全文获取类型
收费全文 | 881篇 |
免费 | 23篇 |
国内免费 | 25篇 |
专业分类
电工技术 | 12篇 |
综合类 | 17篇 |
化学工业 | 19篇 |
金属工艺 | 15篇 |
机械仪表 | 53篇 |
建筑科学 | 24篇 |
矿业工程 | 7篇 |
能源动力 | 13篇 |
轻工业 | 3篇 |
水利工程 | 2篇 |
石油天然气 | 7篇 |
武器工业 | 6篇 |
无线电 | 86篇 |
一般工业技术 | 82篇 |
冶金工业 | 16篇 |
原子能技术 | 37篇 |
自动化技术 | 530篇 |
出版年
2024年 | 1篇 |
2023年 | 3篇 |
2022年 | 8篇 |
2021年 | 13篇 |
2020年 | 13篇 |
2019年 | 6篇 |
2018年 | 1篇 |
2017年 | 22篇 |
2016年 | 18篇 |
2015年 | 23篇 |
2014年 | 45篇 |
2013年 | 33篇 |
2012年 | 33篇 |
2011年 | 66篇 |
2010年 | 49篇 |
2009年 | 43篇 |
2008年 | 56篇 |
2007年 | 83篇 |
2006年 | 81篇 |
2005年 | 56篇 |
2004年 | 40篇 |
2003年 | 37篇 |
2002年 | 26篇 |
2001年 | 22篇 |
2000年 | 31篇 |
1999年 | 19篇 |
1998年 | 20篇 |
1997年 | 20篇 |
1996年 | 5篇 |
1995年 | 7篇 |
1994年 | 13篇 |
1993年 | 3篇 |
1992年 | 9篇 |
1991年 | 4篇 |
1989年 | 5篇 |
1988年 | 1篇 |
1987年 | 1篇 |
1985年 | 1篇 |
1984年 | 1篇 |
1983年 | 4篇 |
1982年 | 3篇 |
1981年 | 1篇 |
1980年 | 1篇 |
1979年 | 1篇 |
1978年 | 1篇 |
排序方式: 共有929条查询结果,搜索用时 0 毫秒
131.
State-space caching revisited 总被引:2,自引:0,他引:2
Patrice Godefroid Gerard J. Holzmann Didier Pirottin 《Formal Methods in System Design》1995,7(3):227-241
State-space caching is a verification technique for finite-state concurrent systems. It performs an exhaustive exploration of the state space of the system being checked while storing only all states of just one execution sequence plus as many other previously visited states as available memory allows. So far, this technique has been of little practical significance: it allows one to reduce memory usage by only twoo to three times, before an unacceptable blow-up of the run-time overhead sets in. The explosion of the run-time requirements is due to redundant multiple explorations of unstored parts of the state space. Indeed, almost all states in the state space of concurrent systems are typically reached several times during the search.In this paper, we present a method to tackle the main cause of this prohibitive state matching: the exploration of all possible interleavings of concurrent executions of the system which all lead to the same state. Then, we show that, in many cases, with this method, most reachable states are visited only once during state-space exploration. This enables one not to store most of the states that have already been visited without incurring too much redundant explorations of parts of the state space, and makes therefore state-space caching a much more attractive verification method. As an example, we were able to competely explore a state space of 250,000 states while storing simultaneously no more than 500 states and with only a three-fold increas of the run-time requirements. 相似文献
132.
A formal error analysis of the order of approximation of a potential based boundary element method (BEM) for two-dimensional flows is performed in order to derive consistent approximations for the potential integrals. Two higher-order approaches satisfying consistency requirements to attain second and third order convergence in the potential are selected for numerical implementation. From the formal local expansions of the potential integrals the influence coefficients are derived and evaluated analytically. In order to assess the methods accuracy, the low and higher-order methods are applied to two-dimensional steady flows around analytical foils. A numerical error analysis is done and a comparison between their theoretical and numerical asymptotic order of accuracy performed.
The first author acknowledges the financial support granted by Fundação para a Ciência e a Tecnologia, Ph.D. grant PRAXISXXI/BD/2226/99. This work was done under the project PRAXIS/2/2.1/MAR/1723/95. 相似文献
133.
R.M. Aguilar V. Muoz M. Noda A. Bruno L. Moreno 《Expert systems with applications》2008,35(3):677-685
This paper presents the results of a verification and validation process for an intelligent system. The system being studied is an Intelligent Tutorial that employs fuzzy logic and multiagent systems. Software engineering techniques were used in the verification process, while the validation exploited both qualitative and quantitative techniques. 相似文献
134.
数字仿真模型的校核验证和测试 (一) 总被引:3,自引:3,他引:0
介绍数字仿真模型的校核、验证和测试的基本概念,并提出了些实际的实行方法。 相似文献
135.
136.
He Xinhua Gong Yunzhan 《电子科学学刊(英文版)》1996,13(1):68-73
This paper presents the techniques of verification and Test Generation(TG) for sequential machines (Finite State Machines, FSMs) based on state traversing of State Transition Graph(STG). The problems of traversing, redundancy and transition fault model are identified. In order to achieve high fault coverage collapsing testing is proposed. Further, the heuristic knowledge for speeding up verification and TG are described. 相似文献
137.
本文叙述221厂核设施退役工程的竣工验收辐射检测,内容涉及竣工验收辐射检测小组的职能和组织形式,验收检测标准,验收检测的实施及其主要结果。 相似文献
138.
Adams Kong Author Vitae King-Hong Cheung Author Vitae Author Vitae Mohamed Kamel Author Vitae Author Vitae 《Pattern recognition》2006,39(7):1359-1368
As a result of the growing demand for accurate and reliable personal authentication, biometric recognition, a substitute for or complement to existing authentication technologies, has attracted considerable attention. It has recently been reported that, along with its variants, BioHashing, a new technique that combines biometric features and a tokenized (pseudo-) random number (TRN), has achieved perfect accuracy, having zero equal error rates (EER) for faces, fingerprints and palmprints. There are, however, anomalies in this approach. These are identified in this paper, in which we systematically analyze the details of the approach and conclude that the claim of having achieved a zero EER is based upon an impractical hidden assumption. We simulate the claimants’ experiments and find that it is not possible to achieve their reported performance without the hidden assumption and that, indeed, the results are worse than when using the biometric alone. 相似文献
139.
A note on the attractor-property of infinite-state Markov chains 总被引:1,自引:0,他引:1
Christel Baier 《Information Processing Letters》2006,97(2):58-63
In the past 5 years, a series of verification algorithms has been proposed for infinite Markov chains that have a finite attractor, i.e., a set that will be visited infinitely often almost surely starting from any state. In this paper, we establish a sufficient criterion for the existence of an attractor. We show that if the states of a Markov chain can be given levels (positive integers) such that the expected next level for states at some level n>0 is less than n−Δ for some positive Δ, then the states at level 0 constitute an attractor for the chain. As an application, we obtain a direct proof that some probabilistic channel systems combining message losses with duplication and insertion errors have a finite attractor. 相似文献
140.