首页 | 官方网站   微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   3836篇
  免费   431篇
  国内免费   237篇
工业技术   4504篇
  2025年   32篇
  2024年   88篇
  2023年   73篇
  2022年   98篇
  2021年   124篇
  2020年   111篇
  2019年   91篇
  2018年   108篇
  2017年   112篇
  2016年   111篇
  2015年   168篇
  2014年   218篇
  2013年   244篇
  2012年   212篇
  2011年   299篇
  2010年   188篇
  2009年   242篇
  2008年   248篇
  2007年   288篇
  2006年   281篇
  2005年   237篇
  2004年   178篇
  2003年   170篇
  2002年   102篇
  2001年   94篇
  2000年   76篇
  1999年   34篇
  1998年   49篇
  1997年   39篇
  1996年   24篇
  1995年   24篇
  1994年   20篇
  1993年   19篇
  1992年   16篇
  1991年   7篇
  1990年   7篇
  1989年   8篇
  1988年   5篇
  1987年   4篇
  1986年   4篇
  1985年   6篇
  1984年   10篇
  1983年   7篇
  1982年   3篇
  1981年   4篇
  1980年   2篇
  1979年   3篇
  1978年   3篇
  1977年   2篇
  1976年   4篇
排序方式: 共有4504条查询结果,搜索用时 15 毫秒
1.
Recent research suggests that implementing information systems presents considerable difficulties and that many implementations are total or partial failures. This paper argues that what both practitioners and students require are richer and more acceptable models of information systems implementation. Accordingly, case study data concerning the introduction of manufacturing resource planning (MRP II) are used to illustrate five patterns of behaviour (rites) which capture important social actions; and four components of changing psychological orientation. It is argued that appreciation of the rites and psychological developments identified here will support effective change programmes. Guidelines based on our model are provided for practitioners.  相似文献   
2.
Intensional negative adjectives alleged , artificial , fake , false , former , and toy are unusual adjectives that depending on context may or may not be restricting functions. A formal theory of their semantics, pragmatics, and context that uniformly accounts for their complex mathematical and computational characteristics and captures some peculiarities of individual adjectives is presented.
Such adjectives are formalized as new concept builders, negation‐like functions that operate on the values of intensional properties of the concepts denoted by their arguments and yield new concepts whose intensional properties have values consistent with the negation of the old values. Understanding these new concepts involves semantics, pragmatics and context‐dependency of natural language. It is argued that intensional negative adjectives can be viewed as a special‐purpose, weaker, conntext‐dependent negationin natural language. The theory explains and predicts many inferences licensed by expressions involving such adjectives. Implementation of sample examples demonstrates its computational feasibility. Computation of context‐dependent interpretation is discussed.
The theory allows one to enhance a knowledge representation system with similar concept building, negation‐like, context‐dependent functions, the availability of which appears to be a distinct characteristic of natural languages.  相似文献   
3.
We present algorithms, methods, and software for a Grid resource manager, that performs resource brokering and job scheduling in production Grids. This decentralized broker selects computational resources based on actual job requirements, job characteristics, and information provided by the resources, with the aim to minimize the total time to delivery for the individual application. The total time to delivery includes the time for program execution, batch queue waiting, and transfer of executable and input/output data to and from the resource. The main features of the resource broker include two alternative approaches to advance reservations, resource selection algorithms based on computer benchmark results and network performance predictions, and a basic adaptation facility. The broker is implemented as a built-in component of a job submission client for the NorduGrid/ARC middleware.  相似文献   
4.
The parallelism attained by the use of Field Programmable Gate Arrays (FPGAs) has shown remarkable potential for accelerating control systems applications. This comes at a time when well established methods based on inherited serial Central Processor Units (CPUs) cannot guarantee solutions for the increasing execution speed demands. However, the transition from serial to parallel architectures represents a tremendous challenge due to overwhelming numbers of unexplored options and conflicting factors. The work presented achieves a parallelisation characterisation for generic MIMO systems using stand-alone FPGA implementations. The main contribution is that a very fine subset of possible serial/parallel implementations is obtained. This is used to achieve a flexible trade-off between cost and performance. Automatic optimisation of latency, occupied FPGA area and execution speed is attained and justified in respect to most of the feasible scenarios.  相似文献   
5.
This paper concerns resource allocation in distributed message passing systems, i.e., the scheduling of accesses to exclusive system resources shared among concurrent processes. An efficient modular resource allocation algorithm is presented that uses any arbitrary resource allocation algorithm as a subroutine. It improves the performance of the subroutine by letting each process wait only for its currently conflicting processes, and therefore, allows more concurrency. For appropriate choices of the subroutine, we obtain resource allocation algorithms with the minimum worst case response times. Simulation studies were conducted which also indicate that on average, the obtained algorithms perform faster and require a smaller number of messages than other previously known algorithms, especially when resource contention among processes is high and the average time that a process remains in the critical region is large. Received: May 1997 / Accepted: May 1998  相似文献   
6.
One salient impact of information technology on students' lives is the ever-increasing use of the Internet. Although there exist many reports in the media regarding the unhealthy Internet use among students, research is still limited and has mainly relied upon on-line self-selected reports on Internet dependency or “Internet addiction”. This paper attempts to look into the alleged Internet dependency within the Eriksonian psychosocial development framework. The results of a survey of the Internet use among 217 students in an Australian regional university are reported. The measures of patterns of the Internet use were correlated with that of psychosocial maturity and self-efficacy. The results showed that the Internet dependency seemed to be independent of the psychosocial maturity and the general perceived self-efficacy. A factor analysis extracted six factors from a set of 28 Internet experience-related questions and indicated that the Internet dependency could be of a multifaceted nature. The findings and their implications were discussed and a contextual perspective was proposed.  相似文献   
7.
Device-to-device (D2D) communications allow proximate cellular user equipments (UEs) to communicate with each other directly under the control of base station (BS). In this paper, considering the selection relaying (SR) rule which allows a subset of potential relays to forward the source’s data to the corresponding destination, we first establish a multi-relay system model where a D2D UE can act as not only a source but also a potential relay for another D2D link, and then analyze the cooperation behaviors among selfish UEs. Next a simple strategy is proposed to deal with the relay selection problem, and then the fair and efficient resource sharing problem among cooperating D2D UEs is formulated as a bargaining game. Since the game function is non-convex, we turn to an iterative method by introducing an auxiliary function to get the proportional fair resource allocation results. The system efficiency and fairness are proved by numeral simulation results.  相似文献   
8.
基于自相似业务的网络TCP拥塞控制算法   总被引:9,自引:1,他引:9  
本文通过对自相似网络模型的分析,采用TCP协议可以直接观测的回环时间(Bound Trip Time)来进行拥塞程度预测,提出一种改进的TCP拥塞控制算法。仿真证明,改进算法在一定程度上提高了网络的整体性能,在自相似程度较高时尤为明显。  相似文献   
9.
In this paper we examine the resource provisioning aspects in a passive optical network (PON) employing wavelength-division multiplexing (WDM) and optical code-division multiple access (OCDMA) techniques. A judicious resource allocation scheme is proposed for a given set of optical codes and wavelengths with due consideration to the traffic asymmetry between upstream and downstream transmissions. The proposed scheme employs some initial heuristic estimates, followed by a subsequent open search mode towards reaching an optimal solution. The search mechanism in the provisioning scheme is carried out by employing some network performance metrics and evaluated using the appropriate analytical models.  相似文献   
10.
The need for on-demand QoS support for communications over satellite is of primary importance for distributed multimedia applications. This is particularly true for the return link which is often a bottleneck due to the large set of end-users accessing a very limited uplink resource. Facing this need, Demand Assignment Multiple Access (DAMA) is a classical technique that allows satellite operators to offer various types of services, while managing the resources of the satellite system efficiently. Tackling the quality degradation and delay accumulation issues that can result from the use of these techniques, this paper proposes an instantiation of the Application Layer Framing (ALF) approach, using a cross-layer interpreter (xQoS-Interpreter). The information provided by this interpreter is used to manage the resource provided to a terminal by the satellite system in order to improve the quality of multimedia presentations from the end user’s point of view. Several experiments are carried out for different loads on the return link. Their impact on QoS is measured through different application as well as network level metrics.
Laurent DairaineEmail:
  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号

京公网安备 11010802026262号