首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   261篇
  免费   16篇
  国内免费   3篇
电工技术   2篇
化学工业   21篇
金属工艺   5篇
机械仪表   3篇
建筑科学   5篇
能源动力   1篇
轻工业   29篇
水利工程   2篇
无线电   55篇
一般工业技术   39篇
冶金工业   23篇
原子能技术   2篇
自动化技术   93篇
  2023年   1篇
  2020年   9篇
  2019年   5篇
  2018年   5篇
  2017年   6篇
  2016年   8篇
  2015年   7篇
  2014年   6篇
  2013年   17篇
  2012年   16篇
  2011年   16篇
  2010年   19篇
  2009年   15篇
  2008年   11篇
  2007年   17篇
  2006年   9篇
  2005年   1篇
  2004年   9篇
  2003年   3篇
  2002年   6篇
  2001年   6篇
  2000年   1篇
  1999年   4篇
  1998年   3篇
  1997年   7篇
  1996年   3篇
  1995年   3篇
  1994年   5篇
  1993年   9篇
  1992年   8篇
  1991年   4篇
  1990年   6篇
  1989年   7篇
  1988年   1篇
  1987年   3篇
  1986年   2篇
  1985年   3篇
  1984年   2篇
  1983年   1篇
  1982年   6篇
  1980年   1篇
  1978年   2篇
  1974年   1篇
  1973年   3篇
  1970年   3篇
排序方式: 共有280条查询结果,搜索用时 15 毫秒
1.
Learning Automata from Ordered Examples   总被引:1,自引:1,他引:0  
Porat  Sara  Feldman  Jerome A. 《Machine Learning》1991,7(2-3):109-138
Connectionist learning models have had considerable empirical success, but it is hard to characterize exactly what they learn. The learning of finite-state languages (FSL) from example strings is a domain which has been extensively studied and might provide an opportunity to help understand connectionist learning. A major problem is that traditional FSL learning assumes the storage of all examples and thus violates connectionist principles. This paper presents a provably correct algorithm for inferring any minimum-state deterministic finite-state automata (FSA) from a complete ordered sample using limited total storage and without storing example strings. The algorithm is an iterative strategy that uses at each stage a current encoding of the data considered so far, and one single sample string. One of the crucial advantages of our algorithm is that the total amount of space used in the course of learning for encoding any finite prefix of the sample is polynomial in the size of the inferred minimum state deterministic FSA. The algorithm is also relatively efficient in time and has been implemented. More importantly, there is a connectionist version of the algorithm that preserves these properties. The connectionist version requires much more structure than the usual models and has been implemented using the Rochester Connectionist Simulator. We also show that no machine with finite working storage can iteratively identify the FSL from arbitrary presentations.  相似文献   
2.
The detection of short-duration nonstationary signals, which are commonly referred to as transients, is often performed in the time-frequency-transform domain. An analytical framework within which the performance of different detectors based on linear transforms can be easily compared, for different classes of signals, is developed. A given class of transients is modeled as a signal existing in a linear subspace, plus a mismatch signal. Closed-form expressions are derived for the best and the worst detection performance for all possible transients in a given class. Using this framework, the performance of detectors based on the Gabor transform and on the short-time Fourier transform is evaluated and compared  相似文献   
3.
Repeated reference creates strong expectations in addressees that a speaker will continue to use the same expression for the same object. The authors investigate the root reason for these expectations by comparing a cooperativeness-based account (Grice, 1975) with a simpler consistency-based account. In two eye-tracking experiments, the authors investigated the expectations underlying the effect of precedents on comprehension. The authors show that listeners expect speakers to be consistent in their use of expressions even when these expectations cannot be motivated by the assumption of cooperativeness. The authors conclude that though this phenomenon seems to be motivated by cooperativeness, listeners' expectation that speakers be consistent in their use of expressions is governed by a general expectation of consistency. (PsycINFO Database Record (c) 2010 APA, all rights reserved)  相似文献   
4.
A model for the carbohydrate recognition domain (CRD) and combining site of the human asialoglycoprotein (ASGP) receptor has been computed on the basis of the close sequence homology with the mannose-binding lectin (MBP), whose three-dimensional structure in complex with a ligand has been determined by crystallographic methods (Weis, W.I.; Drickamer, K.; Hendrickson, W.A. Nature 1992, 360: 127). Within the limitations of modeling methods, the model is compatible with data on ligand binding of the family C-type lectins, of which the MBP and the ASGP receptor are members. The model derived can serve as a guide for designing site-directed mutagenesis experiments in order to further elucidate the origins of specificity of the ASGP receptor toward galactose. In particular, the model focuses attention on the possible role of position 207 (MBP sequence numbering) in promoting galactose binding.  相似文献   
5.
This paper develops a method of error analysis for Fourier transform-based sinusoidal frequency estimation in the presence of nonrandom interferences. A general error formula is derived and then specialized to the cases of additive and multiplicative interferences. Approximate error formulas are derived for the case of additive polynomial-phase interference. Finally, an application to error analysis in estimating the parameters of multiple polynomial-phase signals is discussed in detail  相似文献   
6.
7.
8.
9.
10.
We show how to support efficient back traversal in a unidirectional list, using small memory and with essentially no slowdown in forward steps. Using O(lgn)O(lgn) memory for a list of size nn, the ii’th back-step from the farthest point reached so far takes O(lgi)O(lgi) time in the worst case, while the overhead per forward step is at most ?? for arbitrary small constant ?>0?>0. An arbitrary sequence of forward and back steps is allowed. A full trade-off between memory usage and time per back-step is presented: kk vs. kn1/kkn1/k and vice versa. Our algorithms are based on a novel pebbling technique which moves pebbles on a virtual binary, or n1/kn1/k-ary, tree that can only be traversed in a pre-order fashion.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号