全文获取类型
收费全文 | 290篇 |
免费 | 8篇 |
专业分类
综合类 | 6篇 |
化学工业 | 109篇 |
金属工艺 | 3篇 |
建筑科学 | 23篇 |
轻工业 | 70篇 |
水利工程 | 1篇 |
无线电 | 2篇 |
一般工业技术 | 38篇 |
冶金工业 | 11篇 |
原子能技术 | 2篇 |
自动化技术 | 33篇 |
出版年
2023年 | 3篇 |
2022年 | 14篇 |
2021年 | 14篇 |
2020年 | 8篇 |
2019年 | 3篇 |
2018年 | 5篇 |
2017年 | 8篇 |
2016年 | 5篇 |
2015年 | 8篇 |
2014年 | 8篇 |
2013年 | 12篇 |
2012年 | 23篇 |
2011年 | 36篇 |
2010年 | 22篇 |
2009年 | 15篇 |
2008年 | 23篇 |
2007年 | 5篇 |
2006年 | 12篇 |
2005年 | 9篇 |
2004年 | 9篇 |
2003年 | 5篇 |
2002年 | 6篇 |
2001年 | 2篇 |
2000年 | 2篇 |
1999年 | 6篇 |
1998年 | 4篇 |
1997年 | 1篇 |
1996年 | 2篇 |
1995年 | 5篇 |
1994年 | 5篇 |
1993年 | 2篇 |
1992年 | 1篇 |
1990年 | 1篇 |
1989年 | 2篇 |
1988年 | 4篇 |
1987年 | 1篇 |
1985年 | 3篇 |
1980年 | 2篇 |
1979年 | 1篇 |
1963年 | 1篇 |
排序方式: 共有298条查询结果,搜索用时 19 毫秒
31.
32.
33.
Beate Grawemeyer 《Interacting with computers》2011,23(3):256-267
Security policies are required that protect information from unauthorised access, and also respect challenges users face in creating, and particularly managing, increasing numbers of passwords. This paper investigates real password use in the context of daily life. It presents the results of an empirical study where participants completed a password diary over 7 days, followed by debrief interviews to gain further knowledge and understanding of user behaviour. The results reported relate to how many passwords are in use, the types of passwords participants created, the relationships between different passwords and to sensitive services, how participants retrieved their passwords and finally, the different strategies adopted by users in their management of passwords. The paper concludes by providing a high level set of password guidelines, along with suggestions for mechanisms to support creating, encoding, retrieving and executing multiple passwords. 相似文献
34.
Horst Kesselmeier Inga Tschiersch Klaus Henning Beate Stoffels Sebastian Kutscha 《AI & Society》1998,12(1-2):55-63
Today technology design can no longer be understood as a design process on a green site. Design and implementation of new technology are always dependent on existing technology and the way it is used by people. In this respect Software-Engineering has also changed to the characteristics of normal technology design taking into account existing computer systems. Experiences show that the conditions and needs of such Software-Reengineering projects are highly complex and differ in their special characteristics ranging from aspects of quality of existing system documentation to organizational structures of the computer departments concerned. The Task-Artifact Cycle presented here gives a suitable reengineering approach emphasizing both analysis and design in Software-Reengineering. 相似文献
35.
Beate Eichmann Samuel Greiff Johannes Naumann Liene Brandhuber Frank Goldhammer 《Journal of Computer Assisted Learning》2020,36(6):933-956
In this explorative study, we investigate how sequences of behaviour are related to success or failure in complex problem-solving (CPS). To this end, we analysed log data from two different tasks of the problem-solving assessment of the Programme for International Student Assessment 2012 study (n = 30,098 students). We first coded every interaction of students as (initial or repeated) exploration, (initial or repeated) goal-directed behaviour, or resetting the task. We then split the data according to task successes and failures. We used full-path sequence analysis to identify groups of students with similar behavioural patterns in the respective tasks. Double-checking and minimalistic behaviour was associated with success in CPS, while guessing and exploring task-irrelevant content was associated with failure. Our findings held for both tasks investigated, from two different CPS measurement frameworks. We thus gained detailed insight into the behavioural processes that are related to success and failure in CPS. 相似文献
36.
Dominik Benz Andreas Hotho Robert Jäschke Beate Krause Folke Mitzlaff Christoph Schmitz Gerd Stumme 《The VLDB Journal The International Journal on Very Large Data Bases》2010,19(6):849-875
Social resource sharing systems are central elements of the Web 2.0 and use the same kind of lightweight knowledge representation, called folksonomy. Their large user communities and ever-growing networks of user-generated content have made them an attractive object of investigation for researchers from different disciplines like Social Network Analysis, Data Mining, Information Retrieval or Knowledge Discovery. In this paper, we summarize and extend our work on different aspects of this branch of Web 2.0 research, demonstrated and evaluated within our own social bookmark and publication sharing system BibSonomy, which is currently among the three most popular systems of its kind. We structure this presentation along the different interaction phases of a user with our system, coupling the relevant research questions of each phase with the corresponding implementation issues. This approach reveals in a systematic fashion important aspects and results of the broad bandwidth of folksonomy research like capturing of emergent semantics, spam detection, ranking algorithms, analogies to search engine log data, personalized tag recommendations and information extraction techniques. We conclude that when integrating a real-life application like BibSonomy into research, certain constraints have to be considered; but in general, the tight interplay between our scientific work and the running system has made BibSonomy a valuable platform for demonstrating and evaluating Web 2.0 research. 相似文献
37.
38.
39.
40.