首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1474篇
  免费   88篇
  国内免费   3篇
电工技术   12篇
综合类   2篇
化学工业   380篇
金属工艺   11篇
机械仪表   14篇
建筑科学   75篇
能源动力   40篇
轻工业   143篇
水利工程   9篇
石油天然气   1篇
无线电   135篇
一般工业技术   241篇
冶金工业   131篇
原子能技术   9篇
自动化技术   362篇
  2023年   10篇
  2022年   9篇
  2021年   32篇
  2020年   40篇
  2019年   40篇
  2018年   47篇
  2017年   42篇
  2016年   68篇
  2015年   32篇
  2014年   72篇
  2013年   87篇
  2012年   99篇
  2011年   112篇
  2010年   73篇
  2009年   78篇
  2008年   85篇
  2007年   73篇
  2006年   66篇
  2005年   68篇
  2004年   57篇
  2003年   52篇
  2002年   54篇
  2001年   25篇
  2000年   22篇
  1999年   32篇
  1998年   32篇
  1997年   26篇
  1996年   22篇
  1995年   15篇
  1994年   6篇
  1993年   7篇
  1992年   11篇
  1991年   2篇
  1990年   6篇
  1989年   5篇
  1988年   7篇
  1987年   5篇
  1986年   5篇
  1985年   3篇
  1984年   6篇
  1983年   5篇
  1982年   4篇
  1981年   6篇
  1977年   2篇
  1976年   3篇
  1975年   2篇
  1965年   1篇
  1963年   2篇
  1959年   1篇
  1939年   1篇
排序方式: 共有1565条查询结果,搜索用时 187 毫秒
41.
42.
In this paper, a social capital perspective is applied to the relationship between the IT department and the Business organization. IT and Business are conceptualized as different occupational communities, with different understandings of their work. Our focus is on the level of social capital and the process of knowledge sharing between these occupational communities. We analyze the role that these factors play in reaching a mutual understanding within the process of IS development, and the influence this has on the perceived performance of the IT organization. Our study, combining qualitative and quantitative methods, points out that a lack of social capital (structural, relational as well as cognitive) can serve as an explanation for the often problematic relationship between these communities. Our analyses also show that social capital is especially relevant for the Business organization's perception of IT performance, whereas the IT department's perception is that performance is primarily dependent on the exchange of information.  相似文献   
43.
In this work, point-wise discretization error is bounded via interval approach for the elasticity problem using interval boundary element formulation. The formulation allows for computation of the worst case bounds on the boundary values for the elasticity problem. From these bounds the worst case bounds on the true solution at any point in the domain of the system can be computed. Examples are presented to demonstrate the effectiveness of the treatment of local discretization error in elasticity problem via interval methods.  相似文献   
44.
The reconstruction problem is usually formulated as a variational problem in which one searches for that image that minimizes a so called prior (image model) while insisting on certain image features to be preserved. When the prior can be described by a norm induced by some inner product on a Hilbert space, the exact solution to the variational problem can be found by orthogonal projection. In previous work we considered the image as compactly supported in and we used Sobolev norms on the unbounded domain including a smoothing parameter γ>0 to tune the smoothness of the reconstructed image. Due to the assumption of compact support of the original image, components of the reconstructed image near the image boundary are too much penalized. Therefore, in this work we minimize Sobolev norms only on the actual image domain, yielding much better reconstructions (especially for γ≫0). As an example we apply our method to the reconstruction of singular points that are present in the scale space representation of an image.  相似文献   
45.
ABSTRACT

We report on two empirical studies that explore key factors that help translate information technology governance by the board of directors into organizational performance. The first study shows that strategic alignment partially mediates the effect of board-level information technology governance on performance. The second study demonstrates that authoritarian governance style negatively moderates the effect of board-level information technology governance on performance. Together, these studies open up the black box between board-level information technology governance and organizational performance.  相似文献   
46.
International Journal on Software Tools for Technology Transfer - System designers make trade-offs between metrics of interest such as execution time, functional quality and cost to create a...  相似文献   
47.
Dagstuhl seminar no. 10102 on discrete event logistic systems recognized a network of persistent models to be a “Grand Challenge.” Such on-line model network will offer an infrastructure that facilitates the management of logistic operations. This ambition to create a network of persistent models implies a radical shift for model design activities as the objective is an infrastructure rather than application-specific solutions. In particular, model developers can no longer assume that they know what their model will be used for. It is no longer possible to design for the expected.This paper presents insights in model development and design in the absence of precise knowledge concerning a model's usage. Basically, model developers may solely rely on the presence of the real-world counterpart mirrored by their model and a general idea about the nature of the application (e.g. coordination of logistic operations). When the invariants of their real-world counterpart suffice for models to be valid, these models become reusable and integrate-able. As these models remain valid under a wide range of situations, they become multi-purpose and durable resources rather than single-purpose short-lived components or legacy, which is even worse.Moreover and more specifically, the paper describes how to build models that allow their users to generate predictions in unexpected situations and atypical conditions. Referring to previous work, the paper concisely discusses how these predictions can be generated starting from the models. This prediction-generating technology is currently being transferred into an industrial MES.  相似文献   
48.
This paper proposes a complete framework to assess the overall performance of classification models from a user perspective in terms of accuracy, comprehensibility, and justifiability. A review is provided of accuracy and comprehensibility measures, and a novel metric is introduced that allows one to measure the justifiability of classification models. Furthermore, taxonomy of domain constraints is introduced, and an overview of the existing approaches to impose constraints and include domain knowledge in data mining techniques is presented. Finally, justifiability metric is applied to a credit scoring and customer churn prediction case.  相似文献   
49.
Network-on-chip-based multiprocessor systems-on-chip are considered as future embedded systems platforms. One of the steps in mapping an application onto such a parallel platform involves scheduling the communication on the network-on-chip. This paper presents different scheduling strategies that minimize resource usage by exploiting all scheduling freedom offered by networks-on-chip. It also introduces a technique to take the dynamism in applications into account when scheduling the communication of an application on the network-on-chip while minimizing the resource usage. Our experiments show that resource-utilization is improved when compared to existing techniques.  相似文献   
50.
A lot of progress has been made to secure network communication, e.g., through the use of cryptographic algorithms. However, this offers only a partial solution as long as the communicating end points still suffer from security problems. A number of applications require remote verification of software executing on an untrusted platform. Trusted computing solutions propose to solve this problem through software and hardware changes, typically a secure operating system and the addition of a secure coprocessor respectively. On the other hand, timed execution of code checksum calculations aims for a solution on legacy platforms, but can not provide strong security assurance. We present a mixed solution by using the trusted computing hardware, namely the time stamping functionality of the trusted platform module, in combination with a timing based remote code integrity verification mechanism. In this way, we do not require a secure operating system, but at the same time the overall security of the timed execution scheme can be improved.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号