首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   707篇
  免费   77篇
  国内免费   34篇
综合类   8篇
化学工业   1篇
机械仪表   1篇
建筑科学   24篇
轻工业   2篇
无线电   193篇
一般工业技术   25篇
冶金工业   4篇
自动化技术   560篇
  2025年   20篇
  2024年   29篇
  2023年   31篇
  2022年   30篇
  2021年   42篇
  2020年   36篇
  2019年   23篇
  2018年   34篇
  2017年   44篇
  2016年   49篇
  2015年   26篇
  2014年   53篇
  2013年   58篇
  2012年   33篇
  2011年   60篇
  2010年   26篇
  2009年   43篇
  2008年   35篇
  2007年   35篇
  2006年   32篇
  2005年   17篇
  2004年   14篇
  2003年   6篇
  2002年   9篇
  2001年   4篇
  2000年   8篇
  1999年   2篇
  1998年   1篇
  1997年   2篇
  1996年   1篇
  1995年   1篇
  1994年   2篇
  1992年   1篇
  1989年   2篇
  1988年   1篇
  1986年   1篇
  1984年   1篇
  1983年   1篇
  1982年   2篇
  1981年   2篇
  1979年   1篇
排序方式: 共有818条查询结果,搜索用时 15 毫秒
41.
This paper first illustrates what kind of ethical issues arise from the new information, communication and automation technology. It then argues that we may embrace the popular idea that technology is ethically neutral or even ambivalent without having to close our eyes to those issues and in fact, that the ethical neutrality of technology makes them all the more urgent. Finally, it suggests that the widely ignored fact of normal responsible behaviour offers a new and fruitful starting point for any future thinking about such issues.  相似文献   
42.
在高速发展的信息时代,网络用户的隐私问题正受到普遍关注。而普试算法也正由于它能够为用户提供任何时间、任何地点、任何方式的方便服务使不同网络不同设备的人都得到满足而得到越来越多的应用。因此,我们在普适环境中,基于对位置隐私的分析,本文选取了包括Landmark Objects(LO)、False Dummies(FD)等在内的较为重要的不同位置隐私方法,并对其核心实现机制、特点以及优缺点等进行了分析。在此基础上,本文又对以上方法进行了比较并最终归纳总结了这些方法在面对多种形式攻击时的不足。  相似文献   
43.
Soft computing continuously gains interest in many fields of academic and industrial domain; among the most notable characteristics for using soft computing methodological tools is the ability to handle with vague and imprecise data in decision making processes. Similar conditions are often encountered in requirements engineering. In this paper, we introduce the PriS approach, a security and privacy requirements engineering framework which aims at incorporating privacy requirements early in the system development process. Specifically, PriS provides a set of concepts for modelling privacy requirements in the organisation domain and a systematic way-of-working for translating these requirements into system models. The conceptual model of PriS uses a goal hierarchy structure. Every privacy requirement is either applied or not on every goal. To this end every privacy requirement is a variable that can take two values [0,1] on every goal meaning that the requirements constraints the goal (value 1) or not (value 0). Following this way of working PriS ends up suggesting a number of implementation techniques based on the privacy requirements constraining the respective goals. Taking into account that the mapping of privacy variables to a crisp set consisting of two values [0,1] is constraining, we extend also the PriS framework so as to be able to address the degree of participation of every privacy requirement towards achieving the generic goal of privacy. Therefore, we propose a fuzzification of privacy variables that maps the expression of the degree of participation of each privacy variable to the [0,1] interval. We also present a mathematical framework that allows the concurrent management of combined independent preferences towards the necessity of a privacy measure; among the advantages of the presented extended framework is the scalability of the approach in such a way that the results are not limited by the number of independent opinions or by the number of factors considered while reasoning for a specific selection of privacy measures.  相似文献   
44.
随着移动边缘计算(Mobile Edge Computing,MEC)和无线充电技术(Wireless Power Transmission,WPT)的诞生和发展,越来越多的计算任务被卸载至MEC服务器以进行处理,并借助WPT技术为终端设备供电,以缓解终端设备计算能力受限和设备能耗过高的问题.由于卸载的任务和数据往往携...  相似文献   
45.
This research investigates the impact on social communication quality of using anonymous avatars during small-screen mobile audio/visual communications. Elements of behavioral and visual realism of avatars are defined, as is an elaborated three-component measure of communication quality called Social Copresence. Experimental results with 196 participants participating in a social interaction using a simulated mobile device with varied levels of avatar visual and behavioral realism showed higher levels of avatar Kinetic Conformity and Fidelity produced increased perceived Social Richness of Medium, while higher avatar Anthropomorphism produced higher levels of Psychological Copresence and Interactant Satisfaction with Communication. Increased levels of avatar Anonymity produced decreases in Social Copresence, but these were smaller when avatars possessed higher levels of visual and behavioral realism.  相似文献   
46.
47.
The use of the Internet for conducting research has found that the level of anonymity intrinsic to web-based surveys is useful in deterring various participant biases. Though, concerns about Internet privacy could interfere with the effects of perceived anonymity and influence how a person responds. In this study, participants were asked to take an Internet survey and then were randomly assigned to conditions with varying degrees of implied privacy in which they answered questions about their desire for casual sex (sociosexuality) and their lifetime sexual partners. Only in the condition without any threat to the participant’s anonymity was there no difference between men and women’s reports of their sexual behavior. However, in every condition men reported having a significantly higher sociosexuality than women. Findings are consistent with both the biologic and gender-biased explanations in differences of self-report for sexual information. Implications for social constraints and Internet based research are discussed.  相似文献   
48.
Protecting privacy on the Web is becoming increasingly complicated because of the considerable amount of personal and sensitive information left by users in many locations during their Web browsing and the silent actions of third party sites that collect data, aggregate information and build personal profiles of Internet users in order to provide free and personalized services. On the other hand, most of people are unaware that their information may be collected online, and that, after their aggregation from multiple sources, could be used for secondary purposes, such as linked to allow identification, without user’s notice.  相似文献   
49.
The postmortem examination of failed IT projects reveals that long before the failure there were significant symptoms or “early warning signs.” This article describes the top 12 people- related and project-related IT project risks, based on “early warning sign” data collected from a panel of 19 experts and a survey of 55 IT project managers.  相似文献   
50.
With the increasing popularity of cloud computing, there is increased motivation to outsource data services to the cloud to save money. An important problem in such an environment is to protect user privacy while querying data from the cloud. To address this problem, researchers have proposed several techniques. However, existing techniques incur heavy computational and bandwidth related costs, which will be unacceptable to users. In this paper, we propose a cooperative private searching (COPS) protocol that provides the same privacy protections as prior protocols, but with much lower overhead. Our protocol allows multiple users to combine their queries to reduce the querying cost while protecting their privacy. Extensive evaluations have been conducted on both analytical models and on a real cloud environment to examine the effectiveness of our protocol. Our simulation results show that the proposed protocol reduces computational costs by 80% and bandwidth cost by 37%, even when only five users query data.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号