全文获取类型
收费全文 | 107篇 |
免费 | 5篇 |
专业分类
电工技术 | 1篇 |
化学工业 | 5篇 |
金属工艺 | 1篇 |
建筑科学 | 2篇 |
能源动力 | 3篇 |
无线电 | 10篇 |
一般工业技术 | 36篇 |
冶金工业 | 21篇 |
原子能技术 | 1篇 |
自动化技术 | 32篇 |
出版年
2023年 | 1篇 |
2022年 | 1篇 |
2021年 | 1篇 |
2019年 | 2篇 |
2018年 | 4篇 |
2017年 | 3篇 |
2016年 | 2篇 |
2014年 | 7篇 |
2013年 | 8篇 |
2012年 | 6篇 |
2011年 | 4篇 |
2010年 | 5篇 |
2009年 | 4篇 |
2008年 | 4篇 |
2007年 | 3篇 |
2006年 | 6篇 |
2005年 | 4篇 |
2004年 | 4篇 |
2003年 | 6篇 |
2001年 | 4篇 |
1999年 | 1篇 |
1998年 | 6篇 |
1997年 | 3篇 |
1996年 | 2篇 |
1995年 | 3篇 |
1993年 | 2篇 |
1991年 | 2篇 |
1990年 | 3篇 |
1988年 | 3篇 |
1987年 | 2篇 |
1985年 | 2篇 |
1984年 | 1篇 |
1983年 | 1篇 |
1982年 | 1篇 |
1976年 | 1篇 |
排序方式: 共有112条查询结果,搜索用时 15 毫秒
1.
2.
Anna Monreale Dino Pedreschi Ruggero G. Pensa Fabio Pinelli 《Artificial Intelligence and Law》2014,22(2):141-173
The increasing availability of personal data of a sequential nature, such as time-stamped transaction or location data, enables increasingly sophisticated sequential pattern mining techniques. However, privacy is at risk if it is possible to reconstruct the identity of individuals from sequential data. Therefore, it is important to develop privacy-preserving techniques that support publishing of really anonymous data, without altering the analysis results significantly. In this paper we propose to apply the Privacy-by-design paradigm for designing a technological framework to counter the threats of undesirable, unlawful effects of privacy violation on sequence data, without obstructing the knowledge discovery opportunities of data mining technologies. First, we introduce a k-anonymity framework for sequence data, by defining the sequence linking attack model and its associated countermeasure, a k-anonymity notion for sequence datasets, which provides a formal protection against the attack. Second, we instantiate this framework and provide a specific method for constructing the k-anonymous version of a sequence dataset, which preserves the results of sequential pattern mining, together with several basic statistics and other analytical properties of the original data, including the clustering structure. A comprehensive experimental study on realistic datasets of process-logs, web-logs and GPS tracks is carried out, which empirically shows how, in our proposed method, the protection of privacy meets analytical utility. 相似文献
3.
Ilaria Bartolini Vincenzo Moscato Ruggero G. Pensa Antonio Penta Antonio Picariello Carlo Sansone Maria Luisa Sapino 《Multimedia Tools and Applications》2016,75(7):3813-3842
The valorization and promotion of worldwide Cultural Heritage by the adoption of Information and Communication Technologies represent nowadays some of the most important research issues with a large variety of potential applications. This challenge is particularly perceived in the Italian scenario, where the artistic patrimony is one of the most diverse and rich of the world, able to attract millions of visitors every year to monuments, archaeological sites and museums. In this paper, we present a general recommendation framework able to uniformly manage heterogeneous multimedia data coming from several web repositories and to provide context-aware recommendation techniques supporting intelligent multimedia services for the users—i.e. dynamic visiting paths for a given environment. Specific applications of our system within the cultural heritage domain are proposed by means of real case studies in the mobile environment related both to an outdoor and indoor scenario, together with some results on user’s satisfaction and system accuracy. 相似文献
4.
This work presents a distributed method for control centers to monitor the operating condition of a power network, i.e., to estimate the network state, and to ultimately determine the occurrence of threatening situations. State estimation has been recognized to be a fundamental task for network control centers to operate safely and reliably a power grid. We consider (static) state estimation problems, in which the state vector consists of the voltage magnitude and angle at all network buses. We consider the state to be linearly related to network measurements, which include power flows, current injections, and voltage phasors at some buses. We admit the presence of several cooperating control centers, and we design two distributed methods for them to compute the minimum variance estimate of the state, given the network measurements. The two distributed methods rely on different modes of cooperation among control centers: in the first method an incremental mode of cooperation is used, whereas, in the second method, a diffusive interaction is implemented. Our procedures, which require each control center to know only the measurements and the structure of a subpart of the whole network, are computationally efficient and scalable with respect to the network dimension, provided that the number of control centers also increases with the network cardinality. Additionally, a finite-memory approximation of our diffusive algorithm is proposed, and its accuracy is characterized. Finally, our estimation methods are exploited to develop a distributed algorithm to detect corrupted network measurements. 相似文献
5.
A. Andreone F. Fontana M. Iavarone M. Salluzzo R. Vaglio 《Journal of Low Temperature Physics》1997,107(5-6):527-532
High quality c-axis oriented films of the intriguing intermetallic superconducting compound YNi2B2C have been obtained “in situ” by magnetron sputtering on MgO substrates held at about 800°C. The films showed maximum Tc=15.3 K, †Tc≈0.1 K, room temperature resistivity ρ≈50μΩ·cm, critical current Jc≈105 A/cm2 and Bc2≈6 T. Superconducting films were also obtained on Al2O3 and LaAlO3 single-crystal substrates. From the ρ(T) dependence a value of the Debye temperature Θ
D
=330±20 K can be deduced. At low temperatures the resistivity follows a quadratic power law possibly indicative of a high
value of the electron-phonon interaction parameter λ. In order to clarify the role of λ in these compounds, point contact
spectroscopy measurements have been performed on YNi2B2C and HoNi2B2C bulk samples prepared by inductive melting using a Low Temperature Scanning Tunneling Microscope (LTSTM). In the point contact
regime clear evidence of a superconducting gap have been found in both compounds, corresponding to a moderate strong coupling
behaviour (2†/KTc≈3.8). 相似文献
6.
We consider the optimal servicing of a queue with sigmoid server performance. There are various systems with sigmoid server performance, including systems involving human decision making, visual perception, human–machine communication and advertising response. Tasks arrive at the server according to a Poisson process. Each task has a deadline that is incorporated as a latency penalty. We investigate the trade-off between the reward obtained by processing the current task and the penalty incurred due to the tasks waiting in the queue. We study this optimization problem in a Markov decision process (MDP) framework. We characterize the properties of the optimal policy for the MDP and show that the optimal policy may drop some tasks; that is, may not process a task at all. We determine an approximate solution to the MDP using the certainty-equivalent receding horizon optimization framework and derive performance bounds on the proposed receding horizon policy. We also suggest guidelines for the design of such queues. 相似文献
7.
Pintore Giovanni Ganovelli Fabio Pintus Ruggero Scopigno Roberto Gobbetti Enrico 《计算可视媒体(英文)》2018,4(4):367-383
Computational Visual Media - We present a novel approach to automatically recover, from a small set of partially overlapping spherical images, an indoor structure representation in terms of a 3D... 相似文献
8.
Ruggero Lanotte Andrea Maggiolo-Schettini Angelo Troina 《Formal Aspects of Computing》2007,19(1):93-109
We develop a model of parametric probabilistic transition Systems (PPTSs), where probabilities associated with transitions
may be parameters. We show how to find instances of the parameters that satisfy a given property and instances that either
maximize or minimize the probability of reaching a certain state. As an application, we model a probabilistic non-repudiation
protocol with a PPTS. The theory we develop allows us to find instances that maximize the probability that the protocol ends
in a fair state (no participant has an advantage over the others).
A preliminary version of this paper was presented at SEFM’04 [LMT04].
05 April 2006 相似文献
9.
Gaia Vaglio Laurin Fabio Del Frate Luca Pasolli Claudia Notarnicola Leila Guerriero Riccardo Valentini 《International journal of remote sensing》2013,34(19):6898-6913
Natural vegetation monitoring in the alpine mountain range is a priority in the European Union in view of climate change effects. Many potential monitoring tools, based on advanced remote sensing sensors, are still not fully integrated in operational activities, such as those exploiting very high-resolution synthetic aperture radar (SAR) or light detection and ranging (lidar) data. Their testing is important for possible incorporation in routine monitoring and to increase the quantity and quality of environmental information. In this study the potential of ALOS PALSAR and RADARSAT-2 SAR scenes' synergic use for discrimination of different vegetation types was tested in an alpine heterogeneous and fragmented landscape. The integration of a lidar-based canopy height model (CHM) with SAR data was also tested. A SPOT image was used as a benchmark to evaluate the results obtained with different input data. Discrimination of vegetation types was performed with maximum likelihood classification and neural networks. Six tested data combinations obtained more than 85% overall accuracy, and the most complex input which integrates the two SARs with lidar CHM outperformed the result based on SPOT. Neural network algorithms provided the best results. This study highlights the advantages of integrating SAR sensors with lidar CHM for vegetation monitoring in a changing environment. 相似文献
10.
The effects of low-frequency (50, 100, 200 and 400 Hz) 'suppressor' tones on responses to moderate-level characteristic frequency (CF) tones were measured in chinchilla auditory nerve fibers. Two-tone interactions were evident at suppressor intensities of 70-100 dB SPL. In this range, the average response rate decreased as a function of increasing suppressor level and the instantaneous response rate was modulated periodically. At suppression threshold, the phase of suppression typically coincided with basilar membrane displacement toward scala tympani, regardless of CF. At higher suppressor levels, two suppression maxima coexisted, synchronous with peak basilar membrane displacement toward scala tympani and scala vestibuli. Modulation and rate-suppression thresholds did not vary as a function of spontaneous activity and were only minimally correlated with fiber sensitivity. Except for fibers with CF < 1 kHz, modulation and rate-suppression thresholds were lower than rate and phase-locking thresholds for the suppressor tones presented alone. In the case of high-CF fibers with low spontaneous activity, excitation thresholds could exceed suppression thresholds by more than 30 dB. The strength of modulation decreased systematically with increasing suppressor frequency. For a given suppressor frequency, modulation was strongest in high-CF fibers and weakest in low-CF fibers. The present findings strongly support the notion that low-frequency suppression in auditory nerve fibers largely reflects an underlying basilar membrane phenomenon closely related to compressive non-linearity. 相似文献