首页 | 官方网站   微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   566篇
  免费   26篇
  国内免费   2篇
工业技术   594篇
  2024年   1篇
  2023年   14篇
  2022年   38篇
  2021年   33篇
  2020年   21篇
  2019年   21篇
  2018年   33篇
  2017年   33篇
  2016年   27篇
  2015年   18篇
  2014年   33篇
  2013年   53篇
  2012年   37篇
  2011年   27篇
  2010年   26篇
  2009年   32篇
  2008年   21篇
  2007年   33篇
  2006年   13篇
  2005年   14篇
  2004年   8篇
  2003年   3篇
  2001年   3篇
  2000年   1篇
  1999年   7篇
  1998年   5篇
  1997年   5篇
  1996年   1篇
  1995年   2篇
  1994年   2篇
  1993年   3篇
  1992年   1篇
  1991年   2篇
  1990年   4篇
  1986年   3篇
  1985年   5篇
  1984年   7篇
  1983年   3篇
  1982年   1篇
排序方式: 共有594条查询结果,搜索用时 15 毫秒
11.
Delay composition in preemptive and non-preemptive real-time pipelines   总被引:1,自引:1,他引:0  
Uniprocessor schedulability theory made great strides, in part, due to the simplicity of composing the delay of a job from the execution times of higher-priority jobs that preempt it. In this paper, we bound the end-to-end delay of a job in a multistage pipeline as a function of job execution times on different stages under preemptive as well as non-preemptive scheduling. We show that the end-to-end delay is bounded by that of a single virtual “bottleneck” stage plus a small additive component. This contribution effectively transforms the pipeline into a single stage system. The wealth of schedulability analysis techniques derived for uniprocessors can then be applied to decide the schedulability of the pipeline. The transformation does not require imposing artificial per-stage deadlines, but rather models the pipeline as a whole and uses the end-to-end deadlines directly in the single-stage analysis. It also does not make assumptions on job arrival patterns or periodicity and thus can be applied to periodic and aperiodic tasks alike. We show through simulations that this approach outperforms previous pipeline schedulability tests except for very short pipelines or when deadlines are sufficiently large. The reason lies in the way we account for execution overlap among stages. We discuss how previous approaches account for overlap and point out interesting differences that lead to different performance advantages in different cases. Further, we also show that in certain cases non-preemptive scheduling can result in higher system utilization than preemptive scheduling in pipelined systems. We hope that the pipeline delay composition rule, derived in this paper, may be a step towards a general schedulability analysis foundation for large distributed systems.
Tarek AbdelzaherEmail:
  相似文献   
12.
Multi‐principal elemental alloys, commonly referred to as high‐entropy alloys (HEAs), are a new class of emerging advanced materials with novel alloy design concept. Unlike the design of conventional alloys, which is based on one or at most two principal elements, the design of HEA is based on multi‐principal elements in equal or near‐equal atomic ratio. The advent of HEA has revived the alloy design perception and paved the way to produce an ample number of compositions with different combinations of promising properties for a variety of structural applications. Among the properties possessed by HEAs, sluggish diffusion and strength retention at elevated temperature have caught wide attention. The need to develop new materials for high‐temperature applications with superior high‐temperature properties over superalloys has been one of the prime concerns of the high‐temperature materials research community. The current article shows that HEAs have the potential to replace Ni‐base superalloys as the next generation high‐temperature materials. This review focuses on the phase stability, microstructural stability, and high‐temperature mechanical properties of HEAs. This article will be highly beneficial for materials engineering and science community whose interest is in the development and understanding of HEAs for high‐temperature applications.  相似文献   
13.
In this paper, a compact asymmetric coplanar strip (ACS)-fed printed monopole antenna for dual frequency operation is presented. The proposed antenna is composed of an ACS-fed monopole structure and two semi circle shaped radiating branches, which occupies a very small size of 13.4 × 22.7 mm2 including the ground plane. By properly selecting the length and position of these branches, two desired operating bands can be achieved and tuned independently. The simulated and measured return loss results shows that the proposed antenna can be used for long term evolution 2500 (2500–2690 MHz), WLAN 5.2 GHz (5.15–5.35 GHz)/5.8 GHz (5.725–5.825 GHz), WiMAX 5.5 GHz (5.28–5.85 GHz) and 4.9 GHz (4.94–4.99 GHz) public safety applications. The omnidirectional and bidirectional radiation pattern characteristics in H-plane and E-plane of the proposed antenna along with acceptable peak gain make the best suitable candidate for the above intended applications.  相似文献   
14.
15.
The pathogenesis of progressive renal allograft injury, which is termed chronic allograft nephropathy (CAN), remains obscure and is currently defined by histology. Prospective protocol-biopsy trials have demonstrated that clinical and standard laboratory tests are insufficiently sensitive indicators of the development and progression of CAN. The study aim was to determine if CAN could be characterized by urinary proteomic data and identify the proteins associated with disease. The urinary proteome of 75 renal transplant recipients and 20 healthy volunteers was analyzed using surface enhanced laser desorption and ionization MS. Patients could be classified into subgroups with normal histology and Banff CAN grades 2-3 with a sensitivity of 86% and a specificity of 92% by applying the classification algorithm Adaboost to urinary proteomic data. Several urinary proteins associated with advanced CAN were identified including α1-microglobulin, β2-microglobulin, prealbumin, and endorepellin, the antiangiogenic C-terminal fragment of perlecan. Increased urinary endorepellin was confirmed by ELISA and increased tissue expression of the endorepellin/perlecan ratio by immunofluoresence analysis of renal biopsies. In conclusion, analysis of urinary proteomic data has further characterized the more severe CAN grades and identified urinary endorepellin, as a potential biomarker of advanced CAN.  相似文献   
16.
Temporal jitter in a magnetic pulse compression based copper vapor laser (CVL) system is analyzed by considering ripple present in the input dc power supply and ripple present in the magnetic core resetting power supply. It is shown that the jitter is a function of the ratio of operating voltage to the designed voltage, percentage ripple, and the total propagation delay of the magnetic pulse compression circuit. Experimental results from a CVL system operating at a repetition rate of 9 kHz are presented.  相似文献   
17.
Steady state responses at viscous fluid/ orthotropic micropolar solid interfaces to moving point loads have been studied. An eigenvalue approach using the Fourier transform has been employed to solve the problem. The displacement, microrotation and stress components for the orthotropic micropolar solids so obtained in the physical domain are computed numerically by applying numerical inversion technique. Viscosity and anisotropy effects on normal displacement, normal force stress and tangential couple stress have been shown graphically for a particular model. Some special cases of interest have been presented.  相似文献   
18.
19.
The explosion in complex multimedia content makes it crucial for database systems to support such data efficiently. This paper argues that the “blackbox” ADTs used in current object-relational systems inhibit their performance, thereby limiting their use in emerging applications. Instead, the next generation of object-relational database systems should be based on enhanced abstract data type (E-ADT) technology. An (E-ADT) can expose the semantics of its methods to the database system, thereby permitting advanced query optimizations. Fundamental architectural changes are required to build a database system with E-ADTs; the added functionality should not compromise the modularity of data types and the extensibility of the type system. The implementation issues have been explored through the development of E-ADTs in Predator. Initial performance results demonstrate an order of magnitude in performance improvements. Received January 1, 1998 / Accepted May 27, 1998  相似文献   
20.
Deep packet inspection using parallel bloom filters   总被引:2,自引:0,他引:2  
There is a class of packet processing applications that inspect packets deeper than the protocol headers to analyze content. For instance, network security applications must drop packets containing certain malicious Internet worms or computer viruses carried in a packet payload. Content forwarding applications look at the hypertext transport protocol headers and distribute the requests among the servers for load balancing. Packet inspection applications, when deployed at router ports, must operate at wire speeds. With networking speeds doubling every year, it is becoming increasingly difficult for software-based packet monitors to keep up with the line rates. We describe a hardware-based technique using Bloom filters, which can detect strings in streaming data without degrading network throughput. A Bloom filter is a data structure that stores a set of signatures compactly by computing multiple hash functions on each member of the set. This technique queries a database of strings to check for the membership of a particular string. The answer to this query can be false positive but never a false negative. An important property of this data structure is that the computation time involved in performing the query is independent of the number of strings in the database provided the memory used by the data structure scales linearly with the number of strings stored in it. Furthermore, the amount of storage required by the Bloom filter for each string is independent of its length.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号