首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1024篇
  免费   44篇
  国内免费   2篇
电工技术   10篇
化学工业   193篇
金属工艺   12篇
机械仪表   18篇
建筑科学   50篇
矿业工程   1篇
能源动力   98篇
轻工业   69篇
水利工程   4篇
石油天然气   6篇
无线电   72篇
一般工业技术   197篇
冶金工业   124篇
原子能技术   7篇
自动化技术   209篇
  2023年   13篇
  2022年   16篇
  2021年   47篇
  2020年   33篇
  2019年   24篇
  2018年   25篇
  2017年   36篇
  2016年   16篇
  2015年   27篇
  2014年   42篇
  2013年   56篇
  2012年   45篇
  2011年   54篇
  2010年   38篇
  2009年   47篇
  2008年   37篇
  2007年   35篇
  2006年   33篇
  2005年   18篇
  2004年   26篇
  2003年   24篇
  2002年   18篇
  2001年   12篇
  2000年   11篇
  1999年   19篇
  1998年   30篇
  1997年   26篇
  1996年   12篇
  1995年   16篇
  1994年   29篇
  1993年   7篇
  1992年   8篇
  1991年   9篇
  1990年   8篇
  1989年   8篇
  1988年   11篇
  1987年   5篇
  1985年   17篇
  1984年   11篇
  1983年   13篇
  1982年   7篇
  1981年   11篇
  1980年   13篇
  1979年   12篇
  1978年   13篇
  1977年   8篇
  1976年   13篇
  1975年   6篇
  1974年   7篇
  1973年   5篇
排序方式: 共有1070条查询结果,搜索用时 15 毫秒
81.
This paper explains the evolution of the concept of delegation since its first references in the context of distributed authorization to the actual use as a fundamental part of a privilege management architecture. The work reviews some of the earliest contributions that pointed out the relevance of delegation when dealing with distributed authorization, in particular we comment on PolicyMaker and KeyNote, and also on SDSI/SPKI. Then, we elaborate on Federation as a particular case of delegation, and remark the importance given to Federation by the industry. Finally, the paper discusses about Privilege Management Infrastructures, introducing a new mechanism to extend their functionality using advanced delegation services.  相似文献   
82.
This research project was designed to investigate cultural and cognitive issues related to the work of nuclear power plant operators during their time on the job in the control room and during simulator training (emergency situations), in order to show how these issues impact on plant safety. The modeling of the operators work deals with the use of operational procedures, the constant changes in the focus of attention and the dynamics of the conflicting activities. The paper focuses on the relationships between the courses of action of the different operators and the constraints imposed by their working environment. It shows that the safety implications of the control room operators' cognitive and cultural issues go far beyond the formal organizational constructs usually implied. Our findings indicate that the competence required for the operators are concerned with developing the possibility of constructing situation awareness, managing conflicts, gaps and time problems created by ongoing task procedures, and dealing with distractions, developing skills for collaborative work.  相似文献   
83.
84.
As humans, we have innate faculties that allow us to efficiently segment groups of objects. Computers, to some degree, can be programmed with similar categorical capabilities, which stem from exploratory data analysis. Out of the various subsets of data reasoning, clustering provides insight into the structure and relationships of input samples situated in a number of distributions. To determine these relationships, many clustering methods rely on one or more human inputs; the most important being the number of distributions, c, to seek. This work investigates a technique for estimating the number of clusters from a general type of data called relational data. Several numerical examples are presented to illustrate the effectiveness of the proposed method.  相似文献   
85.
86.
We have analyzed a large set of data in the literature as well as new data of our own to provide an improved equation of state of solid para-hydrogen and ortho-deuterium, with pressures ranging from 0 to 25 kbar (at the melting line). Results, including pressure, bulk modulus, and thermal expansion, are tabulated for a dense set of molar volumes as a function of temperature.Partial financial support provided by the Stichting FOM.  相似文献   
87.
Computational trust and reputation models have been recognized as one of the key technologies required to design and implement agent systems. These models manage and aggregate the information needed by agents to efficiently perform partner selection in uncertain situations. For simple applications, a game theoretical approach similar to that used in most models can suffice. However, if we want to undertake problems found in socially complex virtual societies, we need more sophisticated trust and reputation systems. In this context, reputation-based decisions that agents make take on special relevance and can be as important as the reputation model itself. In this paper, we propose a possible integration of a cognitive reputation model, Repage, into a cognitive BDI agent. First, we specify a belief logic capable to capture the semantics of Repage information, which encodes probabilities. This logic is defined by means of a two first-order languages hierarchy, allowing the specification of axioms as first-order theories. The belief logic integrates the information coming from Repage in terms if image and reputation, and combines them, defining a typology of agents depending of such combination. We use this logic to build a complete graded BDI model specified as a multi-context system where beliefs, desires, intentions and plans interact among each other to perform a BDI reasoning. We conclude the paper with an example and a related work section that compares our approach with current state-of-the-art models.  相似文献   
88.
In a previous paper we generated animated agents and their behavior using a combination of XML and images. The behavior of agents was specified as a finite state machine (FSM) in XML. We used images to determine properties of the world that agents react to. While this approach is very flexible, it can be made much faster by using the power available in modern GPUs. In this paper we implement FSMs as fragment shaders using three kinds of images: world space images, agent space images and FSM table images. We show a simple example and compare performance of CPU and GPU implementations. Then we examine a more complex example involving more maps and two types of agents (predator–prey). Furthermore we explore how to render agents in 3D more efficiently by using a variation on pseudoinstancing.  相似文献   
89.
To date, information systems (IS) research mainly has provided a monolithic view of information technology (IT) use, considering it to be a desired behaviour with positive outcomes. However, given the dramatic increase in the use of technology during the last few years, susceptibility to IT addiction is increasingly becoming an important issue for technology users and IS researchers. In this paper, we report the results of a study that focuses on identifying variations in user liability to IT addiction, which reflects the susceptibility of individual users to develop IT addiction. First, a review of the literature in different disciplines (e.g. health, psychology and IS) allows us to better understand the concepts of IT addiction and liability to addiction. The literature review also provides an overview of the antecedents and consequences associated with IT addiction. Then, building on the analysis of 15 in‐depth interviews and 182 exploratory open‐ended surveys collected from smartphone users, we apply the concept of liability to addiction in the IT use context and propose a typological theory of user liability to IT addiction. Our typology reveals five ideal types; each can be associated to a user profile (addict, fanatic, highly engaged, regular and thoughtful ). Building upon both the extant literature and our results, we put forth propositions to extend the theoretical contributions of the study. We finally discuss the contributions and implications of our paper for research and practice.  相似文献   
90.
Knowledge organization systems (KOS) can use different types of hierarchical relations: broader generic (BTG), broader partitive (BTP), and broader instantial (BTI). The latest ISO standard on thesauri (ISO 25964) has formalized these relations in a corresponding OWL ontology (De Smedt et al., ISO 25964 part 1: thesauri for information retrieval: RDF/OWL vocabulary, extension of SKOS and SKOS-XL. http://purl.org/iso25964/skos-thes, 2013) and expressed them as properties: broaderGeneric, broaderPartitive, and broaderInstantial, respectively. These relations are used in actual thesaurus data. The compositionality of these types of hierarchical relations has not been investigated systematically yet. They all contribute to the general broader (BT) thesaurus relation and its transitive generalization broader transitive defined in the SKOS model for representing KOS. But specialized relationship types cannot be arbitrarily combined to produce new statements that have the same semantic precision, leading to cases where inference of broader transitive relationships may be misleading. We define Extended properties (BTGE, BTPE, BTIE) and analyze which compositions of the original “one-step” properties and the Extended properties are appropriate. This enables providing the new properties with valuable semantics usable, e.g., for fine-grained information retrieval purposes. In addition, we relax some of the constraints assigned to the ISO properties, namely the fact that hierarchical relationships apply to SKOS concepts only. This allows us to apply them to the Getty Art and Architecture Thesaurus (AAT), where they are also used for non-concepts (facets, hierarchy names, guide terms). In this paper, we present extensive examples derived from the recent publication of AAT as linked open data.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号