首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1701篇
  免费   137篇
  国内免费   3篇
电工技术   48篇
综合类   2篇
化学工业   337篇
金属工艺   20篇
机械仪表   24篇
建筑科学   61篇
矿业工程   2篇
能源动力   54篇
轻工业   151篇
水利工程   10篇
石油天然气   3篇
无线电   166篇
一般工业技术   426篇
冶金工业   280篇
原子能技术   11篇
自动化技术   246篇
  2023年   35篇
  2022年   37篇
  2021年   76篇
  2020年   56篇
  2019年   56篇
  2018年   54篇
  2017年   37篇
  2016年   75篇
  2015年   67篇
  2014年   66篇
  2013年   109篇
  2012年   138篇
  2011年   175篇
  2010年   121篇
  2009年   81篇
  2008年   106篇
  2007年   102篇
  2006年   77篇
  2005年   54篇
  2004年   46篇
  2003年   37篇
  2002年   30篇
  2001年   20篇
  2000年   16篇
  1999年   12篇
  1998年   23篇
  1997年   23篇
  1996年   16篇
  1995年   16篇
  1994年   5篇
  1993年   8篇
  1992年   4篇
  1991年   3篇
  1990年   2篇
  1989年   3篇
  1988年   2篇
  1987年   4篇
  1986年   4篇
  1985年   5篇
  1984年   2篇
  1983年   4篇
  1982年   2篇
  1981年   2篇
  1980年   2篇
  1978年   4篇
  1976年   5篇
  1973年   3篇
  1972年   6篇
  1969年   2篇
  1944年   1篇
排序方式: 共有1841条查询结果,搜索用时 31 毫秒
41.
Privacy policies for shared content in social network sites   总被引:1,自引:0,他引:1  
Social networking is one of the major technological phenomena of the Web 2.0, with hundreds of millions of subscribed users. Social networks enable a form of self-expression for users and help them to socialize and share content with other users. In spite of the fact that content sharing represents one of the prominent features of existing Social network sites, they do not provide any mechanisms for collective management of privacy settings for shared content. In this paper, using game theory, we model the problem of collective enforcement of privacy policies on shared data. In particular, we propose a solution that offers automated ways to share images based on an extended notion of content ownership. Building upon the Clarke-Tax mechanism, we describe a simple mechanism that promotes truthfulness and that rewards users who promote co-ownership. Our approach enables social network users to compose friendship based policies based on distances from an agreed upon central user selected using several social networks metrics. We integrate our design with inference techniques that free the users from the burden of manually selecting privacy preferences for each picture. To the best of our knowledge, this is the first time such a privacy protection mechanism for social networking has been proposed. We also extend our mechanism so as to support collective enforcement across multiple social network sites. In the paper, we also show a proof-of-concept application, which we implemented in the context of Facebook, one of today’s most popular social networks. Through our implementation, we show the feasibility of such approach and show that it can be implemented with a minimal increase in overhead to end-users. We complete our analysis by conducting a user study to investigate users’ understanding of co-ownership, usefulness and understanding of our approach. Users responded favorably to the approach, indicating a general understanding of co-ownership and the auction, and found the approach to be both useful and fair.  相似文献   
42.
43.
Development of a pit filling algorithm for LiDAR canopy height models   总被引:1,自引:0,他引:1  
LiDAR canopy height models (CHMs) can exhibit unnatural looking holes or pits, i.e., pixels with a much lower digital number than their immediate neighbors. These artifacts may be caused by a combination of factors, from data acquisition to post-processing, that not only result in a noisy appearance to the CHM but may also limit semi-automated tree-crown delineation and lead to errors in biomass estimates. We present a highly effective semi-automated pit filling algorithm that interactively detects data pits based on a simple user-defined threshold, and then fills them with a value derived from their neighborhood. We briefly describe this algorithm and its graphical user interface, and show its result in a LiDAR CHM populated with data pits. This method can be rapidly applied to any CHM with minimal user interaction. Visualization confirms that our method effectively and quickly removes data pits.  相似文献   
44.
We present The Chinese Room , a visualization interface that allows users to explore and interact with a multitude of linguistic resources in order to decode and correct poor machine translations. The target users of The Chinese Room are not bilingual and are not familiar with machine translation technologies. We investigate the ability of our system to assist such users in decoding and correcting faulty machine translations. We found that by collaborating with our application, end-users can overcome many difficult translation errors and disambiguate translated passages that were otherwise baffling. We also examine the utility of our system to machine translation researchers. Anecdotal evidence suggests that The Chinese Room can help such researchers develop better machine translation systems.  相似文献   
45.
We define a formal model of dynamic programming algorithms which we call Prioritized Branching Programs (pBP). Our model is a generalization of the BT model of Alekhnovich et al. (IEEE Conference on Computational Complexity, pp. 308–322, 2005), which is in turn a generalization of the priority algorithms model of Borodin, Nielson and Rackoff. One of the distinguishing features of these models is that they not only capture large classes of algorithms generally considered to be greedy, backtracking or dynamic programming algorithms, but they also allow characterizations of their limitations. Hence they give meaning to the statement that a given problem can or cannot be solved by dynamic programming. After defining the model, we prove three main results: (i) that certain types of natural restrictions of our seemingly more powerful model can be simulated by the BT model; (ii) that in general our model is stronger than the BT model—a fact which is witnessed by the classical shortest paths problem; (iii) that our model has very real limitations, namely that bipartite matching cannot be efficiently computed in it, hence suggesting that there are problems that can be solved efficiently by network flow algorithms and by simple linear programming that cannot be solved by natural dynamic programming approaches.  相似文献   
46.
Biologists hope to address grand scientific challenges by exploring the abundance of data made available through modern microarray technology and other high-throughput techniques. The impact of this data, however, is limited unless researchers can effectively assimilate such complex information and integrate it into their daily research; interactive visualization tools are called for to support the effort. Specifically, typical studies of gene co-expression require novel visualization tools that enable the dynamic formulation and fine-tuning of hypotheses to aid the process of evaluating sensitivity of key parameters. These tools should allow biologists to develop an intuitive understanding of the structure of biological networks and discover genes residing in critical positions in networks and pathways. By using a graph as a universal representation of correlation in gene expression, our system employs several techniques that when used in an integrated manner provide innovative analytical capabilities. Our tool for interacting with gene co-expression data integrates techniques such as: graph layout, qualitative subgraph extraction through a novel 2D user interface, quantitative subgraph extraction using graph-theoretic algorithms or by compound queries, dynamic level-of-detail abstraction, and template-based fuzzy classification. We demonstrate our system using a real-world workflow from a large-scale, systems genetics study of mammalian gene co-expression.  相似文献   
47.
Learning to Be Thoughtless: Social Norms and Individual Computation   总被引:2,自引:0,他引:2  
This paper extends the literature on the evolution of norms with anagent-based modelcapturing a phenomenon that has been essentially ignored, namely thatindividual thought – orcomputing – is often inversely related to the strength of a social norm.Once a norm isentrenched, we conform thoughtlessly. In this model, agents learn how tobehave (what normto adopt), but – under a strategy I term Best Reply to Adaptive SampleEvidence – they also learnhow much to think about how to behave. How much they are thinking affects howthey behave,which – given how others behave – affects how much they think. Inshort, there is feedbackbetween the social (inter-agent) and internal (intra-agent) dynamics. Inaddition, we generate thestylized facts regarding the spatio-temporal evolution of norms: localconformity, global diversity,and punctuated equilibria.  相似文献   
48.
Parametric embedding for class visualization   总被引:1,自引:0,他引:1  
We propose a new method, parametric embedding (PE), that embeds objects with the class structure into a low-dimensional visualization space. PE takes as input a set of class conditional probabilities for given data points and tries to preserve the structure in an embedding space by minimizing a sum of Kullback-Leibler divergences, under the assumption that samples are generated by a gaussian mixture with equal covariances in the embedding space. PE has many potential uses depending on the source of the input data, providing insight into the classifier's behavior in supervised, semisupervised, and unsupervised settings. The PE algorithm has a computational advantage over conventional embedding methods based on pairwise object relations since its complexity scales with the product of the number of objects and the number of classes. We demonstrate PE by visualizing supervised categorization of Web pages, semisupervised categorization of digits, and the relations of words and latent topics found by an unsupervised algorithm, latent Dirichlet allocation.  相似文献   
49.
50.
The Seebeck coefficient is a physical parameter routinely measured to identify the potential thermoelectric performance of a material. However, researchers employ a variety of techniques, conditions, and probe arrangements to measure the Seebeck coefficient, resulting in conflicting materials data. To compare and evaluate these methodologies, and to identify optimal Seebeck coefficient measurement protocols, we have developed an improved experimental apparatus to measure the Seebeck coefficient under multiple conditions and probe arrangements (300 K-1200 K). This paper will describe in detail the apparatus design and instrumentation, including a discussion of its capabilities and accuracy as measured through representative diagnostics. In addition, this paper will emphasize the techniques required to effectively manage uncertainty in high temperature Seebeck coefficient measurements.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号