首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1700篇
  免费   50篇
  国内免费   2篇
电工技术   8篇
化学工业   294篇
金属工艺   16篇
机械仪表   12篇
建筑科学   87篇
矿业工程   3篇
能源动力   24篇
轻工业   172篇
水利工程   10篇
石油天然气   2篇
无线电   83篇
一般工业技术   195篇
冶金工业   662篇
原子能技术   5篇
自动化技术   179篇
  2022年   20篇
  2021年   54篇
  2020年   25篇
  2019年   28篇
  2018年   25篇
  2017年   20篇
  2016年   24篇
  2015年   24篇
  2014年   44篇
  2013年   100篇
  2012年   71篇
  2011年   63篇
  2010年   60篇
  2009年   54篇
  2008年   73篇
  2007年   57篇
  2006年   55篇
  2005年   49篇
  2004年   48篇
  2003年   20篇
  2002年   52篇
  2001年   40篇
  2000年   35篇
  1999年   36篇
  1998年   22篇
  1997年   22篇
  1996年   31篇
  1995年   27篇
  1994年   36篇
  1993年   42篇
  1992年   40篇
  1991年   11篇
  1990年   37篇
  1989年   34篇
  1988年   33篇
  1987年   31篇
  1986年   23篇
  1985年   31篇
  1984年   32篇
  1983年   21篇
  1982年   15篇
  1981年   16篇
  1980年   15篇
  1979年   26篇
  1978年   16篇
  1977年   11篇
  1976年   14篇
  1975年   19篇
  1973年   9篇
  1972年   12篇
排序方式: 共有1752条查询结果,搜索用时 46 毫秒
31.
The network function virtualization (NFV) paradigm replaces hardware-dependent network functions by virtual network functions (VNFs) that can be deployed in commodity hardware, including legacy servers. Consequently, the use of NFV is expected to reduce operating and capital expenses, as well as improve service deployment operation and management flexibility. For many use cases, the VNFs must be visited and invoked following a specific order of execution in order to compose a complete network service, named service function chain (SFC). Nonetheless, despite the benefits from NFV and SFC virtualization technologies, their introduction must not harm network performance and service availability. On the one hand, redundancy is seen by network service planners as a mechanism well established to combat availability issues. At same time, there is a goal to optimize resource utilization in order to reduce operational expenditure. In this article, we share our experience in the design use of a framework, named SPIDER, focused on SFC placement that considers the network infrastructure condition and the required SFC availability to define the placement strategy. The SPIDER monitors the status of infrastructure nodes and links and defines which servers the VNFs should be placed on and the number of redundant replicas needed. We present a proof-of-concept of SPIDER using Kubernetes to launch the VNFs as containers. We also use Kubernetes to forward the traffic between the VNFs, composing the service chain. We perform experiments to evaluate the runtime of SPIDER and the SFC delay under different network conditions.  相似文献   
32.
In earlier work, I identified a particular class of end-user developers, who include scientists and whom I term ‘professional end-user developers’, as being of especial interest. Here, I extend this work by articulating a culture of professional end-user development, and illustrating by means of a field-study how the influence of this culture causes cooperation problems in an inter-disciplinary team developing a software system for a scientific community. My analysis of the field study data is informed by some recent literature on multi-national work cultures. Whilst acknowledging that viewing a scientific development through a lens of software development culture does not give a full picture, I argue that it nonetheless provides deep insights.  相似文献   
33.
This study analyses the decision to exploit an innovation project and investigates differences in individuals’ evaluations of project attributes in the context of innovation project portfolio management. A conjoint field experiment was used to collect data on exploitation decisions made by 126 research and development (R&D) managers to test how managers evaluate specific project attributes in the context of innovation project portfolio management. I analyse the relative power and popularity of profitability, strategy, uncertainty and social dimensions of the portfolio while R&D managers exploit an innovation project. Moreover, using social judgement theory, I analyse actual exploitation processes (i.e., the innovation attributes an R&D manager considers while he or she is making an exploitation decision) and self‐reported decision‐making attributes (i.e., managers’ self‐reported data). The data underline that R&D managers value specific project attributes more and others less, and therefore find disparities in innovation project portfolio decision making. Based on this study's results, decision makers are better able to reflect and understand the influence of specific project attributes. Therefore, they should investigate established decision‐making processes which can help them to improve portfolio performance.  相似文献   
34.
B2B Procurement and Marketplace Transformation   总被引:2,自引:0,他引:2  
Emerging web technologies and systems have started a revolutionary path that will have a profound impact on procurement processes and systems, especially in the area of indirect procurement and the management of operating resources. In fact, what started as more narrowly focused procurement systems only a couple of years ago, has transformed into a web of technologies, markets, and business strategies that have ramifications well beyond the purchasing function. The focus of this paper is on the marketplace structure, functionality and capabilities of systems, and key factors that buyers need to take into consideration when transforming their procurement processes. Contents management, markets, standards, and outsourcing are important problems that are discussed in this paper.  相似文献   
35.
36.
The use of information and communications technology and the ‘digitalisation’ of everyday tasks has resulted in a paradigm shift where vast amounts of personal information about individuals, their opinions and habits is generated and stored in the databases of those providing online services. The mere existence of those data pools has created ‘unwholesome’ desires in both private and public organisations which cover that data for their own purposes. This article looks at the way in which the ‘market value’ of privacy seems to be falling as individuals are persuaded to disclose information about themselves in order to minimise real or perceived risks. It examines the way in which our perception of risk has changed in recent years and the way in which that perception may be manipulated. It analyses the link between risk perception, data processing and individual concepts of privacy as well as the dangers that increased privacy intrusion represents for the relationship between the individual and the state and the relationship between citizens.  相似文献   
37.
38.
Visual programming languages aim to broaden the use ofdiagrams within the software industry, to the extentthat they are integrated into the programming languageitself. As a result, they provide an ideal opportunityto study the benefits of diagrams as an externalrepresentation during problem solving: not only isprogramming a challenging problem-solving activity,but the effect of diagram usage can be directlyassessed by comparing performance while using a visualprogramming language to performance with a standardtextual language. There have been severalmisconceptions amongst visual language researchersregarding the role of diagrams in software design, butthese are being addressed by empirical studies and bynew theories of notation design derived from studiesof visual programming. Based on this research, theauthors are able to recommend several new directionsfor research into thinking with diagrams.  相似文献   
39.
Dayhoff JE 《Neural computation》2007,19(9):2433-2467
We demonstrate a model in which synchronously firing ensembles of neurons are networked to produce computational results. Each ensemble is a group of biological integrate-and-fire spiking neurons, with probabilistic interconnections between groups. An analogy is drawn in which each individual processing unit of an artificial neural network corresponds to a neuronal group in a biological model. The activation value of a unit in the artificial neural network corresponds to the fraction of active neurons, synchronously firing, in a biological neuronal group. Weights of the artificial neural network correspond to the product of the interconnection density between groups, the group size of the presynaptic group, and the postsynaptic potential heights in the synchronous group model. All three of these parameters can modulate connection strengths between neuronal groups in the synchronous group models. We give an example of nonlinear classification (XOR) and a function approximation example in which the capability of the artificial neural network can be captured by a neural network model with biological integrate-and-fire neurons configured as a network of synchronously firing ensembles of such neurons. We point out that the general function approximation capability proven for feedforward artificial neural networks appears to be approximated by networks of neuronal groups that fire in synchrony, where the groups comprise integrate-and-fire neurons. We discuss the advantages of this type of model for biological systems, its possible learning mechanisms, and the associated timing relationships.  相似文献   
40.
Gold JE  Park JS  Punnett L 《Ergonomics》2006,49(1):12-27
Jobs in many modern settings, including manufacturing, service, agriculture and construction, are variable in their content and timing. This prompts the need for exposure assessment methods that do not assume regular work cycles. A scheme is presented for classifying levels of routinization to inform development of an appropriate exposure assessment strategy for a given occupational setting. Five levels of routinization have been defined based on the tasks of which the job is composed: 1) a single scheduled task with a regular work cycle; 2) multiple cyclical tasks; 3) a mix of cyclical and non-cyclical tasks; 4) one non-cyclical task; 5) multiple non-cyclical tasks. This classification, based primarily on job observation, is illustrated through data from a study of automobile manufacturing workers (n = 1200), from which self-assessed exposures to physical and psychosocial stressors were also obtained. In this cohort, decision latitude was greater with higher routinization level (p < 0.0001), and the least routinized jobs showed the lowest self-reported exposure to physical ergonomic stressors. The job analysis checklist developed for non-routinized jobs is presented, and limitations of the task analysis method utilized in the study are discussed. A work sampling approach to job analysis is recommended as the most efficient way to obtain a comparable unbiased exposure estimate across all routinization levels.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号