首页 | 官方网站   微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   3749篇
  免费   217篇
  国内免费   9篇
工业技术   3975篇
  2024年   6篇
  2023年   40篇
  2022年   70篇
  2021年   169篇
  2020年   102篇
  2019年   137篇
  2018年   144篇
  2017年   118篇
  2016年   187篇
  2015年   90篇
  2014年   168篇
  2013年   322篇
  2012年   257篇
  2011年   321篇
  2010年   236篇
  2009年   252篇
  2008年   220篇
  2007年   171篇
  2006年   125篇
  2005年   94篇
  2004年   98篇
  2003年   75篇
  2002年   81篇
  2001年   48篇
  2000年   36篇
  1999年   43篇
  1998年   44篇
  1997年   46篇
  1996年   31篇
  1995年   33篇
  1994年   27篇
  1993年   17篇
  1992年   26篇
  1991年   14篇
  1990年   15篇
  1989年   16篇
  1988年   18篇
  1987年   8篇
  1986年   5篇
  1985年   9篇
  1984年   9篇
  1983年   8篇
  1982年   3篇
  1981年   7篇
  1980年   7篇
  1979年   3篇
  1978年   3篇
  1977年   6篇
  1976年   5篇
  1962年   1篇
排序方式: 共有3975条查询结果,搜索用时 457 毫秒
71.
This article focusses on the fusion of information from various automotive sensors like radar, video, and lidar for enhanced safety and traffic efficiency. Fusion is not restricted to data from sensors onboard the same vehicle but vehicular communication systems allow to propagate and fuse information with sensor data from other vehicles or from the road infrastructure as well. This enables vehicles to perceive information from regions that are hardly accessible otherwise and represents the basis for cooperative driving maneuvers. While the Bayesian framework builds the basis for information fusion, automobile environments are characterized by their a priori unknown topology, i.e., the number, type, and structure of the perceived objects is highly variable. Multi-object detection and tracking methods are a first step to cope with this challenge. Obviously, the existence or non-existence of an object is of paramount importance for safe driving. Such decisions are highly influenced by the association step that assigns sensor measurements to object tracks. Methods that involve multiple sequences of binary assignments are compared with soft-assignment strategies. Finally, fusion based on finite set statistics that (theoretically) avoid an explicit association are discussed.  相似文献   
72.
Over the last decade 3D face models have been extensively used in many applications such as face recognition, facial animation and facial expression analysis. 3D Morphable Models (MMs) have become a popular tool to build and fit 3D face models to images. Critical to the success of MMs is the ability to build a generic 3D face model. Major limitations in the MMs building process are: (1) collecting 3D data usually involves the use of expensive laser scans and complex capture setups, (2) the number of available 3D databases is limited, and typically there is a lack of expression variability and (3) finding correspondences and registering the 3D model is a labor intensive and error prone process.  相似文献   
73.
A new way of devising numerical methods is introduced whose distinctive feature is the computation of a finite element approximation only in a polyhedral subdomain D{\mathsf{D}} of the original, possibly curved-boundary domain. The technique is applied to a discontinuous Galerkin method for the one-dimensional diffusion-reaction problem. Sharp a priori error estimates are obtained which identify conditions, on the subdomain D{\mathsf{D}} and the discretization parameters of the discontinuous Galerkin method, under which the method maintains its original optimal convergence properties. The error analysis is new even in the case in which D=W{\mathsf{D}}=\Omega . It allows to see that the uniform error at any given interval is bounded by an interpolation error associated to the interval plus a significantly smaller error of a global nature. Numerical results confirming the sharpness of the theoretical results are displayed. Also, preliminary numerical results illustrating the application of the method to two-dimensional second-order elliptic problems are shown.  相似文献   
74.
Graph constraints were introduced in the area of graph transformation, in connection with the notion of (negative) application conditions, as a form to limit the applicability of transformation rules. However, we believe that graph constraints may also play a significant role in the area of visual software modelling or in the specification and verification of semi-structured documents or websites (i.e. HTML or XML sets of documents). In this sense, after some discussion on these application areas, we concentrate on the problem of how to prove the consistency of specifications based on this kind of constraints. In particular, we present proof rules for two classes of graph constraints and show that our proof rules are sound and (refutationally) complete for each class. In addition, we study clause subsumption in this context as a form to speed up refutation.  相似文献   
75.
Kerberos is a well-known standard protocol which is becoming one of the most widely deployed for authentication and key distribution in application services. However, whereas service providers use the protocol to control their own subscribers, they do not widely deploy Kerberos infrastructures to handle subscribers coming from foreign domains, as happens in network federations. Instead, the deployment of Authentication, Authorization and Accounting (AAA) infrastructures has been preferred for that operation. Thus, the lack of a correct integration between these infrastructures and Kerberos limits the service access only to service provider's subscribers. To avoid this limitation, we design an architecture which integrates a Kerberos pre-authentication mechanism, based on the use of the Extensible Authentication Protocol (EAP), and advanced authorization, based on the standards SAML and XACML, to link the end user authentication and authorization performed through an AAA infrastructure with the delivery of Kerberos tickets in the service provider's domain. We detail the interfaces, protocols, operation and extensions required for our solution. Moreover, we discuss important aspects such as the implications on existing standards.  相似文献   
76.
Distributed Video Coding (DVC) has been proposed for increasingly new application domains. This rise is apparently motivated by the very attractive features of its flexibility for building very low cost video encoders and the very high built-in error resilience when applied over noisy communication channels. Yet, the compression efficiency of DVC is notably lagging behind the state-of-the-art in video coding and compression, H.264/AVC in particular. In this context, a novel coding solution for DVC is presented in this paper, which promises to improve its rate-distortion (RD) performance towards the state-of-the-art. Here, Turbo Trellis Coded Modulation (TTCM), with its attractive coding gain in channel coding, is utilized and its resultant impact in both pixel domain and transform domain DVC framework is discussed herein. Simulations have shown a significant gain in the RD performance when compared with the state-of-the-art Turbo coding based DVC implementations.
A. GarridoEmail:
  相似文献   
77.
We present new GPU-based techniques for implementing linear digital filters for real-time audio processing. Our solution for recursive filters is the first presented in the literature. We demonstrate the relevance of these algorithms to computer graphics by synthesizing realistic sounds of colliding objects made of different materials, such as glass, plastic, and wood, in real time. The synthesized sounds can be parameterized by the object materials, velocities, and collision angles. Despite its flexibility, our approach uses very little memory, since it essentially requires a set of coefficients representing the impulse response of each material sound. Such features make our approach an attractive alternative to traditional CPU-based techniques that use playback of pre-recorded sounds.  相似文献   
78.
Web-based learning environments are becoming increasingly popular in higher education. One of the most important web-learning resources is the virtual laboratory (VL), which gives students an easy way for training and learning through the Internet. Moreover, on-line collaborative communication represents a practical method to transmit the knowledge and experience from the teacher to students overcoming physical distance and isolation. Considering these facts, the authors of this document have developed a new dynamic collaborative e-learning system which combines the main advantages of virtual laboratories and collaborative learning practices. In this system, the virtual laboratories are based on Java applets which have embedded simulations developed in Easy Java Simulations (EJS), an open-source tool for teachers who do not need complex programming skills. The collaborative e-learning is based on a real-time synchronized communication among these Java applets. Therefore, this original approach provides a new tool which integrates virtual laboratories inside a synchronous collaborative e-learning framework. This paper describes the main features of this system and its successful application in a distance education environment among different universities from Spain.  相似文献   
79.
Fernando O.  Maurício C.  Reinaldo M.   《Automatica》2009,45(9):2128-2133
This paper is concerned with the problem of assessing the stability of linear systems with a single time-delay. Stability analysis of linear systems with time-delays is complicated by the need to locate the roots of a transcendental characteristic equation. In this paper we show that a linear system with a single time-delay is stable independent of delay if and only if a certain rational function parameterized by an integer k and a positive real number T has only stable roots for any finite T≥0 and any k≥2. We then show how this stability result can be further simplified by analyzing the roots of an associated polynomial parameterized by a real number δ in the open interval (0,1). The paper is closed by showing counterexamples where stability of the roots of the rational function when k=1 is not sufficient for stability of the associated linear system with time-delay. We also introduce a variation of an existing frequency-sweeping necessary and sufficient condition for stability independent of delay which resembles the form of a generalized Nyquist criterion. The results are illustrated by numerical examples.  相似文献   
80.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号