首页 | 官方网站   微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1840篇
  免费   51篇
  国内免费   2篇
工业技术   1893篇
  2023年   7篇
  2022年   13篇
  2021年   34篇
  2020年   25篇
  2019年   32篇
  2018年   30篇
  2017年   47篇
  2016年   45篇
  2015年   25篇
  2014年   71篇
  2013年   158篇
  2012年   91篇
  2011年   104篇
  2010年   97篇
  2009年   107篇
  2008年   117篇
  2007年   114篇
  2006年   122篇
  2005年   100篇
  2004年   95篇
  2003年   77篇
  2002年   56篇
  2001年   39篇
  2000年   33篇
  1999年   36篇
  1998年   26篇
  1997年   32篇
  1996年   31篇
  1995年   13篇
  1994年   19篇
  1993年   10篇
  1992年   10篇
  1991年   8篇
  1990年   8篇
  1989年   4篇
  1988年   2篇
  1987年   9篇
  1985年   2篇
  1984年   6篇
  1983年   6篇
  1982年   3篇
  1981年   6篇
  1980年   8篇
  1979年   1篇
  1978年   4篇
  1977年   4篇
  1974年   1篇
  1971年   2篇
  1970年   1篇
  1969年   2篇
排序方式: 共有1893条查询结果,搜索用时 281 毫秒
31.
CPU demand for web serving: Measurement analysis and dynamic estimation   总被引:2,自引:0,他引:2  
Giovanni  Wolfgang  Mike  Asser   《Performance Evaluation》2008,65(6-7):531-553
Managing the resources in a large Web serving system requires knowledge of the resource needs for service requests of various types. In order to investigate the properties of Web traffic and its demand, we collected measurements of throughput and CPU utilization and performed some data analyses. First, we present our findings in relation to the time-varying nature of the traffic, the skewness of traffic intensity among the various types of requests, the correlation among traffic streams, and other system-related phenomena. Then, given such nature of web traffic, we devise and implement an on-line method for the dynamic estimation of CPU demand.

Assessing resource needs is commonly performed using techniques such as off-line profiling, application instrumentation, and kernel-based instrumentation. Little attention has been given to the dynamic estimation of dynamic resource needs, relying only on external and high-level measurements such as overall resource utilization and request rates. We consider the problem of dynamically estimating dynamic CPU demands of multiple kinds of requests using CPU utilization and throughput measurements. We formulate the problem as a multivariate linear regression problem and obtain its basic solution. However, as our measurement data analysis indicates, one is faced with issues such as insignificant flows, collinear flows, space and temporal variations, and background noise. In order to deal with such issues, we present several mechanisms such as data aging, flow rejection, flow combining, noise reduction, and smoothing. We implemented these techniques in a Work Profiler component that we delivered as part of a broader system management product. We present experimental results from using this component in scenarios inspired by real-world usage of that product.  相似文献   

32.
Subsistence farming communities are dependent on the landscape to provide the resource base upon which their societies can be built. A key component of this is the role of climate and the feedback between rainfall, crop growth, land clearance and their coupling to the hydrological cycle. Temporal fluctuations in rainfall alter the spatial distribution of water availability, which in turn is mediated by soil-type, slope and landcover. This pattern ultimately determines the locations within the landscape that can support agriculture and controls sustainability of farming practices. The representation of such a system requires us to couple together the dynamics of human and ecological systems and landscape change, each of which constitutes a significant modelling challenge on its own. Here we present a proto-type coupled modelling system to simulate land-use change by bringing together three simple process models: (a) an agent-based model of subsistence farming; (b) an individual-based model of forest dynamics; and (c) a spatially explicit hydrological model which predicts distributed soil moisture and basin scale water fluxes. Using this modelling system we investigate how demographic changes influence deforestation and assess its impact on forest ecology, stream hydrology and changes in water availability.  相似文献   
33.
In mobile ad hoc networks (MANETs), flooding is a required message dissemination technique for network-wide broadcast. The conventional blind flooding algorithm causes broadcast storm problem, a high number of unnecessary packet rebroadcasts thus resulting in high contention and packet collisions. This paper proposes a new probabilistic approach that dynamically fine-tunes the rebroadcasting probability of a node for routing request packets (RREQs) according to the number of neighbour nodes. We evaluate the performance of the proposed approach for the ad hoc on demand distance vector (AODV) routing protocol and compared against the blind flooding, fixed probabilistic and adjusted probabilistic flooding [L.M.M.M. Bani-Yassein, M. Ould-Khaoua et al., Performance analysis of adjusted probabilistic broadcasting in mobile ad hoc networks, International Journal of Wireless Information Networks 13(2) (2006) 127–140; M.B. Yassein, M.O. Khaoua et al., Improving route discovery in on-demand routing protocols using local topology information in MANETs, Proceedings of the ACM international workshop on Performance Monitoring, Measurement, and Evaluation of Heterogeneous Wireless and Wired Networks, Terromolinos, Spain, ACM Press, 2006, pp. 95–99.] approaches. The simulation results show that our proposed approach demonstrates better performance than blind flooding, fixed probabilistic and adjusted flooding approaches.  相似文献   
34.
下一代台式PC和笔记本电脑也许会跟iPhone特别相像。一年前,我写过一篇专栏文章"为什么iPhone会改变PC世界",在那篇文章中我描绘了未来PC操作系统的用户界面,将出现类似于iPhone中的多重触控、智能识别、3D和微小图标等元素。在微软的Surface Computing中这些元素已经成为现实。  相似文献   
35.
Letf: {0,1} n {0,1} m be anm-output Boolean function inn variables.f is called ak-slice iff(x) equals the all-zero vector for allx with Hamming weight less thank andf(x) equals the all-one vector for allx with Hamming weight more thank. Wegener showed that PI k -set circuits (set circuits over prime implicants of lengthk) are at the heart of any optimum Boolean circuit for ak-slicef. We prove that, in PI k -set circuits, savings are possible for the mass production of anyFX, i.e., any collectionF ofm output-sets given any collectionX ofn input-sets, if their PI k -set complexity satisfiesSC m (FX)3n+2m. This PI k mass production, which can be used in monotone circuits for slice functions, is then exploited in different ways to obtain a monotone circuit of complexity 3n+o(n) for the Neiporuk slice, thus disproving a conjecture by Wegener that this slice has monotone complexity (n 3/2). Finally, the new circuit for the Neiporuk slice is proven to be asymptotically optimal, not only with respect to monotone complexity, but also with respect to combinational complexity.  相似文献   
36.
Capacitive deionization (CDI) is an emerging water desalination technology for removing different ionic species from water, which is based on electric charge compensation by these charged species. CDI is becoming popular because it is more energy-efficient and cost-effective than other technologies, such as reverse osmosis and distillation, specifically in dealing with brackish water having low or moderate salt concentrations. Over the past decade, the CDI research field has witnessed significant advances in the used electrode materials, cell architectures, and associated mechanisms for desalination applications. This review article first discusses ion storage/removal mechanisms in carbon and Faradaic materials aided by advanced in situ analysis techniques and computations. It then summarizes research progress toward electrode materials in terms of structure, surface chemistry, and composition. More still, it discusses CDI cell architectures by highlighting their different cell design concepts. Finally, current challenges and future research directions are summarized to provide guidelines for future CDI research.  相似文献   
37.
Strengthening intellectual property rights for publicly financed research and development (R&D) ensures that research organizations maximize the full national value of the intellectual property that they generate, but potential negative spillover effects on the perceived value of a research alliance might deter an existing alliance partner from continued collaboration or a potential alliance partner from future collaboration. This study, performed in 2010 within the context of the Council for Scientific and Industrial Research in South Africa, aimed to develop a structural equation modeling-based value-mediation governance decision-making model that will enable engineering managers at publicly financed R&D organizations to select optimal governance modes for the research alliances they are establishing to grow their organizations’ R&D capabilities.  相似文献   
38.
39.
We discuss the calculus of variations in tensor representations with a special focus on tensor networks and apply it to functionals of practical interest. The survey provides all necessary ingredients for applying minimization methods in a general setting. The important cases of target functionals which are linear and quadratic with respect to the tensor product are discussed, and combinations of these functionals are presented in detail. As an example, we consider the representation rank compression in tensor networks. For the numerical treatment, we use the nonlinear block Gauss?CSeidel method. We demonstrate the rate of convergence in numerical tests.  相似文献   
40.
Automating software testing activities can increase the quality and drastically decrease the cost of software development. Toward this direction, various automated test data generation tools have been developed. The majority of existing tools aim at structural testing, while a quite limited number aim at a higher level of testing thoroughness such as mutation. In this paper, an attempt toward automating the generation of mutation-based test cases by utilizing existing automated tools is proposed. This is achieved by reducing the killing mutants’ problem into a covering branches one. To this extent, this paper is motivated by the use of state of the art techniques and tools suitable for covering program branches when performing mutation. Tools and techniques such as symbolic execution, concolic execution, and evolutionary testing can be easily adopted toward automating the test input generation activity for the weak mutation testing criterion by simply utilizing a special form of the mutant schemata technique. The propositions made in this paper integrate three automated tools in order to illustrate and examine the method’s feasibility and effectiveness. The obtained results, based on a set of Java program units, indicate the applicability and effectiveness of the suggested technique. The results advocate that the proposed approach is able to guide existing automating tools in producing test cases according to the weak mutation testing criterion. Additionally, experimental results with the proposed mutation testing regime show that weak mutation is able to speedup the mutant execution time by at least 4.79 times when compared with strong mutation.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号