashing, a new technique that combines biometric features and a tokenized (pseudo-) random number (TRN), has achieved perfect accuracy, having zero equal error rates (EER) for faces, fingerprints and palmprints. There are, however, anomalies in this approach. These are identified in this paper, in which we systematically analyze the details of the approach and conclude that the claim of having achieved a zero EER is based upon an impractical hidden assumption. We simulate the claimants’ experiments and find that it is not possible to achieve their reported performance without the hidden assumption and that, indeed, the results are worse than when using the biometric alone.  相似文献   
125.
A note on the attractor-property of infinite-state Markov chains   总被引:1,自引:0,他引:1  
In the past 5 years, a series of verification algorithms has been proposed for infinite Markov chains that have a finite attractor, i.e., a set that will be visited infinitely often almost surely starting from any state. In this paper, we establish a sufficient criterion for the existence of an attractor. We show that if the states of a Markov chain can be given levels (positive integers) such that the expected next level for states at some level n>0 is less than nΔ for some positive Δ, then the states at level 0 constitute an attractor for the chain. As an application, we obtain a direct proof that some probabilistic channel systems combining message losses with duplication and insertion errors have a finite attractor.  相似文献   
126.
127.
128.
分布实时系统的概率规范和证明形式化   总被引:1,自引:0,他引:1  
1引言 随着数字系统变得越来越小、越来越便宜,它们用于物理过程控制和与物理过程互协作的机会将越来越多。互相协作的过程如果出现意外行为,后果将可能很严重。这种意外为不仅仅指程序和数字  相似文献   
129.
The article discusses the rationale used to make the decision to implement a constrained design capability for VLSI in Wang. A CAD/CAM system will be put in place that will permit product designers to achieve design and manufacturing turn-a-round times that are consistent with a product development cycle of 18 to 24 months. The functional requirements of the various subsystems are discussed as well as those for the excutive, the data base, and the audit capability. The latter capabilities are necessary to achieve a controlled constrained design environment.  相似文献   
130.
A. C. Fleck 《Software》1982,12(7):627-640
The presentation of an abstract data type by a series of equational axioms has become an accepted specification mechanism. Verifying the correctness of such specifications has been recognized as a problem troubling their use. A means is presented for experimenting with a directly executable version of the axioms without having to choose representations for the data structures or describe algorithms for the operations.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号