全文获取类型
收费全文 | 1553篇 |
免费 | 32篇 |
国内免费 | 1篇 |
专业分类
电工技术 | 18篇 |
综合类 | 6篇 |
化学工业 | 358篇 |
金属工艺 | 19篇 |
机械仪表 | 39篇 |
建筑科学 | 73篇 |
矿业工程 | 8篇 |
能源动力 | 29篇 |
轻工业 | 222篇 |
水利工程 | 18篇 |
石油天然气 | 2篇 |
无线电 | 123篇 |
一般工业技术 | 226篇 |
冶金工业 | 263篇 |
原子能技术 | 17篇 |
自动化技术 | 165篇 |
出版年
2022年 | 12篇 |
2021年 | 18篇 |
2020年 | 18篇 |
2019年 | 11篇 |
2018年 | 17篇 |
2017年 | 19篇 |
2016年 | 33篇 |
2015年 | 16篇 |
2014年 | 35篇 |
2013年 | 72篇 |
2012年 | 44篇 |
2011年 | 65篇 |
2010年 | 58篇 |
2009年 | 52篇 |
2008年 | 65篇 |
2007年 | 57篇 |
2006年 | 45篇 |
2005年 | 28篇 |
2004年 | 30篇 |
2003年 | 38篇 |
2002年 | 27篇 |
2001年 | 33篇 |
2000年 | 28篇 |
1999年 | 26篇 |
1998年 | 86篇 |
1997年 | 60篇 |
1996年 | 44篇 |
1995年 | 35篇 |
1994年 | 47篇 |
1993年 | 34篇 |
1992年 | 24篇 |
1991年 | 16篇 |
1990年 | 15篇 |
1989年 | 24篇 |
1988年 | 10篇 |
1987年 | 16篇 |
1986年 | 16篇 |
1985年 | 15篇 |
1984年 | 17篇 |
1981年 | 14篇 |
1980年 | 13篇 |
1979年 | 11篇 |
1978年 | 20篇 |
1977年 | 16篇 |
1976年 | 34篇 |
1975年 | 12篇 |
1974年 | 17篇 |
1969年 | 9篇 |
1966年 | 9篇 |
1954年 | 9篇 |
排序方式: 共有1586条查询结果,搜索用时 0 毫秒
81.
82.
83.
Shared databases are used for knowledge exchange in groups. Whether a person is willing to contribute knowledge to a shared database presents a social dilemma: Each group member saves time and energy by not contributing any information to the database and by using the database only to retrieve information which was contributed by others. But if all people use this strategy, then the database will be empty and, hence, useless for every group member. Based on theoretical approaches, two models for fostering the information-sharing behavior of database users are presented. One for enhancing the quality of database contents, and one for enhancing the quantity of those contents. The models take into account the following factors: the kinds of rewards the participants obtain for contributing information, the individual costs associated with this contribution, the prospective metaknowledge about the importance of one’s own information to the others, and the retrospective metaknowledge about how much others contributed to and retrieved from the database. These factors enhance the quantity of database contents as well as their quality. 相似文献
84.
Following a 1986 study reporting a predominance of ambivalent attachment among insecure Sapporo infants, the generalizability of attachment theory and methodologies to Japanese samples has been questioned. In this 2nd study of Sapporo mother-child dyads (N=43), the authors examined attachment distributions for both (a) child, based on M. Main and J. Cassidy's (1988) 6th-year reunion, and (b) adult, via the Adult Attachment Interview (AAI). In contrast to the previous Sapporo study, children's 3-way or "organized" distribution did not differ from the global distribution. However, when the disorganized-controlling (D) and cannot classify (CC) categories were applied to the analyses, a high proportion of D/CC children was found. Comparable analyses for Japanese mothers, including the unresolved/disorganized (U) and CC categories, were found to deviate slightly from the global norm. However, turning from global distributions to mothers' AAI classification as related to their child's reunion classification, all matches were surprisingly close to those established worldwide. When, as is customary, mothers' U and CC classifications were combined (U/CC) and compared with the child's D and CC classifications (also customarily combined as D/CC), mothers' U/CC status strongly predicted child D/CC status (r=.60, d=1.50). Additionally, mothers' AAI subclassifications predicted child subclassifications. (PsycINFO Database Record (c) 2010 APA, all rights reserved) 相似文献
85.
By the very nature of information technology (IT), change and dynamism have always been significant drivers on its path to further development—and it has traditionally been the Western countries leading these. Now the picture is changing. The new high growth economies of the world (also known as BRIC countries) are increasingly pressing forward as active IT development drivers. Internal IT organizations of international companies are experiencing these global shifts firsthand and are facing changes in their traditional roles. This exploratory research is aimed at clarifying the context of the impact of high growth economies on such IT departments of Western-rooted enterprises. Forty-six interviews were conducted with IT managers, HR managers and expatriates emphasizing the importance of intercultural interaction, maturing IT economies, change in IT landscape and entrepreneurship. 相似文献
86.
87.
Jörg Becker Patrick Delfmann Hanns-Alexander Dietrich Matthias Steinhorst Mathias Eggert 《Information Systems Frontiers》2016,18(2):359-405
Given the strong increase in regulatory requirements for business processes the management of business process compliance becomes a more and more regarded field in IS research. Several methods have been developed to support compliance checking of conceptual models. However, their focus on distinct modeling languages and mostly linear (i.e., predecessor-successor related) compliance rules may hinder widespread adoption and application in practice. Furthermore, hardly any of them has been evaluated in a real-world setting. We address this issue by applying a generic pattern matching approach for conceptual models to business process compliance checking in the financial sector. It consists of a model query language, a search algorithm and a corresponding modelling tool prototype. It is (1) applicable for all graph-based conceptual modeling languages and (2) for different kinds of compliance rules. Furthermore, based on an applicability check, we (3) evaluate the approach in a financial industry project setting against its relevance for decision support of audit and compliance management tasks. 相似文献
88.
Matthias Zobel Joachim Denzler Benno Heigl Elmar Nöth Dietrich Paulus Jochen Schmidt Georg Stemmer 《Machine Vision and Applications》2003,14(1):26-34
Abstract. This contribution introduces MOBSY, a fully integrated, autonomous mobile service robot system. It acts as an automatic dialogue-based
receptionist for visitors to our institute. MOBSY incorporates many techniques from different research areas into one working
stand-alone system. The techniques involved range from computer vision over speech understanding to classical robotics.
Along with the two main aspects of vision and speech, we also focus on the integration aspect, both on the methodological
and on the technical level. We describe the task and the techniques involved. Finally, we discuss the experiences that we
gained with MOBSY during a live performance at our institute. 相似文献
89.
Patrick Duessel Christian Gehl Ulrich Flegel Sven Dietrich Michael Meier 《International Journal of Information Security》2017,16(5):475-490
Anomaly detection allows for the identification of unknown and novel attacks in network traffic. However, current approaches for anomaly detection of network packet payloads are limited to the analysis of plain byte sequences. Experiments have shown that application-layer attacks become difficult to detect in the presence of attack obfuscation using payload customization. The ability to incorporate syntactic context into anomaly detection provides valuable information and increases detection accuracy. In this contribution, we address the issue of incorporating protocol context into payload-based anomaly detection. We present a new data representation, called \({c}_n\)-grams, that allows to integrate syntactic and sequential features of payloads in an unified feature space and provides the basis for context-aware detection of network intrusions. We conduct experiments on both text-based and binary application-layer protocols which demonstrate superior accuracy on the detection of various types of attacks over regular anomaly detection methods. Furthermore, we show how \({c}_n\)-grams can be used to interpret detected anomalies and thus, provide explainable decisions in practice. 相似文献
90.
We present the language CRStL (Control Rule Strategy Language, pronounce “crystal”) to formulate mathematical reasoning techniques as proof strategies in the context of the proof assistant Ωmega. The language is arranged in two levels, a query language to access mathematical knowledge maintained in development graphs, and a strategy language to annotate the results of these queries with further control information. The two-leveled structure of the language allows the specification of proof techniques in a declarative way. We present the syntax and semantics of CRStL and illustrate its use by examples. 相似文献