全文获取类型
收费全文 | 728篇 |
免费 | 44篇 |
专业分类
电工技术 | 6篇 |
综合类 | 1篇 |
化学工业 | 179篇 |
金属工艺 | 9篇 |
机械仪表 | 9篇 |
建筑科学 | 31篇 |
矿业工程 | 1篇 |
能源动力 | 49篇 |
轻工业 | 46篇 |
水利工程 | 9篇 |
石油天然气 | 2篇 |
无线电 | 99篇 |
一般工业技术 | 84篇 |
冶金工业 | 13篇 |
自动化技术 | 234篇 |
出版年
2023年 | 9篇 |
2022年 | 45篇 |
2021年 | 39篇 |
2020年 | 28篇 |
2019年 | 23篇 |
2018年 | 33篇 |
2017年 | 38篇 |
2016年 | 44篇 |
2015年 | 26篇 |
2014年 | 46篇 |
2013年 | 48篇 |
2012年 | 40篇 |
2011年 | 61篇 |
2010年 | 51篇 |
2009年 | 45篇 |
2008年 | 32篇 |
2007年 | 42篇 |
2006年 | 23篇 |
2005年 | 16篇 |
2004年 | 12篇 |
2003年 | 6篇 |
2002年 | 8篇 |
2001年 | 4篇 |
2000年 | 4篇 |
1999年 | 8篇 |
1998年 | 5篇 |
1997年 | 4篇 |
1996年 | 2篇 |
1995年 | 3篇 |
1994年 | 4篇 |
1993年 | 6篇 |
1992年 | 1篇 |
1991年 | 2篇 |
1990年 | 2篇 |
1989年 | 2篇 |
1988年 | 1篇 |
1985年 | 3篇 |
1984年 | 2篇 |
1982年 | 2篇 |
1980年 | 1篇 |
1978年 | 1篇 |
排序方式: 共有772条查询结果,搜索用时 15 毫秒
1.
Georgios D. Styliaras Georgios K. Tsolis Chris M. Papaterpos 《International Journal on Digital Libraries》2007,8(1):61-78
In this paper, AssetCollector is presented, which is a system for managing collections of cultural assets. AssetCollector
covers the needs of collection curators towards defining, populating and searching a collection in a flexible way, while supporting
them in generating reports based on the collection’s assets and reusing them in order to build web sites and CD-ROMs. In order
to support the above functionality, the system provides the content structuring subsystem, the content input subsystem, the
search subsystem and the report subsystem. The use of the subsystems is straightforward and requires no technical skills from
the curators. AssetCollector has been successfully applied for organizing various collections of cultural assets in Greece,
such as archaeological sites, museums and published books. In the future, an evaluation procedure is planned in order to further
refine the use of the system according to the targeted users’ needs. Furthermore, more import and export facilities will be
provided, which will make the system compliant with widely accepted standards. 相似文献
2.
Performance analysis of IEEE 802.11 ad hoc networks in the presence of exposed terminals 总被引:1,自引:0,他引:1
The paper evaluates the performance effects of exposed terminals in IEEE 802.11 ad hoc networks in finite load conditions. It derives analytical models for the estimation of channel utilization and media access delay for IEEE 802.11 ad hoc networks in finite load conditions with and without exposed terminals. The simulation results show that the analytical estimated channel utilization and media access delay metrics are fairly accurate. 相似文献
3.
A new approach to the combination of exergetic and economic analysis (exergoeconomic analysis) for the investigation of energy-conversion processes is presented. This approach allows the monetary evaluation of costs caused by irreversibilities (exergy losses), as well as comparisons between these costs and the investment and operating costs for each component of a plant. The present analysis permits identification and evaluation of inefficiencies in an energy-conversion plant and of opportunities for improvement. 相似文献
4.
Coalition formation is a central problem in multiagent systems research, but most models assume common knowledge of agent
types. In practice, however, agents are often unsure of the types or capabilities of their potential partners, but gain information about these capabilities through repeated interaction. In this paper, we
propose a novel Bayesian, model-based reinforcement learning framework for this problem, assuming that coalitions are formed
(and tasks undertaken) repeatedly. Our model allows agents to refine their beliefs about the types of others as they interact
within a coalition. The model also allows agents to make explicit tradeoffs between exploration (forming “new” coalitions
to learn more about the types of new potential partners) and exploitation (relying on partners about which more is known),
using value of information to define optimal exploration policies. Our framework effectively integrates decision making during
repeated coalition formation under type uncertainty with Bayesian reinforcement learning techniques. Specifically, we present
several learning algorithms to approximate the optimal Bayesian solution to the repeated coalition formation and type-learning
problem, providing tractable means to ensure good sequential performance. We evaluate our algorithms in a variety of settings,
showing that one method in particular exhibits consistently good performance in practice. We also demonstrate the ability
of our model to facilitate knowledge transfer across different dynamic tasks. 相似文献
5.
Georgios Kontaxis Michalis Polychronakis Evangelos P. Markatos 《International Journal of Information Security》2012,11(5):321-332
Over the past few years, a large and ever increasing number of Web sites have incorporated one or more social login platforms and have encouraged users to log in with their Facebook, Twitter, Google, or other social networking identities. Research results suggest that more than two million Web sites have already adopted Facebook’s social login platform, and the number is increasing sharply. Although one might theoretically refrain from such social login features and cross-site interactions, usage statistics show that more than 250 million people might not fully realize the privacy implications of opting-in. To make matters worse, certain Web sites do not offer even the minimum of their functionality unless users meet their demands for information and social interaction. At the same time, in a large number of cases, it is unclear why these sites require all that personal information for their purposes. In this paper, we mitigate this problem by designing and developing a framework for minimum information disclosure in social login interactions with third-party sites. Our example case is Facebook, which combines a very popular single sign-on platform with information-rich social networking profiles. Whenever users want to browse to a Web site that requires authentication or social interaction using a Facebook identity, our system employs, by default, a Facebook session that reveals the minimum amount of information necessary. Users have the option to explicitly elevate that Facebook session in a manner that reveals more or all of the information tied to their social identity. This enables users to disclose the minimum possible amount of personal information during their browsing experience on third-party Web sites. 相似文献
6.
7.
8.
Ioannis Marras Georgios Tzimiropoulos Stefanos Zafeiriou Maja Pantic 《Image and vision computing》2014
We introduce a robust framework for learning and fusing of orientation appearance models based on both texture and depth information for rigid object tracking. Our framework fuses data obtained from a standard visual camera and dense depth maps obtained by low-cost consumer depth cameras such as the Kinect. To combine these two completely different modalities, we propose to use features that do not depend on the data representation: angles. More specifically, our framework combines image gradient orientations as extracted from intensity images with the directions of surface normals computed from dense depth fields. We propose to capture the correlations between the obtained orientation appearance models using a fusion approach motivated by the original Active Appearance Models (AAMs). To incorporate these features in a learning framework, we use a robust kernel based on the Euler representation of angles which does not require off-line training, and can be efficiently implemented online. The robustness of learning from orientation appearance models is presented both theoretically and experimentally in this work. This kernel enables us to cope with gross measurement errors, missing data as well as other typical problems such as illumination changes and occlusions. By combining the proposed models with a particle filter, the proposed framework was used for performing 2D plus 3D rigid object tracking, achieving robust performance in very difficult tracking scenarios including extreme pose variations. 相似文献
9.
The enzymatic degradation of poly(N‐isopropyl acrylamide) (PNIPAM) grafted to carboxymethylcellulose (CMC) copolymers with a cellulasic preparation (Trichoderma viride) was studied. The enzymatic activity of the cellulasic preparation against CMC and the grafted copolymers was determined by the Petterson–Porath method, while their reduced viscosity variation in the presence of the same preparation was also followed. It has been shown that the enzymatic degradation behavior depends on the copolymer composition and the reaction temperature. Reducing sugars analysis showed that the experimental values for the grafted copolymers were higher than the calculated ones. At 50°C, the enzymatic reaction is completed in about 20 min for the copolymers, whereas for CMC it takes more than 40 min. It can be concluded that their enzymatic degradation is facilitated by the presence of the PNIPAM grafts. © 2002 Wiley Periodicals, Inc. J Appl Polym Sci 87: 1383–1386, 2003 相似文献
10.
Papatheodorou Nikolaos Kouroupetroglou Georgios Pino Alexandros Giannopoulos Panagiotis-Alexios Makris Gerasimos Papageorgiou Charalambos 《Universal Access in the Information Society》2021,20(2):321-331
Universal Access in the Information Society - We present an investigation of the systematic differences in upper limb motor skills between children with learning disabilities (LDs) and children... 相似文献