全文获取类型
收费全文 | 4274篇 |
免费 | 656篇 |
国内免费 | 497篇 |
专业分类
电工技术 | 42篇 |
综合类 | 336篇 |
化学工业 | 146篇 |
金属工艺 | 28篇 |
机械仪表 | 44篇 |
建筑科学 | 528篇 |
矿业工程 | 40篇 |
能源动力 | 30篇 |
轻工业 | 1349篇 |
水利工程 | 38篇 |
石油天然气 | 194篇 |
武器工业 | 5篇 |
无线电 | 489篇 |
一般工业技术 | 328篇 |
冶金工业 | 84篇 |
原子能技术 | 12篇 |
自动化技术 | 1734篇 |
出版年
2024年 | 44篇 |
2023年 | 159篇 |
2022年 | 250篇 |
2021年 | 302篇 |
2020年 | 286篇 |
2019年 | 241篇 |
2018年 | 220篇 |
2017年 | 223篇 |
2016年 | 216篇 |
2015年 | 261篇 |
2014年 | 310篇 |
2013年 | 297篇 |
2012年 | 336篇 |
2011年 | 349篇 |
2010年 | 220篇 |
2009年 | 228篇 |
2008年 | 215篇 |
2007年 | 219篇 |
2006年 | 183篇 |
2005年 | 171篇 |
2004年 | 129篇 |
2003年 | 108篇 |
2002年 | 92篇 |
2001年 | 65篇 |
2000年 | 55篇 |
1999年 | 38篇 |
1998年 | 34篇 |
1997年 | 29篇 |
1996年 | 28篇 |
1995年 | 16篇 |
1994年 | 15篇 |
1993年 | 8篇 |
1992年 | 8篇 |
1991年 | 7篇 |
1990年 | 7篇 |
1989年 | 8篇 |
1988年 | 5篇 |
1987年 | 6篇 |
1985年 | 7篇 |
1983年 | 7篇 |
1982年 | 5篇 |
1981年 | 2篇 |
1980年 | 5篇 |
1975年 | 1篇 |
1973年 | 1篇 |
1969年 | 1篇 |
1966年 | 2篇 |
1965年 | 2篇 |
1959年 | 1篇 |
1956年 | 1篇 |
排序方式: 共有5427条查询结果,搜索用时 15 毫秒
91.
92.
A privacy access control model for content sharing was presented to fine-grained control users' location infor-mation associated with sharing content in mobile social network. A k-anonymity privacy algorithm for privacy settings was given to protect against inference attack on a content sharing service provider server. To balance the privacy and quality of service, a location shifting method was presented. Finally experimental results demonstrate the validity and practicality of the proposed approach. 相似文献
93.
94.
《Journal of Location Based Services》2013,7(3-4):141-178
ABSTRACTDisclosing the current location of a person can seriously affect their privacy, but many apps request location information to provide location-based services. Simultaneously, these apps provide only crude controls for location privacy settings (sharing all or nothing). There is an ongoing discussion about rights of users regarding their location privacy (e.g. in the context of the General Data Protection Regulation – GDPR). GDPR requires data collectors to notify users about data collection and to provide them with opt-out options. To address these requirements, we propose a set of user interface (UI) controls for fine-grained management of location privacy settings based on privacy theory (Westin), privacy by design principles and general UI design principles. The UI notifies users about the state of location data sharing and provides controls for adjusting location sharing preferences. It addresses three key issues: whom to share location with, when to share it, and where to share it. Results of a user study (N=23) indicate that (1) the proposed interface led to a greater sense of control, that (2) it was usable and well received, and that (3) participants were keen on using it in real life. Our findings can inform the development of interfaces to manage location privacy. 相似文献
95.
This study investigates why ordinary online users highly concerned about the misuse of personal information do not adopt privacy-protective behaviors, or even engage in risky behaviors, on the Internet. Given that people have few chances to directly experience privacy infringement and tend to be unfamiliar with technical terms, their opinions as reflected in conventional polls tend to be instantaneous reactions to survey questionnaires, lacking thoughtfulness. By adopting a counterargument experimental technique, this study produced three important findings: (1) people’s opinions about online privacy are swayed after being presented with a message containing a counterargument; (2) this persuasion effect is pronounced among people with a low level of online knowledge or who assess the presented message’s argument as strong; and (3) the privacy paradox is found in conventional polls but disappears in counterargument conditions. These findings imply that opinions concerning online privacy should not be estimated through conventional polling. Rather, alternative polls (e.g., deliberative polls) should be adopted for online privacy policy-making. 相似文献
96.
With the arrival of the era of big data sharing,data privacy protection issues will be highlighted.Since its introduction in 2006,differential privacy technology has been widely researched in data mining and data publishing.In recent years,Google,Apple and other companies have introduced differential privacy technology into the latest products,and differential privacy technology has become the focus of academia and industry again.Firstly,the traditional centralized model of differential privacy was summarized,from the perspective of analysis of data mining and data released in the differential privacy way.Then the latest local differential privacy regarding data collection and data analysis based on the local model was described,involving crowdsourcing with random response technology,BloomFilter,statistical inference techniques.Finally,the main problems and solutions of differential privacy technology were summarized. 相似文献
97.
98.
征信机构在征集、利用个人信用信息的过程中,由于对个人信息的披露易给个人权益造成损害。如何避免个人隐私受到侵犯,是个人征信建设必须要考虑的问题。文中在分析信用立法较完善国家的经验的基础上,对我国征信过程中个人信用信息隐私权的立法提出建议。 相似文献
99.
《国际计算机数学杂志》2012,89(11):2331-2347
We describe a fast, reliable and automatic algorithm for image sequence inpainting that combines spatio-temporal interpolation with fine texture preservation inside missing areas. The algorithm provides an estimate of the inpainting error by using an automatic geometric recognition of missing regions. Computational kernels are sparse linear systems solved using Generalized Minimum RESidual iterative method equipped with AMG multigrid preconditioner. Experiments on synthetic and real data are discussed. 相似文献
100.
本文介绍了一种新型节能保温墙体——预制混凝土夹芯保温墙板,阐述了应用这种新型墙体的必要性及这种新型节能墙体的国内外发展现状与进展,并展望了其发展趋势,该技术为实现住宅产业化提供了重要支撑. 相似文献