全文获取类型
收费全文 | 1701篇 |
免费 | 137篇 |
国内免费 | 3篇 |
专业分类
电工技术 | 48篇 |
综合类 | 2篇 |
化学工业 | 337篇 |
金属工艺 | 20篇 |
机械仪表 | 24篇 |
建筑科学 | 61篇 |
矿业工程 | 2篇 |
能源动力 | 54篇 |
轻工业 | 151篇 |
水利工程 | 10篇 |
石油天然气 | 3篇 |
无线电 | 166篇 |
一般工业技术 | 426篇 |
冶金工业 | 280篇 |
原子能技术 | 11篇 |
自动化技术 | 246篇 |
出版年
2023年 | 35篇 |
2022年 | 37篇 |
2021年 | 76篇 |
2020年 | 56篇 |
2019年 | 56篇 |
2018年 | 54篇 |
2017年 | 37篇 |
2016年 | 75篇 |
2015年 | 67篇 |
2014年 | 66篇 |
2013年 | 109篇 |
2012年 | 138篇 |
2011年 | 175篇 |
2010年 | 121篇 |
2009年 | 81篇 |
2008年 | 106篇 |
2007年 | 102篇 |
2006年 | 77篇 |
2005年 | 54篇 |
2004年 | 46篇 |
2003年 | 37篇 |
2002年 | 30篇 |
2001年 | 20篇 |
2000年 | 16篇 |
1999年 | 12篇 |
1998年 | 23篇 |
1997年 | 23篇 |
1996年 | 16篇 |
1995年 | 16篇 |
1994年 | 5篇 |
1993年 | 8篇 |
1992年 | 4篇 |
1991年 | 3篇 |
1990年 | 2篇 |
1989年 | 3篇 |
1988年 | 2篇 |
1987年 | 4篇 |
1986年 | 4篇 |
1985年 | 5篇 |
1984年 | 2篇 |
1983年 | 4篇 |
1982年 | 2篇 |
1981年 | 2篇 |
1980年 | 2篇 |
1978年 | 4篇 |
1976年 | 5篇 |
1973年 | 3篇 |
1972年 | 6篇 |
1969年 | 2篇 |
1944年 | 1篇 |
排序方式: 共有1841条查询结果,搜索用时 31 毫秒
41.
Privacy policies for shared content in social network sites 总被引:1,自引:0,他引:1
Anna C. Squicciarini Mohamed Shehab Joshua Wede 《The VLDB Journal The International Journal on Very Large Data Bases》2010,19(6):777-796
Social networking is one of the major technological phenomena of the Web 2.0, with hundreds of millions of subscribed users.
Social networks enable a form of self-expression for users and help them to socialize and share content with other users.
In spite of the fact that content sharing represents one of the prominent features of existing Social network sites, they
do not provide any mechanisms for collective management of privacy settings for shared content. In this paper, using game
theory, we model the problem of collective enforcement of privacy policies on shared data. In particular, we propose a solution
that offers automated ways to share images based on an extended notion of content ownership. Building upon the Clarke-Tax
mechanism, we describe a simple mechanism that promotes truthfulness and that rewards users who promote co-ownership. Our
approach enables social network users to compose friendship based policies based on distances from an agreed upon central
user selected using several social networks metrics. We integrate our design with inference techniques that free the users
from the burden of manually selecting privacy preferences for each picture. To the best of our knowledge, this is the first
time such a privacy protection mechanism for social networking has been proposed. We also extend our mechanism so as to support
collective enforcement across multiple social network sites. In the paper, we also show a proof-of-concept application, which
we implemented in the context of Facebook, one of today’s most popular social networks. Through our implementation, we show
the feasibility of such approach and show that it can be implemented with a minimal increase in overhead to end-users. We
complete our analysis by conducting a user study to investigate users’ understanding of co-ownership, usefulness and understanding
of our approach. Users responded favorably to the approach, indicating a general understanding of co-ownership and the auction,
and found the approach to be both useful and fair. 相似文献
42.
43.
Joshua R. Ben-Arie Geoffrey J. Hay Ryan P. Powers Guillermo Castilla Benoît St-Onge 《Computers & Geosciences》2009,35(9):1940-1949
LiDAR canopy height models (CHMs) can exhibit unnatural looking holes or pits, i.e., pixels with a much lower digital number than their immediate neighbors. These artifacts may be caused by a combination of factors, from data acquisition to post-processing, that not only result in a noisy appearance to the CHM but may also limit semi-automated tree-crown delineation and lead to errors in biomass estimates. We present a highly effective semi-automated pit filling algorithm that interactively detects data pits based on a simple user-defined threshold, and then fills them with a value derived from their neighborhood. We briefly describe this algorithm and its graphical user interface, and show its result in a LiDAR CHM populated with data pits. This method can be rapidly applied to any CHM with minimal user interaction. Visualization confirms that our method effectively and quickly removes data pits. 相似文献
44.
We present The Chinese Room , a visualization interface that allows users to explore and interact with a multitude of linguistic resources in order to decode and correct poor machine translations. The target users of The Chinese Room are not bilingual and are not familiar with machine translation technologies. We investigate the ability of our system to assist such users in decoding and correcting faulty machine translations. We found that by collaborating with our application, end-users can overcome many difficult translation errors and disambiguate translated passages that were otherwise baffling. We also examine the utility of our system to machine translation researchers. Anecdotal evidence suggests that The Chinese Room can help such researchers develop better machine translation systems. 相似文献
45.
We define a formal model of dynamic programming algorithms which we call Prioritized Branching Programs (pBP). Our model is
a generalization of the BT model of Alekhnovich et al. (IEEE Conference on Computational Complexity, pp. 308–322, 2005), which is in turn a generalization of the priority algorithms model of Borodin, Nielson and Rackoff. One of the distinguishing
features of these models is that they not only capture large classes of algorithms generally considered to be greedy, backtracking
or dynamic programming algorithms, but they also allow characterizations of their limitations. Hence they give meaning to
the statement that a given problem can or cannot be solved by dynamic programming. After defining the model, we prove three
main results: (i) that certain types of natural restrictions of our seemingly more powerful model can be simulated by the
BT model; (ii) that in general our model is stronger than the BT model—a fact which is witnessed by the classical shortest
paths problem; (iii) that our model has very real limitations, namely that bipartite matching cannot be efficiently computed
in it, hence suggesting that there are problems that can be solved efficiently by network flow algorithms and by simple linear
programming that cannot be solved by natural dynamic programming approaches. 相似文献
46.
New J Kendall W Huang J Chesler E 《IEEE transactions on visualization and computer graphics》2008,14(5):1081-1094
Biologists hope to address grand scientific challenges by exploring the abundance of data made available through modern microarray technology and other high-throughput techniques. The impact of this data, however, is limited unless researchers can effectively assimilate such complex information and integrate it into their daily research; interactive visualization tools are called for to support the effort. Specifically, typical studies of gene co-expression require novel visualization tools that enable the dynamic formulation and fine-tuning of hypotheses to aid the process of evaluating sensitivity of key parameters. These tools should allow biologists to develop an intuitive understanding of the structure of biological networks and discover genes residing in critical positions in networks and pathways. By using a graph as a universal representation of correlation in gene expression, our system employs several techniques that when used in an integrated manner provide innovative analytical capabilities. Our tool for interacting with gene co-expression data integrates techniques such as: graph layout, qualitative subgraph extraction through a novel 2D user interface, quantitative subgraph extraction using graph-theoretic algorithms or by compound queries, dynamic level-of-detail abstraction, and template-based fuzzy classification. We demonstrate our system using a real-world workflow from a large-scale, systems genetics study of mammalian gene co-expression. 相似文献
47.
Joshua M. Epstein 《Computational Economics》2001,18(1):9-24
This paper extends the literature on the evolution of norms with anagent-based modelcapturing a phenomenon that has been essentially ignored, namely thatindividual thought – orcomputing – is often inversely related to the strength of a social norm.Once a norm isentrenched, we conform thoughtlessly. In this model, agents learn how tobehave (what normto adopt), but – under a strategy I term Best Reply to Adaptive SampleEvidence – they also learnhow much to think about how to behave. How much they are thinking affects howthey behave,which – given how others behave – affects how much they think. Inshort, there is feedbackbetween the social (inter-agent) and internal (intra-agent) dynamics. Inaddition, we generate thestylized facts regarding the spatio-temporal evolution of norms: localconformity, global diversity,and punctuated equilibria. 相似文献
48.
Parametric embedding for class visualization 总被引:1,自引:0,他引:1
Iwata T Saito K Ueda N Stromsten S Griffiths TL Tenenbaum JB 《Neural computation》2007,19(9):2536-2556
We propose a new method, parametric embedding (PE), that embeds objects with the class structure into a low-dimensional visualization space. PE takes as input a set of class conditional probabilities for given data points and tries to preserve the structure in an embedding space by minimizing a sum of Kullback-Leibler divergences, under the assumption that samples are generated by a gaussian mixture with equal covariances in the embedding space. PE has many potential uses depending on the source of the input data, providing insight into the classifier's behavior in supervised, semisupervised, and unsupervised settings. The PE algorithm has a computational advantage over conventional embedding methods based on pairwise object relations since its complexity scales with the product of the number of objects and the number of classes. We demonstrate PE by visualizing supervised categorization of Web pages, semisupervised categorization of digits, and the relations of words and latent topics found by an unsupervised algorithm, latent Dirichlet allocation. 相似文献
49.
50.
Martin J 《The Review of scientific instruments》2012,83(6):065101
The Seebeck coefficient is a physical parameter routinely measured to identify the potential thermoelectric performance of a material. However, researchers employ a variety of techniques, conditions, and probe arrangements to measure the Seebeck coefficient, resulting in conflicting materials data. To compare and evaluate these methodologies, and to identify optimal Seebeck coefficient measurement protocols, we have developed an improved experimental apparatus to measure the Seebeck coefficient under multiple conditions and probe arrangements (300 K-1200 K). This paper will describe in detail the apparatus design and instrumentation, including a discussion of its capabilities and accuracy as measured through representative diagnostics. In addition, this paper will emphasize the techniques required to effectively manage uncertainty in high temperature Seebeck coefficient measurements. 相似文献