首页 | 官方网站   微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   4394篇
  免费   543篇
  国内免费   395篇
工业技术   5332篇
  2024年   36篇
  2023年   122篇
  2022年   252篇
  2021年   274篇
  2020年   268篇
  2019年   174篇
  2018年   160篇
  2017年   165篇
  2016年   193篇
  2015年   175篇
  2014年   261篇
  2013年   255篇
  2012年   229篇
  2011年   348篇
  2010年   232篇
  2009年   255篇
  2008年   223篇
  2007年   228篇
  2006年   230篇
  2005年   166篇
  2004年   150篇
  2003年   135篇
  2002年   125篇
  2001年   94篇
  2000年   71篇
  1999年   67篇
  1998年   62篇
  1997年   64篇
  1996年   45篇
  1995年   44篇
  1994年   37篇
  1993年   29篇
  1992年   23篇
  1991年   33篇
  1990年   17篇
  1989年   21篇
  1988年   13篇
  1987年   4篇
  1986年   15篇
  1985年   7篇
  1984年   9篇
  1983年   6篇
  1982年   3篇
  1980年   3篇
  1977年   1篇
  1976年   2篇
  1975年   1篇
  1973年   1篇
  1972年   1篇
  1959年   1篇
排序方式: 共有5332条查询结果,搜索用时 15 毫秒
101.
Contention resolution schemes in optical burst switched networks (OBS) as well as contention avoidance schemes delay burst delivery and change the burst arrival sequence. The burst arrival sequence usually changes the packet arrival sequence and degrades the upper layer protocols performance, e.g., the throughput of the transmission control protocol (TCP).In this paper, we present and analyze a detailed burst reordering model for two widely applied burst assembly strategies: time-based and random selection. We apply the IETF reordering metrics and calculate explicitly three reordering metrics: the reordering ratio, the reordering extent metric and the TCP relevant metric. These metrics allow estimating the degree of reordering in a certain network scenario. They estimate the buffer space at the destination to resolve reordering and quantify the number of duplicate acknowledgements relevant for investigations on the transmission control protocol.We show that our model reflects the burst/packet reordering pattern of simulated OBS networks very well. Applying our model in a network emulation scenario, enables investigations on real protocol implementations in network emulation environments. It therefore serves as a substitute for extensive TCP over OBS network simulations with a focus on burst reordering.  相似文献   
102.
We analyze large, random network topologies that arise in ad hoc or sensor networks. A fundamental requirement of communication in these systems is reachability, that is, to have a connected network topology. It is known, however, that the price for full connectivity is very high, as it requires unbounded local complexity, i.e., it forces the nodes to have infinitely growing degrees to achieve asymptotic connectivity. This means a lack of scalability, which is known to hold for a quite general class of random network topology models. Therefore, an important step in analyzing the performance of such networks is to explore the trade-off between the fraction of nodes that still belong to a connected component vs. a bound imposed on local connectivity, i.e., on the node degrees. We investigate this issue in a model that is more general than previously investigated random wireless network topology models. In our general model we derive an asymptotically optimal trade-off between node degrees and the fraction of nodes that form a connected component.  相似文献   
103.
Min and Agresti (2005) proposed random effect hurdle models for zero-inflated clustered count data with two-part random effects for a binary component and a truncated count component. In this paper, we propose new marginalized models for zero-inflated clustered count data using random effects. The marginalized models are similar to Dobbie and Welsh’s (2001) model in which generalized estimating equations were exploited to find estimates. However, our proposed models are based on a likelihood-based approach. A Quasi-Newton algorithm is developed for estimation. We use these methods to carefully analyze two real datasets.  相似文献   
104.
We consider a Riemann surface X defined by a polynomial f(x,y) of degree d, whose coefficients are chosen randomly. Hence, we can suppose that X is smooth, that the discriminant δ(x) of f has d(d−1) simple roots, Δ, and that δ(0)≠0, i.e. the corresponding fiber has d distinct points {y1,…,yd}. When we lift a loop 0∈γCΔ by a continuation method, we get d paths in X connecting {y1,…,yd}, hence defining a permutation of that set. This is called monodromy.Here we present experimentations in Maple to get statistics on the distribution of transpositions corresponding to loops around each point of Δ. Multiplying families of “neighbor” transpositions, we construct permutations and the subgroups of the symmetric group they generate. This allows us to establish and study experimentally two conjectures on the distribution of these transpositions and on transitivity of the generated subgroups.Assuming that these two conjectures are true, we develop tools allowing fast probabilistic algorithms for absolute multivariate polynomial factorization, under the hypothesis that the factors behave like random polynomials whose coefficients follow uniform distributions.  相似文献   
105.
网络文件系统(Network Filc System)由于其稳定、易用而得到了广泛的应用。为了提高NFS服务器端的I/O性能,提出一种在给定客户端访问序列的NFS服务器端伪随机序列预取(NPRP: NFS Pseudo Random Prefetch)机制。实验测试结果表明,NPRP机制对特定应用的NFS服务器的I/O带宽提升超过2倍。  相似文献   
106.
Reliability-based design optimization (RBDO) incorporates probabilistic analysis into optimization process so that an optimum design has a great chance of staying in the feasible design space when the inevitable variability in design variables/parameters is considered. One of the biggest drawbacks of applying RBDO to practical problem is its high computational cost that is often impractical to industries. In search of the most suitable RBDO method for industrial applications, we first evaluated several existing RBDO approaches in details such as the double-loop RBDO, the sequential optimization and reliability assessment, and the response surface method. Then, based on industry needs, a platform incorporating/integrating the existing algorithm of optimization and reliability analysis is built for a practical RBDO problem. Effectiveness of the proposed RBDO approach is demonstrated using a simple cantilever beam problem and a more complicated industry problem.  相似文献   
107.
This article is about testing the equality of several normal means when the variances are unknown and arbitrary, i.e., the set up of the one-way ANOVA. Even though several tests are available in the literature, none of them perform well in terms of Type I error probability under various sample size and parameter combinations. In fact, Type I errors can be highly inflated for some of the commonly used tests; a serious issue that appears to have been overlooked. We propose a parametric bootstrap (PB) approach and compare it with three existing location-scale invariant tests—the Welch test, the James test and the generalized F (GF) test. The Type I error rates and powers of the tests are evaluated using Monte Carlo simulation. Our studies show that the PB test is the best among the four tests with respect to Type I error rates. The PB test performs very satisfactorily even for small samples while the Welch test and the GF test exhibit poor Type I error properties when the sample sizes are small and/or the number of means to be compared is moderate to large. The James test performs better than the Welch test and the GF test. It is also noted that the same tests can be used to test the significance of the random effect variance component in a one-way random model under unequal error variances. Such models are widely used to analyze data from inter-laboratory studies. The methods are illustrated using some examples.  相似文献   
108.
In this paper we provide an explicit way to compute asymptotically almost sure upper bounds on the bisection width of random dd-regular graphs, for any value of dd. The upper bounds are obtained from the analysis of the performance of a randomized greedy algorithm to find bisections of dd-regular graphs. We provide bounds for 5≤d≤125d12. We also give empirical values of the size of the bisection found by the algorithm for some small values of dd and compare them with numerical approximations of our theoretical bounds. Our analysis also gives asymptotic lower bounds for the size of the maximum bisection.  相似文献   
109.
林业调查中采用的基本方法是全林调查法和局部估测法,而局部估测方法中最常用的是角规测量法与标准地法,在林地调查中角规法误差较大,而标准地法又存在着难于布设的问题。本研究提出的面积单元线性测量法,可方便快捷地进行局部估测,节省人力和时间,同时又达到了较高的精度,特别适用于不规则林分的调查。  相似文献   
110.
Random Sampling of Euler Tours   总被引:1,自引:0,他引:1  
P. Tetali  S. Vempala 《Algorithmica》2001,30(3):376-385
We define a Markov chain on the set of Euler tours of a given Eulerian graph based on transformations first defined by Kotzig in 1966. We prove that the chain is rapidly mixing if the maximum degree in the given graph is 6, thus obtaining an efficient algorithm for sampling and counting the set of Euler tours for such an Eulerian graph. Received October 30, 1997; revised March 12, 1999, and April 17, 2000.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号