首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   878篇
  免费   22篇
  国内免费   25篇
电工技术   12篇
综合类   17篇
化学工业   19篇
金属工艺   15篇
机械仪表   52篇
建筑科学   22篇
矿业工程   7篇
能源动力   13篇
轻工业   3篇
水利工程   2篇
石油天然气   7篇
武器工业   6篇
无线电   85篇
一般工业技术   82篇
冶金工业   16篇
原子能技术   37篇
自动化技术   530篇
  2024年   1篇
  2023年   3篇
  2022年   8篇
  2021年   13篇
  2020年   10篇
  2019年   6篇
  2018年   1篇
  2017年   21篇
  2016年   18篇
  2015年   23篇
  2014年   45篇
  2013年   33篇
  2012年   33篇
  2011年   66篇
  2010年   49篇
  2009年   43篇
  2008年   56篇
  2007年   83篇
  2006年   81篇
  2005年   56篇
  2004年   40篇
  2003年   37篇
  2002年   26篇
  2001年   22篇
  2000年   31篇
  1999年   19篇
  1998年   20篇
  1997年   20篇
  1996年   5篇
  1995年   7篇
  1994年   13篇
  1993年   3篇
  1992年   9篇
  1991年   4篇
  1989年   5篇
  1988年   1篇
  1987年   1篇
  1985年   1篇
  1984年   1篇
  1983年   4篇
  1982年   3篇
  1981年   1篇
  1980年   1篇
  1979年   1篇
  1978年   1篇
排序方式: 共有925条查询结果,搜索用时 15 毫秒
51.
德国EMH公司是生产精密电测量产品的专业公司。本文详细介绍了山东电力系统引进的5套全电子式电能表检验装置的特点、验收项目、检定结果、存在的问题和解决方法。  相似文献   
52.
53.
Summary. We set out a modal logic for reasoning about multilevel security of probabilistic systems. This logic contains expressions for time, probability, and knowledge. Making use of the Halpern-Tuttle framework for reasoning about knowledge and probability, we give a semantics for our logic and prove it is sound. We give two syntactic definitions of perfect multilevel security and show that their semantic interpretations are equivalent to earlier, independently motivated characterizations. We also discuss the relation between these characterizations of security and between their usefulness in security analysis.  相似文献   
54.
SCV及其在SoC验证中的应用   总被引:2,自引:0,他引:2  
片上系统(System on Chip,SoC)是集成电路设计发展的趋势,验证在整个SoC设计中工作量巨大且至关重要.应用验证领域的最新成果SCV(SystemCVerification),提出了通过设计用户定义的事务接口(Transactor),对RTL(RegisterTransferLevel)级设计进行事务级验证的策略,并对一个具体的FIFO事例进行了验证.  相似文献   
55.
Goal-oriented requirements engineering promotes the use of goals to elicit, elaborate, structure, specify, analyze, negotiate, document, and modify requirements. Thus, goal-oriented specifications are essential for capturing the objectives that the system to be developed should achieve. However, the application of goal-oriented specifications into model-driven development (MDD) processes is still handcrafted, not aligned in the automated flow from models to code. In other words, the experience of analysts and designers is necessary to manually transform the input goal-oriented models into system models for code generation (models compilation). Some authors have proposed guidelines to facilitate and partially automate this translation, but there is a lack of techniques to assess the adequacy of goal-oriented models as starting point of MDD processes. In this paper, we present and evaluate a verification approach that guarantees the automatic, correct, and complete transformation of goal-oriented models into design models used by specific MDD solutions. In particular, this approach has been put into practice by adopting a well-known goal-oriented modeling approach, the i* framework, and an industrial MDD solution called Integranova.  相似文献   
56.
Web services run in complex contexts where arising events may compromise the quality of the whole system. Thus, it is desirable to count on autonomic mechanisms to guide the self-adaptation of service compositions according to changes in the computing infrastructure. One way to achieve this goal is by implementing variability constructs at the language level. However, this approach may become tedious, difficult to manage, and error-prone. In this paper, we propose a solution based on a semantically rich variability model to support the dynamic adaptation of service compositions. When a problematic event arises in the context, this model is leveraged for decision-making. The activation and deactivation of features in the variability model result in changes in a composition model that abstracts the underlying service composition. These changes are reflected into the service composition by adding or removing fragments of Business Process Execution Language (WS-BPEL) code, which can be deployed at runtime. In order to reach optimum adaptations, the variability model and its possible configurations are verified at design time using Constraint Programming. An evaluation demonstrates several benefits of our approach, both at design time and at runtime.  相似文献   
57.
Executable models play a key role in many software development methods by facilitating the (semi)automatic implementation/execution of the software system under development. This is possible because executable models promote a complete and fine-grained specification of the system behaviour. In this context, where models are the basis of the whole development process, the quality of the models has a high impact on the final quality of software systems derived from them. Therefore, the existence of methods to verify the correctness of executable models is crucial. Otherwise, the quality of the executable models (and in turn the quality of the final system generated from them) will be compromised. In this paper a lightweight and static verification method to assess the correctness of executable models is proposed. This method allows us to check whether the operations defined as part of the behavioural model are able to be executed without breaking the integrity of the structural model and returns a meaningful feedback that helps repairing the detected inconsistencies.  相似文献   
58.
Methods to objectively evaluate performance are critical for model development. In contrast to recent advances in wildfire simulation, there has been limited attention to evaluating fire model performance. Information to validate fire models is typically limited, commonly to a few perimeter observations at a small number of points in time. We review metrics for comparing two burnt areas at a point in time: observed and predicted. These are compared in an idealised landscape and with a case study evaluating the performance of simulations of an Australian wildfire. We assessed: Shape Deviation Index (SDI), Jaccard's coefficient, F1, Sørensen's Similarity and Area Difference Index (ADI). For decomposing fit into error components (overprediction and underprediction) we assessed the partial indices of SDI and ADI, Precision and Recall. The various metrics were evaluated for their ability to represent error and their suitability for use in model improvement frameworks.  相似文献   
59.
Testing in the automotive industry is supposed to guarantee that vehicles are shipped without any flaw. Respective processes are complex, due to the variety of components and electronic devices in modern vehicles. To achieve error-free processes, their formal analysis is required. Specifying and maintaining properties the processes must satisfy in a user-friendly way is a core requirement on any verification system. We have observed that there are few property templates that testing processes must adhere to, and we describe these templates. They depend on the context of the processes, e.g., the components of the vehicle or testing stations. We have developed a framework that instantiates the templates of properties at verification time and then verifies the process against these instances. To allow an automatic verification we develop a transformation of the commissioning process to a Petri net. Using a novel approach, we are able to report the found violations to the user in a user-friendly way. Our empirical evaluation with the industrial partner has shown that our framework does detect property violations in processes. From expert interviews we conclude that our framework is user-friendly and well suited to operate in a real production environment.  相似文献   
60.
To date, there is little evidence that modular reasoning about fault-tolerant systems can simplify the verification process in practice. This question is studied using a prominent example from the fault tolerance literature: the problem of reliable broadcast in point-to-point networks subject to crash failures of processes. The experiences from this case study show how modular specification techniques and rigorous proof re-use can indeed help in such undertakings.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号