首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   237篇
  免费   9篇
  国内免费   2篇
化学工业   34篇
金属工艺   4篇
机械仪表   3篇
建筑科学   4篇
能源动力   1篇
轻工业   10篇
水利工程   2篇
无线电   36篇
一般工业技术   36篇
冶金工业   56篇
自动化技术   62篇
  2024年   1篇
  2023年   3篇
  2022年   9篇
  2021年   10篇
  2020年   6篇
  2019年   3篇
  2018年   6篇
  2017年   5篇
  2016年   5篇
  2015年   6篇
  2014年   5篇
  2013年   20篇
  2012年   5篇
  2011年   11篇
  2010年   12篇
  2009年   11篇
  2008年   12篇
  2007年   8篇
  2006年   6篇
  2005年   11篇
  2004年   7篇
  2003年   8篇
  2002年   5篇
  2001年   2篇
  2000年   4篇
  1999年   7篇
  1998年   16篇
  1997年   9篇
  1996年   2篇
  1995年   5篇
  1994年   4篇
  1993年   2篇
  1990年   1篇
  1987年   1篇
  1986年   1篇
  1985年   1篇
  1984年   2篇
  1983年   4篇
  1982年   1篇
  1981年   2篇
  1978年   1篇
  1977年   2篇
  1976年   1篇
  1975年   3篇
  1974年   1篇
  1973年   1篇
排序方式: 共有248条查询结果,搜索用时 15 毫秒
1.
Efficient multicast search under delay and bandwidth constraints   总被引:1,自引:0,他引:1  
The issue of a multicast search for a group of users is discussed in this study. Given the condition that the search is over only after all the users in the group are found, this problem is called the Conference Call Search (CCS) problem. The goal is to design efficient CCS strategies under delay and bandwidth constraints. While the problem of tracking a single user has been addressed by many studies, to the best of our knowledge, this study is one of the first attempts to reduce the search cost for multiple users. Moreover, as oppose to the single user tracking, for which one can always reduce the expected search delay by increasing the expected search cost, for a multicast search the dependency between the delay and the search cost is more complicated, as demonstrated in this study. We identify the key factors affecting the search efficiency, and the dependency between them and the search delay. Our analysis shows that under tight bandwidth constraints, the CCS problem is NP-hard. We therefore propose a search method that is not optimal, but has a low computational complexity. In addition, the proposed strategy yields a low search delay as well as a low search cost. The performance of the proposed search strategy is superior to the implementation of an optimal single user search on a group of users. Amotz Bar-Noy received the B.Sc. degree in 1981 in Mathematics and Computer Science and the Ph.D. degree in 1987 in Computer Science, both from the Hebrew University, Israel. From October 1987 to September 1989 he was a post-doc fellow in Stanford University, California. From October 1989 to August 1996 he was a Research Staff Member with IBM T. J. Watson Research Center, New York. From February 1995 to September 2001 he was an associate Professor with the Electrical Engineering-Systems department of Tel Aviv University, Israel. From September 1999 to December 2001 he was with AT research labs in New Jersey. Since February 2002 he is a Professor with the Computer and Information Science Department of Brooklyn College - CUNY, Brooklyn New York. Zohar Naor received the Ph.D. degree in Computer Science from Tel Aviv University, Tel Aviv, Israel, in 2000. Since 2003 he is with the University of Haifa, Israel. His areas of interests include wireless networks, resource management of computer networks, mobility, search strategies, and multiple access protocols.  相似文献   
2.
Linear elastic two-dimensional problems with singular points subjected to steady-state temperature distribution are considered. The stress tensor in the vicinity of the singular points exhibits singular behavior characterized by the strength of the singularity and the associated thermal stress intensity factors (TSIFs). It is shown that the TSIFs and the strength of the stress singularity can be obtained using the principle of complementary energy together with the modified Steklov method and the p-version of the finite element method. Importantly, the proposed method is applicable not only to singularities associated with crack tips, but also to multi-material interfaces and non-homogeneous materials. Numerical results of crack-tip singularities in a rectangular plate and singular points associated with a two-material inclusion are presented.Research performed while the author served as a visiting assistant professor at the Center for Computational Mechanics, Washington University, St. Louis, Missouri 63130, USA.  相似文献   
3.
Crack onset at a v-notch. Influence of the notch tip radius   总被引:1,自引:0,他引:1  
A criterion to predict crack onset at a sharp notch in homogeneous brittle materials has been presented in a previous paper of one of the authors. It is reviewed and improved herein. It fulfils both the energy and the strength criteria and takes an Irwin-like form involving the generalized intensity factor of the singularity governing the elastic behaviour in the vicinity of a notch tip. The prediction agrees fairly well with the experiments although it slightly underestimates the experimental measures. A cause of this discrepancy can be that a small notch tip radius blunts the sharp corner. It is analysed in this paper by means of matched asymptotics involving 2 small parameters: a micro-crack increment length and the notch tip radius. A correction is brought to the initial prediction and a better agreement is obtained with experiments on PMMA notched specimens. Experiments performed on a stiffer material (Alumina/Zirconia) show that it is less sensitive to small notch tip radii. A remaining small discrepancy between experiments and predictions can be due to some non linear behaviour of the materials near the notch tip. In addition, without new developments, the method allows to determine the stress intensity factor at the tip of a short crack emanating from a sharp or a rounded v-notch.  相似文献   
4.
The ability of the juvenile female reproductive axis to respond to hormonal stimulation was investigated in a Perciform fish, the striped bass (Morone saxatilis) using various combinations of testosterone (T), GnRH agonist (GnRHa), and pimozide. A long-term treatment with T alone, or T in combination with GnRHa, increased pituitary gonadotropin II (GtH II) levels 2- and 3-fold, respectively, suggesting that T and GnRHa each stimulate GtH II accumulation. Release of the accumulated GtH II could be induced only by high doses of GnRHa in combination with T, indicating that GtH II synthesis and release require different levels of GnRH stimulation. The addition of the dopamine antagonist pimozide did not affect pituitary and plasma GtH II levels but, in response to an additional acute GnRHa challenge, inhibited the release of GtH II. Although ovarian development was slightly stimulated by a combined T and GnRHa treatment, vitellogenesis was generally not initiated. The present study demonstrated that the juvenile striped bass pituitary is responsive to hormonal stimulation, resulting in elevated levels of GtH II in the pituitary and plasma. However, increased plasma levels of GtH II did not result in precocious puberty, suggesting that additional factors are required for the initiation of ovarian development in this teleost.  相似文献   
5.
Alternating systems are models of computer programs whose behavior is governed by the actions of multiple agents with, potentially, different goals. Examples include control systems, resource schedulers, security protocols, auctions and election mechanisms. Proving properties about such systems has emerged as an important new area of study in formal verification, with the development of logical frameworks such as the alternating temporal logic ATL*. Techniques for model checking ATL* over finite-state systems have been well studied, but many important systems are infinite-state and thus their verification requires, either explicitly or implicitly, some form of deductive reasoning. This paper presents a theoretical framework for the analysis of alternating infinite-state systems. It describes models of computation, of various degrees of generality, and alternating-time logics such as ATL* and its variations. It then develops a proof system that allows to prove arbitrary ATL* properties over these infinite-state models. The proof system is shown to be complete relative to validities in the weakest possible assertion language. The paper then derives auxiliary proof rules and verification diagrams techniques and applies them to security protocols, deriving a new formal proof of fairness of a multi-party contract signing protocol where the model of the protocol and of the properties contains both game-theoretic and infinite-state (parameterized) aspects.  相似文献   
6.
There have been suggestions that the unity of consciousness may be related to the kind of holism depicted only in quantum physics. This argument will be clarified and strengthened. It requires the brain to contain a quantum system with the right properties — a Bose-Einstein condensate. It probably does contain one such system, as both theory and experiment have indicated. In fact, we cannot pay full attention to a quantum whole and its parts simultaneously, though we may oscillate between the two. In a quantum theory of consciousness, emergent meanings arise as an inevitable consequence of Heisenberg's Uncertainty Principle.  相似文献   
7.
Relying on the literature on tensions and contradictions and the theory of practice, coupled with the literature on creative industries, this study uncovers how creative entrepreneurs balance the tension between art and business and respond to other challenges of creative entrepreneurship. The multiple case studies method is adopted by examining founders, cofounders and main employees of European film production companies. We reveal the perception of creative entrepreneurs towards the relationship between art and business. We explore different organizational and industry-level challenges experienced by creative entrepreneurs and uncover the organizational practices they adopt to deal with the identified challenges. The research contributes to the phenomenon of creative entrepreneurship by introducing the practice perspective, to the literature on paradox and contradiction by exploring the micro-foundations of tensions and paradox responses in high-intensity situations and to practice-based studies by investigating a domain-specific practice theory and highlighting the agency of creative entrepreneurs in adapting practices necessary to deal with conflicting demands of creative entrepreneurship.  相似文献   
8.
Journal of Automated Reasoning - Algebraic datatypes, and among them lists and trees, have attracted a lot of interest in automated reasoning and Satisfiability Modulo Theories (SMT). Since its...  相似文献   
9.
This paper provides a comparative study on the different techniques of classifying human activities that are performed using body-worn miniature inertial and magnetic sensors. The classification techniques implemented and compared in this study are: Bayesian decision making (BDM), a rule-based algorithm (RBA) or decision tree, the least-squares method (LSM), the k-nearest neighbor algorithm (k-NN), dynamic time warping (DTW), support vector machines (SVM), and artificial neural networks (ANN). Human activities are classified using five sensor units worn on the chest, the arms, and the legs. Each sensor unit comprises a tri-axial gyroscope, a tri-axial accelerometer, and a tri-axial magnetometer. A feature set extracted from the raw sensor data using principal component analysis (PCA) is used in the classification process. A performance comparison of the classification techniques is provided in terms of their correct differentiation rates, confusion matrices, and computational cost, as well as their pre-processing, training, and storage requirements. Three different cross-validation techniques are employed to validate the classifiers. The results indicate that in general, BDM results in the highest correct classification rate with relatively small computational cost.  相似文献   
10.
We review a number of formal verification techniques supported by STeP, the Stanford Temporal Prover, describing how the tool can be used to verify properties of several versions of the Bakery Mutual exclusion algorithm for mutual exclusion. We verify the classic two-process algorithm and simple variants, as well as an atomic parameterized version. The methods used include deductive verification rules, verification diagrams, automatic invariant generation, and finite-state model checking and abstraction.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号