首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   293篇
  免费   38篇
  国内免费   30篇
电工技术   1篇
综合类   19篇
化学工业   3篇
机械仪表   3篇
建筑科学   2篇
轻工业   2篇
水利工程   1篇
石油天然气   1篇
武器工业   1篇
无线电   31篇
一般工业技术   6篇
冶金工业   19篇
自动化技术   272篇
  2024年   1篇
  2023年   1篇
  2022年   5篇
  2020年   2篇
  2019年   6篇
  2018年   5篇
  2017年   5篇
  2016年   4篇
  2015年   8篇
  2014年   15篇
  2013年   18篇
  2012年   29篇
  2011年   29篇
  2010年   25篇
  2009年   28篇
  2008年   32篇
  2007年   31篇
  2006年   26篇
  2005年   14篇
  2004年   18篇
  2003年   5篇
  2002年   8篇
  2001年   3篇
  2000年   7篇
  1999年   5篇
  1998年   3篇
  1997年   1篇
  1996年   2篇
  1994年   3篇
  1993年   2篇
  1992年   1篇
  1991年   1篇
  1990年   2篇
  1989年   2篇
  1987年   3篇
  1986年   1篇
  1985年   1篇
  1979年   3篇
  1978年   3篇
  1974年   1篇
  1960年   1篇
  1957年   1篇
排序方式: 共有361条查询结果,搜索用时 15 毫秒
1.
Risk allocation decisions are of critical importance in project management. The present study proposes an explanation for how risk allocation in a contract motivates a contractor to cooperate with a project owner. Theories of risk allocation and trust were used to motivate the research. Using a survey methodology, we collected data concerning 124 construction projects in China. We found that risk allocation influenced the contractor’s role behavior through the contractor’s feeling of being trusted but not the contractor’s trust in the owner. Feeling of being trusted partially mediated the effect of risk allocation on the contractor’s in-role (i.e., contractual) behavior and fully mediated the effect on extra-role behavior. The study introduces a social and psychological view of the impacts of risk allocation to the project and engineering management literature. We contribute to theory by arguing and demonstrating the mediating effect of trust on the relationship between risk allocation and contractor behavior. From a practical standpoint, we conclude that contractual risk allocation has a significant impact on building a trusting relationship between owners and contractors and that contractors who feel trusted perform both contractually mandated actions and actions external to the contract more diligently, resulting in the likelihood of improved outcomes for both parties.  相似文献   
2.
近年来,中国物联网政策支持力度不断加大,技术创新成果接连涌现,各领域应用持续深化,产业规模保持快速增长。本论文以物联网接入边界为切入点,探讨了物联网安全接入问题的解决方案。设计了基于可信计算3.0的物联网可信网关,以及安全管理中心,构建了可信的物联网安全边界接入系统。为各种异构物联网终端设备提供了安全屏障,隔绝了针对于物联网设备的网络安全威胁。  相似文献   
3.
自组织线性表在非等概率查找中具有较好的效率。本文在原有3种基本构造策略的基础上,提出一种新方法——移至中位策略。该策略优化自组织线性表中记录的调整方式,减少了累计记录比较次数,从而提高了查找响应速度。在实验测试中,提出平稳的查找过程和非平稳的查找过程的概念,并分别设计相应的测试用例。实验结果表明,移至中位策略的综合性能最好。  相似文献   
4.
With the rapid development of Mobile ad hoc network (MANET), secure and practical authentica- tion is becoming increasingly important. There still ex- ist several unsolved problems. It may suffer from cheat- ing problems and Denial of services (DOS) attacks to- wards authentication service. Most existing schemes do not have satisfactory efficiency due to the exponential arithmetic complexity of Shamir's scheme. We explore the property of Verifiable secret sharing (VSS) schemes with Chinese remainder theorem (CRT), then propose a se- cret key distributed storage scheme based on CRT-VSS and trusted computing techniques. We discuss the homo- morphism property of CRT-VSS and design a secure dis- tributed Elliptic curve-digital signature standard (ECC- DSS) authentication scheme. We provide formal guaran- tees towards the scheme proposed in this paper.  相似文献   
5.
周勇 《计算机应用》2014,(Z2):99-101
针对传统可信网络中存在会话密钥协商过程易受中间人攻击的不足,提出改进的可信网络连接机制。该机制基于椭圆曲线Diffie-Hellman( ECDH)算法实现会话密钥的安全协商,用户与节点使用私钥和随机数完成会话密钥的计算。分析表明改进的密钥协商协议具有抗中间人攻击、高效性等特点,会话密钥具有前向安全性及较强的新鲜性和保密性。  相似文献   
6.
随着计算机网络的发展,其开放性、共享性、互连程度扩大,网络的重要性和对人们的影响也越来越大,而网络安全问题显得也越来越重要了。本文阐述了当前网络存在的漏洞,同时对当前主要的网络安全技术进行了分析,指出当前的网络安全技术的局限性。最后指出了几种较为前景的网络安全技术,包括可信计算和基于安全语言的防御技术。  相似文献   
7.
伴随着电子邮件的广泛使用,垃圾邮件日益泛滥,严重影响了人们正常的工作、学习和生活。如今新型的垃圾邮件变化多端,使得传统的、单一的垃圾邮件过滤方法对新型垃圾邮件已经无能为力。针对这一难题,介绍了当前已经应用于垃圾邮件过滤领域主流的3种垃圾邮件过滤技术。通过详细分析各种技术的优缺点,对黑白名单过滤技术、基于规则的过滤技术和贝叶斯过滤技术进行整合,从而建立了一个分层次的垃圾邮件过滤系统模型,并对该过滤系统进行了性能分析。  相似文献   
8.
This paper reports the development of a sorting algorithm, called a ‘pocket sort.’ It is primarily directed to sorting of character data. The algorithm is strictly of order O(n); sorting time is directly proportional to the number of data elements to be sorted. Further, through the use of pointer - linked list data structures, no internal movement of the records containing the sort field is required. The algorithm has been implemented in Turbo Pascal. Data are presented comparing this pocket sort to other sorting techniques.  相似文献   
9.
Reference lists appended to published journals are of critical importance to readers of academic literature. They allow readers to retrieve cited sources, either to increase their own knowledge or to substantiate the authors' claims, and in so doing help to establish the judgment and credibility of the authors (M. F. McLellan et al, 1992). However, erroneous references detract from the intended function of reference lists by impeding retrieval searches and by providing misleading bibliographic information (G. de Lacey et al, 1985; McLellan et al, 1992). The present study aims to assess the accuracy of reference lists in five experimental psychology journals published by the American Psychological Association (APA) in 1999 (Journal of Experimental Psychology: Animal Behavior Processes, Journal of Experimental Psychology: Applied, Journal of Experimental Psychology: Learning, Memory, and Cognition, Journal of Experimental Psychology: Human Perception and Performance, and Journal of Experimental Psychology: General). Perhaps the most disturbing result from this study is the finding that authors were incorrectly cited in 12% of reference list citations, with errors in the initials of the authors being the most common. (PsycINFO Database Record (c) 2010 APA, all rights reserved)  相似文献   
10.
The proposition that the difference in memory span between Welsh digits and English digits is accounted for by the longer articulatory duration of Welsh digits is critically reexamined. Two methods of measuring digit duration are contrasted. One is derived from digits spoken in isolation, the other is based on digits spoken in list format. Duration of Welsh digits was greater only when spoken in lists; with isolated production Welsh digits were significantly shorter than English digits. Also, span was shorter for Welsh digits. The results are interpreted in the light of the different articulatory demands made at the junctures between words in the English and Welsh lists. A supplementary experiment, using English words, illustrated that articulatory complexity at item boundaries increased serial recall error. (PsycINFO Database Record (c) 2010 APA, all rights reserved)  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号