全文获取类型
收费全文 | 240篇 |
免费 | 9篇 |
国内免费 | 2篇 |
专业分类
化学工业 | 37篇 |
金属工艺 | 4篇 |
机械仪表 | 3篇 |
建筑科学 | 4篇 |
能源动力 | 1篇 |
轻工业 | 10篇 |
水利工程 | 2篇 |
无线电 | 36篇 |
一般工业技术 | 36篇 |
冶金工业 | 56篇 |
自动化技术 | 62篇 |
出版年
2024年 | 1篇 |
2023年 | 4篇 |
2022年 | 11篇 |
2021年 | 10篇 |
2020年 | 6篇 |
2019年 | 3篇 |
2018年 | 6篇 |
2017年 | 5篇 |
2016年 | 5篇 |
2015年 | 6篇 |
2014年 | 5篇 |
2013年 | 20篇 |
2012年 | 5篇 |
2011年 | 11篇 |
2010年 | 12篇 |
2009年 | 11篇 |
2008年 | 12篇 |
2007年 | 8篇 |
2006年 | 6篇 |
2005年 | 11篇 |
2004年 | 7篇 |
2003年 | 8篇 |
2002年 | 5篇 |
2001年 | 2篇 |
2000年 | 4篇 |
1999年 | 7篇 |
1998年 | 16篇 |
1997年 | 9篇 |
1996年 | 2篇 |
1995年 | 5篇 |
1994年 | 4篇 |
1993年 | 2篇 |
1990年 | 1篇 |
1987年 | 1篇 |
1986年 | 1篇 |
1985年 | 1篇 |
1984年 | 2篇 |
1983年 | 4篇 |
1982年 | 1篇 |
1981年 | 2篇 |
1978年 | 1篇 |
1977年 | 2篇 |
1976年 | 1篇 |
1975年 | 3篇 |
1974年 | 1篇 |
1973年 | 1篇 |
排序方式: 共有251条查询结果,搜索用时 31 毫秒
1.
Efficient multicast search under delay and bandwidth constraints 总被引:1,自引:0,他引:1
The issue of a multicast search for a group of users is discussed in this study. Given the condition that the search is over
only after all the users in the group are found, this problem is called the Conference Call Search (CCS) problem. The goal
is to design efficient CCS strategies under delay and bandwidth constraints. While the problem of tracking a single user has
been addressed by many studies, to the best of our knowledge, this study is one of the first attempts to reduce the search
cost for multiple users. Moreover, as oppose to the single user tracking, for which one can always reduce the expected search
delay by increasing the expected search cost, for a multicast search the dependency between the delay and the search cost
is more complicated, as demonstrated in this study. We identify the key factors affecting the search efficiency, and the dependency
between them and the search delay. Our analysis shows that under tight bandwidth constraints, the CCS problem is NP-hard.
We therefore propose a search method that is not optimal, but has a low computational complexity. In addition, the proposed
strategy yields a low search delay as well as a low search cost. The performance of the proposed search strategy is superior
to the implementation of an optimal single user search on a group of users.
Amotz Bar-Noy received the B.Sc. degree in 1981 in Mathematics and Computer Science and the Ph.D. degree in 1987 in Computer Science, both
from the Hebrew University, Israel. From October 1987 to September 1989 he was a post-doc fellow in Stanford University, California.
From October 1989 to August 1996 he was a Research Staff Member with IBM T. J. Watson Research Center, New York. From February
1995 to September 2001 he was an associate Professor with the Electrical Engineering-Systems department of Tel Aviv University,
Israel. From September 1999 to December 2001 he was with AT research labs in New Jersey. Since February 2002 he is a Professor
with the Computer and Information Science Department of Brooklyn College - CUNY, Brooklyn New York.
Zohar Naor received the Ph.D. degree in Computer Science from Tel Aviv University, Tel Aviv, Israel, in 2000. Since 2003 he is with
the University of Haifa, Israel. His areas of interests include wireless networks, resource management of computer networks,
mobility, search strategies, and multiple access protocols. 相似文献
2.
Zohar Yosibash 《International Journal of Fracture》1995,74(4):341-361
Linear elastic two-dimensional problems with singular points subjected to steady-state temperature distribution are considered. The stress tensor in the vicinity of the singular points exhibits singular behavior characterized by the strength of the singularity and the associated thermal stress intensity factors (TSIFs). It is shown that the TSIFs and the strength of the stress singularity can be obtained using the principle of complementary energy together with the modified Steklov method and the p-version of the finite element method. Importantly, the proposed method is applicable not only to singularities associated with crack tips, but also to multi-material interfaces and non-homogeneous materials. Numerical results of crack-tip singularities in a rectangular plate and singular points associated with a two-material inclusion are presented.Research performed while the author served as a visiting assistant professor at the Center for Computational Mechanics, Washington University, St. Louis, Missouri 63130, USA. 相似文献
3.
Crack onset at a v-notch. Influence of the notch tip radius 总被引:1,自引:0,他引:1
A criterion to predict crack onset at a sharp notch in homogeneous brittle materials has been presented in a previous paper of one of the authors. It is reviewed and improved herein. It fulfils both the energy and the strength criteria and takes an Irwin-like form involving the generalized intensity factor of the singularity governing the elastic behaviour in the vicinity of a notch tip. The prediction agrees fairly well with the experiments although it slightly underestimates the experimental measures. A cause of this discrepancy can be that a small notch tip radius blunts the sharp corner. It is analysed in this paper by means of matched asymptotics involving 2 small parameters: a micro-crack increment length and the notch tip radius. A correction is brought to the initial prediction and a better agreement is obtained with experiments on PMMA notched specimens. Experiments performed on a stiffer material (Alumina/Zirconia) show that it is less sensitive to small notch tip radii. A remaining small discrepancy between experiments and predictions can be due to some non linear behaviour of the materials near the notch tip. In addition, without new developments, the method allows to determine the stress intensity factor at the tip of a short crack emanating from a sharp or a rounded v-notch. 相似文献
4.
The ability of the juvenile female reproductive axis to respond to hormonal stimulation was investigated in a Perciform fish, the striped bass (Morone saxatilis) using various combinations of testosterone (T), GnRH agonist (GnRHa), and pimozide. A long-term treatment with T alone, or T in combination with GnRHa, increased pituitary gonadotropin II (GtH II) levels 2- and 3-fold, respectively, suggesting that T and GnRHa each stimulate GtH II accumulation. Release of the accumulated GtH II could be induced only by high doses of GnRHa in combination with T, indicating that GtH II synthesis and release require different levels of GnRH stimulation. The addition of the dopamine antagonist pimozide did not affect pituitary and plasma GtH II levels but, in response to an additional acute GnRHa challenge, inhibited the release of GtH II. Although ovarian development was slightly stimulated by a combined T and GnRHa treatment, vitellogenesis was generally not initiated. The present study demonstrated that the juvenile striped bass pituitary is responsive to hormonal stimulation, resulting in elevated levels of GtH II in the pituitary and plasma. However, increased plasma levels of GtH II did not result in precocious puberty, suggesting that additional factors are required for the initiation of ovarian development in this teleost. 相似文献
5.
Alternating systems are models of computer programs whose behavior is governed by the actions of multiple agents with, potentially, different goals. Examples include control systems, resource schedulers, security protocols, auctions and election mechanisms. Proving properties about such systems has emerged as an important new area of study in formal verification, with the development of logical frameworks such as the alternating temporal logic ATL*. Techniques for model checking ATL* over finite-state systems have been well studied, but many important systems are infinite-state and thus their verification requires, either explicitly or implicitly, some form of deductive reasoning. This paper presents a theoretical framework for the analysis of alternating infinite-state systems. It describes models of computation, of various degrees of generality, and alternating-time logics such as ATL* and its variations. It then develops a proof system that allows to prove arbitrary ATL* properties over these infinite-state models. The proof system is shown to be complete relative to validities in the weakest possible assertion language. The paper then derives auxiliary proof rules and verification diagrams techniques and applies them to security protocols, deriving a new formal proof of fairness of a multi-party contract signing protocol where the model of the protocol and of the properties contains both game-theoretic and infinite-state (parameterized) aspects. 相似文献
6.
Danah Zohar 《Minds and Machines》1995,5(4):597-607
There have been suggestions that the unity of consciousness may be related to the kind of holism depicted only in quantum physics. This argument will be clarified and strengthened. It requires the brain to contain a quantum system with the right properties — a Bose-Einstein condensate. It probably does contain one such system, as both theory and experiment have indicated. In fact, we cannot pay full attention to a quantum whole and its parts simultaneously, though we may oscillate between the two. In a quantum theory of consciousness, emergent meanings arise as an inevitable consequence of Heisenberg's Uncertainty Principle. 相似文献
7.
Relying on the literature on tensions and contradictions and the theory of practice, coupled with the literature on creative industries, this study uncovers how creative entrepreneurs balance the tension between art and business and respond to other challenges of creative entrepreneurship. The multiple case studies method is adopted by examining founders, cofounders and main employees of European film production companies. We reveal the perception of creative entrepreneurs towards the relationship between art and business. We explore different organizational and industry-level challenges experienced by creative entrepreneurs and uncover the organizational practices they adopt to deal with the identified challenges. The research contributes to the phenomenon of creative entrepreneurship by introducing the practice perspective, to the literature on paradox and contradiction by exploring the micro-foundations of tensions and paradox responses in high-intensity situations and to practice-based studies by investigating a domain-specific practice theory and highlighting the agency of creative entrepreneurs in adapting practices necessary to deal with conflicting demands of creative entrepreneurship. 相似文献
8.
Sheng Ying Zohar Yoni Ringeissen Christophe Lange Jane Fontaine Pascal Barrett Clark 《Journal of Automated Reasoning》2022,66(3):331-355
Journal of Automated Reasoning - Algebraic datatypes, and among them lists and trees, have attracted a lot of interest in automated reasoning and Satisfiability Modulo Theories (SMT). Since its... 相似文献
9.
Kerem Altun Author Vitae Author Vitae Orkun Tunçel Author Vitae 《Pattern recognition》2010,43(10):3605-3620
This paper provides a comparative study on the different techniques of classifying human activities that are performed using body-worn miniature inertial and magnetic sensors. The classification techniques implemented and compared in this study are: Bayesian decision making (BDM), a rule-based algorithm (RBA) or decision tree, the least-squares method (LSM), the k-nearest neighbor algorithm (k-NN), dynamic time warping (DTW), support vector machines (SVM), and artificial neural networks (ANN). Human activities are classified using five sensor units worn on the chest, the arms, and the legs. Each sensor unit comprises a tri-axial gyroscope, a tri-axial accelerometer, and a tri-axial magnetometer. A feature set extracted from the raw sensor data using principal component analysis (PCA) is used in the classification process. A performance comparison of the classification techniques is provided in terms of their correct differentiation rates, confusion matrices, and computational cost, as well as their pre-processing, training, and storage requirements. Three different cross-validation techniques are employed to validate the classifiers. The results indicate that in general, BDM results in the highest correct classification rate with relatively small computational cost. 相似文献
10.
Nikolaj S. Bjørner Anca Browne Michael A. Colón Bernd Finkbeiner Zohar Manna Henny B. Sipma Tomás E. Uribe 《Formal Methods in System Design》2000,16(3):227-270
We review a number of formal verification techniques supported by STeP, the Stanford Temporal Prover, describing how the tool can be used to verify properties of several versions of the Bakery Mutual exclusion algorithm for mutual exclusion. We verify the classic two-process algorithm and simple variants, as well as an atomic parameterized version. The methods used include deductive verification rules, verification diagrams, automatic invariant generation, and finite-state model checking and abstraction. 相似文献