全文获取类型
收费全文 | 566篇 |
免费 | 26篇 |
国内免费 | 2篇 |
学科分类
工业技术 | 594篇 |
出版年
2024年 | 1篇 |
2023年 | 14篇 |
2022年 | 38篇 |
2021年 | 33篇 |
2020年 | 21篇 |
2019年 | 21篇 |
2018年 | 33篇 |
2017年 | 33篇 |
2016年 | 27篇 |
2015年 | 18篇 |
2014年 | 33篇 |
2013年 | 53篇 |
2012年 | 37篇 |
2011年 | 27篇 |
2010年 | 26篇 |
2009年 | 32篇 |
2008年 | 21篇 |
2007年 | 33篇 |
2006年 | 13篇 |
2005年 | 14篇 |
2004年 | 8篇 |
2003年 | 3篇 |
2001年 | 3篇 |
2000年 | 1篇 |
1999年 | 7篇 |
1998年 | 5篇 |
1997年 | 5篇 |
1996年 | 1篇 |
1995年 | 2篇 |
1994年 | 2篇 |
1993年 | 3篇 |
1992年 | 1篇 |
1991年 | 2篇 |
1990年 | 4篇 |
1986年 | 3篇 |
1985年 | 5篇 |
1984年 | 7篇 |
1983年 | 3篇 |
1982年 | 1篇 |
排序方式: 共有594条查询结果,搜索用时 15 毫秒
11.
Uniprocessor schedulability theory made great strides, in part, due to the simplicity of composing the delay of a job from
the execution times of higher-priority jobs that preempt it. In this paper, we bound the end-to-end delay of a job in a multistage
pipeline as a function of job execution times on different stages under preemptive as well as non-preemptive scheduling. We
show that the end-to-end delay is bounded by that of a single virtual “bottleneck” stage plus a small additive component. This contribution effectively transforms the pipeline into a
single stage system. The wealth of schedulability analysis techniques derived for uniprocessors can then be applied to decide
the schedulability of the pipeline. The transformation does not require imposing artificial per-stage deadlines, but rather
models the pipeline as a whole and uses the end-to-end deadlines directly in the single-stage analysis. It also does not make
assumptions on job arrival patterns or periodicity and thus can be applied to periodic and aperiodic tasks alike. We show
through simulations that this approach outperforms previous pipeline schedulability tests except for very short pipelines
or when deadlines are sufficiently large. The reason lies in the way we account for execution overlap among stages. We discuss
how previous approaches account for overlap and point out interesting differences that lead to different performance advantages
in different cases. Further, we also show that in certain cases non-preemptive scheduling can result in higher system utilization
than preemptive scheduling in pipelined systems. We hope that the pipeline delay composition rule, derived in this paper,
may be a step towards a general schedulability analysis foundation for large distributed systems.
相似文献
Tarek AbdelzaherEmail: |
12.
Multi‐principal elemental alloys, commonly referred to as high‐entropy alloys (HEAs), are a new class of emerging advanced materials with novel alloy design concept. Unlike the design of conventional alloys, which is based on one or at most two principal elements, the design of HEA is based on multi‐principal elements in equal or near‐equal atomic ratio. The advent of HEA has revived the alloy design perception and paved the way to produce an ample number of compositions with different combinations of promising properties for a variety of structural applications. Among the properties possessed by HEAs, sluggish diffusion and strength retention at elevated temperature have caught wide attention. The need to develop new materials for high‐temperature applications with superior high‐temperature properties over superalloys has been one of the prime concerns of the high‐temperature materials research community. The current article shows that HEAs have the potential to replace Ni‐base superalloys as the next generation high‐temperature materials. This review focuses on the phase stability, microstructural stability, and high‐temperature mechanical properties of HEAs. This article will be highly beneficial for materials engineering and science community whose interest is in the development and understanding of HEAs for high‐temperature applications. 相似文献
13.
In this paper, a compact asymmetric coplanar strip (ACS)-fed printed monopole antenna for dual frequency operation is presented. The proposed antenna is composed of an ACS-fed monopole structure and two semi circle shaped radiating branches, which occupies a very small size of 13.4 × 22.7 mm2 including the ground plane. By properly selecting the length and position of these branches, two desired operating bands can be achieved and tuned independently. The simulated and measured return loss results shows that the proposed antenna can be used for long term evolution 2500 (2500–2690 MHz), WLAN 5.2 GHz (5.15–5.35 GHz)/5.8 GHz (5.725–5.825 GHz), WiMAX 5.5 GHz (5.28–5.85 GHz) and 4.9 GHz (4.94–4.99 GHz) public safety applications. The omnidirectional and bidirectional radiation pattern characteristics in H-plane and E-plane of the proposed antenna along with acceptable peak gain make the best suitable candidate for the above intended applications. 相似文献
14.
15.
O'Riordan E Orlova TN Mendelev N Patschan D Kemp R Chander PN Hu R Hao G Gross SS Iozzo RV Delaney V Goligorsky MS 《Proteomics. Clinical applications》2008,2(7-8):1025-1035
The pathogenesis of progressive renal allograft injury, which is termed chronic allograft nephropathy (CAN), remains obscure and is currently defined by histology. Prospective protocol-biopsy trials have demonstrated that clinical and standard laboratory tests are insufficiently sensitive indicators of the development and progression of CAN. The study aim was to determine if CAN could be characterized by urinary proteomic data and identify the proteins associated with disease. The urinary proteome of 75 renal transplant recipients and 20 healthy volunteers was analyzed using surface enhanced laser desorption and ionization MS. Patients could be classified into subgroups with normal histology and Banff CAN grades 2-3 with a sensitivity of 86% and a specificity of 92% by applying the classification algorithm Adaboost to urinary proteomic data. Several urinary proteins associated with advanced CAN were identified including α1-microglobulin, β2-microglobulin, prealbumin, and endorepellin, the antiangiogenic C-terminal fragment of perlecan. Increased urinary endorepellin was confirmed by ELISA and increased tissue expression of the endorepellin/perlecan ratio by immunofluoresence analysis of renal biopsies. In conclusion, analysis of urinary proteomic data has further characterized the more severe CAN grades and identified urinary endorepellin, as a potential biomarker of advanced CAN. 相似文献
16.
Durga Praveen Kumar D Gantayet LM Singh S Rawat AS Rana P Rajasree V Agarwalla SK Chakravarthy DP 《The Review of scientific instruments》2012,83(2):025105
Temporal jitter in a magnetic pulse compression based copper vapor laser (CVL) system is analyzed by considering ripple present in the input dc power supply and ripple present in the magnetic core resetting power supply. It is shown that the jitter is a function of the ratio of operating voltage to the designed voltage, percentage ripple, and the total propagation delay of the magnetic pulse compression circuit. Experimental results from a CVL system operating at a repetition rate of 9 kHz are presented. 相似文献
17.
Steady state responses at viscous fluid/ orthotropic micropolar solid interfaces to moving point loads have been studied.
An eigenvalue approach using the Fourier transform has been employed to solve the problem. The displacement, microrotation
and stress components for the orthotropic micropolar solids so obtained in the physical domain are computed numerically by
applying numerical inversion technique. Viscosity and anisotropy effects on normal displacement, normal force stress and tangential
couple stress have been shown graphically for a particular model. Some special cases of interest have been presented. 相似文献
18.
19.
Praveen Seshadri 《The VLDB Journal The International Journal on Very Large Data Bases》1998,7(3):130-140
The explosion in complex multimedia content makes it crucial for database systems to support such data efficiently. This
paper argues that the “blackbox” ADTs used in current object-relational systems inhibit their performance, thereby limiting
their use in emerging applications. Instead, the next generation of object-relational database systems should be based on
enhanced abstract data type (E-ADT) technology. An (E-ADT) can expose the semantics of its methods to the database system, thereby permitting advanced query optimizations. Fundamental architectural changes
are required to build a database system with E-ADTs; the added functionality should not compromise the modularity of data
types and the extensibility of the type system. The implementation issues have been explored through the development of E-ADTs
in Predator. Initial performance results demonstrate an order of magnitude in performance improvements.
Received January 1, 1998 / Accepted May 27, 1998 相似文献
20.
Deep packet inspection using parallel bloom filters 总被引:2,自引:0,他引:2
There is a class of packet processing applications that inspect packets deeper than the protocol headers to analyze content. For instance, network security applications must drop packets containing certain malicious Internet worms or computer viruses carried in a packet payload. Content forwarding applications look at the hypertext transport protocol headers and distribute the requests among the servers for load balancing. Packet inspection applications, when deployed at router ports, must operate at wire speeds. With networking speeds doubling every year, it is becoming increasingly difficult for software-based packet monitors to keep up with the line rates. We describe a hardware-based technique using Bloom filters, which can detect strings in streaming data without degrading network throughput. A Bloom filter is a data structure that stores a set of signatures compactly by computing multiple hash functions on each member of the set. This technique queries a database of strings to check for the membership of a particular string. The answer to this query can be false positive but never a false negative. An important property of this data structure is that the computation time involved in performing the query is independent of the number of strings in the database provided the memory used by the data structure scales linearly with the number of strings stored in it. Furthermore, the amount of storage required by the Bloom filter for each string is independent of its length. 相似文献