全文获取类型
收费全文 | 707篇 |
免费 | 77篇 |
国内免费 | 34篇 |
专业分类
综合类 | 8篇 |
化学工业 | 1篇 |
机械仪表 | 1篇 |
建筑科学 | 24篇 |
轻工业 | 2篇 |
无线电 | 193篇 |
一般工业技术 | 25篇 |
冶金工业 | 4篇 |
自动化技术 | 560篇 |
出版年
2025年 | 20篇 |
2024年 | 29篇 |
2023年 | 31篇 |
2022年 | 30篇 |
2021年 | 42篇 |
2020年 | 36篇 |
2019年 | 23篇 |
2018年 | 34篇 |
2017年 | 44篇 |
2016年 | 49篇 |
2015年 | 26篇 |
2014年 | 53篇 |
2013年 | 58篇 |
2012年 | 33篇 |
2011年 | 60篇 |
2010年 | 26篇 |
2009年 | 43篇 |
2008年 | 35篇 |
2007年 | 35篇 |
2006年 | 32篇 |
2005年 | 17篇 |
2004年 | 14篇 |
2003年 | 6篇 |
2002年 | 9篇 |
2001年 | 4篇 |
2000年 | 8篇 |
1999年 | 2篇 |
1998年 | 1篇 |
1997年 | 2篇 |
1996年 | 1篇 |
1995年 | 1篇 |
1994年 | 2篇 |
1992年 | 1篇 |
1989年 | 2篇 |
1988年 | 1篇 |
1986年 | 1篇 |
1984年 | 1篇 |
1983年 | 1篇 |
1982年 | 2篇 |
1981年 | 2篇 |
1979年 | 1篇 |
排序方式: 共有818条查询结果,搜索用时 0 毫秒
201.
Privacy is an ancient concept, but its interpretation and application in the area of e-commerce are still new. It is increasingly
widely accepted, however, that by giving precedence to consumer privacy bigger benefits can be reaped by all parties involved.
There has been much investigation into the concept of privacy, legal frameworks for protecting this most impalpable of human
values and, more recently, computing technologies that help preserve an individual’s privacy in today’s environment. In this
paper we review the historical development of this fundamental concept, discussing how advancements both in society and in
technology have challenged the right to privacy, and we survey the existing computing technologies that promote consumer privacy
in e-commerce. Our study shows that historically the protection of privacy has been driven primarily both by our understanding
of privacy and by the advancement of technology, analyses the limitations of privacy protections for current e-commerce applications,
and identifies directions for the future development of successful privacy enhancing technologies. 相似文献
202.
Most research on privacy management within the context of social network sites (SNSs) treats users as individual owners of private information. Privacy, however, is beyond individual control and is also managed on a group level. This study applies the Communication Privacy Management theory (CPM) to explore the individual and group privacy management strategies in Facebook. We present a survey completed by 900 members of a youth organization regarding their online behaviors and membership. We found that women are more likely to employ individual privacy management strategies, while men are more likely to employ group privacy management strategies. For group privacy management, we found common bond and the role an individual is attributed within the youth organization to be the strongest predictors. The results generated from this study are a first but important step to illustrate the differences and similarities between individual and group privacy management. We argue that it is necessary to further study and understand group privacy to better approach users’ privacy needs. 相似文献
203.
Andreas Ekelhart Author Vitae 《Journal of Systems and Software》2008,81(10):1715-1724
Since the turn of the millenium, working groups of the W3C have been concentrating on the development of XML-based security standards, which are paraphrased as XML security. XML security consists of three recommendations: XML (digital) signature, XML encryption and XML key management specification (XKMS), all of them published by the W3C.By means of a review of the available literature the authors draw several conclusions about the status quo of XML security. Furthermore, the current state and focuses of research as well as the existing challenges are derived. Trends to different application areas - e.g. use of XML security for mobile computing - are also outlined. Based on this information the analyzed results are discussed and a future outlook is predicted. 相似文献
204.
Privacy-aware collection of aggregate spatial data 总被引:1,自引:0,他引:1
Hairuo Xie Author VitaeLars Kulik Author Vitae Egemen TaninAuthor Vitae 《Data & Knowledge Engineering》2011,70(6):576-595
Privacy concerns can be a major barrier to collecting aggregate data from the public. Recent research proposes negative surveys that collect negative data, which is complementary to the true data. This opens a new direction for privacy-aware data collection. However, the existing approach cannot avoid certain errors when applied to many spatial data collection tasks. The errors can make the data unusable in many real scenarios. We propose Gaussian negative surveys. We modulate data collection based on Gaussian distribution. The collected data can be used to compute accurate spatial distribution of participants and can be used to accurately answer range aggregate queries. Our approach avoids the errors that can occur with the existing approach. Our experiments show that we achieve an excellent balance between privacy and accuracy. 相似文献
205.
This article examined the interplay between cognition and affect in Internet uses for privacy control. A survey of a national sample was conducted to empirically test the relationship between affective concern for and cognitive knowledge of information privacy online. We also tested for the interactive role of reward-seeking as a moderator among these relationships. Findings revealed that concern did not directly play a meaningful role in guiding users’ protective behavior, whereas knowledge was found significant in moderating the role of concern. The interactive role of reward-seeking seems particularly salient in shaping the structure of the relationships. These findings suggest that the intersections between knowledge, reward, and concern can play out differently, depending on the levels of each. Policy implications in relation to users’ cognitive, affective, and reward-seeking rationalities are offered, and future research considerations are discussed. 相似文献
206.
Adams Kong Author Vitae David Zhang Author Vitae Author Vitae 《Pattern recognition》2009,42(7):1408-1418
Palmprint recognition has been investigated over 10 years. During this period, many different problems related to palmprint recognition have been addressed. This paper provides an overview of current palmprint research, describing in particular capture devices, preprocessing, verification algorithms, palmprint-related fusion, algorithms especially designed for real-time palmprint identification in large databases and measures for protecting palmprint systems and users’ privacy. Finally, some suggestion is offered. 相似文献
207.
Jiuyong Li Jixue Liu Muzammil Baig Raymond Chi-Wing WongAuthor vitae 《Data & Knowledge Engineering》2011,70(12):1030-1045
Anonymization is a practical approach to protect privacy in data. The major objective of privacy preserving data publishing is to protect private information in data whereas data is still useful for some intended applications, such as building classification models. In this paper, we argue that data generalization in anonymization should be determined by the classification capability of data rather than the privacy requirement. We make use of mutual information for measuring classification capability for generalization, and propose two k-anonymity algorithms to produce anonymized tables for building accurate classification models. The algorithms generalize attributes to maximize the classification capability, and then suppress values by a privacy requirement k (IACk) or distributional constraints (IACc). Experimental results show that algorithm IACk supports more accurate classification models and is faster than a benchmark utility-aware data anonymization algorithm. 相似文献
208.
本文从腾讯与360之间引发的"3Q大战"之争出发,论述了个人信息保护的必要性,并对国家相关政府机构和第三方测评机构在个人信息保护中应发挥的作用提出了建议。 相似文献
209.
RFID, with its capability of remote automatic identification, is taking the place of barcodes and becoming the new generation of electronic tags. However, information transmitted through the air is vulnerable to eavesdropping, interception, or modification due to its radio transmission nature; the prevalence of RFID has greatly increased security and privacy concerns. In 2008, Chen et al. proposed an RFID authentication scheme which can enhance security and privacy by using hash functions and quadratic residues. However, their scheme was found to be vulnerable to impersonation attacks. This study further demonstrates that their scheme does not provide location privacy and suffers from replay attacks. An improved scheme is also proposed which can prevent possible attacks and be applied in environments requiring a high level of security. 相似文献
210.
Collaboration and coordination between organizations are necessary in today’s business environment, and are enabled by inter-organizational
processes. Many approaches for the construction of such processes have been proposed in recent years. However, due to the
lack of standard terminology it is hard to evaluate and select a solution that fits a specific business scenario. The paper
proposes a conceptual model which depicts the nature of interaction between organizations through business processes under
specific business requirements that emphasize the privacy and autonomy of the participating organizations. The model is generic,
and relies on the generic process model (GPM) framework and on Bunge’s ontology. Being generic and theory-based, we propose
to use the model as a basis for comparing and evaluating design and implementation-level approaches for inter-organizational
processes. We demonstrate the evaluation procedure by applying it to three existing approaches.
Johny Ghattas is currently a PhD student in the Management Information Systems department in the University of Haifa in Israel. He has an M.Sc. in Telecommunication Engineering from the University of Valladolid in Spain, and an MBA from the Edinburgh Business College. In his professional life, Johny specializes in business process management, requirement engineering, and enterprise architecture design and implementation. His current research deals with the establishment of a business process learning framework. Pnina Soffer is a lecturer in the Management Information Systems department in the University of Haifa in Israel. She received her Ph.D. from the Technion—Israel Institute of Technology in 2002. In her Ph.D. thesis she developed a requirement-driven approach to the alignment of enterprise processes and an ERP system. Pnina also has industrial experience as a production engineer and as an ERP consultant. Her current research areas are formal methods for business process modeling, conceptual modeling, and requirements engineering. 相似文献
Pnina SofferEmail: |
Johny Ghattas is currently a PhD student in the Management Information Systems department in the University of Haifa in Israel. He has an M.Sc. in Telecommunication Engineering from the University of Valladolid in Spain, and an MBA from the Edinburgh Business College. In his professional life, Johny specializes in business process management, requirement engineering, and enterprise architecture design and implementation. His current research deals with the establishment of a business process learning framework. Pnina Soffer is a lecturer in the Management Information Systems department in the University of Haifa in Israel. She received her Ph.D. from the Technion—Israel Institute of Technology in 2002. In her Ph.D. thesis she developed a requirement-driven approach to the alignment of enterprise processes and an ERP system. Pnina also has industrial experience as a production engineer and as an ERP consultant. Her current research areas are formal methods for business process modeling, conceptual modeling, and requirements engineering. 相似文献