首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   881篇
  免费   23篇
  国内免费   25篇
电工技术   12篇
综合类   17篇
化学工业   19篇
金属工艺   15篇
机械仪表   53篇
建筑科学   24篇
矿业工程   7篇
能源动力   13篇
轻工业   3篇
水利工程   2篇
石油天然气   7篇
武器工业   6篇
无线电   86篇
一般工业技术   82篇
冶金工业   16篇
原子能技术   37篇
自动化技术   530篇
  2024年   1篇
  2023年   3篇
  2022年   8篇
  2021年   13篇
  2020年   13篇
  2019年   6篇
  2018年   1篇
  2017年   22篇
  2016年   18篇
  2015年   23篇
  2014年   45篇
  2013年   33篇
  2012年   33篇
  2011年   66篇
  2010年   49篇
  2009年   43篇
  2008年   56篇
  2007年   83篇
  2006年   81篇
  2005年   56篇
  2004年   40篇
  2003年   37篇
  2002年   26篇
  2001年   22篇
  2000年   31篇
  1999年   19篇
  1998年   20篇
  1997年   20篇
  1996年   5篇
  1995年   7篇
  1994年   13篇
  1993年   3篇
  1992年   9篇
  1991年   4篇
  1989年   5篇
  1988年   1篇
  1987年   1篇
  1985年   1篇
  1984年   1篇
  1983年   4篇
  1982年   3篇
  1981年   1篇
  1980年   1篇
  1979年   1篇
  1978年   1篇
排序方式: 共有929条查询结果,搜索用时 0 毫秒
131.
State-space caching revisited   总被引:2,自引:0,他引:2  
State-space caching is a verification technique for finite-state concurrent systems. It performs an exhaustive exploration of the state space of the system being checked while storing only all states of just one execution sequence plus as many other previously visited states as available memory allows. So far, this technique has been of little practical significance: it allows one to reduce memory usage by only twoo to three times, before an unacceptable blow-up of the run-time overhead sets in. The explosion of the run-time requirements is due to redundant multiple explorations of unstored parts of the state space. Indeed, almost all states in the state space of concurrent systems are typically reached several times during the search.In this paper, we present a method to tackle the main cause of this prohibitive state matching: the exploration of all possible interleavings of concurrent executions of the system which all lead to the same state. Then, we show that, in many cases, with this method, most reachable states are visited only once during state-space exploration. This enables one not to store most of the states that have already been visited without incurring too much redundant explorations of parts of the state space, and makes therefore state-space caching a much more attractive verification method. As an example, we were able to competely explore a state space of 250,000 states while storing simultaneously no more than 500 states and with only a three-fold increas of the run-time requirements.  相似文献   
132.
A formal error analysis of the order of approximation of a potential based boundary element method (BEM) for two-dimensional flows is performed in order to derive consistent approximations for the potential integrals. Two higher-order approaches satisfying consistency requirements to attain second and third order convergence in the potential are selected for numerical implementation. From the formal local expansions of the potential integrals the influence coefficients are derived and evaluated analytically. In order to assess the methods accuracy, the low and higher-order methods are applied to two-dimensional steady flows around analytical foils. A numerical error analysis is done and a comparison between their theoretical and numerical asymptotic order of accuracy performed. The first author acknowledges the financial support granted by Fundação para a Ciência e a Tecnologia, Ph.D. grant PRAXISXXI/BD/2226/99. This work was done under the project PRAXIS/2/2.1/MAR/1723/95.  相似文献   
133.
This paper presents the results of a verification and validation process for an intelligent system. The system being studied is an Intelligent Tutorial that employs fuzzy logic and multiagent systems. Software engineering techniques were used in the verification process, while the validation exploited both qualitative and quantitative techniques.  相似文献   
134.
数字仿真模型的校核验证和测试 (一)   总被引:3,自引:3,他引:0  
介绍数字仿真模型的校核、验证和测试的基本概念,并提出了些实际的实行方法。  相似文献   
135.
薛英  朱江 《计测技术》1998,(6):11-13
总结了作者几年来从事进口经纬仪检定工作的部分体会,就存在的几个问题进行了讨论。  相似文献   
136.
This paper presents the techniques of verification and Test Generation(TG) for sequential machines (Finite State Machines, FSMs) based on state traversing of State Transition Graph(STG). The problems of traversing, redundancy and transition fault model are identified. In order to achieve high fault coverage collapsing testing is proposed. Further, the heuristic knowledge for speeding up verification and TG are described.  相似文献   
137.
黄治俭  腾慧洁 《辐射防护》1996,16(4):290-296
本文叙述221厂核设施退役工程的竣工验收辐射检测,内容涉及竣工验收辐射检测小组的职能和组织形式,验收检测标准,验收检测的实施及其主要结果。  相似文献   
138.
As a result of the growing demand for accurate and reliable personal authentication, biometric recognition, a substitute for or complement to existing authentication technologies, has attracted considerable attention. It has recently been reported that, along with its variants, BioHashing, a new technique that combines biometric features and a tokenized (pseudo-) random number (TRN), has achieved perfect accuracy, having zero equal error rates (EER) for faces, fingerprints and palmprints. There are, however, anomalies in this approach. These are identified in this paper, in which we systematically analyze the details of the approach and conclude that the claim of having achieved a zero EER is based upon an impractical hidden assumption. We simulate the claimants’ experiments and find that it is not possible to achieve their reported performance without the hidden assumption and that, indeed, the results are worse than when using the biometric alone.  相似文献   
139.
A note on the attractor-property of infinite-state Markov chains   总被引:1,自引:0,他引:1  
In the past 5 years, a series of verification algorithms has been proposed for infinite Markov chains that have a finite attractor, i.e., a set that will be visited infinitely often almost surely starting from any state. In this paper, we establish a sufficient criterion for the existence of an attractor. We show that if the states of a Markov chain can be given levels (positive integers) such that the expected next level for states at some level n>0 is less than nΔ for some positive Δ, then the states at level 0 constitute an attractor for the chain. As an application, we obtain a direct proof that some probabilistic channel systems combining message losses with duplication and insertion errors have a finite attractor.  相似文献   
140.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号