全文获取类型
收费全文 | 597篇 |
免费 | 52篇 |
国内免费 | 20篇 |
专业分类
电工技术 | 20篇 |
技术理论 | 1篇 |
综合类 | 46篇 |
化学工业 | 8篇 |
金属工艺 | 13篇 |
机械仪表 | 26篇 |
建筑科学 | 94篇 |
矿业工程 | 3篇 |
能源动力 | 5篇 |
轻工业 | 12篇 |
水利工程 | 8篇 |
无线电 | 46篇 |
一般工业技术 | 57篇 |
冶金工业 | 121篇 |
原子能技术 | 1篇 |
自动化技术 | 208篇 |
出版年
2024年 | 10篇 |
2023年 | 16篇 |
2022年 | 17篇 |
2021年 | 25篇 |
2020年 | 25篇 |
2019年 | 13篇 |
2018年 | 17篇 |
2017年 | 16篇 |
2016年 | 11篇 |
2015年 | 16篇 |
2014年 | 22篇 |
2013年 | 33篇 |
2012年 | 34篇 |
2011年 | 36篇 |
2010年 | 38篇 |
2009年 | 36篇 |
2008年 | 48篇 |
2007年 | 32篇 |
2006年 | 23篇 |
2005年 | 31篇 |
2004年 | 25篇 |
2003年 | 22篇 |
2002年 | 17篇 |
2001年 | 17篇 |
2000年 | 9篇 |
1999年 | 6篇 |
1998年 | 9篇 |
1997年 | 7篇 |
1996年 | 12篇 |
1995年 | 9篇 |
1994年 | 6篇 |
1993年 | 5篇 |
1992年 | 7篇 |
1991年 | 2篇 |
1990年 | 2篇 |
1989年 | 2篇 |
1988年 | 2篇 |
1987年 | 2篇 |
1982年 | 1篇 |
1977年 | 1篇 |
1975年 | 1篇 |
1972年 | 1篇 |
1966年 | 1篇 |
1965年 | 1篇 |
1964年 | 1篇 |
1963年 | 1篇 |
1954年 | 1篇 |
排序方式: 共有669条查询结果,搜索用时 15 毫秒
41.
Facing the scale, heterogeneity and dynamics of the global computing platform emerging on top of the Internet, autonomic computing has been raised recently as one of the top challenges of computer science research. Such a paradigm calls for alternative programming abstractions, able to express autonomic behaviours. In this quest, nature-inspired analogies regained a lot of interest. More specifically, the chemical programming paradigm, which envisions a program’s execution as a succession of reactions between molecules representing data to produce a result, has been shown to provide some adequate abstractions for the high-level specification of autonomic systems. 相似文献
42.
Moshe Sniedovich 《International Transactions in Operational Research》2016,23(4):625-653
Ever since its appearance on the scene in the 1940s, in the then nascent field of statistical decision theory, Wald's maximin paradigm has played a vital role in many disciplines in the treatment of nonprobabilistic uncertainty, both as a tool of thought and as a practical instrument. In fact, in some fields, such as modern robust optimization, Wald's paradigm dominates the scene. It is important to note that this paradigm's preeminence in many fields continues unabated, despite its obvious limitations and the criticism that had been and continues to be leveled at it. So, in this tutorial we examine the methodological aspects of this stalwart of decision theory from the viewpoint of robust decision‐making, paying special attention to its obvious and not so obvious limitations and to its relation to other maximin paradigms. 相似文献
43.
统计分布的多方保密计算 总被引:1,自引:0,他引:1
多方保密的概念是姚期智教授首先提出的,是计算网络计算环境中隐私保护的关键技术,在密码学中占有重要的地位,是构造许多密码学协议的基本模块,是国际密码学界近年来研究的热点问题.这方面国内外的学者进行了大量的研究,已经取得了许多理论成果与实用成果,但还有许多应用问题需要研究.介绍了多方保密计算方面的研究现状和一些需要研究的问题,研究了统计工作中所遇到的保密问题,主要解决在统计工作中经常遇到的统计分布的保密计算问题,基于计算离散对数困难性假设,运用严格的逻辑推理方法,提出了该问题的3个多方保密计算方案,并用模拟范例证明了方案的保密性.这样的问题尚没有见到研究报道,解决方案对于实际工作中的保密统计计算有重要的意义,它们可以用于保护统计过程中被统计对象的各种数据的保密,从而使被统计者不用担心隐私的泄漏,使所获得的数据更为可靠,更具有参考价值. 相似文献
44.
Qinghai Miao Wenbo Zheng Yisheng Lv Min Huang Wenwen Ding Fei-Yue Wang 《IEEE/CAA Journal of Automatica Sinica》2023,10(4):877-897
From AlphaGo to ChatGPT,the field of AI has launched a series of remarkable achievements in recent years.Analyzing,comparing,and summarizing these achievements at the paradigm level is important for future AI innovation,but has not received sufficient attention.In this paper,we give an overview and perspective on machine learning paradigms.First,we propose a paradigm taxonomy with three levels and seven dimensions from a knowledge perspective.Accordingly,we give an overview on three basic and tw... 相似文献
45.
目的 图像后门攻击是一种经典的对抗性攻击形式,后门攻击使被攻击的深度模型在正常情况下表现良好,而当隐藏的后门被预设的触发器激活时就会出现恶性结果。现有的后门攻击开始转向为有毒样本分配干净标签或在有毒数据中隐蔽触发器以对抗人类检查,但这些方法在视觉监督下很难同时具备这两种安全特性,并且它们的触发器可以很容易地通过统计分析检测出来。因此,提出了一种隐蔽有效的图像后门攻击方法。方法 首先通过信息隐藏技术隐蔽图像后门触发,使标签正确的中毒图像样本(标签不可感知性)和相应的干净图像样本看起来几乎相同(图像不可感知性)。其次,设计了一种全新的后门攻击范式,其中毒的源图像类别同时也是目标类。提出的后门攻击方法不仅视觉上是隐蔽的,同时能抵御经典的后门防御方法(统计不可感知性)。结果 为了验证方法的有效性与隐蔽性,在ImageN et、MNIST、CIFAR-10数据集上与其他3种方法进行了对比实验。实验结果表明,在3个数据集上,原始干净样本分类准确率下降均不到1%,中毒样本分类准确率都超过94%,并具备最好的图像视觉效果。另外,验证了所提出的触发器临时注入的任意图像样本都可以发起有效的后门攻击。结论 ... 相似文献
46.
Abstract. In this journal, Chen and Hirschheim have provided a historical analysis of positivist and interpretivist research paradigms and methodologies in the 10 years following the much cited work of Orlikowski and Baroudi. In this paper, we investigate the mysterious case of the missing paradigm – that of the critical approach to information systems (IS) research. We take Chen and Hirschheim's survey as our starting point and aim to fill the gap left by the absence of the critical paradigm in their analysis and make some criticisms of their method. Recent years have seen the growth of IS research that consciously adopts a critical perspective. This paper charts the development of critical IS research over the period of 1991–2001, adding some comments on more recent developments. We conclude by critically reflecting on the current development of critical research in the field of IS. 相似文献
47.
为提高基于EOG的眼动信号分类算法精度,改进基于EOG的人—机交互系统性能,提出了一种基于曲线拟合(curve fitting)与支持向量机(SVM)的眼动信号分类算法(CF-SVM),并设计了新的实验范式,增加了“扫视保持”环节.该算法采用曲线拟合方法进行特征提取,在此基础上,使用SVM分类器对眼动信号进行分类.实验室环境下,对9名眼部活动正常的受试者进行了眼动数据采集与识别,CF-SVM算法的平均分类准确率达到98.3%,与其他几种眼动识别方法相比较,其平均正确率分别提升了9.4%、5.9%、1.0%.实验结果表明,CF-SVM算法在眼动信号识别中表现了良好的性能,具有高的分类精度和鲁棒性. 相似文献
48.
49.
Development of a Temporal Extension to Query Travel Behavior Time Paths Using an Object-Oriented GIS
An essential requirement to better understand activity-based travel behavior (ABTB) at the disaggregate level is the development of a spatio-temporal model able to support queries related to activities of individuals or groups of individuals. This paper describes the development and implementation of a temporal extension to a geographic information system (GIS) object-oriented model for the modeling of the time path and the retrieval of its event chaining. In this approach, time path is formulated as a totally time ordered set composed by activity events and trip events, themselves organized into time ordered sets. As sets, the time path and its components can be searched using their respective indexes. A series of methods were built that implement temporal predicates as an interface to temporally query the database. A set of positional operator methods were also designed that transform temporal topological queries into retrieval functions based on set ordering indices. Taken together, the temporal predicates and the positional operator methods define a temporal query extension that meets the retrieval needs of an ABTB database. 相似文献
50.
DGPSL:A DISTRIBUTED GRAPHICS LIBRARY 总被引:1,自引:0,他引:1
DGPSL:ADISTRIBUTEDGRAPHICSLIBRARYShiJiaoying;PanZhigeng;ZhengWentingDGPSL:ADISTRIBUTEDGRAPHICSLIBRARY¥ShiJiaoying;PanZhigeng;... 相似文献