全文获取类型
收费全文 | 3230篇 |
免费 | 480篇 |
国内免费 | 554篇 |
学科分类
工业技术 | 4264篇 |
出版年
2024年 | 21篇 |
2023年 | 60篇 |
2022年 | 122篇 |
2021年 | 126篇 |
2020年 | 150篇 |
2019年 | 168篇 |
2018年 | 106篇 |
2017年 | 158篇 |
2016年 | 169篇 |
2015年 | 160篇 |
2014年 | 198篇 |
2013年 | 219篇 |
2012年 | 223篇 |
2011年 | 213篇 |
2010年 | 167篇 |
2009年 | 214篇 |
2008年 | 214篇 |
2007年 | 215篇 |
2006年 | 200篇 |
2005年 | 180篇 |
2004年 | 135篇 |
2003年 | 121篇 |
2002年 | 118篇 |
2001年 | 82篇 |
2000年 | 86篇 |
1999年 | 74篇 |
1998年 | 56篇 |
1997年 | 53篇 |
1996年 | 40篇 |
1995年 | 44篇 |
1994年 | 35篇 |
1993年 | 38篇 |
1992年 | 29篇 |
1991年 | 19篇 |
1990年 | 17篇 |
1989年 | 11篇 |
1988年 | 3篇 |
1987年 | 1篇 |
1986年 | 4篇 |
1985年 | 1篇 |
1984年 | 2篇 |
1983年 | 3篇 |
1982年 | 1篇 |
1980年 | 2篇 |
1976年 | 2篇 |
1975年 | 1篇 |
1961年 | 1篇 |
1959年 | 1篇 |
1955年 | 1篇 |
排序方式: 共有4264条查询结果,搜索用时 15 毫秒
101.
In this paper, a model‐refining method is proposed to alleviate the complexity involved in specification interpretation of DES control problems. The legal constraint language is defined in terms of illegal states and events in contrast with constructing the automaton of the specification language. This method could provide a more intuitive view of the DES control problem and would be suitable for practical implementation. Two examples, which have commonly been used in the literature, are employed to show the efficiency of the proposed method. Further, under this framework, it is shown that the supremal controllable sublanguage can take a simpler form based on the concept of an illegal state set. A state‐based supervisor synthesis procedure is presented, and a simple example is provided. 相似文献
102.
姜滨 《计算机与数字工程》2000,28(5):47-51
本文介绍了Win95下线程多任务的基本原理和串行通信中使用的主要API函数,并使用线程的方法在C++Builder下开发实时性要求很高的Win95下的串行通信程序。 相似文献
103.
G. S. Shedler 《International journal of parallel programming》1980,9(2):73-91
We consider simulation methods for particular marked multivariate point processes, calledR-processes, which have recently been proposed as models for multiprogrammed jobstreams. Using workload marks on events, such models facilitate the incorporation of realistic workload characteristics into computer system performance predictions. We consider R-processes in which workload marks for an individual jobstream form a stationary sequence of discrete random variables having a (generally non-Markovian) mixed moving average-autoregressive dependency structure. For such models we provide a method for obtaining from a single simulation run point and interval estimates for general characteristics of job response times. 相似文献
104.
105.
Engineer Bainomugisha Jorge Vallejos Elisa Gonzalez Boix Pascal Costanza Theo D'Hondt Wolfgang De Meuter 《Software》2012,42(3):331-356
The iPhone SDK provides a powerful platform for the development of applications that make use of iPhone capabilities, such as sensors, GPS, Wi‐Fi, or Bluetooth connectivity. We observe that so far the development of iPhone applications has mostly been restricted to using Objective‐C. However, developing applications in plain Objective‐C on the iPhone OS suffers from limitations, such as the need for explicit memory management and lack of syntactic extension mechanism. Moreover, when developing distributed applications in Objective‐C, programmers have to manually deal with distribution concerns, such as service discovery, remote communication, and failure handling. In this paper, we discuss our experience in porting the Scheme programming language to the iPhone OS and how it can be used together with Objective‐C to develop iPhone applications. To support the interaction between Scheme programs and the underlying iPhone APIs, we have implemented a language symbiosis layer that enables programmers to access the iPhone SDK libraries from Scheme. In addition, we have designed high‐level distribution constructs to ease the development of distributed iPhone applications in an event‐driven style. We validate and discuss these constructs with a series of examples, including an iPod controller, a maps application, and a distributed multiplayer Scrabble‐like game. We discuss the lessons learned from this experience for other programming language ports to mobile platforms. Copyright © 2011 John Wiley & Sons, Ltd. 相似文献
106.
Junhui ZhaoYi-Liang Chen Zhong Chen Feng Lin Caisheng Wang Hongwei Zhang 《Systems & Control Letters》2012,61(1):212-222
Control theories for discrete event systems modeled as finite state machines have been well developed to address various fundamental control issues. However, finite state machine model has long suffered from the problem of state explosion that renders it unsuitable for some practical applications. In an attempt to mitigate the state explosion problem, we propose an efficient representation that appends finite sets of variables to finite state machines in modeling discrete event systems. We also present the control synthesis techniques for such finite state machines with variables (FSMwV). We first present our notion and means of control under this representation. We next present our algorithms for both offline and online synthesis of safety control policies. We then apply these results to the control of electric power grids. 相似文献
107.
With their distributed nature and redundant operation capability, wireless sensor networks are very suitable for border surveillance scenarios that track intruders trying to breach to a safe side. In such scenarios, keeping the operation going on for as long as possible is the most important aspect of the network. We propose that by placing sink at a carefully selected coordinate will results in a longer living network. We also place restrictions on the candidate locations so that the sensing quality of the network is above a useful predetermined value and the sink is placed in a relatively safe location to avoid destruction. In order to find the suitable coordinates we propose a modified lifetime metric which takes quality and safety measures into account. We also propose a genetic algorithm which uses a discrete event simulator-in-the-loop over a three dimensional terrain to find locations for the sink that fits the given quality and safety restrictions. Using a three dimensional underlying terrain makes the proposed approach more realistic. The results obtained for various sensor network scenarios indicate that the proposed algorithm can find locations that increase the lifetime by also considering the sensing quality and safety. 相似文献
108.
针对云计算环境下被监测对象的异构性、动态性和复杂多样性等问题,提出一个云计算环境下的资源监控平台,该平台包括用户接口,数所分析与资源优化调度,监控管理,监控内核和底层工具五部分。介绍了每层的详细功能,讨论了基于事件和规则的监控方法和松耦合的云计算监控组件的设计思想,重点阐述了平台的主要技术实现。该平台利用监控和预警机制保障云计算平台的可用性,具有重要的应用价值。 相似文献
109.
本文设计了基于事件关联电位脑机接口的脑电信号预处理、特征提取、分类识别实时算法,开发了具有通讯功能的遥控器,实现了脑机接口电视遥控的异步系统.受试者可以用脑电波来遥控电视选择频道和调整音量,这为重症瘫痪病人拓展其与自然的直接交流开辟了新的通道.5位健康的受试者参与了训练实验和在线实验,实验结果表明经过特定的训练,受试者均可有效控制该脑机接口电视遥控系统,其统计平均准确率达87%,平均传输速率(ITR)达35 bits/min. 相似文献
110.
话题跟踪中静态和动态话题模型的核捕捉衰减 总被引:1,自引:0,他引:1
话题跟踪是一项针对新闻话题进行相关信息识别、挖掘和自组织的研究课题,其关键问题之一是如何建立符合话题形态的统计模型.话题形态的研究涉及两个问题,其一是话题的结构特性,其二是话题变形.对比分析了现有词包式、层次树式和链式这3类主流话题模型的形态特征,尤其深入探讨了静态和动态话题模型拟合话题脉络的优势和劣势,并提出一种基于特征重叠比的核捕捉衰减评价策略,专门用于衡量静态和动态话题模型追踪话题发展趋势的能力.在此基础上,分别给出突发式增量式学习方法和时序事件链的更新算法,借以提高动态话题模型的核捕捉性能.实验基于国际标准评测语料TDT4,采用NIST(National Institute of Standards and Technology)提出的最小检测错误权衡系数评测法,并结合所提出的核捕捉衰减评价方法,对各类主要话题模型进行测试.实验结果显示,结构化的动态话题模型具有最佳的跟踪性能,且突发式增量式学习和时序事件链的更新算法分别给予动态话题模型0.4%和3.3%的性能改进. 相似文献