全文获取类型
收费全文 | 6353篇 |
免费 | 975篇 |
国内免费 | 977篇 |
专业分类
电工技术 | 368篇 |
综合类 | 674篇 |
化学工业 | 32篇 |
金属工艺 | 14篇 |
机械仪表 | 145篇 |
建筑科学 | 268篇 |
矿业工程 | 43篇 |
能源动力 | 35篇 |
轻工业 | 60篇 |
水利工程 | 49篇 |
石油天然气 | 24篇 |
武器工业 | 14篇 |
无线电 | 1206篇 |
一般工业技术 | 875篇 |
冶金工业 | 116篇 |
原子能技术 | 10篇 |
自动化技术 | 4372篇 |
出版年
2024年 | 57篇 |
2023年 | 158篇 |
2022年 | 248篇 |
2021年 | 279篇 |
2020年 | 304篇 |
2019年 | 318篇 |
2018年 | 318篇 |
2017年 | 333篇 |
2016年 | 318篇 |
2015年 | 340篇 |
2014年 | 497篇 |
2013年 | 506篇 |
2012年 | 597篇 |
2011年 | 560篇 |
2010年 | 448篇 |
2009年 | 423篇 |
2008年 | 456篇 |
2007年 | 422篇 |
2006年 | 299篇 |
2005年 | 273篇 |
2004年 | 218篇 |
2003年 | 195篇 |
2002年 | 130篇 |
2001年 | 106篇 |
2000年 | 81篇 |
1999年 | 52篇 |
1998年 | 44篇 |
1997年 | 52篇 |
1996年 | 34篇 |
1995年 | 51篇 |
1994年 | 31篇 |
1993年 | 32篇 |
1992年 | 19篇 |
1991年 | 16篇 |
1990年 | 15篇 |
1989年 | 7篇 |
1988年 | 4篇 |
1987年 | 5篇 |
1986年 | 4篇 |
1985年 | 9篇 |
1984年 | 4篇 |
1983年 | 9篇 |
1982年 | 7篇 |
1979年 | 3篇 |
1978年 | 4篇 |
1977年 | 2篇 |
1976年 | 4篇 |
1975年 | 4篇 |
1972年 | 2篇 |
1960年 | 2篇 |
排序方式: 共有8305条查询结果,搜索用时 62 毫秒
11.
Xueming Huang Gordon I. McCalla Jim E. Greer Eric Neufeld 《User Modeling and User-Adapted Interaction》1991,1(1):87-115
A user/student model must be revised when new information about the user/student is obtained. But a sophisticated user/student model is a complex structure that contains different types of knowledge. Different techniques may be needed for revising different types of knowledge. This paper presents a student model maintenance system (SMMS) which deals with revision of two important types of knowledge in student models: deductive knowledge and stereotypical knowledge. In the SMMS, deductive knowledge is represented by justified beliefs. Its revision is accomplished by a combination of techniques involving reason maintenance and formal diagnosis. Stereotypical knowledge is represented in the Default Package Network (DPN). The DPN is a knowledge partitioning hierarchy in which each node contains concepts in a sub-domain. Revision of stereotypical knowledge is realized by propagating new information through the DPN to change default packages (stereotypes) of the nodes in the DPN. A revision of deductive knowledge may trigger a revision of stereotypical knowledge, which results in a desirable student model in which the two types of knowledge exist harmoniously. 相似文献
12.
本文介绍了一个用户接口管理系统NUUIMS的设计和实现.重点叙述了该系统基于规范化目标用户接口模型的设计思想,系统组成及描述方法.文章也讨论了使用NUUIMS设计而成的用户接口的特点. 相似文献
13.
Two studies are presented. The first aimed to identify possible barriers to the uptake and use of commonly available telephony features and to determine whether greater knowledge of features/access codes and availability of user manuals could increase feature usage under certain conditions. Results showed that feature-usage patterns were not affected by any of the manipulations, but that they were determined by specific job demands. Using Constantine and Lockwood's (1999) conceptualization of user roles, a method to support feature bundling decisions for specific target markets was developed and tested in the second study. The method - Strategic User Needs Analysis (SUNA) - was shown to yield a useful balance between high- and low-level information about selected roles. SUNA provided sufficient information to distinguish between PDA feature usage patterns of two similar target user groups as well as to suggest additional features each of the two target groups would find useful. The development of SUNA and observational findings of actual PDA usage are reported. 相似文献
14.
讨论了指数自回归模型的辨识问题,证明了该模型最小二乘估计的目标函数的非凸性,并给出了使该函数为凸的条件,最后给出了辨识该模型的算法及该算法的收敛性,并以数值例子加以说明。 相似文献
15.
Trust for Ubiquitous,Transparent Collaboration 总被引:1,自引:0,他引:1
In this paper, trust-based recommendations control the exchange of personal information between handheld computers. Combined with explicit risk analysis, this enables unobtrusive information exchange, while limiting access to confidential information. The same model can be applied to a wide range of mobile computing tasks, such as managing personal address books and electronic diaries, to automatically provide an appropriate level of security. Recommendations add structure to the information, by associating categories with data and with each other, with degrees of trust belief and disbelief. Since categories also in turn confer privileges and restrict actions, they are analogous to rôles in a Rôle-Based Access Control system, while principals represent their trust policies in recommendations. Participants first compute their trust in information, by combining their own trust assumptions with others' policies. Recommendations are thus linked together to compute a considered, local trust assessment. Actions are then moderated by a risk assessment, which weighs up costs and benefits, including the cost of the user's time, before deciding whether to allow or forbid the information exchange, or ask for help. By unifying trust assessments and access control, participants can take calculated risks to automatically yet safely share their personal information. 相似文献
16.
We discuss algorithms for learning and revising user profiles that can determine which World Wide Web sites on a given topic would be interesting to a user. We describe the use of a naive Bayesian classifier for this task, and demonstrate that it can incrementally learn profiles from user feedback on the interestingness of Web sites. Furthermore, the Bayesian classifier may easily be extended to revise user provided profiles. In an experimental evaluation we compare the Bayesian classifier to computationally more intensive alternatives, and show that it performs at least as well as these approaches throughout a range of different domains. In addition, we empirically analyze the effects of providing the classifier with background knowledge in form of user defined profiles and examine the use of lexical knowledge for feature selection. We find that both approaches can substantially increase the prediction accuracy. 相似文献
17.
This paper analyses the collaborative design ofa high-technology product, a neuromagnetometerused in the analysis of the activity of thehuman cortex. The producer, Neuromag Company istrying to transform the device from a basicresearch instrument into a means of clinicalpractice. This transition is analyzed as asimultaneous evolution of the product,producer-user network and user activities. Thenetwork is analyzed as a network of activitysystems. Each activity has a historicallyformed object and a motive of its own, as wellas a system of cultural means and expertise. Weuse these to explain and understand theinterests and points of view of the actors inrelation to the product and the contradictionsof the producer-user network. It is suggestedthat the emerging user needs of collectiveactors must be analyzed at three levels. At thefirst level, the use value of the product, itscapacity of solving the vital problems andchallenges of developing user activities, ischaracterized. The second-level analysisconcerns the creation and development of thenecessary complementary tools and services thatmake the implementation and use of the productpossible. This task presupposes collaborationbetween several communities of the innovationnetwork. The third level is the situatedpractical use of the product. In ourexperience, it is advantageous that researcherscontribute with their data to a dialogue inwhich the user needs are articulated. 相似文献
18.
The development of future mobile networks will be driven, in large part, by content and web based services. In this paper,
we examine several performance, scalability and architectural challenges faced by future mobile web applications and how advanced
mobile content delivery techniques can address these challenges. We review existing content delivery using a taxonomy that
consists of three categories: network scaling, end system acceleration, and content and protocol optimization. While wireline
content delivery focuses on network and server scalability, mobile content delivery will likely benefit most from optimizing
radio link usage. We also present our ongoing work in this area, which extends the functionality of edge caching to the terminal,
uses user interest correlation information to maintain low terminal power consumption and adds a new dimension to radio resource
management.
This revised version was published online in August 2006 with corrections to the Cover Date. 相似文献
19.
一种适合协同工作系统的安全认证方案 总被引:2,自引:0,他引:2
针对网络化协同工作系统的安全认证需求,综合应用Kerberos协议、X.509证书和口令认证技术,借鉴PKI的思想,设计了一种适合网络化协同工作系统的灵活而易于扩展的安全认证方案。这个方案能够保证证书的安全分发,满足网络化协同工作系统对分散、动态的用户安全身份认证的要求。 相似文献
20.
Evan E. Anderson 《Information Systems》1988,13(4):327-333
Many organizations, best illustrated by libraries, have access to hundreds of databases possessing varying degrees of complimentary and overlapping records. While users may receive positive marginal benefits from data duplications, all databases and their services cannot be supported because of resource limitations. This paper attempts to conceptualize the problem of database collection in an environment of multiple databases, with differential content and performance characteristics, diverse users, and limited resources. It defines the database collection problem as a constrained zero-one integer programming problem and solves for the optimal combination or union of databases. Several extensions are shown, where special conditions are imposed on the relationships between databases and/or their availability. 相似文献