全文获取类型
收费全文 | 3216篇 |
免费 | 86篇 |
国内免费 | 5篇 |
学科分类
工业技术 | 3307篇 |
出版年
2021年 | 40篇 |
2020年 | 15篇 |
2019年 | 29篇 |
2018年 | 27篇 |
2017年 | 37篇 |
2016年 | 46篇 |
2015年 | 41篇 |
2014年 | 75篇 |
2013年 | 191篇 |
2012年 | 93篇 |
2011年 | 148篇 |
2010年 | 103篇 |
2009年 | 102篇 |
2008年 | 131篇 |
2007年 | 136篇 |
2006年 | 121篇 |
2005年 | 129篇 |
2004年 | 82篇 |
2003年 | 93篇 |
2002年 | 102篇 |
2001年 | 56篇 |
2000年 | 47篇 |
1999年 | 77篇 |
1998年 | 219篇 |
1997年 | 138篇 |
1996年 | 106篇 |
1995年 | 73篇 |
1994年 | 83篇 |
1993年 | 57篇 |
1992年 | 44篇 |
1991年 | 35篇 |
1990年 | 37篇 |
1989年 | 42篇 |
1988年 | 34篇 |
1987年 | 24篇 |
1986年 | 31篇 |
1985年 | 41篇 |
1984年 | 28篇 |
1983年 | 26篇 |
1982年 | 38篇 |
1981年 | 33篇 |
1980年 | 20篇 |
1979年 | 30篇 |
1978年 | 24篇 |
1977年 | 36篇 |
1976年 | 46篇 |
1975年 | 20篇 |
1974年 | 13篇 |
1973年 | 19篇 |
1971年 | 14篇 |
排序方式: 共有3307条查询结果,搜索用时 93 毫秒
101.
Mohammad Shorfuzzaman Peter Graham Rasit Eskicioglu 《The Journal of supercomputing》2010,51(3):374-392
Data grids support access to widely distributed storage for large numbers of users accessing potentially many large files.
Efficient access is hindered by the high latency of the Internet. To improve access time, replication at nearby sites may
be used. Replication also provides high availability, decreased bandwidth use, enhanced fault tolerance, and improved scalability.
Resource availability, network latency, and user requests in a grid environment may vary with time. Any replica placement
strategy must be able to adapt to such dynamic behavior. In this paper, we describe a new dynamic replica placement algorithm,
Popularity Based Replica Placement (PBRP), for hierarchical data grids which is guided by file “popularity”. Our goal is to
place replicas close to clients to reduce data access time while still using network and storage resources efficiently. The
effectiveness of PBRP depends on the selection of a threshold value related to file popularity. We also present Adaptive-PBRP
(APBRP) that determines this threshold dynamically based on data request arrival rates. We evaluate both algorithms using
simulation. Results for a range of data access patterns show that our algorithms can shorten job execution time significantly
and reduce bandwidth consumption compared to other dynamic replication methods. 相似文献
102.
Anonymizing bipartite graph data using safe groupings 总被引:1,自引:0,他引:1
Graham Cormode Divesh Srivastava Ting Yu Qing Zhang 《The VLDB Journal The International Journal on Very Large Data Bases》2010,19(1):115-139
Private data often come in the form of associations between entities, such as customers and products bought from a pharmacy,
which are naturally represented in the form of a large, sparse bipartite graph. As with tabular data, it is desirable to be
able to publish anonymized versions of such data, to allow others to perform ad hoc analysis of aggregate graph properties.
However, existing tabular anonymization techniques do not give useful or meaningful results when applied to graphs: small
changes or masking of the edge structure can radically change aggregate graph properties. We introduce a new family of anonymizations
for bipartite graph data, called (k, ℓ)-groupings. These groupings preserve the underlying graph structure perfectly, and instead anonymize the mapping from entities
to nodes of the graph. We identify a class of “safe” (k, ℓ)-groupings that have provable guarantees to resist a variety of attacks, and show how to find such safe groupings. We perform
experiments on real bipartite graph data to study the utility of the anonymized version, and the impact of publishing alternate
groupings of the same graph data. Our experiments demonstrate that (k, ℓ)-groupings offer strong tradeoffs between privacy and utility. 相似文献
103.
This paper presents an improved constraint satisfaction adaptive neural network for job-shop scheduling problems. The neural
network is constructed based on the constraint conditions of a job-shop scheduling problem. Its structure and neuron connections
can change adaptively according to the real-time constraint satisfaction situations that arise during the solving process.
Several heuristics are also integrated within the neural network to enhance its convergence, accelerate its convergence, and
improve the quality of the solutions produced. An experimental study based on a set of benchmark job-shop scheduling problems
shows that the improved constraint satisfaction adaptive neural network outperforms the original constraint satisfaction adaptive
neural network in terms of computational time and the quality of schedules it produces. The neural network approach is also
experimentally validated to outperform three classical heuristic algorithms that are widely used as the basis of many state-of-the-art
scheduling systems. Hence, it may also be used to construct advanced job-shop scheduling systems. 相似文献
104.
Jonathan Pietarila Graham Darryl D. Holm Pablo Mininni Annick Pouquet 《Journal of scientific computing》2011,49(1):21-34
The subfilter-scale (SFS) physics of regularization models are investigated to understand the regularizations’ performance
as SFS models. Suppression of spectrally local SFS interactions and conservation of small-scale circulation in the Lagrangian-averaged
Navier-Stokes α-model (LANS-α) is found to lead to the formation of rigid bodies. These contaminate the superfilter-scale energy spectrum with a scaling
that approaches k
+1 as the SFS spectra is resolved. The Clark-α and Leray-α models, truncations of LANS-α, do not conserve small-scale circulation and do not develop rigid bodies. LANS-α, however, is closest to Navier-Stokes in intermittency properties. All three models are found to be stable at high Reynolds
number. Differences between L
2 and H
1 norm models are clarified. For magnetohydrodynamics (MHD), the presence of the Lorentz force as a source (or sink) for circulation
and as a facilitator of both spectrally nonlocal large to small scale interactions as well as local SFS interactions prevents
the formation of rigid bodies in Lagrangian-averaged MHD (LAMHD-α). LAMHD-α performs well as a predictor of superfilter-scale energy spectra and of intermittent current sheets at high Reynolds numbers.
It may prove generally applicable as a MHD-LES. 相似文献
105.
The subgraph homeomorphism problem has been shown by Robertson and Seymour to be polynomial-time solvable for any fixed pattern
graph H. The result, however, is not practical, involving constants that are worse than exponential in |H|. Practical algorithms have only been developed for a few specific pattern graphs, the most recent of these being the wheels
with four and five spokes. This paper looks at the subgraph homeomorphism problem where the pattern graph is a wheel with
six spokes. The main result is a theorem characterizing graphs that do not contain subdivisions of W
6. We give an efficient algorithm for solving the subgraph homeomorphism problem for W
6. We also give a strengthening of the previous W
5 result. 相似文献
106.
Matthew R. Graham Author Vitae Author Vitae Raymond A. de Callafon Author Vitae 《Automatica》2009,45(6):1489-1496
This paper introduces an alternative formulation of the Kalman-Yakubovich-Popov (KYP) Lemma, relating an infinite dimensional Frequency Domain Inequality (FDI) to a pair of finite dimensional Linear Matrix Inequalities (LMI). It is shown that this new formulation encompasses previous generalizations of the KYP Lemma which hold in the case the coefficient matrix of the FDI does not depend on frequency. In addition, it allows the coefficient matrix of the frequency domain inequality to vary affinely with the frequency parameter. One application of this results is illustrated in an example of computing upper bounds to the structured singular value with frequency-dependent scalings. 相似文献
107.
Anna Wong Nadine Marcus Paul Ayres Lee Smith Graham A. Cooper Fred Paas John Sweller 《Computers in human behavior》2009
Based on the assumption of a working memory processor devoted to human movement, cognitive load theory is used to explore some conditions under which animated instructions are hypothesised to be more effective for learning than equivalent static graphics. Using paper-folding tasks dealing with human movement, results from three experiments confirmed our hypothesis, indicating a superiority of animation over static graphics. These results are discussed in terms of a working memory processor that may be facilitated by our mirror-neuron system and may explain why animated instructional animations are superior to static graphics for cognitively based tasks that involve human movement. 相似文献
108.
The controlled dispersion of fluids, particularly biologically relevant solutions in micro-volumes, is of high practical interest
in biotechnology and medicine. Pharmaceutical test assays, for example, need a method for the fast and defined deposition
of fluid samples. Most current micro-dispensing methods, i.e. contact-based pin printing, have problems such as time delays,
limited dosing velocity, minimum volume or high interference that limit biological applications. Spraying techniques suffer
from a lack of reproducibility; a defined deposition of samples on targets is not possible. Here, we introduce a new method
for the parallel and spatially defined dispersion of many micro-volumes that overcomes disadvantages of common micro-dispensers.
The overall approach is that a fluid drop, produced by a droplet generator, falls on a free trajectory with a defined kinetic
energy, and is split by a masking unit placed perpendicular to the flight direction into at least two smaller droplets (Zimmermann
et al. in Method and device for dosing fluid media, WO/2002/102515, Germany, 2002). On the target, the resulting droplets form reproducible patterns, which are enlarged and scalable images of the grid pattern.
Possible applications for this method are non-contact cell patterning, cell encapsulation, cryopreservation and fast mixing
processes in micro-volumes. Here, we use this method for the direct and defined parallel positioning of cell suspensions on
specific substrates, which can be useful for test assays, tissue engineering and cryopreservation. 相似文献
109.
Previous research has identified user concerns about biometric authentication technology, but most of this research has been
conducted in European contexts. There is a lack of research that has investigated attitudes towards biometric technology in
other cultures. To address this issue, data from India, South Africa and the United Kingdom were collected and compared. Cross-cultural
attitudinal differences were seen, with Indian respondents viewing biometrics most positively while respondents from the United
Kingdom were the least likely to have a positive opinion about biometrics. Multiple barriers to the acceptance of biometric
technology were identified with data security and health and safety fears having the greatest overall impact on respondents’
attitudes towards biometrics. The results of this investigation are discussed with reference to Hofstede’s cultural dimensions
and theories of technology acceptance. It is argued that contextual issues specific to each country provide a better explanation
of the results than existing theories based on Hofstede’s model. We conclude that cultural differences have an impact on the
way biometric systems will be used and argue that these factors should be taken into account during the design and implementation
of biometric systems. 相似文献
110.
Theo Lynn Lisa van der Werff Graham Hunt Philip Healy 《Journal of Computer Information Systems》2016,56(3):185-193
The purpose of this research is to identify the potential information components of an online, real-time trust label, which is proposed as a communication mechanism to encourage trust in cloud service providers and cloud computing products. An online Delphi process was used with 28 cloud computing experts (including vendors, software providers, and legal and business representatives). The proposed label contains 81 information components, covering the cloud service provider (e.g. physical location, legal jurisdiction), the cloud service itself (e.g. data location, security, backup, certification), and a historical service-level summary (e.g. uptime data, support response times). The potential benefits of such a label to encourage trustworthiness perceptions and trust behaviors in the cloud computing environment are explored. Limitations of the study are highlighted, and further research studies are suggested to test the concept of the label and to refine the components of the label itself. 相似文献