首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   4777篇
  免费   229篇
  国内免费   5篇
电工技术   25篇
综合类   8篇
化学工业   1206篇
金属工艺   48篇
机械仪表   64篇
建筑科学   194篇
矿业工程   13篇
能源动力   74篇
轻工业   860篇
水利工程   31篇
石油天然气   9篇
无线电   158篇
一般工业技术   530篇
冶金工业   1185篇
原子能技术   26篇
自动化技术   580篇
  2023年   21篇
  2022年   149篇
  2021年   216篇
  2020年   94篇
  2019年   106篇
  2018年   121篇
  2017年   96篇
  2016年   115篇
  2015年   112篇
  2014年   150篇
  2013年   273篇
  2012年   191篇
  2011年   254篇
  2010年   214篇
  2009年   182篇
  2008年   232篇
  2007年   208篇
  2006年   161篇
  2005年   143篇
  2004年   135篇
  2003年   102篇
  2002年   129篇
  2001年   78篇
  2000年   71篇
  1999年   99篇
  1998年   104篇
  1997年   77篇
  1996年   87篇
  1995年   62篇
  1994年   67篇
  1993年   67篇
  1992年   64篇
  1991年   21篇
  1990年   49篇
  1989年   72篇
  1988年   49篇
  1987年   56篇
  1986年   57篇
  1985年   56篇
  1984年   59篇
  1983年   47篇
  1982年   34篇
  1981年   50篇
  1980年   27篇
  1979年   24篇
  1978年   24篇
  1977年   26篇
  1976年   38篇
  1975年   27篇
  1970年   17篇
排序方式: 共有5011条查询结果,搜索用时 0 毫秒
101.
The generative topographic mapping (GTM) has been proposed as a statistical model to represent high-dimensional data by a distribution induced by a sparse lattice of points in a low-dimensional latent space, such that visualization, compression, and data inspection become possible. The formulation in terms of a generative statistical model has the benefit that relevant parameters of the model can be determined automatically based on an expectation maximization scheme. Further, the model offers a large flexibility such as a direct out-of-sample extension and the possibility to obtain different degrees of granularity of the visualization without the need of additional training. Original GTM is restricted to Euclidean data points in a given Euclidean vector space. Often, data are not explicitly embedded in a Euclidean vector space, rather pairwise dissimilarities of data can be computed, i.e. the relations between data points are given rather than the data vectors themselves. We propose a method which extends the GTM to relational data and which allows us to achieve a sparse representation of data characterized by pairwise dissimilarities, in latent space. The method, relational GTM, is demonstrated on several benchmarks.  相似文献   
102.

Context

Adopting IT innovation in organizations is a complex decision process driven by technical, social and economic issues. Thus, those organizations that decide to adopt innovation take a decision of uncertain success of implementation, as the actual use of a new technology might not be the one expected. The misalignment between planned and effective use of innovation is called assimilation gap.

Objective

This research aims at defining a quantitative instrument for measuring the assimilation gap and applying it to the case of the adoption of OSS.

Method

In this paper, we use the theory of path dependence and increasing returns of Arthur. In particular, we model the use of software applications (planned or actual) by stochastic processes defined by the daily amounts of files created with the applications. We quantify the assimilation gap by comparing the resulting models by measures of proximity.

Results

We apply and validate our method to a real case study of introduction of OpenOffice. We have found a gap between the planned and the effective use despite well-defined directives to use the new OS technology. These findings suggest a need of strategy re-calibration that takes into account environmental factors and individual attitudes.

Conclusions

The theory of path dependence is a valid instrument to model the assimilation gap provided information on strategy toward innovation and quantitative data on actual use are available.  相似文献   
103.
Six different methods to calculate the Strain Index (SI) scores for jobs with multiple forces/tasks were developed. Exposure data of 733 subjects from 12 different worksites were used to calculate these SI scores. Results show that using different SI computation methods could result in different SI scores, hence different risk level classifications. However, some simpler methods generated SI scores were comparable to the more complicated composite SI method. Despite differences in the scores between the six different SI computation methods, Spearman rank-order correlation coefficients of 0.61-0.97 were found between the methods. With some confidence, ergonomic practitioners may use simpler methods, depending on their specificity requirement in job evaluations and available resources. Some SI computation methods may tend to over-estimate job risk levels, while others may tend to under-estimate job risk levels, due to different ways used in obtaining the various SI parameters and computations.  相似文献   
104.
Koordination in Service Value Networks   总被引:1,自引:1,他引:0  
The fundamental paradigm shift from traditional value chains to agile service value networks implies new economic and organizational challenges. As coordination mechanisms, auctions have proven to perform quite well in situations where intangible and heterogeneous goods are traded. Nevertheless, traditional approaches in the area of multidimensional combinatorial auctions are not quite suitable to enable the trade of composite services. A flawless service execution and therefore the requester’s valuation highly depends on the accurate sequence of the functional parts of the composition, meaning that in contrary to service bundles, composite services only generate value through a valid order of their components. The authors present an abstract model as a formalization of service value networks. The model comprehends a graph-based mechanism implementation to allocate multidimensional service offers within the network, to impose penalties for non-performance and to determine prices for complex services. The mechanism and the bidding language support various types of QoS attributes and their (semantic) aggregation. It is analytically shown that this variant is incentive compatible with respect to all dimensions of the service offer (quality and price). Based on these results, the authors numerically analyze strategic behavior of participating service providers regarding possible collusion strategies.  相似文献   
105.
106.
Component-based approaches are becoming more and more popular to support Internet-based application development. Different component modeling approaches, however, can be adopted, obtaining different abstraction levels (either conceptual or operational). In this paper we present a component-based architecture for the design of e-applications, and discuss the concept of wrapper components as building blocks for the development of e-services, where these services are based on legacy systems. We discuss their characteristics and their applicability in Internet-based application development. Received: 30 October 2000 / Accepted: 9 January 2001 Published online: 28 June 2001  相似文献   
107.
An industry consortium focused on ensuring that all PCs are secure for electronic business transactions has announced the release of its first version specification. The Trusted Computing Platform Alliance (TCPA), backed by founding members Compaq, Microsoft, Hewlett-Packard, IBM and Intel, said that the specification will adopt the combination of a hardware and a software approach, which includes a security chip that encrypts data whether filed locally, or sent over the Internet by E-mail.  相似文献   
108.
The frequent occurrence of implicitly thrown exceptions poses one of the challenges present in a Java compiler. Not only do these implicitly thrown exceptions directly affect the performance by requiring explicit checks, they also indirectly impact the performance by restricting code movement in order to satisfy the precise exception model in Java. In particular, instruction scheduling is one transformation that is restricted by implicitly thrown exceptions due to the heavy reliance on reordering instructions to exploit maximum hardware performance. The goal of this study is two-fold: first, investigate the degree to which implicitly thrown exceptions in Java hinder instruction scheduling, and second, find new techniques for allowing more efficient execution of Java programs containing implicitly thrown exceptions. Experimental results show that with aggressive scheduling techniques, such as superblock scheduling, the negative performance impact can be greatly reduced.  相似文献   
109.
Two samples of naturally occurring pyrite were treated with acetyl acetone, silanes, humic acids, lignin-NaOH mixture, and oxalic acid. The corrosion rate of pyrite was observed to decrease significantly due to the surface treatment by the chemicals used in this study. Surface characterization methods indicate that phenyl triacetoxy silane forms a passive coating a few Angstroms thick on the pyrite, thus preventing its dissolution in 1M H2SO4.  相似文献   
110.
Through investigating the reactions of commercial farmers to land and water reforms in the Trichardtsdal-Ofcolaco area, Limpopo Province, Olifants Basin, South Africa, from 1997 to 2006, it is shown that water claims are key to land redistribution processes, and that commercial farmers make strategic use of arguments for nature conservation and ecological stewardship to defend their claims to water. Given these observations, caution is warranted with respect to the implementation of land and water reforms as separate policy packages; it may be more effective to design water and conservation policies as an integral part of land reform programmes.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号