首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   321篇
  免费   17篇
电工技术   10篇
化学工业   60篇
金属工艺   2篇
机械仪表   2篇
建筑科学   21篇
矿业工程   2篇
能源动力   33篇
轻工业   25篇
水利工程   7篇
无线电   28篇
一般工业技术   35篇
冶金工业   34篇
原子能技术   2篇
自动化技术   77篇
  2023年   3篇
  2022年   7篇
  2021年   15篇
  2020年   9篇
  2019年   8篇
  2017年   7篇
  2016年   12篇
  2015年   16篇
  2014年   19篇
  2013年   24篇
  2012年   20篇
  2011年   25篇
  2010年   20篇
  2009年   27篇
  2008年   12篇
  2007年   13篇
  2006年   12篇
  2005年   5篇
  2004年   6篇
  2003年   5篇
  2002年   5篇
  2001年   3篇
  2000年   5篇
  1999年   3篇
  1998年   13篇
  1997年   6篇
  1996年   6篇
  1995年   6篇
  1994年   3篇
  1993年   2篇
  1992年   2篇
  1990年   1篇
  1989年   1篇
  1987年   1篇
  1986年   2篇
  1985年   2篇
  1982年   1篇
  1981年   1篇
  1979年   1篇
  1978年   1篇
  1977年   1篇
  1976年   1篇
  1975年   2篇
  1973年   3篇
  1966年   1篇
排序方式: 共有338条查询结果,搜索用时 15 毫秒
1.
The TELEMAC project brings new methodologies from the Information and Science Technologies field to the world of water treatment. TELEMAC offers an advanced remote management system which adapts to most of the anaerobic wastewater treatment plants that do not benefit from a local expert in wastewater treatment. The TELEMAC system takes advantage of new sensors to better monitor the process dynamics and to run automatic controllers that stabilise the treatment plant, meet the depollution requirements and provide a biogas quality suitable for cogeneration. If the automatic system detects a failure which cannot be solved automatically or locally by a technician, then an expert from the TELEMAC Control Centre is contacted via the internet and manages the problem.  相似文献   
2.
We present some new lower bounds on the optimal information rate and on the optimal average information rate of secret sharing schemes with homogeneous access structure. These bounds are found by using some covering constructions and a new parameter, the k-degree of a participant, that is introduced in this paper. Our bounds improve the previous ones in almost all cases.  相似文献   
3.
4.
Metric Access Methods (MAMs) are indexing techniques which allow working in generic metric spaces. Therefore, MAMs are specially useful for Content-Based Image Retrieval systems based on features which use non L p norms as similarity measures. MAMs naturally allow the design of image browsers due to their inherent hierarchical structure. The Hierarchical Cellular Tree (HCT), a MAM-based indexing technique, provides the starting point of our work. In this paper, we describe some limitations detected in the original formulation of the HCT and propose some modifications to both the index building and the search algorithm. First, the covering radius, which is defined as the distance from the representative to the furthest element in a node, may not cover all the elements belonging to the node’s subtree. Therefore, we propose to redefine the covering radius as the distance from the representative to the furthest element in the node’s subtree. This new definition is essential to guarantee a correct construction of the HCT. Second, the proposed Progressive Query retrieval scheme can be redesigned to perform the nearest neighbor operation in a more efficient way. We propose a new retrieval scheme which takes advantage of the benefits of the search algorithm used in the index building. Furthermore, while the evaluation of the HCT in the original work was only subjective, we propose an objective evaluation based on two aspects which are crucial in any approximate search algorithm: the retrieval time and the retrieval accuracy. Finally, we illustrate the usefulness of the proposal by presenting some actual applications.  相似文献   
5.
Monitoring of cloud computing infrastructures is an imperative necessity for cloud providers and administrators to analyze, optimize and discover what is happening in their own infrastructures. Current monitoring solutions do not fit well for this purpose mainly due to the incredible set of new requirements imposed by the particular requirements associated to cloud infrastructures. This paper describes in detail the main reasons why current monitoring solutions do not work well. Also, it provides an innovative monitoring architecture that enables the monitoring of the physical and virtual machines available within a cloud infrastructure in a non-invasive and transparent way making it suitable not only for private cloud computing but also for public cloud computing infrastructures. This architecture has been validated by means of a prototype integrating an existing enterprise-class monitoring solution, Nagios, with the control and data planes of OpenStack, a well-known stack for cloud infrastructures. As a result, our new monitoring architecture is able to extend the exiting Nagios functionalities to fit in the monitoring of cloud infrastructures. The proposed architecture has been designed, implemented and released as open source to the scientific community. The proposal has also been empirically validated in a production-level cloud computing infrastructure running a test bed with up to 128 VMs where overhead and responsiveness has been carefully analyzed.  相似文献   
6.
Edge matching puzzles have been amongst us for a long time now and traditionally they have been considered, both, a children’s game and an interesting mathematical divertimento. Their main characteristics have already been studied, and their worst-case complexity has been properly classified as a NP-complete problem. It is in recent times, specially after being used as the problem behind a money-prized contest, with a prize of 2US$ million for the first solver, that edge matching puzzles have attracted mainstream attention from wider audiences, including, of course, computer science people working on solving hard problems. We consider these competitions as an interesting opportunity to showcase SAT/CSP solving techniques when confronted to a real world problem to a broad audience, a part of the intrinsic, i.e. monetary, interest of such a contest. This article studies the NP-complete problem known as edge matching puzzle using SAT and CSP approaches for solving it. We will focus on providing, first and foremost, a theoretical framework, including a generalized definition of the problem. We will design and show algorithms for easy and fast problem instances generation, generators with easily tunable hardness. Afterwards we will provide with SAT and CSP models for the problems and we will study problem complexity, both typical case and worst-case complexity. We will also provide some specially crafted heuristics that result in a boost in solving time and study which is the effect of such heuristics.  相似文献   
7.
8.
There is a chronic lack of shared application domains to test advanced research models and agent negotiation architectures in Multiagent Systems. In this paper we introduce a friendly testbed for that purpose. The testbed is based on The Diplomacy Game where negotiation and the relationships between players play an essential role. The testbed profits from the existence of a large community of human players that know the game and can easily provide data for experiments. We explain the infrastructure in the paper and make it freely available to the AI community.  相似文献   
9.
Atrial Fibrillation (AF) is the most common supraventricular tachyarrhythmia. Recently, it has been suggested that AF is partially organized on its onset and termination, thus being more suitable for antiarrhythmia and to avoid unnecessary therapy. Although several invasive and non-invasive AF organization estimators have been proposed, the organization time course in the first and last minutes of AF has not been quantified yet. The aim of this work is to study non-invasively the organization variation within the first and last minutes of paroxysmal AF. The organization was evaluated making use of sample entropy, which can robustly estimate electrical atrial activity organization from surface ECG recordings. This work proves an organization decrease in the first minutes of AF onset and an increase within the last minute before spontaneous AF termination. These results are in agreement with the conclusions reported by other authors who made use of invasive recordings.  相似文献   
10.
There are a few issues that still need to be covered regarding security in the Grid area. One of them is authorization where there exist good solutions to define, manage and enforce authorization policies in Grid scenarios. However, these solutions usually do not provide Grid administrators with semantic-aware components closer to the particular Grid domain and easing different administration tasks such as conflict detection or resolution. This paper defines a proposal based on Semantic Web to define, manage and enforce security policies in a Grid scenario. These policies are defined by means of semantic-aware rules which help the administrator to create higher-level definitions with more expressiveness. These rules also permit performing added-value tasks such as conflict detection and resolution, which can be of interest in medium and large scale scenarios where different administrators define the authorization rules that should be followed before accessing a resource in the Grid. The proposed solution has been also tested providing some reasonable response times in the authorization decision process.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号