全文获取类型
收费全文 | 1700篇 |
免费 | 50篇 |
国内免费 | 2篇 |
专业分类
电工技术 | 8篇 |
化学工业 | 294篇 |
金属工艺 | 16篇 |
机械仪表 | 12篇 |
建筑科学 | 87篇 |
矿业工程 | 3篇 |
能源动力 | 24篇 |
轻工业 | 172篇 |
水利工程 | 10篇 |
石油天然气 | 2篇 |
无线电 | 83篇 |
一般工业技术 | 195篇 |
冶金工业 | 662篇 |
原子能技术 | 5篇 |
自动化技术 | 179篇 |
出版年
2022年 | 20篇 |
2021年 | 54篇 |
2020年 | 25篇 |
2019年 | 28篇 |
2018年 | 25篇 |
2017年 | 20篇 |
2016年 | 24篇 |
2015年 | 24篇 |
2014年 | 44篇 |
2013年 | 100篇 |
2012年 | 71篇 |
2011年 | 63篇 |
2010年 | 60篇 |
2009年 | 54篇 |
2008年 | 73篇 |
2007年 | 57篇 |
2006年 | 55篇 |
2005年 | 49篇 |
2004年 | 48篇 |
2003年 | 20篇 |
2002年 | 52篇 |
2001年 | 40篇 |
2000年 | 35篇 |
1999年 | 36篇 |
1998年 | 22篇 |
1997年 | 22篇 |
1996年 | 31篇 |
1995年 | 27篇 |
1994年 | 36篇 |
1993年 | 42篇 |
1992年 | 40篇 |
1991年 | 11篇 |
1990年 | 37篇 |
1989年 | 34篇 |
1988年 | 33篇 |
1987年 | 31篇 |
1986年 | 23篇 |
1985年 | 31篇 |
1984年 | 32篇 |
1983年 | 21篇 |
1982年 | 15篇 |
1981年 | 16篇 |
1980年 | 15篇 |
1979年 | 26篇 |
1978年 | 16篇 |
1977年 | 11篇 |
1976年 | 14篇 |
1975年 | 19篇 |
1973年 | 9篇 |
1972年 | 12篇 |
排序方式: 共有1752条查询结果,搜索用时 46 毫秒
31.
The network function virtualization (NFV) paradigm replaces hardware-dependent network functions by virtual network functions (VNFs) that can be deployed in commodity hardware, including legacy servers. Consequently, the use of NFV is expected to reduce operating and capital expenses, as well as improve service deployment operation and management flexibility. For many use cases, the VNFs must be visited and invoked following a specific order of execution in order to compose a complete network service, named service function chain (SFC). Nonetheless, despite the benefits from NFV and SFC virtualization technologies, their introduction must not harm network performance and service availability. On the one hand, redundancy is seen by network service planners as a mechanism well established to combat availability issues. At same time, there is a goal to optimize resource utilization in order to reduce operational expenditure. In this article, we share our experience in the design use of a framework, named SPIDER, focused on SFC placement that considers the network infrastructure condition and the required SFC availability to define the placement strategy. The SPIDER monitors the status of infrastructure nodes and links and defines which servers the VNFs should be placed on and the number of redundant replicas needed. We present a proof-of-concept of SPIDER using Kubernetes to launch the VNFs as containers. We also use Kubernetes to forward the traffic between the VNFs, composing the service chain. We perform experiments to evaluate the runtime of SPIDER and the SFC delay under different network conditions. 相似文献
32.
Judith Segal 《Computer Supported Cooperative Work (CSCW)》2009,18(5-6):581-606
In earlier work, I identified a particular class of end-user developers, who include scientists and whom I term ‘professional end-user developers’, as being of especial interest. Here, I extend this work by articulating a culture of professional end-user development, and illustrating by means of a field-study how the influence of this culture causes cooperation problems in an inter-disciplinary team developing a software system for a scientific community. My analysis of the field study data is informed by some recent literature on multi-national work cultures. Whilst acknowledging that viewing a scientific development through a lens of software development culture does not give a full picture, I argue that it nonetheless provides deep insights. 相似文献
33.
A Lack of Insight: An Experimental Analysis of R&D Managers’ Decision Making in Innovation Portfolio Management
下载免费PDF全文
![点击此处可从《Creativity & Innovation Management》网站下载免费的PDF全文](/ch/ext_images/free.gif)
Judith Behrens 《Creativity & Innovation Management》2016,25(2):239-250
This study analyses the decision to exploit an innovation project and investigates differences in individuals’ evaluations of project attributes in the context of innovation project portfolio management. A conjoint field experiment was used to collect data on exploitation decisions made by 126 research and development (R&D) managers to test how managers evaluate specific project attributes in the context of innovation project portfolio management. I analyse the relative power and popularity of profitability, strategy, uncertainty and social dimensions of the portfolio while R&D managers exploit an innovation project. Moreover, using social judgement theory, I analyse actual exploitation processes (i.e., the innovation attributes an R&D manager considers while he or she is making an exploitation decision) and self‐reported decision‐making attributes (i.e., managers’ self‐reported data). The data underline that R&D managers value specific project attributes more and others less, and therefore find disparities in innovation project portfolio decision making. Based on this study's results, decision makers are better able to reflect and understand the influence of specific project attributes. Therefore, they should investigate established decision‐making processes which can help them to improve portfolio performance. 相似文献
34.
B2B Procurement and Marketplace Transformation 总被引:2,自引:0,他引:2
Emerging web technologies and systems have started a revolutionary path that will have a profound impact on procurement processes and systems, especially in the area of indirect procurement and the management of operating resources. In fact, what started as more narrowly focused procurement systems only a couple of years ago, has transformed into a web of technologies, markets, and business strategies that have ramifications well beyond the purchasing function. The focus of this paper is on the marketplace structure, functionality and capabilities of systems, and key factors that buyers need to take into consideration when transforming their procurement processes. Contents management, markets, standards, and outsourcing are important problems that are discussed in this paper. 相似文献
35.
Minds and Machines - 相似文献
36.
Judith Rauhofer 《Information & Communications Technology Law》2008,17(3):185-197
The use of information and communications technology and the ‘digitalisation’ of everyday tasks has resulted in a paradigm shift where vast amounts of personal information about individuals, their opinions and habits is generated and stored in the databases of those providing online services. The mere existence of those data pools has created ‘unwholesome’ desires in both private and public organisations which cover that data for their own purposes. This article looks at the way in which the ‘market value’ of privacy seems to be falling as individuals are persuaded to disclose information about themselves in order to minimise real or perceived risks. It examines the way in which our perception of risk has changed in recent years and the way in which that perception may be manipulated. It analyses the link between risk perception, data processing and individual concepts of privacy as well as the dangers that increased privacy intrusion represents for the relationship between the individual and the state and the relationship between citizens. 相似文献
37.
38.
Alan F. Blackwell Kirsten N. Whitley Judith Good Marian Petre 《Artificial Intelligence Review》2001,15(1-2):95-114
Visual programming languages aim to broaden the use ofdiagrams within the software industry, to the extentthat they are integrated into the programming languageitself. As a result, they provide an ideal opportunityto study the benefits of diagrams as an externalrepresentation during problem solving: not only isprogramming a challenging problem-solving activity,but the effect of diagram usage can be directlyassessed by comparing performance while using a visualprogramming language to performance with a standardtextual language. There have been severalmisconceptions amongst visual language researchersregarding the role of diagrams in software design, butthese are being addressed by empirical studies and bynew theories of notation design derived from studiesof visual programming. Based on this research, theauthors are able to recommend several new directionsfor research into thinking with diagrams. 相似文献
39.
Dayhoff JE 《Neural computation》2007,19(9):2433-2467
We demonstrate a model in which synchronously firing ensembles of neurons are networked to produce computational results. Each ensemble is a group of biological integrate-and-fire spiking neurons, with probabilistic interconnections between groups. An analogy is drawn in which each individual processing unit of an artificial neural network corresponds to a neuronal group in a biological model. The activation value of a unit in the artificial neural network corresponds to the fraction of active neurons, synchronously firing, in a biological neuronal group. Weights of the artificial neural network correspond to the product of the interconnection density between groups, the group size of the presynaptic group, and the postsynaptic potential heights in the synchronous group model. All three of these parameters can modulate connection strengths between neuronal groups in the synchronous group models. We give an example of nonlinear classification (XOR) and a function approximation example in which the capability of the artificial neural network can be captured by a neural network model with biological integrate-and-fire neurons configured as a network of synchronously firing ensembles of such neurons. We point out that the general function approximation capability proven for feedforward artificial neural networks appears to be approximated by networks of neuronal groups that fire in synchrony, where the groups comprise integrate-and-fire neurons. We discuss the advantages of this type of model for biological systems, its possible learning mechanisms, and the associated timing relationships. 相似文献
40.
Jobs in many modern settings, including manufacturing, service, agriculture and construction, are variable in their content and timing. This prompts the need for exposure assessment methods that do not assume regular work cycles. A scheme is presented for classifying levels of routinization to inform development of an appropriate exposure assessment strategy for a given occupational setting. Five levels of routinization have been defined based on the tasks of which the job is composed: 1) a single scheduled task with a regular work cycle; 2) multiple cyclical tasks; 3) a mix of cyclical and non-cyclical tasks; 4) one non-cyclical task; 5) multiple non-cyclical tasks. This classification, based primarily on job observation, is illustrated through data from a study of automobile manufacturing workers (n = 1200), from which self-assessed exposures to physical and psychosocial stressors were also obtained. In this cohort, decision latitude was greater with higher routinization level (p < 0.0001), and the least routinized jobs showed the lowest self-reported exposure to physical ergonomic stressors. The job analysis checklist developed for non-routinized jobs is presented, and limitations of the task analysis method utilized in the study are discussed. A work sampling approach to job analysis is recommended as the most efficient way to obtain a comparable unbiased exposure estimate across all routinization levels. 相似文献