首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   828篇
  免费   29篇
  国内免费   30篇
电工技术   3篇
综合类   16篇
化学工业   6篇
金属工艺   3篇
机械仪表   8篇
建筑科学   56篇
矿业工程   3篇
能源动力   14篇
轻工业   9篇
水利工程   1篇
石油天然气   2篇
无线电   78篇
一般工业技术   44篇
自动化技术   644篇
  2025年   3篇
  2024年   4篇
  2023年   14篇
  2022年   11篇
  2021年   30篇
  2020年   30篇
  2019年   12篇
  2018年   34篇
  2017年   31篇
  2016年   51篇
  2015年   38篇
  2014年   55篇
  2013年   60篇
  2012年   64篇
  2011年   59篇
  2010年   61篇
  2009年   53篇
  2008年   63篇
  2007年   47篇
  2006年   59篇
  2005年   36篇
  2004年   16篇
  2003年   21篇
  2002年   11篇
  2001年   7篇
  2000年   4篇
  1999年   7篇
  1998年   4篇
  1996年   1篇
  1994年   1篇
排序方式: 共有887条查询结果,搜索用时 15 毫秒
41.
Access control is one of the major security concerns for wireless sensor networks. However, applying conventional access control models that rely on the central Certificate Authority and sophisticated cryptographic algorithms to wireless sensor networks poses new challenges as wireless sensor networks are highly distributed and resource-constrained. In this paper, a distributed and fine-grained access control model based on the trust and centrality degree is proposed (TC-BAC). Our design uses the combination of trust and risk to grant access control. To meet the security requirements of an access control system with the absence of Certificate Authority, a distributed trust mechanism is developed to allow access of a trusted node to a network. Then, centrality degree is used to assess the risk factor of a node and award the access, which can reduce the risk ratio of the access control scheme and provide a certain protection level. Finally, our design also takes multi-domain access control into account and solves this problem by utilizing a mapping mechanism and group access policies. We show with simulation that TC-BAC can achieve both the intended level of security and high efficiency suitable for wireless sensor networks.  相似文献   
42.
以IaaS为切入点,对国内外IaaS发展状况及特点进行梳理,通过对比分析,总结我国包括IaaS在内的公共云服务发展面临的主要问题,提出推动公共云发展的具体建议,并简要介绍国内产业界为此进行的努力。  相似文献   
43.
A thorough understanding of consumer confidence in the safety of food and the factors by which this is influenced is necessary for the development of adequate and effective risk management and communication regarding food safety issues. As food chains become globalized, risk management and communication are increasingly applied at international levels. As a consequence, cross-culturally valid theoretical models are needed to investigate consumer confidence in the safety of food. In this study, consumer confidence in the safety of food in Canada and the Netherlands was systematically compared. On the basis of two nationally representative samples, it was examined to what extent differences in consumer confidence between the two countries resulted from differences in the relative importance of the determinants of confidence, and differences in the means of the constructs. No differences between Canada and the Netherlands were found regarding the relative importance of the determinants, which provides support for the generalizability of the framework. However, results indicated that Dutch consumers had a higher level of optimism and a lower level of pessimism regarding the safety of food, which appeared to be mainly related to Dutch consumers’ lower level of concern about factors related to production. The results also indicated cross-national differences in consumer recall of food safety issues in the media.  相似文献   
44.
Risk allocation decisions are of critical importance in project management. The present study proposes an explanation for how risk allocation in a contract motivates a contractor to cooperate with a project owner. Theories of risk allocation and trust were used to motivate the research. Using a survey methodology, we collected data concerning 124 construction projects in China. We found that risk allocation influenced the contractor’s role behavior through the contractor’s feeling of being trusted but not the contractor’s trust in the owner. Feeling of being trusted partially mediated the effect of risk allocation on the contractor’s in-role (i.e., contractual) behavior and fully mediated the effect on extra-role behavior. The study introduces a social and psychological view of the impacts of risk allocation to the project and engineering management literature. We contribute to theory by arguing and demonstrating the mediating effect of trust on the relationship between risk allocation and contractor behavior. From a practical standpoint, we conclude that contractual risk allocation has a significant impact on building a trusting relationship between owners and contractors and that contractors who feel trusted perform both contractually mandated actions and actions external to the contract more diligently, resulting in the likelihood of improved outcomes for both parties.  相似文献   
45.
为了解决数据稀疏性对推荐算法预测准确度的影响,本文提出了一种融合社交信任的矩阵分解推荐算法.在相关数据集上实验结果表明,预测的平均绝对误差和均方根误差都得到了明显的改善.  相似文献   
46.
随着网络空间对抗形式的日趋严峻,网络空间安全、尤其是网络基础设施安全得到世界各国的普遍重视.网络空问安全呈现出从基于特征“辨伪”向基于身份“识真”的发展趋势.通过对网络空间安全的发展现状、防护需求、防护技术的研究,提出“以信任为基础,网络与安全一体化设计”的设计理念,并给出网络空间安全防护技术体系的架构设计,形成覆盖主机-网络-应用的纵深防护体系.  相似文献   
47.
针对传统协同过滤推荐算法推荐精度较低等问题,提出一种基于贝叶斯后验概率预测和非合作博弈的个性化推荐算法。采用文件主题模型求取用户与其参加过的所有社交活动的主题分布,利用隐含主题概率分布表征用户兴趣度,根据信任传递机制求取用户的直接信任和间接信任,形成用户间的信任度;将用户的兴趣度和信任度等隐式特征赋予合理的先验分布,利用贝叶斯后验概率预测隐式特征后的显式反馈;依据显式反馈将推荐结果转化为非合作博弈中用户效益最大化的纳什均衡求解。仿真对比实验表明,与其他三种推荐算法相比该算法的查准率至少提高了3.13%,查全率至少提高了2.62%。  相似文献   
48.
针对传统的云制造服务可信评价模型中存在的可扩展性弱、难以满足个性化需求等问题,提出一种可扩展性强、可以较好地满足个性化需求的可信评价模型.首先构建多层次的、多粒度的云制造服务可信评价框架;然后基于此框架,提出了基于云模型的云制造服务可信评价方法,在该方法中,引入云模型理论,用于统一表征不同类型的评价指标,以及描述用户的...  相似文献   
49.
给出了基于终端可信的分层可信平台的研究,它是信息安全领域的一个新方向是一个结合平台硬件、安全操作系统、应用系统的完整的平台系统。基于终端可信的分层可信平台从客户终端系统的引导阶段出发构建完整的可信链,保证了可信计算平台的安全性,使信任的传递从用户到用户,进而实现真正的对于用户体验的可信计算。  相似文献   
50.
随着企业应用的需求越来越复杂,在复杂的企业环境下处理基于SOAP消息的安全信息是需要解决的实际问题。具体分析Web服务(Web Service)在企业环境下的安全机制,以及这种方式下如何安全处理SOAP消息。以一个税务部门信息服务平台为例分析了采用安全的Web Service的企业应用集成方案,实践证明此方式可以达到比较好的安全性能要求。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号