全文获取类型
收费全文 | 129篇 |
免费 | 8篇 |
专业分类
电工技术 | 3篇 |
化学工业 | 12篇 |
机械仪表 | 2篇 |
建筑科学 | 5篇 |
矿业工程 | 1篇 |
能源动力 | 15篇 |
轻工业 | 8篇 |
无线电 | 17篇 |
一般工业技术 | 20篇 |
冶金工业 | 2篇 |
自动化技术 | 52篇 |
出版年
2023年 | 3篇 |
2022年 | 1篇 |
2021年 | 5篇 |
2020年 | 5篇 |
2019年 | 3篇 |
2018年 | 4篇 |
2017年 | 5篇 |
2016年 | 2篇 |
2015年 | 4篇 |
2014年 | 6篇 |
2013年 | 10篇 |
2012年 | 12篇 |
2011年 | 11篇 |
2010年 | 10篇 |
2009年 | 4篇 |
2008年 | 17篇 |
2007年 | 3篇 |
2006年 | 4篇 |
2005年 | 1篇 |
2004年 | 7篇 |
2003年 | 7篇 |
2002年 | 3篇 |
2000年 | 1篇 |
1999年 | 1篇 |
1998年 | 3篇 |
1997年 | 2篇 |
1995年 | 1篇 |
1993年 | 1篇 |
1992年 | 1篇 |
排序方式: 共有137条查询结果,搜索用时 31 毫秒
1.
Kasper P. Lundquist Dr. Vipul Panchal Prof. Charlotte H. Gotfredsen Prof. Ruth Brenk Prof. Mads H. Clausen 《ChemMedChem》2021,16(17):2588-2603
Rapid development within the fields of both fragment-based drug discovery (FBDD) and medicinal targeting of RNA provides possibilities for combining technologies and methods in novel ways. This review provides an overview of fragment-based screening (FBS) against RNA targets, including a discussion of the most recently used screening and hit validation methods such as NMR spectroscopy, X-ray crystallography, and virtual screening methods. A discussion of fragment library design based on research from small-molecule RNA binders provides an overview on both the currently limited guidelines within RNA-targeting fragment library design, and future possibilities. Finally, future perspectives are provided on screening and hit validation methods not yet used in combination with both fragment screening and RNA targets. 相似文献
2.
Runtime monitoring is an established technique to enforce a wide range of program safety and security properties. We present a formalization of monitoring and monitor inlining, for the Java Virtual Machine. Monitors are security automata given in a special-purpose monitor specification language, ConSpec. The automata operate on finite or infinite strings of calls to a fixed API, allowing local dependencies on parameter values and heap content. We use a two-level class file annotation scheme to characterize two key properties: (i) that the program is correct with respect to the monitor as a constraint on allowed program behavior, and (ii) that the program has a copy of the given monitor embedded into it. As the main application of these results we sketch a simple inlining algorithm and show how the two-level annotations can be completed to produce a fully annotated program which is valid in the standard sense of Floyd/Hoare logic. This establishes the mediation property that inlined programs are guaranteed to adhere to the intended policy. Furthermore, validity can be checked efficiently using a weakest precondition based annotation checker, thus preparing the ground for on-device checking of policy adherence in a proof-carrying code setting. 相似文献
3.
Simon Richard Proud Mads Olander Rasmussen Inge Sandholt Wycliffe Mutero Assaf Anyamba 《Remote sensing of environment》2010,114(8):1687-1698
In order to obtain high quality data, the correction of atmospheric perturbations acting upon land surface reflectance measurements recorded by a space-based sensor is an important topic within remote sensing. For many years the Second Simulation of the Satellite Signal in the Solar Spectrum (6S) radiative transfer model and the Simplified Method for Atmospheric Correction (SMAC) codes have been used for this atmospheric correction, but previous studies have shown that in a number of situations the quality of correction provided by the SMAC is low. This paper describes a method designed to improve the quality of the SMAC atmospheric correction algorithm through a slight increase in its computational complexity. Data gathered from the SEVIRI aboard Meteosat Second Generation (MSG) is used to validate the additions to SMAC, both by comparison to simulated data corrected using the highly accurate 6S method and by comparison to in-situ and 6S corrected SEVIRI data gathered for two field sites in Africa. The additions to the SMAC are found to greatly increase the quality of atmospheric correction performed, as well as broaden the range of atmospheric conditions under which the SMAC can be applied. When examining the Normalised Difference Vegetation Index (NDVI), the relative difference between SMAC and in-situ values decreases by 1.5% with the improvements in place. Similarly, the mean relative difference between SMAC and 6S reflectance values decreases by a mean of 13, 14.5 and 8.5% for Channels 1, 2 and 3 respectively. Furthermore, the processing speed of the SMAC is found to remain largely unaffected, with only a small increase in the time taken to process a full SEVIRI scene. Whilst the method described within this paper is only applicable to SEVIRI data, a similar approach can be applied to other data sources than SEVIRI, and should result in a similar accuracy improvement no matter which instrument supplies the original data. 相似文献
4.
Service Composition Issues in Pervasive Computing 总被引:2,自引:0,他引:2
Providing new services by combining existing ones—or service composition—is an idea pervading pervasive computing. Pervasive computing technologies seek to concurrently exhibit context awareness, manage contingencies, leverage device heterogeneity, and empower users. These four goals prompt service-composition-mechanism design requirements that are unique to pervasive computing. This article catalogs service composition mechanisms and describes their variation points, which indicate how well the resulting compositions meet the four goals. 相似文献
5.
Ivan Damgård Mads Jurik Jesper Buus Nielsen 《International Journal of Information Security》2010,9(6):371-385
We propose a generalization of Paillier’s probabilistic public-key system, in which the expansion factor is reduced and which
allows to adjust the block length of the scheme even after the public key has been fixed, without losing the homomorphic property.
We show that the generalization is as secure as Paillier’s original system and propose several ways to optimize implementations
of both the generalized and the original scheme. We construct a threshold variant of the generalized scheme as well as zero-knowledge
protocols to show that a given ciphertext encrypts one of a set of given plaintexts, and protocols to verify multiplicative
relations on plaintexts. We then show how these building blocks can be used for applying the scheme to efficient electronic
voting. This reduces dramatically the work needed to compute the final result of an election, compared to the previously best
known schemes. We show how the basic scheme for a yes/no vote can be easily adapted to casting a vote for up to t out of L candidates. The same basic building blocks can also be adapted to provide receipt-free elections, under appropriate physical
assumptions. The scheme for 1 out of L elections can be optimized such that for a certain range of the other parameter values, the ballot size is logarithmic in
L. 相似文献
6.
Model selection for convolutive ICA with an application to spatiotemporal analysis of EEG 总被引:2,自引:0,他引:2
We present a new algorithm for maximum likelihood convolutive independent component analysis (ICA) in which components are unmixed using stable autoregressive filters determined implicitly by estimating a convolutive model of the mixing process. By introducing a convolutive mixing model for the components, we show how the order of the filters in the model can be correctly detected using Bayesian model selection. We demonstrate a framework for deconvolving a subspace of independent components in electroencephalography (EEG). Initial results suggest that in some cases, convolutive mixing may be a more realistic model for EEG signals than the instantaneous ICA model. 相似文献
7.
Region-Based Memory Management 总被引:1,自引:0,他引:1
This paper describes a memory management discipline for programs that perform dynamic memory allocation and de-allocation. At runtime, all values are put intoregions. The store consists of a stack of regions. All points of region allocation and de-allocation are inferred automatically, using a type and effect based program analysis. The scheme does not assume the presence of a garbage collector. The scheme was first presented in 1994 (M. Tofte and J.-P. Talpin,in“Proceedings of the 21st ACM SIGPLAN–SIGACT Symposium on Principles of Programming Languages,” pp. 188–201); subsequently, it has been tested in The ML Kit with Regions, a region-based, garbage-collection free implementation of the Standard ML Core language, which includes recursive datatypes, higher-order functions and updatable references L. Birkedal, M. Tofte, and M. Vejlstrup, (1996),in“Proceedings of the 23 rd ACM SIGPLAN–SIGACT Symposium on Principles of Programming Languages,” pp. 171–183. This paper defines a region-based dynamic semantics for a skeletal programming language extracted from Standard ML. We present the inference system which specifies where regions can be allocated and de-allocated and a detailed proof that the system is sound with respect to a standard semantics. We conclude by giving some advice on how to write programs that run well on a stack of regions, based on practical experience with the ML Kit. 相似文献
8.
We consider the problem of implementing a security protocol in such a manner that secrecy of sensitive data is not jeopardized. Implementation is assumed to take place in the context of an API that provides standard cryptography and communication services. Given a dependency specification, stating how API methods can produce and consume secret information, we propose an information flow property based on the idea of invariance under perturbation, relating observable changes in output to corresponding changes in input. Besides the information flow condition itself, the main contributions of the paper are results relating the admissibility property to a direct flow property in the special case of programs which branch on secrets only in cases permitted by the dependency rules. These results are used to derive an unwinding theorem, reducing a behavioural correctness check (strong bisimulation) to an invariant. 相似文献
9.
We bridge the gap between compositional evaluators and abstract machines for the lambda-calculus, using closure conversion, transformation into continuation-passing style, and defunctionalization of continuations. This article is a followup of our article at PPDP 2003, where we consider call by name and call by value. Here, however, we consider call by need.We derive a lazy abstract machine from an ordinary call-by-need evaluator that threads a heap of updatable cells. In this resulting abstract machine, the continuation fragment for updating a heap cell naturally appears as an ‘update marker’, an implementation technique that was invented for the Three Instruction Machine and subsequently used to construct lazy variants of Krivine's abstract machine. Tuning the evaluator leads to other implementation techniques such as unboxed values. The correctness of the resulting abstract machines is a corollary of the correctness of the original evaluators and of the program transformations used in the derivation. 相似文献
10.
Emil Meng-Lund Jette Jacobsen Morten B. Andersen Mads L. Jespersen Jens-Jacob Karlsson Mats Garmer 《Drug development and industrial pharmacy》2014,40(5):604-610
The potential of buccal mucosa as a site for systemic absorption has attracted increased attention in recent years creating a need for new predictive in-vivo models. The aim of this study was to evaluate anaesthetised and conscious Göttingen mini-pigs as a model for buccal drug absorption by testing pH-dependent absorption of metoprolol from a solid dosage form. Buccal tablets buffered to pH 6.2 and pH 8.9, oral liquid and intravenous injection were tested in four conscious and anaesthetised Göttingen mini-pigs in a non-randomised cross-over study. Blood samples were collected and processed before analysis by ultra-performance liquid chromatography with tandem mass spectrometry detection. An ex-vivo flow retention model was applied to study release and retention of the bioadhesive buccal tablets. The Tmax obtained from the two buccal conscious groups (55?±?5 and 35?±?5?min) were significantly different to the buccal anaesthetised groups (120?±?0 and 165?±?15?min) for buccal tablet pH 6.2 and pH 8.9, respectively. Also, the absolute bioavailability from the anaesthetised buccal tablet pH 8.9 (20.7?±?4.0%) had a significant increase compared to all other buccal tablet groups. In conclusion, this study showed a pH-dependent absolute bioavailability of metoprolol when administrated as bioadhesive buccal tablets to anaesthetised mini-pigs. The anaesthesia was found to delay the time to reach maximal plasma concentration of metoprolol as compared to the conscious pig model when administrated as buccal tablets. 相似文献