全文获取类型
收费全文 | 823篇 |
免费 | 22篇 |
国内免费 | 30篇 |
专业分类
电工技术 | 3篇 |
综合类 | 16篇 |
化学工业 | 6篇 |
金属工艺 | 3篇 |
机械仪表 | 8篇 |
建筑科学 | 51篇 |
矿业工程 | 3篇 |
能源动力 | 14篇 |
轻工业 | 9篇 |
水利工程 | 1篇 |
石油天然气 | 2篇 |
无线电 | 77篇 |
一般工业技术 | 44篇 |
自动化技术 | 638篇 |
出版年
2024年 | 4篇 |
2023年 | 14篇 |
2022年 | 11篇 |
2021年 | 30篇 |
2020年 | 28篇 |
2019年 | 12篇 |
2018年 | 29篇 |
2017年 | 31篇 |
2016年 | 49篇 |
2015年 | 38篇 |
2014年 | 55篇 |
2013年 | 60篇 |
2012年 | 64篇 |
2011年 | 59篇 |
2010年 | 61篇 |
2009年 | 53篇 |
2008年 | 63篇 |
2007年 | 47篇 |
2006年 | 59篇 |
2005年 | 36篇 |
2004年 | 16篇 |
2003年 | 21篇 |
2002年 | 11篇 |
2001年 | 7篇 |
2000年 | 4篇 |
1999年 | 7篇 |
1998年 | 4篇 |
1996年 | 1篇 |
1994年 | 1篇 |
排序方式: 共有875条查询结果,搜索用时 15 毫秒
51.
分布式信任模型直接信任的模糊计算方法 总被引:1,自引:0,他引:1
在电子商务、数据通信和网络安全等应用系统中,信任模型是不可缺少的基本机制。但是对于Ad—hoe网络,Peer-to—Peer网络等分布式系统,由于不存在集中专用的服务器,传统的信任模型无法被采用。本文分析了保证分布式信任模型有效性的关键因素,提出了一种新的直接信任模糊计算方法,仿真数据表明,新方法比传统方法更准确。 相似文献
52.
AbstractDevelopment of semantic web and social network is undeniable in the Internet world these days. Widespread nature of semantic web has been very challenging to assess the trust in this field. In recent years, extensive researches have been done to estimate the trust of semantic web. Since trust of semantic web is a multidimensional problem, in this paper, we used parameters of social network authority, the value of pages links authority and semantic authority to assess the trust. Due to the large space of semantic network, we considered the problem scope to the clusters of semantic subnetworks and obtained the trust of each cluster elements as local and calculated the trust of outside resources according to their local trusts and trust of clusters to each other. According to the experimental result, the proposed method shows more than 79% Fscore that is about 11.9% in average more than Eigen, Tidal and centralised trust methods. Mean of error in this proposed method is 12.936, that is 9.75% in average less than Eigen and Tidal trust methods. 相似文献
53.
The postmortem examination of failed IT projects reveals that long before the failure there were significant symptoms or “early warning signs.” This article describes the top 12 people- related and project-related IT project risks, based on “early warning sign” data collected from a panel of 19 experts and a survey of 55 IT project managers. 相似文献
54.
A trust negotiation system for digital library Web services 总被引:1,自引:0,他引:1
Halvard?SkogsrudEmail author Boualem?Benatallah Fabio?Casati 《International Journal on Digital Libraries》2004,4(3):185-207
A scalable approach to trust negotiation is required in digital library (DL) environments that have large and dynamic user populations. In this paper we introduce Trust-Serv, a model-driven trust negotiation framework for Web services, and show how it can be used to effectively handle trust negotiation in DLs. The framework employs a model for trust negotiation based on state machines, extended with security abstractions. High-level specifications expressed with the state-machine-based model are then translated into formats suitable for automating the trust negotiation process. The proposed framework also supports negotiation policy lifecycle management, an important trait in the dynamic environments that characterize DLs. In particular, we present a set of policy change operations that enable the dynamic evolution of negotiation policies without disrupting ongoing negotiations. The proposed approach has been implemented as a container-centric mechanism that is transparent to the DL and to the developers of DL Web services, simplifying DL development and management as well as enabling scalable deployments. 相似文献
55.
Web服务安全问题研究 总被引:1,自引:2,他引:1
Web服务具有平台无关性、动态性、开放性和松散耦合等特征,这给基于异构平台的应用集成带来极大便利,同时也使其自身面临许多独特的安全问题.Web服务的安全性对其发展前景产生重要的影响,也是目前Web服务并没有进入大规模应用阶段的主要原因之一.总结了Web服务存在的主要安全问题;概述了已有的Web服务安全标准;然后从消息层安全、Web服务安全策略、Web服务组合安全、身份与信任管理、Web服务访问控制、Web服务攻击与防御、安全Web服务开发等方面详细分析了目前有代表性的Web服务关键安全技术解决方案;结合已有的研究成果,讨论了Web服务安全未来的研究动向及面临的挑战. 相似文献
56.
Wei Sha 《Electronic Markets》2009,19(1):43-54
This study examines the effects of different types of structural assurance mechanisms on trusting intention in business-to-consumer
electronic commerce. Inconsistent results from prior research on structural assurance motivated the current study to further
explore the nature of structural assurance. Based on the Institution-based Trust Theory, this paper proposes that different
types of structural assurance mechanisms, specifically: seals of approval, vendor-specific guarantees, protections from credit
card companies and transaction protections, may have their unique effects on trusting intentions. The results indicate that
customer perceptions about seals of approval and vendor-specific guarantees can significantly influence trusting intentions
while perceptions about protections from credit card companies, legal systems and technology infrastructures do not. 相似文献
57.
As mobile technology has developed, mobile banking has become accepted as part of daily life. Although many studies have been conducted to assess users’ satisfaction with mobile applications, none has focused on the ways in which the three quality factors associated with mobile banking – system quality, information quality and interface design quality – affect consumers’ trust and satisfaction. Our proposed research model, based on DeLone and McLean’s model, assesses how these three external quality factors can impact satisfaction and trust. We collected 276 valid questionnaires from mobile banking customers, then analyzed them using structural equation modeling. Our results show that system quality and information quality significantly influence customers’ trust and satisfaction, and that interface design quality does not. We present herein implications and suggestions for further research. 相似文献
58.
《Journal of Visual Languages and Computing》2014,25(6):850-857
New trust, reputation and recommendation (TRR) models are continuously proposed. However, the existing models lack shared bases and goals. For this reason, in this work we define an innovative meta model to facilitate the definition and standardization of a generic TRR model. Following the meta model, researchers in the field will be able to define standard models, compare them with other models and reuse parts of them. A standardization is also needed to determine which properties should be present in a TRR model.In accordance with the objectives we were seeking, following our meta model, we have defined a pre-standardized TRR model for e-commerce, identified the fundamental concepts and the main features that contribute to form trust and reputation in that domain, respected the dependence on the context/role of trust and reputation, aggregated only homogeneous trust information; listed and shown how to defend from the main malicious attacks. 相似文献
59.
信任已成为网格安全的重要因素.信任一般具有模糊性,网格信任的模糊性是随时间和空间变化而变化的.本文基于动态和复杂的VOs信任域环境来研究解决网格系统的安全问题,设计了网格信任管理模式的安全体系结构,并提出了基于模糊逻辑的动态信任域作为安全的实施方案,以保证网格系统环境的安全性. 相似文献
60.
《Expert systems with applications》2014,41(6):3091-3104
The viability of networked communities depends on the creation and disclosure of user-generated content and the frequency of user visitation (Facebook 10-K Annual Report, 2012). However, little is known about how to align the interests of user and social networking sites. In this study, we draw upon the principal-agent perspective to extend Pavlou et al.’s uncertainty mitigation model of online exchange relationships (2007) and propose an empirically tested model for aligning the incentives of the principal (user) and the agent (service provider). As suggested by Pavlou et al., we incorporated a multi-dimensional measure of trust: trust of provider and trust of members. The proposed model is empirically tested with survey data from 305 adults aged 20-55. The results support our model, delineating how real individuals with bounded rationality actually make decision about information disclosure under uncertainty in the social networking site context. There is show little to no relationship between online privacy concerns and information disclosure on online social network sites. Perceived benefits provide the linkage between the incentives of principal (user) and agent (provider) while usage intensity demonstrated the most significant impact on information disclosure. We argue that the phenomenon may be explained through Communication Privacy Management Theory. The present study enhances our understanding of agency theory and human judgment theory in the context of social media. Practical implications for understanding and facilitating online social exchange relationships are also discussed. 相似文献