首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   301篇
  免费   11篇
  国内免费   3篇
电工技术   4篇
化学工业   48篇
机械仪表   1篇
建筑科学   5篇
能源动力   6篇
轻工业   12篇
水利工程   2篇
石油天然气   2篇
无线电   61篇
一般工业技术   29篇
冶金工业   30篇
自动化技术   115篇
  2023年   2篇
  2022年   7篇
  2021年   5篇
  2020年   4篇
  2019年   3篇
  2018年   6篇
  2017年   9篇
  2016年   12篇
  2015年   10篇
  2014年   10篇
  2013年   21篇
  2012年   9篇
  2011年   10篇
  2010年   7篇
  2009年   19篇
  2008年   19篇
  2007年   15篇
  2006年   11篇
  2005年   15篇
  2004年   10篇
  2003年   12篇
  2002年   10篇
  2001年   4篇
  2000年   6篇
  1999年   8篇
  1998年   13篇
  1997年   12篇
  1996年   7篇
  1995年   3篇
  1994年   5篇
  1993年   7篇
  1992年   3篇
  1991年   8篇
  1990年   2篇
  1989年   1篇
  1988年   1篇
  1987年   1篇
  1984年   2篇
  1983年   1篇
  1982年   1篇
  1979年   1篇
  1978年   1篇
  1972年   1篇
  1971年   1篇
排序方式: 共有315条查询结果,搜索用时 15 毫秒
1.
Efficient multicast search under delay and bandwidth constraints   总被引:1,自引:0,他引:1  
The issue of a multicast search for a group of users is discussed in this study. Given the condition that the search is over only after all the users in the group are found, this problem is called the Conference Call Search (CCS) problem. The goal is to design efficient CCS strategies under delay and bandwidth constraints. While the problem of tracking a single user has been addressed by many studies, to the best of our knowledge, this study is one of the first attempts to reduce the search cost for multiple users. Moreover, as oppose to the single user tracking, for which one can always reduce the expected search delay by increasing the expected search cost, for a multicast search the dependency between the delay and the search cost is more complicated, as demonstrated in this study. We identify the key factors affecting the search efficiency, and the dependency between them and the search delay. Our analysis shows that under tight bandwidth constraints, the CCS problem is NP-hard. We therefore propose a search method that is not optimal, but has a low computational complexity. In addition, the proposed strategy yields a low search delay as well as a low search cost. The performance of the proposed search strategy is superior to the implementation of an optimal single user search on a group of users. Amotz Bar-Noy received the B.Sc. degree in 1981 in Mathematics and Computer Science and the Ph.D. degree in 1987 in Computer Science, both from the Hebrew University, Israel. From October 1987 to September 1989 he was a post-doc fellow in Stanford University, California. From October 1989 to August 1996 he was a Research Staff Member with IBM T. J. Watson Research Center, New York. From February 1995 to September 2001 he was an associate Professor with the Electrical Engineering-Systems department of Tel Aviv University, Israel. From September 1999 to December 2001 he was with AT research labs in New Jersey. Since February 2002 he is a Professor with the Computer and Information Science Department of Brooklyn College - CUNY, Brooklyn New York. Zohar Naor received the Ph.D. degree in Computer Science from Tel Aviv University, Tel Aviv, Israel, in 2000. Since 2003 he is with the University of Haifa, Israel. His areas of interests include wireless networks, resource management of computer networks, mobility, search strategies, and multiple access protocols.  相似文献   
2.
This paper describes a new formalism for inheritance systems, based on the formal semantics of set expressions. Using the formalism, it is possible to define new semantic classes by arbitrary set expressions operating on previously defined classes. Thus generalizing bothIS-A links andIS-NOT-A links and adding the set intersection operation. We present an efficient algorithm which follows these definitions to deduce the properties implied by the inheritance network, i.e., the properties of the classes containing a given element. The application which motivated the development of the formalism, namely semantic disambiguation of natural language, is also described.  相似文献   
3.
This paper presents a technique for characterizing the statistical properties and spectrum of power supply noise using only two on-chip low-throughput samplers. The samplers utilize a voltage-controlled oscillator to perform high-resolution analog-to-digital conversion with minimal hardware. The measurement system is implemented in a 0.13-/spl mu/m process along with a high-speed link transceiver. Measured results from this chip validate the accuracy of the measurement system and elucidate several aspects of power supply noise, including its cyclostationary nature.  相似文献   
4.
Fractionation of partly hydrolysed polyvinyl acetate (PVA) was performed by warming of its aqueous solutions. The following properties of the obtained fractions were determined: viscosity, molecular weight and molecular weight distribution, surface tension, and absorbance in the IR range. The blockiness of the polymer molecules, characterized by their behaviour towards iodine-containing systems such as I2,-H3BO3 and I2,-KI, was estimated. Fractionation of the aqueous solutions of PVA by warming is based mainly on the different internal molecular structure of the separated products, i.e. on the length of the vinyl acetate blocks in the PVA molecules and, to a lesser extent, on the degree of hydrolysis and the degree of polymerization. The more blocklike are the PVA molecules, the less compatible are the polymers in the PVA-hydroxypropyl methylcellulose (HPMC)-water system. At phase separation in this sytem the PVA molecules which are not compatible with HPMC are, in the first place, those of the highest blockiness.  相似文献   
5.
We show how to construct pseudo-random permutations that satisfy a certain cycle restriction, for example that the permutation be cyclic (consisting of one cycle containing all the elements) or an involution (a self-inverse permutation) with no fixed points. The construction can be based on any (unrestricted) pseudo-random permutation. The resulting permutations are defined succinctly and their evaluation at a given point is efficient. Furthermore, they enjoy a fast forward property, i.e. it is possible to iterate them at a very small cost. Received 10 August 2000 and revised 30 September 2000 Online publication 9 April 2001  相似文献   
6.
We say that a distribution over {0,1}n is (ε,k)-wise independent if its restriction to every k coordinates results in a distribution that is ε-close to the uniform distribution. A natural question regarding (ε,k)-wise independent distributions is how close they are to some k-wise independent distribution. We show that there exist (ε,k)-wise independent distributions whose statistical distance is at least nO(k)·ε from any k-wise independent distribution. In addition, we show that for any (ε,k)-wise independent distribution there exists some k-wise independent distribution, whose statistical distance is nO(k)·ε.  相似文献   
7.
The Sparse Table is a data structure for controlling density in an array which was first proposed in 1981 and has recently reappeared as a component of cache-oblivious data structures. All existing variants of the Sparse Table divide the array into blocks that have a calibrator tree above them. We show that the same amortized complexity can be achieved without this auxiliary structure, obtaining a canonical data structure that can be updated by conceptually simpler algorithms.  相似文献   
8.
Mucopolysaccharidosis IIIA (MPS IIIA, Sanfilippo syndrome type A), a paediatric neurological lysosomal storage disease, is caused by impaired function of the enzyme N-sulfoglucosamine sulfohydrolase (SGSH) resulting in impaired catabolism of heparan sulfate glycosaminoglycan (HS GAG) and its accumulation in tissues. MPS IIIA represents a significant proportion of childhood dementias. This condition generally leads to patient death in the teenage years, yet no effective therapy exists for MPS IIIA and a complete understanding of the mechanisms of MPS IIIA pathogenesis is lacking. Here, we employ targeted CRISPR/Cas9 mutagenesis to generate a model of MPS IIIA in the zebrafish, a model organism with strong genetic tractability and amenity for high-throughput screening. The sgshΔex5−6 zebrafish mutant exhibits a complete absence of Sgsh enzymatic activity, leading to progressive accumulation of HS degradation products with age. sgshΔex5−6 zebrafish faithfully recapitulate diverse CNS-specific features of MPS IIIA, including neuronal lysosomal overabundance, complex behavioural phenotypes, and profound, lifelong neuroinflammation. We further demonstrate that neuroinflammation in sgshΔex5−6 zebrafish is largely dependent on interleukin-1β and can be attenuated via the pharmacological inhibition of Caspase-1, which partially rescues behavioural abnormalities in sgshΔex5−6 mutant larvae in a context-dependent manner. We expect the sgshΔex5−6 zebrafish mutant to be a valuable resource in gaining a better understanding of MPS IIIA pathobiology towards the development of timely and effective therapeutic interventions.  相似文献   
9.
We show how to compute the smallest rectangle that can enclose any polygon, from a given set of polygons, in nearly linear time; we also present a PTAS for the problem, as well as a linear-time algorithm for the case when the polygons are rectangles themselves. We prove that finding a smallest convex polygon that encloses any of the given polygons is NP-hard, and give a PTAS for minimizing the perimeter of the convex enclosure. We also give efficient algorithms to find the smallest rectangle simultaneously enclosing a given pair of convex polygons.  相似文献   
10.
Alon  Zaks 《Algorithmica》2008,32(4):611-614
Abstract. A proper coloring of the edges of a graph G is called acyclic if there is no two-colored cycle in G . The acyclic edge chromatic number of G , denoted by a'(G) , is the least number of colors in an acyclic edge coloring of G . For certain graphs G , a'(G)\geq Δ(G)+2 where Δ(G) is the maximum degree in G . It is known that a'(G)≤ Δ + 2 for almost all Δ -regular graphs, including all Δ -regular graphs whose girth is at least log Δ . We prove that determining the acyclic edge chromatic number of an arbitrary graph is an NP-complete problem. For graphs G with sufficiently large girth in terms of Δ(G) , we present deterministic polynomial-time algorithms that color the edges of G acyclically using at most Δ(G)+2 colors.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号