首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   868篇
  免费   105篇
  国内免费   83篇
电工技术   30篇
综合类   97篇
化学工业   10篇
金属工艺   4篇
机械仪表   22篇
建筑科学   7篇
矿业工程   4篇
能源动力   4篇
轻工业   8篇
水利工程   4篇
石油天然气   2篇
武器工业   2篇
无线电   170篇
一般工业技术   19篇
冶金工业   260篇
原子能技术   2篇
自动化技术   411篇
  2023年   6篇
  2022年   10篇
  2021年   14篇
  2020年   16篇
  2019年   17篇
  2018年   12篇
  2017年   18篇
  2016年   33篇
  2015年   22篇
  2014年   32篇
  2013年   41篇
  2012年   64篇
  2011年   83篇
  2010年   91篇
  2009年   67篇
  2008年   96篇
  2007年   88篇
  2006年   73篇
  2005年   63篇
  2004年   59篇
  2003年   40篇
  2002年   33篇
  2001年   24篇
  2000年   4篇
  1999年   6篇
  1997年   6篇
  1995年   1篇
  1993年   1篇
  1992年   1篇
  1989年   1篇
  1988年   1篇
  1987年   1篇
  1986年   1篇
  1985年   1篇
  1984年   1篇
  1983年   5篇
  1982年   2篇
  1981年   1篇
  1979年   1篇
  1970年   1篇
  1968年   1篇
  1965年   4篇
  1964年   2篇
  1963年   2篇
  1962年   3篇
  1961年   1篇
  1959年   1篇
  1957年   1篇
  1955年   1篇
  1954年   1篇
排序方式: 共有1056条查询结果,搜索用时 62 毫秒
1.
张宏科  冯博昊  权伟 《电子学报》2019,47(5):977-982
现有互联网因其原始设计不足已在服务质量、资源利用率、管控能力等诸多方面暴露出严重弊端,难以支撑起"互联网+"新业态高速发展对通信网络与服务日趋复杂化、多元化的需求.因此,如何设计全新的互联网已成为信息领域最为迫切与核心的研究内容之一,受到学术界与产业界的高度重视.本文基于前期"标识网络"与"智慧标识网络"研究,创造性提出"智融标识网络"体系及其关键机制,通过全网多空间、多维度资源的智慧融合,实现个性化服务的按需供给与灵活化组网的有效支撑,为不同行业与用户提供高效的差异化、定制化通信网络服务,以普遍适用于高铁网络、工业互联网、车联网等各类迥异应用情景.  相似文献   
2.
Open source projects leverage a large number of people to review products and improve code quality. Differences among participants are inevitable and important to this collaborative review process—participants with different expertise, experience, resources, and values approach the problems differently, increasing the likelihood of finding more bugs and fixing the particularly difficult ones. To understand the impacts of member differences on the open source software peer review process, we examined bug reports of Mozilla Firefox. These analyses show that the various types of member differences increase workload as well as frustration and conflicts. However, they facilitate situated learning, problem characterization, design review, and boundary spanning. We discuss implications for work performance and community engagement, and suggest several ways to leverage member differences in the open source software peer review process.  相似文献   
3.
Receiving negative peer feedback in social media may have negative consequences for adolescents’ psychosocial development and well-being. Therefore, the first aim of this study was to investigate online behavior (i.e., online social exploration, risky online self-presentation) that predicts receiving negative online peer feedback. The second aim was to examine three types of precursors that may predict this online behavior and, indirectly, negative feedback: (a) developmental (i.e., sex, age), (b) dispositional (i.e., sensation seeking, inhibitory control), and (c) social precursors (i.e., peer problems, family conflict). We collected survey data among 785 Dutch adolescents (10–15 years old). Our results showed that adolescents who engaged in online social exploration and risky online self-presentation more often, were more likely to receive negative peer feedback. Online social exploration was more prevalent among the older adolescents and adolescents characterized by higher sensation seeking and more family conflict. In addition, risky online self-presentation was more prevalent among adolescents high in sensation seeking. Consequently, these adolescents’ online behavior, indirectly, made them more at risk of receiving negative peer feedback in social media.  相似文献   
4.
Extended access control lists (ACLs) are used to filter packets for network security. However, in current network frameworks, ACL rules are not transferred simultaneously with devices that move across network segments. The Internet Engineering Task Force proposed the Locator/Identifier Separation Protocol (LISP), which enables routers (xTRs) to configure ACL rules for blocking immobile endpoint identifiers (EIDs). However, when an EID moves from the original xTR to a new xTR, the ACL rules at the original xTR cannot be transferred with the EID. Thus, the new xTR lacks the corresponding ACL rules to effectively block the EID, resulting in security risks. The highlights of this study are as follows. First, a method is proposed for dynamically transferring ACL rules in LISP environments and frameworks. Second, the map‐register and map‐notify protocols were combined to encapsulate and transfer the ACL rules and thus obviate an additional process required to transfer these rules. Third, the experimental results verified that the proposed method can be used to achieve synchronized security protection in an LISP environment involving cross‐segment EID movements.  相似文献   
5.
Farmer-led, participatory approaches are being increasingly employed in agricultural research, with promising results. This study aimed to understand how a participatory approach based on the Danish stable schools could help to achieve practical, farmer-led changes that reduced reliance on antimicrobials in the UK. Five facilitated farmer action groups comprising 30 dairy farms across South West England met on farm at regular intervals between 2016 and 2018, and worked collaboratively within their groups to discuss how to reduce antimicrobial use. Qualitative data from group discussions and individual semi-structured interviews were collected and analyzed using thematic analysis to explore how the approach helped farmers address and deal with changes to their on-farm practices. Facilitator-guided reviews of antimicrobial use and benchmarking were carried out on each farm to assess any change in usage and help farmers review their practices. The pattern of antimicrobial use changed over the 2 yr of the study, with 21 participating farms reducing their use of highest-priority critically important antibiotics (6 farms were not using any of these critical medicines from the outset). Thirty practical action plans were co-developed by the groups with an average implementation rate of 54.3% within a year. All assessed farms implemented 1 recommendation, and many were still ongoing at the end of the study. Farmers particularly valued the peer-to-peer learning during farm walks. Farmers reported how facilitated discussions and action planning as a peer group had empowered them to change practices. Participants identified knowledge gaps during the project, particularly on highest-priority critically important antibiotics, where they were not getting information from their veterinarians. The study demonstrated that facilitation has a valuable role to play in participatory approaches beyond moderating discussion; facilitators encouraged knowledge mobilization within the groups and were participants in the research as well. Facilitated, farmer-led, participatory approaches that mobilize different forms of knowledge and encourage peer learning are a promising way of helping farmers to adapt and develop responsible practices.  相似文献   
6.
The micro level behavioral foundation for how quality reviews of experts and word of mouth (WOM) affect demand for experience goods has received scant attention in previous research. Taking an experimental approach, the present study examines how quality reviews and peer recommendations influence consumers’ decisions to buy red wine. Four main findings are presented for a sample of Norwegian wine consumers. First, consumers prefer wines that have obtained very good quality reviews to wines getting OK quality reviews. Second, consumers prefer peer-recommended wines to non-recommended wines. Third, the effect of a very good quality review is greater for non-recommended wines than for peer-recommended wines. Fourth, some of these effects on wine buying decisions are contingent on price level, and there is also some heterogeneity to their magnitude. The results are mainly in concert with the proposed hypotheses.  相似文献   
7.
8.
最近几年逐渐出现了对同行评议文本情感分析的研究,包括通过同行评议文本预测审稿人的推荐状态的任务。现有模型融入了论文本身或摘要信息,采用神经网络学习论文或摘要的高层表示,结合同行评议文本预测审稿人的推荐状态,这使得模型变得非常复杂的同时结果却没有实质性的提高。为此,提出了OSA机制来提高情感分析模型中对观点句的关注度。具体来说,采用pu-learning从同行评议文本的前N个句子中学习观点句的特征,使每一个句子都得到一个观点句权重,将其应用于情感分析模型的倒数第二层,由此得到最终的预测结果。在ICLR2017—2018数据集上使用不同的情感分析模型对OSA进行了评估,实验结果验证了OSA的高效性,并在两个数据集上取得了优异的性能。  相似文献   
9.
In mobile ad hoc peer to peer (M-P2P) networks, since nodes are highly resource constrained, it is effective to retrieve data items using a top-k query, in which data items are ordered by the score of a particular attribute and the query-issuing node acquires data items with the k highest scores. However, when network partitioning occurs, the query-issuing node cannot connect to some nodes having data items included in the top-k query result, and thus, the accuracy of the query result decreases. To solve this problem, data replication is a promising approach. However, if each node sends back its own data items (replicas) responding to a query without considering replicas held by others, same data items are sent back to the query-issuing node more than once through long paths, which results in increase of traffic. In this paper, we propose a top-k query processing method considering data replication in M-P2P networks. This method suppresses duplicate transmissions of same data items through long paths. Moreover, an intermediate node stops transmitting a query message on-demand.  相似文献   
10.
Decentralized Online Social Networks (DOSNs) have recently captured the interest of users because of the more control given to them over their shared contents. Indeed, most of the user privacy issues related to the centralized Online Social Network (OSN) services (such as Facebook or Google+) do not apply in the case of DOSNs because of the absence of the centralized service provider. However, these new architectures have motivated researchers to investigate new privacy solutions that allow DOSN’s users to protect their contents by taking into account the decentralized nature of the DOSNs platform.In this survey, we provide a comprehensive overview of the privacy solutions adopted by currently available DOSNs, and we compare them by exploiting several criteria. After presenting the differences that existing DOSNs present in terms of provided services and architecture, we identify, for each of them, the privacy model used to define the privacy policies and the mechanisms for their management (i.e., initialization and modification of the privacy policy). In addition, we evaluate the overhead introduced by the security mechanisms adopted for privacy policy management and enforcement by discussing their advantages and drawbacks.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号