全文获取类型
收费全文 | 823篇 |
免费 | 22篇 |
国内免费 | 30篇 |
专业分类
电工技术 | 3篇 |
综合类 | 16篇 |
化学工业 | 6篇 |
金属工艺 | 3篇 |
机械仪表 | 8篇 |
建筑科学 | 51篇 |
矿业工程 | 3篇 |
能源动力 | 14篇 |
轻工业 | 9篇 |
水利工程 | 1篇 |
石油天然气 | 2篇 |
无线电 | 77篇 |
一般工业技术 | 44篇 |
自动化技术 | 638篇 |
出版年
2024年 | 4篇 |
2023年 | 14篇 |
2022年 | 11篇 |
2021年 | 30篇 |
2020年 | 28篇 |
2019年 | 12篇 |
2018年 | 29篇 |
2017年 | 31篇 |
2016年 | 49篇 |
2015年 | 38篇 |
2014年 | 55篇 |
2013年 | 60篇 |
2012年 | 64篇 |
2011年 | 59篇 |
2010年 | 61篇 |
2009年 | 53篇 |
2008年 | 63篇 |
2007年 | 47篇 |
2006年 | 59篇 |
2005年 | 36篇 |
2004年 | 16篇 |
2003年 | 21篇 |
2002年 | 11篇 |
2001年 | 7篇 |
2000年 | 4篇 |
1999年 | 7篇 |
1998年 | 4篇 |
1996年 | 1篇 |
1994年 | 1篇 |
排序方式: 共有875条查询结果,搜索用时 15 毫秒
101.
推荐系统在解决信息过载方面已经取得了很大的成功,同时也存在数据稀疏、冷启动等问题。如何在评分数据稀疏的情况下获得满意的推荐成为推荐系统亟待解决的问题。将信任引入推荐系统成为解决上述问题的有效方法之一。已有的信任感知推荐系统大多基于布尔型信任关系,且没有考虑信任的领域相关性。在服务选择领域,服务请求者依据QoS(quality of service)选择服务。联想到在服务推荐领域推荐请求者可以依据推荐质量(quality of recommendation,QoR)选择推荐用户,提出了推荐质量(QoR)的概念和基于推荐质量的信任感知推荐系统。QoR的属性包含评价相似度、领域信任值、领域相关度和亲密程度,利用信息熵方法可确定各属性的权重。仿真表明该方法提高了推荐系统在数据稀疏情况下的精确度和评分覆盖率,有效提高了冷启动用户的召回率,在一定程度上解决了冷启动问题。 相似文献
102.
基于可信计算平台的信任链传递研究进展 总被引:7,自引:0,他引:7
信任链传递问题是可信计算的基本问题.阐述了信任链传递在技术与理论方面的最新研究进展.通过分析信任链传递的技术方案、可信测量技术、信任链理论和信任链的可信度度量理论,提出了值得研究的理论与技术方向,包括:以可信静态测量、可信动态测量技术等为代表的信任链传递关键技术,以信任链层次理论模型、信任链传递中的信任损失度量理论和软件的动态可信度度量理论等为代表的基础理论. 相似文献
103.
104.
Jiangtao Li Ninghui Li XiaoFeng Wang Ting Yu 《International Journal of Information Security》2009,8(2):89-101
Trust management is an approach to scalable and flexible access control in decentralized systems. In trust management, a server
often needs to evaluate a chain of credentials submitted by a client; this requires the server to perform multiple expensive
digital signature verifications. In this paper, we study low-bandwidth Denial-of-Service (DoS) attacks that exploit the existence
of trust management systems to deplete server resources. Although the threat of DoS attacks has been studied for some application-level
protocols such as authentication protocols, we show that it is especially destructive for trust management systems. Exploiting
the delegation feature in trust management languages, an attacker can forge a long credential chain to force a server to consume
a large amount of computing resource. Using game theory as an analytic tool, we demonstrate that unprotected trust management
servers will easily fall prey to a witty attacker who moves smartly. We report our empirical study of existing trust management
systems, which manifests the gravity of this threat. We also propose a defense technique using credential caching, and show
that it is effective in the presence of intelligent attackers.
A preliminary version of this paper was presented at the Second IEEE International Conference on Security and Privacy in Communication
Networks, Baltimore, MD, USA, August 2006. 相似文献
105.
“模糊、自治”的云计算环境中,服务品类繁多、质量参差不齐,用户主体难以进行可信赖的服务选择。在用户交互经验的基础上,结合现实人际交易模式,提出了一种基于协同推荐的综合信任量化评估模型。模型引入了时间衰减、权重两类动态因子,设计了多元化混合协同推荐算法来实现用户之间的有效协作,帮助用户正确选择可信云服务。为了验证模型的可行性,设计出一个分布式的原型系统,对模型的用户满意度和服务选择质量进行仿真实验。仿真结果表明,该模型能够更快地提高平均服务满意度,更有效地抑制恶意服务,而且随着交互次数的增长,服务选择质量也会不断提高。 相似文献
106.
In the Internet of Things (IoT), a huge amount of valuable data is generated by various IoT applications. As the IoT technologies become more complex, the attack methods are more diversified and can cause serious damages. Thus, establishing a secure IoT network based on user trust evaluation to defend against security threats and ensure the reliability of data source of collected data have become urgent issues, in this paper, a Data Fusion and transfer learning empowered granular Trust Evaluation mechanism (DFTE) is proposed to address the above challenges. Specifically, to meet the granularity demands of trust evaluation, time–space empowered fine/coarse grained trust evaluation models are built utilizing deep transfer learning algorithms based on data fusion. Moreover, to prevent privacy leakage and task sabotage, a dynamic reward and punishment mechanism is developed to encourage honest users by dynamically adjusting the scale of reward or punishment and accurately evaluating users’ trusts. The extensive experiments show that: (i) the proposed DFTE achieves high accuracy of trust evaluation under different granular demands through efficient data fusion; (ii) DFTE performs excellently in participation rate and data reliability. 相似文献
107.
108.
This paper presents findings on the use of Web sites as a political marketing tool in the context of the 2007 Greek national elections. The questions guiding this research are how popular were online campaigns in terms of candidate use of Web sites and which trust and credibility-building Web site design cues were leveraged by candidates. This study also explored differences in online campaign practices both between Greek political parties and between the 2007 national Greek elections and the 2002 federal US elections. 相似文献
109.
A trust degree based access control in grid environments 总被引:1,自引:0,他引:1
The purpose of grid computing is to enable coordinated resource sharing and support cooperative work between different domains in dynamic grid environments. In order to protect each participant’s privilege and security, a secure and efficient access control is essential. This paper presents a new approach of access mechanism based on trust relationships across domains. A new calculation method of trust in grid is proposed and the difference between intro-domain trust and inter-domain trust is analyzed. In addition, a novel access control framework combined with trust degree is given from this proposal. It is shown to be adaptive for both intro-domain and inter-domain conditions. Hence, a prototype system based on the proposed model is introduced; furthermore, it has been shown as a dynamic and fine-granularity access control method through performance analyses and has also been demonstrated as a suitable system for grid environments. 相似文献
110.
鉴于传统网络安全策略无法阻止或识别传感器网络内部节点的攻击或异常行为,结合节点资源受限的特点,提出了一种无线传感器网络节点信任度计算模型.该模型采用Bayes估计方法,通过求解基于Beta分布的节点行为信誉函数的期望值得到直接信任并将其作为Bayes估计的先验信息,将来自邻居节点的推荐信息作为其样本信息.仿真实验表明,本方案有较好的稳定性,能够有效识别异常节点,从而阻止内部节点对网络的攻击,与RFSN相比,不仅节约了存储空间、运算时间与通信量,而且能够避免恶评现象对节点信任度计算的影响. 相似文献