首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   6353篇
  免费   975篇
  国内免费   977篇
电工技术   368篇
综合类   674篇
化学工业   32篇
金属工艺   14篇
机械仪表   145篇
建筑科学   268篇
矿业工程   43篇
能源动力   35篇
轻工业   60篇
水利工程   49篇
石油天然气   24篇
武器工业   14篇
无线电   1206篇
一般工业技术   875篇
冶金工业   116篇
原子能技术   10篇
自动化技术   4372篇
  2024年   57篇
  2023年   158篇
  2022年   248篇
  2021年   279篇
  2020年   304篇
  2019年   318篇
  2018年   318篇
  2017年   333篇
  2016年   318篇
  2015年   340篇
  2014年   497篇
  2013年   506篇
  2012年   597篇
  2011年   560篇
  2010年   448篇
  2009年   423篇
  2008年   456篇
  2007年   422篇
  2006年   299篇
  2005年   273篇
  2004年   218篇
  2003年   195篇
  2002年   130篇
  2001年   106篇
  2000年   81篇
  1999年   52篇
  1998年   44篇
  1997年   52篇
  1996年   34篇
  1995年   51篇
  1994年   31篇
  1993年   32篇
  1992年   19篇
  1991年   16篇
  1990年   15篇
  1989年   7篇
  1988年   4篇
  1987年   5篇
  1986年   4篇
  1985年   9篇
  1984年   4篇
  1983年   9篇
  1982年   7篇
  1979年   3篇
  1978年   4篇
  1977年   2篇
  1976年   4篇
  1975年   4篇
  1972年   2篇
  1960年   2篇
排序方式: 共有8305条查询结果,搜索用时 62 毫秒
11.
Revising deductive knowledge and stereotypical knowledge in a student model   总被引:1,自引:1,他引:0  
A user/student model must be revised when new information about the user/student is obtained. But a sophisticated user/student model is a complex structure that contains different types of knowledge. Different techniques may be needed for revising different types of knowledge. This paper presents a student model maintenance system (SMMS) which deals with revision of two important types of knowledge in student models: deductive knowledge and stereotypical knowledge. In the SMMS, deductive knowledge is represented by justified beliefs. Its revision is accomplished by a combination of techniques involving reason maintenance and formal diagnosis. Stereotypical knowledge is represented in the Default Package Network (DPN). The DPN is a knowledge partitioning hierarchy in which each node contains concepts in a sub-domain. Revision of stereotypical knowledge is realized by propagating new information through the DPN to change default packages (stereotypes) of the nodes in the DPN. A revision of deductive knowledge may trigger a revision of stereotypical knowledge, which results in a desirable student model in which the two types of knowledge exist harmoniously.  相似文献   
12.
蔡士杰  张福炎 《计算机学报》1991,14(10):790-797
本文介绍了一个用户接口管理系统NUUIMS的设计和实现.重点叙述了该系统基于规范化目标用户接口模型的设计思想,系统组成及描述方法.文章也讨论了使用NUUIMS设计而成的用户接口的特点.  相似文献   
13.
Two studies are presented. The first aimed to identify possible barriers to the uptake and use of commonly available telephony features and to determine whether greater knowledge of features/access codes and availability of user manuals could increase feature usage under certain conditions. Results showed that feature-usage patterns were not affected by any of the manipulations, but that they were determined by specific job demands. Using Constantine and Lockwood's (1999) conceptualization of user roles, a method to support feature bundling decisions for specific target markets was developed and tested in the second study. The method - Strategic User Needs Analysis (SUNA) - was shown to yield a useful balance between high- and low-level information about selected roles. SUNA provided sufficient information to distinguish between PDA feature usage patterns of two similar target user groups as well as to suggest additional features each of the two target groups would find useful. The development of SUNA and observational findings of actual PDA usage are reported.  相似文献   
14.
讨论了指数自回归模型的辨识问题,证明了该模型最小二乘估计的目标函数的非凸性,并给出了使该函数为凸的条件,最后给出了辨识该模型的算法及该算法的收敛性,并以数值例子加以说明。  相似文献   
15.
Trust for Ubiquitous,Transparent Collaboration   总被引:1,自引:0,他引:1  
Shand  Brian  Dimmock  Nathan  Bacon  Jean 《Wireless Networks》2004,10(6):711-721
In this paper, trust-based recommendations control the exchange of personal information between handheld computers. Combined with explicit risk analysis, this enables unobtrusive information exchange, while limiting access to confidential information. The same model can be applied to a wide range of mobile computing tasks, such as managing personal address books and electronic diaries, to automatically provide an appropriate level of security. Recommendations add structure to the information, by associating categories with data and with each other, with degrees of trust belief and disbelief. Since categories also in turn confer privileges and restrict actions, they are analogous to rôles in a Rôle-Based Access Control system, while principals represent their trust policies in recommendations. Participants first compute their trust in information, by combining their own trust assumptions with others' policies. Recommendations are thus linked together to compute a considered, local trust assessment. Actions are then moderated by a risk assessment, which weighs up costs and benefits, including the cost of the user's time, before deciding whether to allow or forbid the information exchange, or ask for help. By unifying trust assessments and access control, participants can take calculated risks to automatically yet safely share their personal information.  相似文献   
16.
Pazzani  Michael  Billsus  Daniel 《Machine Learning》1997,27(3):313-331
We discuss algorithms for learning and revising user profiles that can determine which World Wide Web sites on a given topic would be interesting to a user. We describe the use of a naive Bayesian classifier for this task, and demonstrate that it can incrementally learn profiles from user feedback on the interestingness of Web sites. Furthermore, the Bayesian classifier may easily be extended to revise user provided profiles. In an experimental evaluation we compare the Bayesian classifier to computationally more intensive alternatives, and show that it performs at least as well as these approaches throughout a range of different domains. In addition, we empirically analyze the effects of providing the classifier with background knowledge in form of user defined profiles and examine the use of lexical knowledge for feature selection. We find that both approaches can substantially increase the prediction accuracy.  相似文献   
17.
This paper analyses the collaborative design ofa high-technology product, a neuromagnetometerused in the analysis of the activity of thehuman cortex. The producer, Neuromag Company istrying to transform the device from a basicresearch instrument into a means of clinicalpractice. This transition is analyzed as asimultaneous evolution of the product,producer-user network and user activities. Thenetwork is analyzed as a network of activitysystems. Each activity has a historicallyformed object and a motive of its own, as wellas a system of cultural means and expertise. Weuse these to explain and understand theinterests and points of view of the actors inrelation to the product and the contradictionsof the producer-user network. It is suggestedthat the emerging user needs of collectiveactors must be analyzed at three levels. At thefirst level, the use value of the product, itscapacity of solving the vital problems andchallenges of developing user activities, ischaracterized. The second-level analysisconcerns the creation and development of thenecessary complementary tools and services thatmake the implementation and use of the productpossible. This task presupposes collaborationbetween several communities of the innovationnetwork. The third level is the situatedpractical use of the product. In ourexperience, it is advantageous that researcherscontribute with their data to a dialogue inwhich the user needs are articulated.  相似文献   
18.
The development of future mobile networks will be driven, in large part, by content and web based services. In this paper, we examine several performance, scalability and architectural challenges faced by future mobile web applications and how advanced mobile content delivery techniques can address these challenges. We review existing content delivery using a taxonomy that consists of three categories: network scaling, end system acceleration, and content and protocol optimization. While wireline content delivery focuses on network and server scalability, mobile content delivery will likely benefit most from optimizing radio link usage. We also present our ongoing work in this area, which extends the functionality of edge caching to the terminal, uses user interest correlation information to maintain low terminal power consumption and adds a new dimension to radio resource management. This revised version was published online in August 2006 with corrections to the Cover Date.  相似文献   
19.
一种适合协同工作系统的安全认证方案   总被引:2,自引:0,他引:2  
针对网络化协同工作系统的安全认证需求,综合应用Kerberos协议、X.509证书和口令认证技术,借鉴PKI的思想,设计了一种适合网络化协同工作系统的灵活而易于扩展的安全认证方案。这个方案能够保证证书的安全分发,满足网络化协同工作系统对分散、动态的用户安全身份认证的要求。  相似文献   
20.
Many organizations, best illustrated by libraries, have access to hundreds of databases possessing varying degrees of complimentary and overlapping records. While users may receive positive marginal benefits from data duplications, all databases and their services cannot be supported because of resource limitations. This paper attempts to conceptualize the problem of database collection in an environment of multiple databases, with differential content and performance characteristics, diverse users, and limited resources. It defines the database collection problem as a constrained zero-one integer programming problem and solves for the optimal combination or union of databases. Several extensions are shown, where special conditions are imposed on the relationships between databases and/or their availability.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号