首页 | 官方网站   微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   3216篇
  免费   86篇
  国内免费   5篇
工业技术   3307篇
  2021年   40篇
  2020年   15篇
  2019年   29篇
  2018年   27篇
  2017年   37篇
  2016年   46篇
  2015年   41篇
  2014年   75篇
  2013年   191篇
  2012年   93篇
  2011年   148篇
  2010年   103篇
  2009年   102篇
  2008年   131篇
  2007年   136篇
  2006年   121篇
  2005年   129篇
  2004年   82篇
  2003年   93篇
  2002年   102篇
  2001年   56篇
  2000年   47篇
  1999年   77篇
  1998年   219篇
  1997年   138篇
  1996年   106篇
  1995年   73篇
  1994年   83篇
  1993年   57篇
  1992年   44篇
  1991年   35篇
  1990年   37篇
  1989年   42篇
  1988年   34篇
  1987年   24篇
  1986年   31篇
  1985年   41篇
  1984年   28篇
  1983年   26篇
  1982年   38篇
  1981年   33篇
  1980年   20篇
  1979年   30篇
  1978年   24篇
  1977年   36篇
  1976年   46篇
  1975年   20篇
  1974年   13篇
  1973年   19篇
  1971年   14篇
排序方式: 共有3307条查询结果,搜索用时 93 毫秒
101.
Data grids support access to widely distributed storage for large numbers of users accessing potentially many large files. Efficient access is hindered by the high latency of the Internet. To improve access time, replication at nearby sites may be used. Replication also provides high availability, decreased bandwidth use, enhanced fault tolerance, and improved scalability. Resource availability, network latency, and user requests in a grid environment may vary with time. Any replica placement strategy must be able to adapt to such dynamic behavior. In this paper, we describe a new dynamic replica placement algorithm, Popularity Based Replica Placement (PBRP), for hierarchical data grids which is guided by file “popularity”. Our goal is to place replicas close to clients to reduce data access time while still using network and storage resources efficiently. The effectiveness of PBRP depends on the selection of a threshold value related to file popularity. We also present Adaptive-PBRP (APBRP) that determines this threshold dynamically based on data request arrival rates. We evaluate both algorithms using simulation. Results for a range of data access patterns show that our algorithms can shorten job execution time significantly and reduce bandwidth consumption compared to other dynamic replication methods.  相似文献   
102.
Anonymizing bipartite graph data using safe groupings   总被引:1,自引:0,他引:1  
Private data often come in the form of associations between entities, such as customers and products bought from a pharmacy, which are naturally represented in the form of a large, sparse bipartite graph. As with tabular data, it is desirable to be able to publish anonymized versions of such data, to allow others to perform ad hoc analysis of aggregate graph properties. However, existing tabular anonymization techniques do not give useful or meaningful results when applied to graphs: small changes or masking of the edge structure can radically change aggregate graph properties. We introduce a new family of anonymizations for bipartite graph data, called (k, ℓ)-groupings. These groupings preserve the underlying graph structure perfectly, and instead anonymize the mapping from entities to nodes of the graph. We identify a class of “safe” (k, ℓ)-groupings that have provable guarantees to resist a variety of attacks, and show how to find such safe groupings. We perform experiments on real bipartite graph data to study the utility of the anonymized version, and the impact of publishing alternate groupings of the same graph data. Our experiments demonstrate that (k, ℓ)-groupings offer strong tradeoffs between privacy and utility.  相似文献   
103.
This paper presents an improved constraint satisfaction adaptive neural network for job-shop scheduling problems. The neural network is constructed based on the constraint conditions of a job-shop scheduling problem. Its structure and neuron connections can change adaptively according to the real-time constraint satisfaction situations that arise during the solving process. Several heuristics are also integrated within the neural network to enhance its convergence, accelerate its convergence, and improve the quality of the solutions produced. An experimental study based on a set of benchmark job-shop scheduling problems shows that the improved constraint satisfaction adaptive neural network outperforms the original constraint satisfaction adaptive neural network in terms of computational time and the quality of schedules it produces. The neural network approach is also experimentally validated to outperform three classical heuristic algorithms that are widely used as the basis of many state-of-the-art scheduling systems. Hence, it may also be used to construct advanced job-shop scheduling systems.  相似文献   
104.
The subfilter-scale (SFS) physics of regularization models are investigated to understand the regularizations’ performance as SFS models. Suppression of spectrally local SFS interactions and conservation of small-scale circulation in the Lagrangian-averaged Navier-Stokes α-model (LANS-α) is found to lead to the formation of rigid bodies. These contaminate the superfilter-scale energy spectrum with a scaling that approaches k +1 as the SFS spectra is resolved. The Clark-α and Leray-α models, truncations of LANS-α, do not conserve small-scale circulation and do not develop rigid bodies. LANS-α, however, is closest to Navier-Stokes in intermittency properties. All three models are found to be stable at high Reynolds number. Differences between L 2 and H 1 norm models are clarified. For magnetohydrodynamics (MHD), the presence of the Lorentz force as a source (or sink) for circulation and as a facilitator of both spectrally nonlocal large to small scale interactions as well as local SFS interactions prevents the formation of rigid bodies in Lagrangian-averaged MHD (LAMHD-α). LAMHD-α performs well as a predictor of superfilter-scale energy spectra and of intermittent current sheets at high Reynolds numbers. It may prove generally applicable as a MHD-LES.  相似文献   
105.
The subgraph homeomorphism problem has been shown by Robertson and Seymour to be polynomial-time solvable for any fixed pattern graph H. The result, however, is not practical, involving constants that are worse than exponential in |H|. Practical algorithms have only been developed for a few specific pattern graphs, the most recent of these being the wheels with four and five spokes. This paper looks at the subgraph homeomorphism problem where the pattern graph is a wheel with six spokes. The main result is a theorem characterizing graphs that do not contain subdivisions of W 6. We give an efficient algorithm for solving the subgraph homeomorphism problem for W 6. We also give a strengthening of the previous W 5 result.  相似文献   
106.
This paper introduces an alternative formulation of the Kalman-Yakubovich-Popov (KYP) Lemma, relating an infinite dimensional Frequency Domain Inequality (FDI) to a pair of finite dimensional Linear Matrix Inequalities (LMI). It is shown that this new formulation encompasses previous generalizations of the KYP Lemma which hold in the case the coefficient matrix of the FDI does not depend on frequency. In addition, it allows the coefficient matrix of the frequency domain inequality to vary affinely with the frequency parameter. One application of this results is illustrated in an example of computing upper bounds to the structured singular value with frequency-dependent scalings.  相似文献   
107.
Based on the assumption of a working memory processor devoted to human movement, cognitive load theory is used to explore some conditions under which animated instructions are hypothesised to be more effective for learning than equivalent static graphics. Using paper-folding tasks dealing with human movement, results from three experiments confirmed our hypothesis, indicating a superiority of animation over static graphics. These results are discussed in terms of a working memory processor that may be facilitated by our mirror-neuron system and may explain why animated instructional animations are superior to static graphics for cognitively based tasks that involve human movement.  相似文献   
108.
The controlled dispersion of fluids, particularly biologically relevant solutions in micro-volumes, is of high practical interest in biotechnology and medicine. Pharmaceutical test assays, for example, need a method for the fast and defined deposition of fluid samples. Most current micro-dispensing methods, i.e. contact-based pin printing, have problems such as time delays, limited dosing velocity, minimum volume or high interference that limit biological applications. Spraying techniques suffer from a lack of reproducibility; a defined deposition of samples on targets is not possible. Here, we introduce a new method for the parallel and spatially defined dispersion of many micro-volumes that overcomes disadvantages of common micro-dispensers. The overall approach is that a fluid drop, produced by a droplet generator, falls on a free trajectory with a defined kinetic energy, and is split by a masking unit placed perpendicular to the flight direction into at least two smaller droplets (Zimmermann et al. in Method and device for dosing fluid media, WO/2002/102515, Germany, 2002). On the target, the resulting droplets form reproducible patterns, which are enlarged and scalable images of the grid pattern. Possible applications for this method are non-contact cell patterning, cell encapsulation, cryopreservation and fast mixing processes in micro-volumes. Here, we use this method for the direct and defined parallel positioning of cell suspensions on specific substrates, which can be useful for test assays, tissue engineering and cryopreservation.  相似文献   
109.
Previous research has identified user concerns about biometric authentication technology, but most of this research has been conducted in European contexts. There is a lack of research that has investigated attitudes towards biometric technology in other cultures. To address this issue, data from India, South Africa and the United Kingdom were collected and compared. Cross-cultural attitudinal differences were seen, with Indian respondents viewing biometrics most positively while respondents from the United Kingdom were the least likely to have a positive opinion about biometrics. Multiple barriers to the acceptance of biometric technology were identified with data security and health and safety fears having the greatest overall impact on respondents’ attitudes towards biometrics. The results of this investigation are discussed with reference to Hofstede’s cultural dimensions and theories of technology acceptance. It is argued that contextual issues specific to each country provide a better explanation of the results than existing theories based on Hofstede’s model. We conclude that cultural differences have an impact on the way biometric systems will be used and argue that these factors should be taken into account during the design and implementation of biometric systems.  相似文献   
110.
The purpose of this research is to identify the potential information components of an online, real-time trust label, which is proposed as a communication mechanism to encourage trust in cloud service providers and cloud computing products. An online Delphi process was used with 28 cloud computing experts (including vendors, software providers, and legal and business representatives). The proposed label contains 81 information components, covering the cloud service provider (e.g. physical location, legal jurisdiction), the cloud service itself (e.g. data location, security, backup, certification), and a historical service-level summary (e.g. uptime data, support response times). The potential benefits of such a label to encourage trustworthiness perceptions and trust behaviors in the cloud computing environment are explored. Limitations of the study are highlighted, and further research studies are suggested to test the concept of the label and to refine the components of the label itself.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号