首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   218篇
  免费   8篇
  国内免费   1篇
电工技术   3篇
化学工业   27篇
金属工艺   3篇
机械仪表   14篇
建筑科学   8篇
能源动力   40篇
轻工业   6篇
水利工程   3篇
石油天然气   2篇
无线电   5篇
一般工业技术   27篇
冶金工业   12篇
自动化技术   77篇
  2023年   1篇
  2022年   4篇
  2021年   5篇
  2020年   2篇
  2019年   9篇
  2018年   9篇
  2017年   4篇
  2016年   3篇
  2015年   7篇
  2014年   8篇
  2013年   14篇
  2012年   19篇
  2011年   12篇
  2010年   25篇
  2009年   19篇
  2008年   20篇
  2007年   11篇
  2006年   5篇
  2005年   2篇
  2004年   4篇
  2002年   3篇
  2000年   3篇
  1998年   1篇
  1997年   5篇
  1996年   5篇
  1995年   1篇
  1994年   4篇
  1993年   1篇
  1992年   2篇
  1991年   1篇
  1990年   1篇
  1989年   2篇
  1985年   2篇
  1984年   2篇
  1983年   1篇
  1982年   2篇
  1981年   3篇
  1980年   1篇
  1977年   1篇
  1970年   1篇
  1969年   1篇
  1966年   1篇
排序方式: 共有227条查询结果,搜索用时 15 毫秒
1.
2.
Preemptive scheduling problems on parallel machines are classic problems. Given the goal of minimizing the makespan, they are polynomially solvable even for the most general model of unrelated machines. In these problems, a set of jobs is to be assigned to run on a set of m machines. A job can be split into parts arbitrarily and these parts are to be assigned to time slots on the machines without parallelism, that is, for every job, at most one of its parts can be processed at each time. Motivated by sensitivity analysis and online algorithms, we investigate the problem of designing robust algorithms for constructing preemptive schedules. Robust algorithms receive one piece of input at a time. They may change a small portion of the solution as an additional part of the input is revealed. The capacity of change is based on the size of the new piece of input. For scheduling problems, the supremum ratio between the total size of the jobs (or parts of jobs) which may be re-scheduled upon the arrival of a new job j, and the size of j, is called migration factor. We design a strongly optimal algorithm with the migration factor $1-\frac{1}{m}$ for identical machines. Strongly optimal algorithms avoid idle time and create solutions where the (non-increasingly) sorted vector of completion times of the machines is lexicographically minimal. In the case of identical machines this results not only in makespan minimization, but the created solution is also optimal with respect to any ? p norm (for p>1). We show that an algorithm of a smaller migration factor cannot be optimal with respect to makespan or any other ? p norm, thus the result is best possible in this sense as well. We further show that neither uniformly related machines nor identical machines with restricted assignment admit an optimal algorithm with a constant migration factor. This lower bound holds both for makespan minimization and for any ? p norm. Finally, we analyze the case of two machines and show that in this case it is still possible to maintain an optimal schedule with a small migration factor in the cases of two uniformly related machines and two identical machines with restricted assignment.  相似文献   
3.
4.
Two mechanisms that verify knowledge contributions in electronic repositories are expert-governance and community-governance. Our goal is to examine repository users' perceptions of the conditions under which these mechanisms verify knowledge contributions. Qualitative data show that perceived credibility of experts, perceived ownership of content, and experts' (meticulous) execution of governance functions are salient for expert-governance, and the perceived involvement of community members, and community members' (continuous and collective) execution of governance functions are important for community-governance.  相似文献   
5.
In this paper, a new approach for detecting previously unencountered malware targeting mobile device is proposed. In the proposed approach, time-stamped security data is continuously monitored within the target mobile device (i.e., smartphones, PDAs) and then processed by the knowledge-based temporal abstraction (KBTA) methodology. Using KBTA, continuously measured data (e.g., the number of sent SMSs) and events (e.g., software installation) are integrated with a mobile device security domain knowledge-base (i.e., an ontology for abstracting meaningful patterns from raw, time-oriented security data), to create higher level, time-oriented concepts and patterns, also known as temporal abstractions. Automatically-generated temporal abstractions are then monitored to detect suspicious temporal patterns and to issue an alert. These patterns are compatible with a set of predefined classes of malware as defined by a security expert (or the owner) employing a set of time and value constraints. The goal is to identify malicious behavior that other defensive technologies (e.g., antivirus or firewall) failed to detect. Since the abstraction derivation process is complex, the KBTA method was adapted for mobile devices that are limited in resources (i.e., CPU, memory, battery). To evaluate the proposed modified KBTA method a lightweight host-based intrusion detection system (HIDS), combined with central management capabilities for Android-based mobile phones, was developed. Evaluation results demonstrated the effectiveness of the new approach in detecting malicious applications on mobile devices (detection rate above 94% in most scenarios) and the feasibility of running such a system on mobile devices (CPU consumption was 3% on average).  相似文献   
6.
7.
In the robotics community, there exist implicit assumptions concerning the computational capabilities of robots. Two computational classes of robots emerge as focal points of recent research: robot ants and robot elephants. Ants have poor memory and communication capabilities, but are able to communicate using pheromones, in effect, turning their work area into a shared memory. By comparison, elephants are computationally stronger, have large memory, and are equipped with strong sensing and communication capabilities. Unfortunately, not much is known about the relation between the capabilities of these models in terms of the tasks they can address. In this paper, we present formal models of both ants and elephants, and investigate if one dominates the other. We present two algorithms: AntEater, which allows elephant robots to execute ant algorithms and ElephantGun, which converts elephant algorithms-specified as Turing machines-into ant algorithms. By exploring the computational capabilities of these algorithms, we reach interesting conclusions regarding the computational power of both models.  相似文献   
8.
9.
The Tigris is one of the most important transboundary rivers in western Asia and originates in the Toros mountains of the Eastern Anatolia region of Turkey. Multivariate statistical techniques, such as cluster analysis (CA), principal component analysis (PCA) and factor analysis (FA), were applied for the evaluation of temporal/spatial variations and the interpretation of a water quality data set for the Tigris River, which was obtained during 1 year of monitoring. This study presents the usefulness of multivariate statistical techniques for the evaluation and interpretation of complex water quality data sets and apportionment of pollution sources/factors to obtain better information about water quality and the design of a monitoring network for the effective management of water resources. Hierarchical CA grouped 12 months into two periods (the first and second periods) and classified seven monitoring sites into three groups, that is, less polluted sites, medium polluted sites and highly polluted sites, based on similarities in the water quality characteristics. PCA/FA identified five factors in the data structure, which explained 77.5% of the total variance of the data set. This allowed us to group the selected parameters according to common features and to evaluate the influence of each group on the overall variation in water quality. Varifactors obtained from the factor analysis indicated that the parameters responsible for water quality variation were mainly related to soluble salts (natural), organic pollution and nutrients (anthropogenic). Copyright © 2011 John Wiley & Sons, Ltd.  相似文献   
10.
Let $G=(V,E)$ be an undirected multigraph with a special vertex ${\it root} \in V$, and where each edge $e \in E$ is endowed with a length $l(e) \geq 0$ and a capacity $c(e) > 0$. For a path $P$ that connects $u$ and $v$, the {\it transmission time} of $P$ is defined as $t(P)=\mbox{\large$\Sigma$}_{e \in P} l(e) + \max_{e \in P}\!{(1 / c(e))}$. For a spanning tree $T$, let $P_{u,v}^T$ be the unique $u$--$v$ path in $T$. The {\sc quickest radius spanning tree problem} is to find a spanning tree $T$ of $G$ such that $\max _{v \in V} t(P^T_{root,v})$ is minimized. In this paper we present a 2-approximation algorithm for this problem, and show that unless $P =NP$, there is no approximation algorithm with a performance guarantee of $2 - \epsilon$ for any $\epsilon >0$. The {\sc quickest diameter spanning tree problem} is to find a spanning tree $T$ of $G$ such that $\max_{u,v \in V} t(P^T_{u,v})$ is minimized. We present a ${3 \over 2}$-approximation to this problem, and prove that unless $P=NP$ there is no approximation algorithm with a performance guarantee of ${3 \over 2}-\epsilon$ for any $\epsilon >0$.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号