首页 | 官方网站   微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1305篇
  免费   63篇
  国内免费   61篇
工业技术   1429篇
  2023年   7篇
  2022年   21篇
  2021年   19篇
  2020年   18篇
  2019年   35篇
  2018年   29篇
  2017年   36篇
  2016年   40篇
  2015年   59篇
  2014年   85篇
  2013年   80篇
  2012年   83篇
  2011年   116篇
  2010年   99篇
  2009年   85篇
  2008年   91篇
  2007年   90篇
  2006年   65篇
  2005年   49篇
  2004年   45篇
  2003年   55篇
  2002年   39篇
  2001年   43篇
  2000年   26篇
  1999年   26篇
  1998年   25篇
  1997年   14篇
  1996年   9篇
  1995年   7篇
  1994年   4篇
  1993年   12篇
  1992年   5篇
  1991年   3篇
  1990年   1篇
  1989年   2篇
  1984年   4篇
  1963年   1篇
  1960年   1篇
排序方式: 共有1429条查询结果,搜索用时 31 毫秒
1.
Specialized varieties of sugar beets (Beta vulgaris L.) may be an eligible feedstock for advanced biofuel designation under the USA Energy Independence and Security Act of 2007. These non-food industrial beets could double ethanol production per hectare compared to alternative feedstocks. A mixed-integer mathematical programming model was constructed to determine the breakeven price of ethanol produced from industrial beets, and to determine the optimal size and biorefinery location. The model, based on limited field data, evaluates Southern Plains beet production in a 3-year crop rotation, and beet harvest, transportation, and processing. The optimal strategy depends critically on several assumptions including a just-in-time harvest and delivery system that remains to be tested in field trials. Based on a wet beet to ethanol conversion rate of 110 dm3 Mg−1 and capital cost of 128 M$ for a 152 dam3 y−1 biorefinery, the estimated breakeven ethanol price was 507 $ m−3. The average breakeven production cost of corn (Zea mays L.) grain ethanol ranged from 430 to 552 $ m−3 based on average net corn feedstock cost of 254 and 396 $ m−3 in 2014 and 2013, respectively. The estimated net beet ethanol delivered cost of 207 $ m−3 was lower than the average net corn feedstock cost of 254–396$ m−3 in 2013 and 2014. If for a mature industry, the cost to process beets was equal to the cost to process corn, the beet breakeven ethanol price would be $387 m-3 (587 $ m−3 gasoline equivalent).  相似文献   
2.
Intrusion Detection Networks (IDN) are distributed cyberdefense systems composed of different nodes performing local detection and filtering functions, as well as sharing information with other nodes in the IDN. The security and resilience of such cyberdefense systems are paramount, since an attacker will try to evade them or render them unusable before attacking the end systems. In this paper, we introduce a system model for IDN nodes in terms of their logical components, functions, and communication channels. This allows us to model different IDN node roles (e.g., detectors, filters, aggregators, correlators, etc.) and architectures (e.g., hierarchical, centralized, fully distributed, etc.). We then introduce a threat model that considers adversarial actions executed against particular IDN nodes, and also the propagation of such actions throughout connected nodes. Based on such models, we finally introduce a countermeasure allocation model based on a multi-objective optimization algorithm to obtain optimal allocation strategies that minimize both risk and cost. Our experimental results obtained through simulation with different IDN architectures illustrate the benefit of our framework to design and reconfigure cyberdefense systems optimally.  相似文献   
3.
王维丽 《计算机应用》2004,24(12):126-128
针对实时CSCW系统中的迟加入问题,提出了一个改进的多“迟加入Server”算法。该算法能够有效的解决让“迟加入Client”可靠加入到协同工作的问题。通过实例验证了该算法的有效性,为进行更高效的协同工作提供了支持。  相似文献   
4.
This paper presents a mechanism which infers a user's plans from his/her utterances by directing the inference process towards the more likely interpretations of a speaker's statements among many possible interpretations. Our mechanism uses Bayesian theory of probability to assess the likelihood of an interpretation, and it complements this assessment by taking into consideration two aspects of an interpretation: its coherence and its information content. The coherence of an interpretation is determined by the relationships between the different statements in the discourse. The information content of an interpretation is a measure of how well defined the interpretation is in terms of the actions to be performed on the basis of this interpretation. This measure is used to guide the inference process towards interpretations with higher information content. The information content of an interpretation depends on the specificity and the certainty of the inferences in it, where the certainty of an inference depends on the knowledge on which the inference is based. Our mechanism has been developed for use in task-oriented consultation systems. The particular domain that we have chosen for exploration is that of travel booking.  相似文献   
5.
By Cooperative Editing we mean the coordinated manipulation of information by a group of authors. During the editing process the (co-)authors need to communicate their ideas, drafts and constraints (remotely or face-to-face) until a final version of the information is achieved. For the different phases of this process - discussion of ideas, editing, cross-checking - different media or media integration are adequate. Furthermore, analysing the transition from individual work to group work, within different human activities, two pitfalls are often detected if computer support is considered: a) technological communication difficulties, especially if the group is remotely located on heterogeneous hardware, associated with a fall in productivity and frequent social inadequacies of the group's computer support; b) the lack of integrated media processing tools available for group editing. In order to solve these problems, we suggest that Multimedia can be applied in two ways: to effectively support the necessary group communication links; and to enhance the expressiveness of the information edited. To test this statement we have been conceptualising and implementing a prototype system. Most of the techniques involved can be used in other tools that need multimedia capabilities or that support other specific types of group activities. The innovative aspects of the work are the use of multimedia techniques to support demanding applications, possibly on cross-platforms, and the integration of several concepts to support cooperation.  相似文献   
6.
CoMEdiA is a groupware tool which enables co-authors to cooperatively produce hypermedia documents.CoMEdiA allows co-authors to communicate their ideas,drafts,guidelines,constraints and annotations to other co-authors.In uses a mix of communication patterns,media and document organization to enable co-authors to keep on exchanging information(remotely or face-to-face),improving passages and modifying notes until a final document is achieved.We did not concentrate on th depth but on the breath of the features.Our efforts were on integrating and corrdinating concepts from collaboration,multimedia and hyper organization rather than on making a specialized system in any of them.We began with the text medium and are now including bitmaps and raster images.Later sound and video will also be integrated.In this paper we describe and sustain the available capacites.  相似文献   
7.
Collaborative work is an important part of tertiary education but it is very difficult to arrange and supervise for extremely large classes of students in their first year. The possibility that computer-mediated communication can be used to facilitate this type of learning is appealing from a pragmatic organisational point of view. This paper explains in detail what a ‘virtual team’ is in the educational context. It reports on an interpretive field study where students taking an introductory course were allowed to choose where and when they did the required collaborative work. The paper discusses the factors that should be taken into account when offering students the option of working as a virtual team. These include factors that influence the students’ choice. The project cannot be considered to have been successful but indicates reasons for the lack of success and suggests contexts in which it would be valuable to repeat the project. The importance of extensive preparation in terms of teaching the students necessary social and technological skills cannot be over emphasised.  相似文献   
8.
This research investigates and approach to query processing in a multidatabase system that uses an objectoriented model to capture the semantics of other data models. The object-oriented model is used to construct a global schema, defining an integrated view of the different schemas in the environment. The model is also used as a self-describing model to build a meta-database for storing information about the global schema. A unique aspect of this work is that the object-oriented model is used to describe the different data models of the multidatabase environment, thereby extending the meta database with semantic information about the local schemas. With the global and local schemas all represented in an object-oriented form, structural mappings between the global schema and each local schema are then easily supported. An object algebra then provides a query language for expressing global queries, using the structural mappings to translate object algebra queries into SQL queries over local relational schema. The advantage of using an object algebra is that the object-oriented database can be viewed as a blackboard for temporary storage of local data and for establishing relationships between different databases. The object algebra can be used to directly retrieve temporarily-stored data from the object-oriented database or to transparently retrieve data from local sources using the translation process described in this paper.  相似文献   
9.
Distributed Denial-of-Service (DDoS) attacks pose a serious threat to Internet security. Most current research focuses on detection and prevention methods on the victim server or source side. To date, there has been no work on defenses using valuable information from the innocent client whose IP has been used in attacking packets. In this paper, we propose a novel cooperative system for producing warning of a DDoS attack. The system consists of a client detector and a server detector. The client detector is placed on the innocent client side and uses a Bloom filter-based detection scheme to generate accurate detection results yet consumes minimal storage and computational resources. The server detector can actively assist the warning process by sending requests to innocent hosts. Simulation results show that the cooperative technique presented in this paper can yield accurate DDoS alarms at an early stage. We theoretically show the false alarm probability of the detection scheme, which is insensitive to false alarms when using specially designed evaluation functions. This work is partially supported by HK Polyu ICRG A-PF86 and CERG Polyu 5196/04E, and by the National Natural Science Foundation of China under Grant No. 90104005.  相似文献   
10.
Resource allocation involves deciding how to divide a resource of limited availability among multiple demands in a way that optimizes current objectives. In this brief paper we focus on one type of distributed resource allocation problem where via an imperfect communication network multiple processors can share the load presented by multiple task types. We introduce asynchronous “cooperative” resource allocation strategies, and show that they lead to a bounded cumulative demand.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号