首页 | 官方网站   微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   200篇
  免费   12篇
  国内免费   1篇
工业技术   213篇
  2023年   3篇
  2021年   8篇
  2020年   1篇
  2019年   5篇
  2018年   4篇
  2017年   8篇
  2016年   4篇
  2015年   9篇
  2014年   8篇
  2013年   4篇
  2012年   8篇
  2011年   13篇
  2010年   8篇
  2009年   11篇
  2008年   12篇
  2007年   11篇
  2006年   7篇
  2005年   7篇
  2004年   3篇
  2003年   3篇
  2002年   11篇
  2001年   1篇
  2000年   2篇
  1999年   6篇
  1998年   3篇
  1997年   5篇
  1996年   7篇
  1995年   1篇
  1994年   6篇
  1993年   1篇
  1992年   4篇
  1991年   1篇
  1990年   2篇
  1988年   2篇
  1987年   1篇
  1986年   2篇
  1985年   2篇
  1982年   3篇
  1979年   1篇
  1978年   3篇
  1977年   1篇
  1976年   3篇
  1975年   3篇
  1974年   1篇
  1973年   1篇
  1972年   3篇
排序方式: 共有213条查询结果,搜索用时 15 毫秒
1.
Gamut mapping deals with the need to adjust a color image to fit into the constrained color gamut of a given rendering medium. A typical use for this tool is the reproduction of a color image prior to its printing, such that it exploits best the given printer/medium color gamut, namely the colors the printer can produce on the given medium. Most of the classical gamut mapping methods involve a pixel-by-pixel mapping and ignore the spatial color configuration. Recently proposed spatial-dependent approaches for gamut mapping are either based on heuristic assumptions or involve a high computational cost. In this paper, we present a new variational approach for space-dependent gamut mapping. Our treatment starts with the presentation of a new measure for the problem, closely related to a recent measure proposed for Retinex. We also link our method to recent measures that attempt to couple spectral and spatial perceptual measures. It is shown that the gamut mapping problem leads to a quadratic programming formulation, guaranteed to have a unique solution if the gamut of the target device is convex. An efficient numerical solution is proposed with promising results.  相似文献   
2.
Translated from Kibernetika, No. 1, pp. 40–43, January–February, 1988.  相似文献   
3.
Conventional access methods cannot be effectively used in large Scientific/Statistical Database (SSDB) applications. A file structure (called bit transposed file (BTF)) is proposed which offers several attractive features that are better suited for the special characteristics that SSDBs exhibit. This file structure is an extreme version of the (attribute) transposed file. The data are stored by vertical bit partitions. The bit patterns of attributes are assigned using one of several data encoding methods. Each of these encoding methods is appropriate for different query types. The bit partitions can also be compressed using a version of the run length encoding scheme. Efficient operators on compressed bit vectors have been developed and form the basis of a query language. Because of the simplicity of the file structure and query language, optimization problems for database design, query evaluation, and common subexpression removal can be formalized and efficient exact solution or near optimal solution can be achieved. In addition to selective power with low overheads for SSDBs, the BTF is also amenable to special parallel hardware. Results from experiments with the file structure suggest that this approach may be a reasonable alternative file structure for large SSDBs.  相似文献   
4.
This paper describes a technique for runtime monitoring (RM) and runtime verification (RV) of systems with invisible events and data artifacts. Our approach combines well-known hidden markov model (HMM) techniques for learning and subsequent identification of hidden artifacts, with runtime monitoring of probabilistic formal specifications. The proposed approach entails a process in which the end-user first develops and validates deterministic formal specification assertions, s/he then identifies hidden artifacts in those assertions. Those artifacts induce the state set of the identifying HMM. HMM parameters are learned using standard frequency analysis techniques. In the verification or monitoring phase, the system emits visible events and data symbols, used by the HMM to deduce invisible events and data symbols, and sequences thereof; both types of symbols are then used by a probabilistic formal specification assertion to monitor or verify the system.  相似文献   
5.
High-performance polymers are an important class of materials that are used in challenging conditions, such as in aerospace applications. Until now, 3D printing based on stereolithography processes can not be performed due to a lack of suitable materials. There is report on new materials and printing compositions that enable 3D printing of objects having extremely high thermal resistance, with Tg of 283 °C and excellent mechanical properties. The printing is performed by a low-cost Digital Light Processing printer, and the formulation is based on a dual-cure mechanism, photo, and thermal process. The main components are a molecule that has both epoxy and acrylate groups, alkylated melamine that enables a high degree of crosslinking, and a soluble precursor of silica. The resulting objects are made of hybrid materials, in which the silicon is present in the polymeric backbone and partly as silica enforcement particles.  相似文献   
6.
Certain behavioral properties of distributed systems are difficult to express in interleaving semantics, whereas they are naturally expressed in terms of partial orders of events or, equivalently, Mazurkiewicz traces. Two examples of such properties are serializability of a database and global snapshots of concurrent systems. Recently, a modest extension for LTL by an operator that expresses snapshots, has been proposed. It combines the ease of linear (interleaving) specification with this useful partial order concept. The new construct allows one to assert that a global snapshot appeared in the past, perhaps not in the observed execution sequence, but possibly in an equivalent one.  相似文献   
7.
This paper presents a framework for augmenting independent validation and verification (IV&V) of software systems with computer-based IV&V techniques. The framework allows an IV&V team to capture its own understanding of the application as well as the expected behavior of any proposed system for solving the underlying problem by using an executable system reference model, which uses formal assertions to specify mission- and safety-critical behaviors. The framework uses execution-based model checking to validate the correctness of the assertions and to verify the correctness and adequacy of the system under test.  相似文献   
8.
This paper presents RM-BCS, a novel run-time monitoring (RM) technique that uses periodic bounded constraint solving (BCS) to monitor streaming systems with undetermined artifacts such as agent roles and message classification. BCS is used to discover maps of interest, mapping a streaming collection of messages to a domain of discourse that consists of a set of known agents, roles, and message meanings; the desired map is one in which an underlying first-order logic constraint is satisfied. We demonstrate the technique for the problem of detecting an, Internet-based terrorist attack coordination session within frames of streaming data such as a Twitter stream. The proposed technique is a third class of RM techniques, the first two being RM of deterministic observation streams and RM of probabilistic observation streams.  相似文献   
9.
10.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号