首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   707篇
  免费   77篇
  国内免费   34篇
综合类   8篇
化学工业   1篇
机械仪表   1篇
建筑科学   24篇
轻工业   2篇
无线电   193篇
一般工业技术   25篇
冶金工业   4篇
自动化技术   560篇
  2025年   20篇
  2024年   29篇
  2023年   31篇
  2022年   30篇
  2021年   42篇
  2020年   36篇
  2019年   23篇
  2018年   34篇
  2017年   44篇
  2016年   49篇
  2015年   26篇
  2014年   53篇
  2013年   58篇
  2012年   33篇
  2011年   60篇
  2010年   26篇
  2009年   43篇
  2008年   35篇
  2007年   35篇
  2006年   32篇
  2005年   17篇
  2004年   14篇
  2003年   6篇
  2002年   9篇
  2001年   4篇
  2000年   8篇
  1999年   2篇
  1998年   1篇
  1997年   2篇
  1996年   1篇
  1995年   1篇
  1994年   2篇
  1992年   1篇
  1989年   2篇
  1988年   1篇
  1986年   1篇
  1984年   1篇
  1983年   1篇
  1982年   2篇
  1981年   2篇
  1979年   1篇
排序方式: 共有818条查询结果,搜索用时 0 毫秒
201.
Privacy is an ancient concept, but its interpretation and application in the area of e-commerce are still new. It is increasingly widely accepted, however, that by giving precedence to consumer privacy bigger benefits can be reaped by all parties involved. There has been much investigation into the concept of privacy, legal frameworks for protecting this most impalpable of human values and, more recently, computing technologies that help preserve an individual’s privacy in today’s environment. In this paper we review the historical development of this fundamental concept, discussing how advancements both in society and in technology have challenged the right to privacy, and we survey the existing computing technologies that promote consumer privacy in e-commerce. Our study shows that historically the protection of privacy has been driven primarily both by our understanding of privacy and by the advancement of technology, analyses the limitations of privacy protections for current e-commerce applications, and identifies directions for the future development of successful privacy enhancing technologies.  相似文献   
202.
Most research on privacy management within the context of social network sites (SNSs) treats users as individual owners of private information. Privacy, however, is beyond individual control and is also managed on a group level. This study applies the Communication Privacy Management theory (CPM) to explore the individual and group privacy management strategies in Facebook. We present a survey completed by 900 members of a youth organization regarding their online behaviors and membership. We found that women are more likely to employ individual privacy management strategies, while men are more likely to employ group privacy management strategies. For group privacy management, we found common bond and the role an individual is attributed within the youth organization to be the strongest predictors. The results generated from this study are a first but important step to illustrate the differences and similarities between individual and group privacy management. We argue that it is necessary to further study and understand group privacy to better approach users’ privacy needs.  相似文献   
203.
Since the turn of the millenium, working groups of the W3C have been concentrating on the development of XML-based security standards, which are paraphrased as XML security. XML security consists of three recommendations: XML (digital) signature, XML encryption and XML key management specification (XKMS), all of them published by the W3C.By means of a review of the available literature the authors draw several conclusions about the status quo of XML security. Furthermore, the current state and focuses of research as well as the existing challenges are derived. Trends to different application areas - e.g. use of XML security for mobile computing - are also outlined. Based on this information the analyzed results are discussed and a future outlook is predicted.  相似文献   
204.
Privacy-aware collection of aggregate spatial data   总被引:1,自引:0,他引:1  
Privacy concerns can be a major barrier to collecting aggregate data from the public. Recent research proposes negative surveys that collect negative data, which is complementary to the true data. This opens a new direction for privacy-aware data collection. However, the existing approach cannot avoid certain errors when applied to many spatial data collection tasks. The errors can make the data unusable in many real scenarios. We propose Gaussian negative surveys. We modulate data collection based on Gaussian distribution. The collected data can be used to compute accurate spatial distribution of participants and can be used to accurately answer range aggregate queries. Our approach avoids the errors that can occur with the existing approach. Our experiments show that we achieve an excellent balance between privacy and accuracy.  相似文献   
205.
This article examined the interplay between cognition and affect in Internet uses for privacy control. A survey of a national sample was conducted to empirically test the relationship between affective concern for and cognitive knowledge of information privacy online. We also tested for the interactive role of reward-seeking as a moderator among these relationships. Findings revealed that concern did not directly play a meaningful role in guiding users’ protective behavior, whereas knowledge was found significant in moderating the role of concern. The interactive role of reward-seeking seems particularly salient in shaping the structure of the relationships. These findings suggest that the intersections between knowledge, reward, and concern can play out differently, depending on the levels of each. Policy implications in relation to users’ cognitive, affective, and reward-seeking rationalities are offered, and future research considerations are discussed.  相似文献   
206.
Palmprint recognition has been investigated over 10 years. During this period, many different problems related to palmprint recognition have been addressed. This paper provides an overview of current palmprint research, describing in particular capture devices, preprocessing, verification algorithms, palmprint-related fusion, algorithms especially designed for real-time palmprint identification in large databases and measures for protecting palmprint systems and users’ privacy. Finally, some suggestion is offered.  相似文献   
207.
Anonymization is a practical approach to protect privacy in data. The major objective of privacy preserving data publishing is to protect private information in data whereas data is still useful for some intended applications, such as building classification models. In this paper, we argue that data generalization in anonymization should be determined by the classification capability of data rather than the privacy requirement. We make use of mutual information for measuring classification capability for generalization, and propose two k-anonymity algorithms to produce anonymized tables for building accurate classification models. The algorithms generalize attributes to maximize the classification capability, and then suppress values by a privacy requirement k (IACk) or distributional constraints (IACc). Experimental results show that algorithm IACk supports more accurate classification models and is faster than a benchmark utility-aware data anonymization algorithm.  相似文献   
208.
本文从腾讯与360之间引发的"3Q大战"之争出发,论述了个人信息保护的必要性,并对国家相关政府机构和第三方测评机构在个人信息保护中应发挥的作用提出了建议。  相似文献   
209.
Improvement of the RFID authentication scheme based on quadratic residues   总被引:1,自引:0,他引:1  
RFID, with its capability of remote automatic identification, is taking the place of barcodes and becoming the new generation of electronic tags. However, information transmitted through the air is vulnerable to eavesdropping, interception, or modification due to its radio transmission nature; the prevalence of RFID has greatly increased security and privacy concerns. In 2008, Chen et al. proposed an RFID authentication scheme which can enhance security and privacy by using hash functions and quadratic residues. However, their scheme was found to be vulnerable to impersonation attacks. This study further demonstrates that their scheme does not provide location privacy and suffers from replay attacks. An improved scheme is also proposed which can prevent possible attacks and be applied in environments requiring a high level of security.  相似文献   
210.
Collaboration and coordination between organizations are necessary in today’s business environment, and are enabled by inter-organizational processes. Many approaches for the construction of such processes have been proposed in recent years. However, due to the lack of standard terminology it is hard to evaluate and select a solution that fits a specific business scenario. The paper proposes a conceptual model which depicts the nature of interaction between organizations through business processes under specific business requirements that emphasize the privacy and autonomy of the participating organizations. The model is generic, and relies on the generic process model (GPM) framework and on Bunge’s ontology. Being generic and theory-based, we propose to use the model as a basis for comparing and evaluating design and implementation-level approaches for inter-organizational processes. We demonstrate the evaluation procedure by applying it to three existing approaches.
Pnina SofferEmail:

Johny Ghattas   is currently a PhD student in the Management Information Systems department in the University of Haifa in Israel. He has an M.Sc. in Telecommunication Engineering from the University of Valladolid in Spain, and an MBA from the Edinburgh Business College. In his professional life, Johny specializes in business process management, requirement engineering, and enterprise architecture design and implementation. His current research deals with the establishment of a business process learning framework. Pnina Soffer   is a lecturer in the Management Information Systems department in the University of Haifa in Israel. She received her Ph.D. from the Technion—Israel Institute of Technology in 2002. In her Ph.D. thesis she developed a requirement-driven approach to the alignment of enterprise processes and an ERP system. Pnina also has industrial experience as a production engineer and as an ERP consultant. Her current research areas are formal methods for business process modeling, conceptual modeling, and requirements engineering.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号