首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   85709篇
  免费   1150篇
  国内免费   409篇
电工技术   798篇
综合类   2320篇
化学工业   11930篇
金属工艺   4786篇
机械仪表   3055篇
建筑科学   2264篇
矿业工程   572篇
能源动力   1200篇
轻工业   3742篇
水利工程   1290篇
石油天然气   346篇
无线电   9429篇
一般工业技术   16674篇
冶金工业   2773篇
原子能技术   263篇
自动化技术   25826篇
  2023年   31篇
  2022年   42篇
  2021年   131篇
  2020年   82篇
  2019年   85篇
  2018年   14516篇
  2017年   13438篇
  2016年   10041篇
  2015年   684篇
  2014年   334篇
  2013年   368篇
  2012年   3258篇
  2011年   9591篇
  2010年   8384篇
  2009年   5660篇
  2008年   6919篇
  2007年   7866篇
  2006年   215篇
  2005年   1272篇
  2004年   1172篇
  2003年   1219篇
  2002年   568篇
  2001年   121篇
  2000年   206篇
  1999年   78篇
  1998年   103篇
  1997年   71篇
  1996年   72篇
  1995年   26篇
  1994年   28篇
  1993年   19篇
  1992年   17篇
  1991年   24篇
  1988年   17篇
  1969年   24篇
  1968年   43篇
  1967年   33篇
  1966年   42篇
  1965年   44篇
  1964年   11篇
  1963年   28篇
  1962年   22篇
  1961年   18篇
  1960年   30篇
  1959年   35篇
  1958年   37篇
  1957年   36篇
  1956年   34篇
  1955年   63篇
  1954年   68篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
991.
Social media plays a fundamental role in the diffusion of information. There are two different ways of information diffusion in social media platforms such as Twitter and Weibo. Users can either re-share messages posted by their friends or re-create messages based on the information acquired from other non-local information sources such as the mass media. By analyzing around 60 million messages from a large micro-blog site, we find that about 69 % of the diffusion volume can be attributed to users’ re-sharing behaviors, and the remaining 31 % are caused by user re-creating behaviors. The information diffusions caused by the two kinds of behaviors have different characteristics and variation trends, but most existing models of information diffusion do not distinguish them. The recent availability of massive online social streams allows us to study the process of information diffusion in much finer detail. In this paper, we introduce a novel model to capture and simulate the process of information diffusion in the micro-blog platforms, which distinguishes users’ re-sharing behaviors from re-creating behaviors by introducing two different components. Thus, our model not only considers the effect of the underlying network structure, but also the influence of other non-local information sources. The empirical results show the superiority of our proposed model in the fitting and prediction tasks of information diffusion.  相似文献   
992.
Complex queries are widely used in current Web applications. They express highly specific information needs, but simply aggregating the meanings of primitive visual concepts does not perform well. To facilitate image search of complex queries, we propose a new image reranking scheme based on concept relevance estimation, which consists of Concept-Query and Concept-Image probabilistic models. Each model comprises visual, web and text relevance estimation. Our work performs weighted sum of the underlying relevance scores, a new ranking list is obtained. Considering the Web semantic context, we involve concepts by leveraging lexical and corpus-dependent knowledge, such as Wordnet and Wikipedia, with co-occurrence statistics of tags in our Flickr corpus. The experimental results showed that our scheme is significantly better than the other existing state-of-the-art approaches.  相似文献   
993.
Recently, uncertain graph data management and mining techniques have attracted significant interests and research efforts due to potential applications such as protein interaction networks and social networks. Specifically, as a fundamental problem, subgraph similarity all-matching is widely applied in exploratory data analysis. The purpose of subgraph similarity all-matching is to find all the similarity occurrences of the query graph in a large data graph. Numerous algorithms and pruning methods have been developed for the subgraph matching problem over a certain graph. However, insufficient efforts are devoted to subgraph similarity all-matching over an uncertain data graph, which is quite challenging due to high computation costs. In this paper, we define the problem of subgraph similarity maximal all-matching over a large uncertain data graph and propose a framework to solve this problem. To further improve the efficiency, several speed-up techniques are proposed such as the partial graph evaluation, the vertex pruning, the calculation model transformation, the incremental evaluation method and the probability upper bound filtering. Finally, comprehensive experiments are conducted on real graph data to test the performance of our framework and optimization methods. The results verify that our solutions can outperform the basic approach by orders of magnitudes in efficiency.  相似文献   
994.
Social media influence analysis, sometimes also called authority detection, aims to rank users based on their influence scores in social media. Existing approaches of social influence analysis usually focus on how to develop effective algorithms to quantize users’ influence scores. They rarely consider a person’s expertise levels which are arguably important to influence measures. In this paper, we propose a computational approach to measuring the correlation between expertise and social media influence, and we take a new perspective to understand social media influence by incorporating expertise into influence analysis. We carefully constructed a large dataset of 13,684 Chinese celebrities from Sina Weibo (literally ”Sina microblogging”). We found that there is a strong correlation between expertise levels and social media influence scores. Our analysis gave a good explanation of the phenomenon of “top across-domain influencers”. In addition, different expertise levels showed influence variation patterns: e.g., (1) high-expertise celebrities have stronger influence on the “audience” in their expertise domains; (2) expertise seems to be more important than relevance and participation for social media influence; (3) the audiences of top expertise celebrities are more likely to forward tweets on topics outside the expertise domains from high-expertise celebrities.  相似文献   
995.
Use Case modeling is a popular technique for documenting functional requirements of software systems. Refactoring is the process of enhancing the structure of a software artifact without changing its intended behavior. Refactoring, which was first introduced for source code, has been extended for use case models. Antipatterns are low quality solutions to commonly occurring design problems. The presence of antipatterns in a use case model is likely to propagate defects to other software artifacts. Therefore, detection and refactoring of antipatterns in use case models is crucial for ensuring the overall quality of a software system. Model transformation can greatly ease several software development activities including model refactoring. In this paper, a model transformation approach is proposed for improving the quality of use case models. Model transformations which can detect antipattern instances in a given use case model, and refactor them appropriately are defined and implemented. The practicability of the approach is demonstrated by applying it on a case study that pertains to biodiversity database system. The results show that model transformations can efficiently improve quality of use case models by saving time and effort.  相似文献   
996.
Utilising the methodology of content analysis, this study uses a multidisciplinary approach to define public e-procurement. Various aspects of e-procurement have been discussed from information systems, supply chain management, electronic commerce/electronic government, and public procurement to come up with an integrated definition of public e-procurement. Following this, e-procurement assimilation has been defined and its impact on procurement efficiency has been evaluated. Following the confirmatory factor analysis in structural equation modelling, dimensional level analysis in ANOVA has been undertaken for the three forms of e-procurement technologies namely e-tendering, e-catalogue management systems, and e-marketplace. The results show the positive and significant impact of the assimilation process on procurement efficiency.  相似文献   
997.
Participation is the cornerstone of any community. Promoting, understanding and properly managing it allows not only keeping the community sustainable, but also providing personalized services to its members and managers. This article presents a case study in which student participation in a course community was motivated using two different extrinsic mechanisms, and mediated by a software platform. The results were compared with a baseline community of the same course, in which participation was not motivated by external means. The analysis of these results indicates that managing a partially virtual course community requires the introduction of monitoring services, community managers and extrinsic mechanisms to motivate participation. These findings allow community managers to improve their capability for promoting participation and keeping the community sustainable. The findings also raise several implications that should be considered in the design of software supporting this kind of community, when managing the participation of its members.  相似文献   
998.
Crowdsourcing is currently attracting much attention from organisations for its competitive advantages over traditional work structures regarding how to utilise skills and labour and especially to harvest expertise and innovation. Prior research suggests that the decision to crowdsource cannot simply be based on perceived advantages; rather multiple factors should be considered. However, a structured account and integration of the most important decision factors is still lacking. This research fills the gap by providing a systematic literature review of the decision to crowdsource. Our results identify nine factors and sixteen sub-factors influencing this decision. These factors are structured into a decision framework concerning task, people, management, and environmental factors. Based on this framework, we give several recommendations for managers making the crowdsourcing decision.  相似文献   
999.
The growing need for location based services motivates the moving k nearest neighbor query (MkNN), which requires to find the k nearest neighbors of a moving query point continuously. In most existing solutions, data objects are abstracted as points. However, lots of real-world data objects, such as roads, rivers or pipelines, should be reasonably modeled as line segments or polyline segments. In this paper, we present LV*-Diagram to handle MkNN queries over line segment data objects. LV*-Diagram dynamically constructs a safe region. The query results remain unchanged if the query point is in the safe region, and hence, the computation cost of the server is greatly reduced. Experimental results show that our approach significantly outperforms the baseline method w.r.t. CPU load, I/O, and communication costs.  相似文献   
1000.
This work introduces and establishes a new model for cache management, where clients suggest preferences regarding their expectations for the time they are willing to wait, and the level of obsolescence they are willing to tolerate. The cache uses these preferences to decide upon entrance and exit of objects to and from its storage, and select the best copy of requested object among all available copies (fresh, cached, remote). We introduce three replacement policies, each evicts objects based on ongoing scores, considering users’ preferences combined with other objects’ properties such as size, obsolescence rate and popularity. Each replacement algorithm follows a different strategy: (a) an optimal solution that use dynamic programming approach to find the best objects to be kept (b) another optimal solution that use branch and bound approach to find the worst objects to be thrown out (c) an algorithm that use heuristic approach to efficiently select the objects to be evicted. Using these replacement algorithms the cache is able to keep the objects that are best suited for users preferences and dump the other objects. We compare our proposed algorithms to the Least-Recently-Used algorithm, and provide evidence to the advantages of our algorithms providing better service to cache’s users with less burden on network resources and reduced workloads on origin servers.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号