首页 | 官方网站   微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1598篇
  免费   73篇
  国内免费   2篇
工业技术   1673篇
  2024年   4篇
  2023年   36篇
  2022年   49篇
  2021年   58篇
  2020年   41篇
  2019年   62篇
  2018年   80篇
  2017年   57篇
  2016年   64篇
  2015年   47篇
  2014年   67篇
  2013年   124篇
  2012年   64篇
  2011年   107篇
  2010年   69篇
  2009年   86篇
  2008年   64篇
  2007年   73篇
  2006年   52篇
  2005年   43篇
  2004年   33篇
  2003年   37篇
  2002年   30篇
  2001年   19篇
  2000年   19篇
  1999年   18篇
  1998年   23篇
  1997年   32篇
  1996年   16篇
  1995年   19篇
  1994年   17篇
  1993年   8篇
  1992年   20篇
  1991年   15篇
  1990年   13篇
  1989年   17篇
  1988年   17篇
  1987年   8篇
  1986年   8篇
  1985年   6篇
  1984年   8篇
  1983年   5篇
  1982年   8篇
  1981年   4篇
  1980年   5篇
  1979年   6篇
  1977年   4篇
  1976年   4篇
  1972年   3篇
  1965年   1篇
排序方式: 共有1673条查询结果,搜索用时 15 毫秒
61.
The scheduling of tasks in multiprocessor real-time systems has attracted many researchers in the recent past. Tasks in these systems have deadlines to be met, and most of the real-time scheduling algorithms use worst case computation times to schedule these tasks. Many resources will be left unused if the tasks are dispatched purely based on the schedule produced by these scheduling algorithms, since most of the tasks will take less time to execute than their respective worst case computation times. Resource reclaiming refers to the problem of reclaiming the resources left unused by a real-time task when it takes less time to execute than its worst case computation time. In this paper, we propose two algorithms to reclaim these resources from real-time tasks that are constrained by precedence relations and resource requirements, in shared memory multiprocessor systems. We introduce a notion called a restriction vector for each task which captures its resource and precedence constraints with other tasks. This will help not only in the efficient implementation of the algorithms, but also in obtaining an improvement in performance over the reclaiming algorithms proposed in earlier work [[2]]. We compare our resource reclaiming algorithms with the earlier algorithms and, by experimental studies, show that they reclaim more resources, thereby increasing the guarantee ratio (the ratio of the number of tasks guaranteed to meet their deadlines to the number of tasks that have arrived), which is the basic requirement of any resource reclaiming algorithm. From our simulation studies, we demonstrate that complex reclaiming algorithms with high reclaiming overheads do not lead to an improvement in the guarantee ratio.  相似文献   
62.
A software architecture is presented that allows client application programs to interact with a DBMS server in a flexible and powerful way, using either direct, volatile messages, or messages sent via recoverable queues. Normal requests from clients to the server and replies from the server to clients can be transmitted using direct or recoverable messages. In addition, an application event notification mechanism is provided, whereby client applications running anywhere on the network can register for events, and when those events are raised, the clients are notified. A novel parameter passing mechanism allows a set of tuples to be included in an event notification. The event mechanism is particularly useful in an active DBMS, where events can be raised by triggers to signal running application programs. Received July 21, 1995 / Accepted May 30, 1996  相似文献   
63.
Fractal symbolic analysis is a symbolic analysis technique for verifying the legality of program transformations. It is strictly more powerful than dependence analysis; for example, it can be used to verify the legality of blocking LU factorization with pivoting, a task for which dependence analysis is inadequate. In this paper, we show how fractal symbolic analysis can be used to convert between left- and right-looking versions of three kernels of central importance in computational science: triangular solve, Cholesky factorization, and LU factorization with pivoting.  相似文献   
64.
Numerical schemes and stability criteria are developed for solution of the one-dimensional fractional advection-dispersion equation (FRADE) derived by revising Fick’s first law. Employing 74 sets of dye test data measured on natural streams, it is found that the fractional order F of the partial differential operator acting on the dispersion term varies around the most frequently occurring value of F = 1.65 in the range of 1.4 to 2.0. Two series expansions are proposed for approximation of the limit definitions of fractional derivatives. On this ground, two three-term finite-difference schemes?“1.3 Backward Scheme” having the first-order accuracy and “F.3 Central Scheme” possessing the F-th order accuracy?are presented for fractional order derivatives. The F.3 scheme is found to perform better than does the 1.3 scheme in terms of error and stability analyses and is thus recommended for numerical solution of FRADE. The fractional dispersion model characterized by the FRADE and the F.3 scheme can accurately simulate the long-tailed dispersion processes in natural rivers.  相似文献   
65.
The procedure for phase extension (PX) involves gradually extending the initial phases from low resolution (e.g. ~8?Å) to the high-resolution limit of a diffraction data set. Structural redundancy present in the viral capsids that display icosahedral symmetry results in a high degree of non-crystallographic symmetry (NCS), which in turn translates into higher phasing power and is critical for improving and extending phases to higher resolution. Greater completeness of the diffraction data and determination of a molecular replacement solution, which entails accurately identifying the virus particle orientation(s) and position(s), are important for the smooth progression of the PX procedure. In addition, proper definition of a molecular mask (envelope) around the NCS-asymmetric unit has been found to be important for the success of density modification procedures, such as density averaging and solvent flattening. Regardless of the degree of NCS, the PX method appears to work well in all space groups, provided an accurate molecular mask is used along with reasonable initial phases. However, in the cases with space group P1, in addition to requiring a molecular mask, starting the PX at a higher resolution (e.g. 6?Å) overcame the previously reported problems due to Babinet phases and phase flipping errors.  相似文献   
66.
Bulk samples of pure iron and yttria dispersed iron with and without titanium (i.e., Fe, Fe-Y2O3, and Fe-Y2O3-Ti) were prepared by hot extrusion of high-energy ball-milled powders. An examination of the microstructure using TEM revealed that the addition of titanium resulted in the reduction of the dispersoid size with a concomitant increase in the volume fraction of the dispersoids. As a result, Fe-Y2O3-Ti exhibited a substantial increase in hardness and tensile properties as compared to Fe and Fe-Y2O3. The higher hardness and strength of Fe-Y2O3-Ti is shown to be due to the presence of finer and higher number density of Y-Ti-O complex oxides. Dynamic strain aging in the temperature range of 423 K to 573 K (150 °C to 300 °C) was observed in all the compositions studied.  相似文献   
67.
68.
Journal of Superconductivity and Novel Magnetism - This paper reports the effects of rare-earth Sm3+ ion substitution on structural, optical, electronic, and magnetic responses of maghemite...  相似文献   
69.
Simulink and Stateflow (SL/SF) models are being widely used to design and develop embedded systems. Often the SL/SF models of embedded controllers turn out to be large and consist of many subsystems and hierarchies. When such a system is maintained, it becomes difficult to manually analyse the model to identify the impacted elements due to the existence of several explicit and implicit dependencies among the model elements. To automate the analysis of an SL/SF model, we propose a metamodel to capture various types of dependencies existing across the basic blocks. We have named this metamodel Simulink dependency graph (SLDG). We investigate the use of SLDG in change impact visualization and regression test selection. We have developed a prototype tool by implementing our approach for the aforementioned applications.  相似文献   
70.
Ultrasonic irradiation of molten gallium in organic liquids (decane, dodecane, etc.) results in dispersion of the gallium into nanometric spheres. These were examined by several analytical methods XRD, DSC, Raman and IR spectroscopy) as well as electron microscopy (SEM, TEM) and found to be composed of Ga and C. The DSC analysis indicates that the Ga has possibly reacted with carbon, while the Raman spectrum of the product demonstrates a strong additional peak that could not be identified. This work explores the possibility that the product is gallium carbide or another gallium‐carbon complex. To investigate the nature of the product, we performed detailed extended X‐ray absorption fine structure (EXAFS) and X‐ray absorption near‐edge structure (XANES) analyses. On the basis of DSC, IR, and Raman it appear to be formation of GaC, whereas the analysis by EXAFS and XANES demonstrated that the gallium is found to be in a higher reduced state (almost metallic), supported by carbon. The question that remains open in addition to the one related to the formation of galium carbide is whether a complex structure, including oxygen contamination is involved in the layers surrounding the Ga as indicated by the EXAFS results.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号