首页 | 官方网站   微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   763篇
  免费   55篇
  国内免费   41篇
工业技术   859篇
  2024年   2篇
  2023年   7篇
  2022年   11篇
  2021年   13篇
  2020年   13篇
  2019年   14篇
  2018年   13篇
  2017年   27篇
  2016年   26篇
  2015年   29篇
  2014年   48篇
  2013年   33篇
  2012年   43篇
  2011年   57篇
  2010年   38篇
  2009年   34篇
  2008年   58篇
  2007年   56篇
  2006年   48篇
  2005年   40篇
  2004年   30篇
  2003年   38篇
  2002年   34篇
  2001年   25篇
  2000年   31篇
  1999年   19篇
  1998年   13篇
  1997年   16篇
  1996年   7篇
  1995年   4篇
  1994年   5篇
  1993年   6篇
  1992年   7篇
  1991年   2篇
  1990年   2篇
  1989年   1篇
  1988年   1篇
  1986年   1篇
  1985年   1篇
  1984年   2篇
  1983年   1篇
  1981年   1篇
  1979年   2篇
排序方式: 共有859条查询结果,搜索用时 46 毫秒
61.
With an increasing acceptance of Wireless Sensor Networks (WSNs), the health of individual sensor is becoming critical in identifying important events in the region of interest. One of the key challenges in detecting event in a WSN is how to detect it accurately transmitting minimum information providing sufficient details about the event. At the same time, it is also important to devise a strategy to handle multiple events occurring simultaneously. In this paper, we propose a Polynomial-based scheme that addresses these problems of Event Region Detection (PERD) by having a aggregation tree of sensor nodes. We employ a data aggregation scheme, TREG (proposed in our earlier work) to perform function approximation of the event using a multivariate polynomial regression. Only coefficients of the polynomial (PP) are passed instead of aggregated data. PERD includes two components: event recognition and event report with boundary detection. This can be performed for multiple simultaneously occurring events. We also identify faulty sensor(s) using the aggregation tree. Performing further mathematical operations on the calculated PP can identify the maximum (max) and minimum (min) values of the sensed attribute and their locations. Therefore, if any sensor reports a data value outside the [min, max] range, it can be identified as a faulty sensor. Since PERD is implemented over a polynomial tree on a WSN in a distributed manner, it is easily scalable and computation overhead is marginal. Results reveal that event(s) can be detected by PERD with error in detection remaining almost constant achieving a percentage error within a threshold of 10%10% with increase in communication range. Results also show that a faulty sensor can be detected with an average accuracy of 94%94% and it increases with increase in node density.  相似文献   
62.
63.
This paper proposes a framework to aid video analysts in detecting suspicious activity within the tremendous amounts of video data that exists in today’s world of omnipresent surveillance video. Ideas and techniques for closing the semantic gap between low-level machine readable features of video data and high-level events seen by a human observer are discussed. An evaluation of the event classification and detection technique is presented and a future experiment to refine this technique is proposed. These experiments are used as a lead to a discussion on the most optimal machine learning algorithm to learn the event representation scheme proposed in this paper.
Bhavani ThuraisinghamEmail:
  相似文献   
64.
65.
Events play many roles in computer systems, ranging from hardware interrupts, over event-based software architecture, to monitoring and managing of complex systems. In many applications, however, individual event occurrences are not the main point of concern, but rather the occurrences of certain event patterns. Such event patterns can be defined by means of an event algebra, i.e., expressions representing the patterns of interest are built from simple events and operators such as disjunction, sequence, etc.We propose a novel event algebra with intuitive operators (a claim which is supported by a number of algebraic properties). We also present an efficient detection algorithm that correctly detects any expression with bounded memory, which makes this algebra particularly suitable for resource-constrained applications such as embedded systems.  相似文献   
66.
In the paper we present efficient algorithm for measurement and simultaneous compression of multidimensional symmetrical γ-ray histograms from event data streams. The compression of data volume is achieved due to both the symmetry of the γ-ray spectra and compression capabilities of the employed randomizing transform. The algorithm of compression is very fast. Acquired compressed data can be later processed in an interactive way.  相似文献   
67.
汪新林  岳彬 《微计算机信息》2006,22(28):153-155
机场供油系统是一种典型的排队服务系统。本文通过对单顾客流输入下五种情况的研究,分别建立了系统的仿真模型,提出了适合解决该问题的事件调度法与活动扫描法等两种仿真策略并给出了伪码算法。仿真实践表明,准确而全面的模型分析,对于后期开发仿真程序,优化系统性能是非常重要的。  相似文献   
68.
采用Smith预估反馈控制方法,通过离散事件仿真,对实时CORBA事件通道中任务的QoS级别进行控制,从而控制事件通道中的任务流量。试验结果证明,用该控制方法对事件通道进行性能控制,能够获得低延迟、高可靠的实时通信。  相似文献   
69.
基于事件的发布-订阅系统模型   总被引:5,自引:0,他引:5  
Internet的广泛应用已经改变了分布式系统的规模,使得传统的基于请求/应答的点对.点的同步通信已不能很好地满足大规模的动态分布式应用环境。为了加强大规模的分布式环境中实体之间的通信协作,系统要求更加灵活的通信模型,以反映应用的动态和非耦合特性。基于事件通信的中间件是建立大规模分布式系统的有效方式,发布者/订阅者(Publisher/subscriber)是目前广泛使用的基于事件的通信模型,支持发布者和订阅者之间在时间、空间和同步方面的非耦合以及多对多的通信模式,提供大规模系统所要求的交互间的松散耦合。本文详细阐述了事件系统的组成以及基于事件系统的PUB/SUB模型,提出了基于PUB/SUB的事件系统中间件的核心及实现的关键,这些中间件为大规模的分布式应用提供更多和更有力的保障。  相似文献   
70.
提出了CORBA/SNMP网关事件管理部分的实现框架,针对CORBA公共事件服务的局限性,给出了相应的解决方案,包括分组、过滤、插入序列和再同步等,建立了数学模型进行分析,同时通过试验验证了算法的可行性。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号