全文获取类型
收费全文 | 1438篇 |
免费 | 59篇 |
国内免费 | 23篇 |
专业分类
电工技术 | 4篇 |
综合类 | 48篇 |
化学工业 | 2篇 |
金属工艺 | 2篇 |
机械仪表 | 3篇 |
建筑科学 | 7篇 |
能源动力 | 1篇 |
轻工业 | 2篇 |
水利工程 | 2篇 |
无线电 | 12篇 |
一般工业技术 | 12篇 |
冶金工业 | 25篇 |
自动化技术 | 1400篇 |
出版年
2023年 | 3篇 |
2022年 | 4篇 |
2020年 | 6篇 |
2019年 | 9篇 |
2018年 | 10篇 |
2017年 | 30篇 |
2016年 | 34篇 |
2015年 | 31篇 |
2014年 | 59篇 |
2013年 | 46篇 |
2012年 | 59篇 |
2011年 | 62篇 |
2010年 | 55篇 |
2009年 | 63篇 |
2008年 | 68篇 |
2007年 | 67篇 |
2006年 | 65篇 |
2005年 | 54篇 |
2004年 | 54篇 |
2003年 | 56篇 |
2002年 | 52篇 |
2001年 | 34篇 |
2000年 | 35篇 |
1999年 | 32篇 |
1998年 | 30篇 |
1997年 | 34篇 |
1996年 | 22篇 |
1995年 | 24篇 |
1994年 | 41篇 |
1993年 | 21篇 |
1992年 | 21篇 |
1991年 | 22篇 |
1990年 | 10篇 |
1989年 | 16篇 |
1988年 | 16篇 |
1987年 | 8篇 |
1986年 | 7篇 |
1985年 | 25篇 |
1984年 | 17篇 |
1983年 | 30篇 |
1982年 | 25篇 |
1981年 | 22篇 |
1980年 | 11篇 |
1979年 | 30篇 |
1978年 | 23篇 |
1977年 | 15篇 |
1976年 | 22篇 |
1975年 | 13篇 |
1974年 | 6篇 |
1973年 | 8篇 |
排序方式: 共有1520条查询结果,搜索用时 31 毫秒
111.
In this paper, the authors propose a method that incorporates mechanisms for handling ambiguity in speech and the ability of humans to create associations, and for formulating conversations based on rule base knowledge and common knowledge. Go beyond the level that can be achieved, using only conventional natural language processing and vast repositories of sample patterns. In this paper, the authors propose a method for computer conversation sentences generated using newspaper headlines as an example of how the common knowledge and associative ability are applied. 相似文献
112.
Backtracking techniques which are often used to extend recursive descent (RD) parsers can have explosive run-times and cannot deal with grammars with left recursion. GLL parsers are fully general, worst-case cubic parsers which have the recursive descent-like property that they are easy to write and to use for grammar debugging. They have the direct relationship with the grammar that an RD parser has. In this paper we give an algorithm for generating GLL parsers which build an SPPF representation of the derivations of the input, complementing our existing GLL recognition algorithm, and we show that such parsers and recognisers are worst-case cubic. 相似文献
113.
Sound is an integral part of most movies and videos. In many situations, viewers of a video are unable to hear the sound track, for example, when watching it in a fast forward mode, viewing it by hearing‐impaired viewers or when the plot is given as a storyboard. In this paper, we present an automated visualization solution to such problems. The system first detects the common components (such as music, speech, rain, explosions, and so on) from a sound track, then maps them to a collection of programmable visual metaphors, and generates a composite visualization. This form of sound visualization, which is referred to as SoundRiver, can be also used to augment various forms of video abstraction and annotated key frames and to enhance graphical user interfaces for video handling software. The SoundRiver conveys more semantic information to the viewer than traditional graphical representations of sound illustration, such as phonoautographs, spectrograms or artistic audiovisual animations. 相似文献
114.
Juyong Zhang Chunlin Wu Jianfei Cai Jianmin Zheng Xue‐cheng Tai 《Computer Graphics Forum》2010,29(2):517-526
This paper considers the problem of interactively finding the cutting contour to extract components from a given mesh. Some existing methods support cuts of arbitrary shape but require careful and tedious input from the user. Others need little user input however they are sensitive to user input and need a postprocessing step to smooth the generated jaggy cutting contours. The popular geometric snake can be used to optimize the cutting contour, but it cannot deal with the topology change. In this paper, we propose a geodesic curvature flow based framework to overcome all these problems. Since in many cases the meaningful cutting contour on a 3D mesh is locally shortest in the sense of some weighted curve length, the geodesic curvature flow is an ideal tool for our problem. It evolves the cutting contour to the nearby local minimum. We should mention that the previous numerical scheme, discretized geodesic curvature flow (dGCF) is too slow and has not been applied to mesh segmentation. With a careful observation to dGCF, we devise here a fast computation scheme called fast geodesic curvature flow (FGCF), which only needs to solve a smaller and easier problem. The initial cutting contour is generated by a variant of random walks algorithm, which is very fast and gives reasonable cutting result with little user input. Experiment results on the benchmark mesh segmentation data set show that our proposed framework is robust to user input and capable of producing good results reflecting geometric features and human shape perception. 相似文献
115.
Data sets coming from simulations or sampling of real‐world phenomena often contain noise that hinders their processing and analysis. Automatic filtering and denoising can be challenging: when the nature of the noise is unknown, it is difficult to distinguish between noise and actual data features; in addition, the filtering process itself may introduce “artificial” features into the data set that were not originally present. In this paper, we propose a smoothing method for 2D scalar fields that gives the user explicit control over the data features. We define features as critical points of the given scalar function, and the topological structure they induce (i.e., the Morse‐Smale complex). Feature significance is rated according to topological persistence. Our method allows filtering out spurious features that arise due to noise by means of topological simplification, providing the user with a simple interface that defines the significance threshold, coupled with immediate visual feedback of the remaining data features. In contrast to previous work, our smoothing method guarantees a C1‐continuous output scalar field with the exact specified features and topological structures. 相似文献
116.
Blanchet-Sadri et al. have shown that Avoidability, or the problem of deciding the avoidability of a finite set of partial words over an alphabet of size k≥2, is NP-hard [F. Blanchet-Sadri, R. Jungers, J. Palumbo, Testing avoidability on sets of partial words is hard, Theoret. Comput. Sci. 410 (2009) 968-972]. Building on their work, we analyze in this paper the complexity of natural variations on the problem. While some of them are NP-hard, others are shown to be efficiently decidable. Using some combinatorial properties of de Bruijn graphs, we establish a correspondence between lengths of cycles in such graphs and periods of avoiding words, resulting in a tight bound for periods of avoiding words. We also prove that Avoidability can be solved in polynomial space, and reduces in polynomial time to the problem of deciding the avoidability of a finite set of partial words of equal length over the binary alphabet. We give a polynomial bound on the period of an infinite avoiding word, in the case of sets of full words, in terms of two parameters: the length and the number of words in the set. We give a polynomial space algorithm to decide if a finite set of partial words is avoided by a non-ultimately periodic infinite word. The same algorithm also decides if the number of words of length n avoiding a given finite set of partial words grows polynomially or exponentially with n. 相似文献
117.
Roberto Canonico Maurizio D'Arienzo Simon Pietro Romano Giorgio Ventre 《Software》2003,33(10):901-911
A number of distributed applications require communication services with quality of service (QoS) guarantees. Building global‐scale distributed systems with predictable properties is one of the great challenges for computer systems engineering in the new century. Work undertaken within the Internet Engineering Task Force has led to the definition of novel architectural models for the Internet with QoS support. According to these models, the network has to be appropriately configured in order to provide applications with the required performance guarantees. In next‐generation networks, enabling applications to interact with the underlying QoS services is of primary importance. Hence, several special‐purpose application programming interfaces (APIs) have been defined to let applications negotiate QoS parameters across QoS‐capable networks. However, so far, none of these APIs are available in different operating environments. We believe that such features should be embedded in programming environments for distributed applications. In this work we present how we included QoS control features in Tcl, a programming language that has been widely adopted for the development of distributed multimedia applications. Our work has led to the implementation of QTcl, an extended Tcl interpreter that provides programmers with a new set of primitives, in full compliance with the standard SCRAPI programming interface for the RSVP protocol. QTcl in highly portable, in that it enables standard QoS negotiation to be performed in a seamless fashion on the most common operating systems. Copyright © 2003 John Wiley & Sons, Ltd. 相似文献
118.
Coen De Roover Christophe Scholliers Wouter Amerijckx Theo D’Hondt Wolfgang De Meuter 《Science of Computer Programming》2013
Advances in wireless sensing and actuation technology allow embedding significant amounts of application logic inside wireless sensor networks. Such active WSN applications are more autonomous, but are significantly more complex to implement. Event-based middleware lends itself to implementing these applications. It offers developers fine-grained control over how an individual node interacts with the other nodes of the network. However, this control comes at the cost of event handlers which lack composability and violate software engineering principles such as separation of concerns. In this paper, we present CrimeSPOT as a domain-specific language for programming WSN applications on top of event-driven middleware. Its node-centric features enable programming a node’s interactions through declarative rules rather than event handlers. Its network-centric features support reusing code within and among WSN applications. Unique to CrimeSPOT is its support for associating application-specific semantics with events that carry sensor readings. These preclude transposing existing approaches that address the shortcomings of event-based middleware to the domain of wireless sensor networks. We provide a comprehensive overview of the language and the implementation of its accompanying runtime. The latter comprises several extensions to the Rete forward chaining algorithm. We evaluate the expressiveness of the language and the overhead of its runtime using small, but representative active WSN applications. 相似文献
119.
Model-driven engineering proposes the use of models to describe the relevant aspects of the system to be built and synthesize the final application from them. Models are normally described using Domain-Specific Modeling Languages (DSMLs), which provide primitives and constructs of the domain. Still, the increasing complexity of systems has raised the need for abstraction techniques able to produce simpler versions of the models while retaining some properties of interest. The problem is that developing such abstractions for each DSML from scratch is time and resource consuming. 相似文献
120.
Abstract We consider grammar systems in which several components are active at the same moment (a team of components is working). The power of such mechanisms is investigated and it is found that in many cases the team feature increases the generative capacity of grammar systems. In the so-called t-mode of derivation (a team works as much as it can) it is found that the team size does not induce an infinite hierarchy of languages. However, the family obtained in this case is a full abstract family of languages properly including ETOL. 相似文献