全文获取类型
收费全文 | 707篇 |
免费 | 77篇 |
国内免费 | 34篇 |
专业分类
综合类 | 8篇 |
化学工业 | 1篇 |
机械仪表 | 1篇 |
建筑科学 | 24篇 |
轻工业 | 2篇 |
无线电 | 193篇 |
一般工业技术 | 25篇 |
冶金工业 | 4篇 |
自动化技术 | 560篇 |
出版年
2025年 | 20篇 |
2024年 | 29篇 |
2023年 | 31篇 |
2022年 | 30篇 |
2021年 | 42篇 |
2020年 | 36篇 |
2019年 | 23篇 |
2018年 | 34篇 |
2017年 | 44篇 |
2016年 | 49篇 |
2015年 | 26篇 |
2014年 | 53篇 |
2013年 | 58篇 |
2012年 | 33篇 |
2011年 | 60篇 |
2010年 | 26篇 |
2009年 | 43篇 |
2008年 | 35篇 |
2007年 | 35篇 |
2006年 | 32篇 |
2005年 | 17篇 |
2004年 | 14篇 |
2003年 | 6篇 |
2002年 | 9篇 |
2001年 | 4篇 |
2000年 | 8篇 |
1999年 | 2篇 |
1998年 | 1篇 |
1997年 | 2篇 |
1996年 | 1篇 |
1995年 | 1篇 |
1994年 | 2篇 |
1992年 | 1篇 |
1989年 | 2篇 |
1988年 | 1篇 |
1986年 | 1篇 |
1984年 | 1篇 |
1983年 | 1篇 |
1982年 | 2篇 |
1981年 | 2篇 |
1979年 | 1篇 |
排序方式: 共有818条查询结果,搜索用时 15 毫秒
41.
Dr Fernando Leal 《AI & Society》1995,9(1):29-42
This paper first illustrates what kind of ethical issues arise from the new information, communication and automation technology. It then argues that we may embrace the popular idea that technology is ethically neutral or even ambivalent without having to close our eyes to those issues and in fact, that the ethical neutrality of technology makes them all the more urgent. Finally, it suggests that the widely ignored fact of normal responsible behaviour offers a new and fruitful starting point for any future thinking about such issues. 相似文献
42.
在高速发展的信息时代,网络用户的隐私问题正受到普遍关注。而普试算法也正由于它能够为用户提供任何时间、任何地点、任何方式的方便服务使不同网络不同设备的人都得到满足而得到越来越多的应用。因此,我们在普适环境中,基于对位置隐私的分析,本文选取了包括Landmark Objects(LO)、False Dummies(FD)等在内的较为重要的不同位置隐私方法,并对其核心实现机制、特点以及优缺点等进行了分析。在此基础上,本文又对以上方法进行了比较并最终归纳总结了这些方法在面对多种形式攻击时的不足。 相似文献
43.
Soft computing continuously gains interest in many fields of academic and industrial domain; among the most notable characteristics for using soft computing methodological tools is the ability to handle with vague and imprecise data in decision making processes. Similar conditions are often encountered in requirements engineering. In this paper, we introduce the PriS approach, a security and privacy requirements engineering framework which aims at incorporating privacy requirements early in the system development process. Specifically, PriS provides a set of concepts for modelling privacy requirements in the organisation domain and a systematic way-of-working for translating these requirements into system models. The conceptual model of PriS uses a goal hierarchy structure. Every privacy requirement is either applied or not on every goal. To this end every privacy requirement is a variable that can take two values [0,1] on every goal meaning that the requirements constraints the goal (value 1) or not (value 0). Following this way of working PriS ends up suggesting a number of implementation techniques based on the privacy requirements constraining the respective goals. Taking into account that the mapping of privacy variables to a crisp set consisting of two values [0,1] is constraining, we extend also the PriS framework so as to be able to address the degree of participation of every privacy requirement towards achieving the generic goal of privacy. Therefore, we propose a fuzzification of privacy variables that maps the expression of the degree of participation of each privacy variable to the [0,1] interval. We also present a mathematical framework that allows the concurrent management of combined independent preferences towards the necessity of a privacy measure; among the advantages of the presented extended framework is the scalability of the approach in such a way that the results are not limited by the number of independent opinions or by the number of factors considered while reasoning for a specific selection of privacy measures. 相似文献
44.
随着移动边缘计算(Mobile Edge Computing,MEC)和无线充电技术(Wireless Power Transmission,WPT)的诞生和发展,越来越多的计算任务被卸载至MEC服务器以进行处理,并借助WPT技术为终端设备供电,以缓解终端设备计算能力受限和设备能耗过高的问题.由于卸载的任务和数据往往携... 相似文献
45.
This research investigates the impact on social communication quality of using anonymous avatars during small-screen mobile audio/visual communications. Elements of behavioral and visual realism of avatars are defined, as is an elaborated three-component measure of communication quality called Social Copresence. Experimental results with 196 participants participating in a social interaction using a simulated mobile device with varied levels of avatar visual and behavioral realism showed higher levels of avatar Kinetic Conformity and Fidelity produced increased perceived Social Richness of Medium, while higher avatar Anthropomorphism produced higher levels of Psychological Copresence and Interactant Satisfaction with Communication. Increased levels of avatar Anonymity produced decreases in Social Copresence, but these were smaller when avatars possessed higher levels of visual and behavioral realism. 相似文献
46.
47.
The use of the Internet for conducting research has found that the level of anonymity intrinsic to web-based surveys is useful in deterring various participant biases. Though, concerns about Internet privacy could interfere with the effects of perceived anonymity and influence how a person responds. In this study, participants were asked to take an Internet survey and then were randomly assigned to conditions with varying degrees of implied privacy in which they answered questions about their desire for casual sex (sociosexuality) and their lifetime sexual partners. Only in the condition without any threat to the participant’s anonymity was there no difference between men and women’s reports of their sexual behavior. However, in every condition men reported having a significantly higher sociosexuality than women. Findings are consistent with both the biologic and gender-biased explanations in differences of self-report for sexual information. Implications for social constraints and Internet based research are discussed. 相似文献
48.
Protecting privacy on the Web is becoming increasingly complicated because of the considerable amount of personal and sensitive information left by users in many locations during their Web browsing and the silent actions of third party sites that collect data, aggregate information and build personal profiles of Internet users in order to provide free and personalized services. On the other hand, most of people are unaware that their information may be collected online, and that, after their aggregation from multiple sources, could be used for secondary purposes, such as linked to allow identification, without user’s notice. 相似文献
49.
The postmortem examination of failed IT projects reveals that long before the failure there were significant symptoms or “early warning signs.” This article describes the top 12 people- related and project-related IT project risks, based on “early warning sign” data collected from a panel of 19 experts and a survey of 55 IT project managers. 相似文献
50.
With the increasing popularity of cloud computing, there is increased motivation to outsource data services to the cloud to save money. An important problem in such an environment is to protect user privacy while querying data from the cloud. To address this problem, researchers have proposed several techniques. However, existing techniques incur heavy computational and bandwidth related costs, which will be unacceptable to users. In this paper, we propose a cooperative private searching (COPS) protocol that provides the same privacy protections as prior protocols, but with much lower overhead. Our protocol allows multiple users to combine their queries to reduce the querying cost while protecting their privacy. Extensive evaluations have been conducted on both analytical models and on a real cloud environment to examine the effectiveness of our protocol. Our simulation results show that the proposed protocol reduces computational costs by 80% and bandwidth cost by 37%, even when only five users query data. 相似文献