首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1553篇
  免费   32篇
  国内免费   1篇
电工技术   18篇
综合类   6篇
化学工业   358篇
金属工艺   19篇
机械仪表   39篇
建筑科学   73篇
矿业工程   8篇
能源动力   29篇
轻工业   222篇
水利工程   18篇
石油天然气   2篇
无线电   123篇
一般工业技术   226篇
冶金工业   263篇
原子能技术   17篇
自动化技术   165篇
  2022年   12篇
  2021年   18篇
  2020年   18篇
  2019年   11篇
  2018年   17篇
  2017年   19篇
  2016年   33篇
  2015年   16篇
  2014年   35篇
  2013年   72篇
  2012年   44篇
  2011年   65篇
  2010年   58篇
  2009年   52篇
  2008年   65篇
  2007年   57篇
  2006年   45篇
  2005年   28篇
  2004年   30篇
  2003年   38篇
  2002年   27篇
  2001年   33篇
  2000年   28篇
  1999年   26篇
  1998年   86篇
  1997年   60篇
  1996年   44篇
  1995年   35篇
  1994年   47篇
  1993年   34篇
  1992年   24篇
  1991年   16篇
  1990年   15篇
  1989年   24篇
  1988年   10篇
  1987年   16篇
  1986年   16篇
  1985年   15篇
  1984年   17篇
  1981年   14篇
  1980年   13篇
  1979年   11篇
  1978年   20篇
  1977年   16篇
  1976年   34篇
  1975年   12篇
  1974年   17篇
  1969年   9篇
  1966年   9篇
  1954年   9篇
排序方式: 共有1586条查询结果,搜索用时 0 毫秒
81.
82.
83.
Shared databases are used for knowledge exchange in groups. Whether a person is willing to contribute knowledge to a shared database presents a social dilemma: Each group member saves time and energy by not contributing any information to the database and by using the database only to retrieve information which was contributed by others. But if all people use this strategy, then the database will be empty and, hence, useless for every group member. Based on theoretical approaches, two models for fostering the information-sharing behavior of database users are presented. One for enhancing the quality of database contents, and one for enhancing the quantity of those contents. The models take into account the following factors: the kinds of rewards the participants obtain for contributing information, the individual costs associated with this contribution, the prospective metaknowledge about the importance of one’s own information to the others, and the retrospective metaknowledge about how much others contributed to and retrieved from the database. These factors enhance the quantity of database contents as well as their quality.  相似文献   
84.
Following a 1986 study reporting a predominance of ambivalent attachment among insecure Sapporo infants, the generalizability of attachment theory and methodologies to Japanese samples has been questioned. In this 2nd study of Sapporo mother-child dyads (N=43), the authors examined attachment distributions for both (a) child, based on M. Main and J. Cassidy's (1988) 6th-year reunion, and (b) adult, via the Adult Attachment Interview (AAI). In contrast to the previous Sapporo study, children's 3-way or "organized" distribution did not differ from the global distribution. However, when the disorganized-controlling (D) and cannot classify (CC) categories were applied to the analyses, a high proportion of D/CC children was found. Comparable analyses for Japanese mothers, including the unresolved/disorganized (U) and CC categories, were found to deviate slightly from the global norm. However, turning from global distributions to mothers' AAI classification as related to their child's reunion classification, all matches were surprisingly close to those established worldwide. When, as is customary, mothers' U and CC classifications were combined (U/CC) and compared with the child's D and CC classifications (also customarily combined as D/CC), mothers' U/CC status strongly predicted child D/CC status (r=.60, d=1.50). Additionally, mothers' AAI subclassifications predicted child subclassifications. (PsycINFO Database Record (c) 2010 APA, all rights reserved)  相似文献   
85.
By the very nature of information technology (IT), change and dynamism have always been significant drivers on its path to further development—and it has traditionally been the Western countries leading these. Now the picture is changing. The new high growth economies of the world (also known as BRIC countries) are increasingly pressing forward as active IT development drivers. Internal IT organizations of international companies are experiencing these global shifts firsthand and are facing changes in their traditional roles. This exploratory research is aimed at clarifying the context of the impact of high growth economies on such IT departments of Western-rooted enterprises. Forty-six interviews were conducted with IT managers, HR managers and expatriates emphasizing the importance of intercultural interaction, maturing IT economies, change in IT landscape and entrepreneurship.  相似文献   
86.
87.
Given the strong increase in regulatory requirements for business processes the management of business process compliance becomes a more and more regarded field in IS research. Several methods have been developed to support compliance checking of conceptual models. However, their focus on distinct modeling languages and mostly linear (i.e., predecessor-successor related) compliance rules may hinder widespread adoption and application in practice. Furthermore, hardly any of them has been evaluated in a real-world setting. We address this issue by applying a generic pattern matching approach for conceptual models to business process compliance checking in the financial sector. It consists of a model query language, a search algorithm and a corresponding modelling tool prototype. It is (1) applicable for all graph-based conceptual modeling languages and (2) for different kinds of compliance rules. Furthermore, based on an applicability check, we (3) evaluate the approach in a financial industry project setting against its relevance for decision support of audit and compliance management tasks.  相似文献   
88.
Abstract. This contribution introduces MOBSY, a fully integrated, autonomous mobile service robot system. It acts as an automatic dialogue-based receptionist for visitors to our institute. MOBSY incorporates many techniques from different research areas into one working stand-alone system. The techniques involved range from computer vision over speech understanding to classical robotics. Along with the two main aspects of vision and speech, we also focus on the integration aspect, both on the methodological and on the technical level. We describe the task and the techniques involved. Finally, we discuss the experiences that we gained with MOBSY during a live performance at our institute.  相似文献   
89.
Anomaly detection allows for the identification of unknown and novel attacks in network traffic. However, current approaches for anomaly detection of network packet payloads are limited to the analysis of plain byte sequences. Experiments have shown that application-layer attacks become difficult to detect in the presence of attack obfuscation using payload customization. The ability to incorporate syntactic context into anomaly detection provides valuable information and increases detection accuracy. In this contribution, we address the issue of incorporating protocol context into payload-based anomaly detection. We present a new data representation, called \({c}_n\)-grams, that allows to integrate syntactic and sequential features of payloads in an unified feature space and provides the basis for context-aware detection of network intrusions. We conduct experiments on both text-based and binary application-layer protocols which demonstrate superior accuracy on the detection of various types of attacks over regular anomaly detection methods. Furthermore, we show how \({c}_n\)-grams can be used to interpret detected anomalies and thus, provide explainable decisions in practice.  相似文献   
90.
We present the language CRStL (Control Rule Strategy Language, pronounce “crystal”) to formulate mathematical reasoning techniques as proof strategies in the context of the proof assistant Ωmega. The language is arranged in two levels, a query language to access mathematical knowledge maintained in development graphs, and a strategy language to annotate the results of these queries with further control information. The two-leveled structure of the language allows the specification of proof techniques in a declarative way. We present the syntax and semantics of CRStL and illustrate its use by examples.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号