全文获取类型
收费全文 | 1096篇 |
免费 | 26篇 |
国内免费 | 30篇 |
专业分类
电工技术 | 17篇 |
综合类 | 81篇 |
化学工业 | 22篇 |
金属工艺 | 11篇 |
机械仪表 | 31篇 |
建筑科学 | 120篇 |
矿业工程 | 10篇 |
能源动力 | 4篇 |
轻工业 | 25篇 |
水利工程 | 19篇 |
石油天然气 | 6篇 |
武器工业 | 3篇 |
无线电 | 51篇 |
一般工业技术 | 49篇 |
冶金工业 | 25篇 |
原子能技术 | 5篇 |
自动化技术 | 673篇 |
出版年
2025年 | 2篇 |
2024年 | 6篇 |
2023年 | 6篇 |
2022年 | 12篇 |
2021年 | 10篇 |
2020年 | 19篇 |
2019年 | 13篇 |
2018年 | 8篇 |
2017年 | 14篇 |
2016年 | 19篇 |
2015年 | 36篇 |
2014年 | 66篇 |
2013年 | 55篇 |
2012年 | 52篇 |
2011年 | 86篇 |
2010年 | 59篇 |
2009年 | 73篇 |
2008年 | 80篇 |
2007年 | 79篇 |
2006年 | 56篇 |
2005年 | 51篇 |
2004年 | 42篇 |
2003年 | 58篇 |
2002年 | 40篇 |
2001年 | 30篇 |
2000年 | 38篇 |
1999年 | 30篇 |
1998年 | 25篇 |
1997年 | 23篇 |
1996年 | 15篇 |
1995年 | 6篇 |
1994年 | 6篇 |
1993年 | 3篇 |
1992年 | 4篇 |
1991年 | 6篇 |
1990年 | 3篇 |
1989年 | 1篇 |
1988年 | 3篇 |
1987年 | 1篇 |
1986年 | 1篇 |
1985年 | 4篇 |
1984年 | 3篇 |
1983年 | 1篇 |
1982年 | 3篇 |
1981年 | 2篇 |
1978年 | 1篇 |
1958年 | 1篇 |
排序方式: 共有1152条查询结果,搜索用时 0 毫秒
81.
Knowledge of the business domain (e.g., insurance claim, human resources) is crucial to analysts’ ability to conduct good requirements analysis (RA). However, current practices afford little assistance to analysts in acquiring domain knowledge. We argue that traditional reuse repositories could be augmented by adding rich faceted information on component/services and artifacts such as business-process templates to help analysts acquire domain knowledge during RA. In this paper, we present the design of a Knowledge Based Component Repository (KBCR) for facilitating RA. Then, we report on the design and development of a KBCR prototype. We illustrate its application in a system that is populated with components and process templates for the auto insurance claim domain. An empirical study was conducted to assess its effectiveness in improving RA. Results showed that KBCR enhanced analysts’ business domain knowledge and helped them better prepare for RA. Our key research contribution is to offer analysts a rich repository (i.e., KBCR) containing domain knowledge that they could utilize to acquire domain knowledge that is crucial for carrying out RA. While repositories of reusable components have been employed for some time, no one has used such repositories to help analysts acquire domain knowledge in order improve the RA of the system. 相似文献
82.
83.
基于加权类轴的Web文本分类方法研究 总被引:1,自引:0,他引:1
为了更有效的组织Intemet上丰富的信息资源,通过分析传统的近邻文本分类方法技术以及web文本的特点,提出了一种新的简单有效的网页分类方法。该方法充分利用了web文本的结构信息进行特征词加权,以类轴向量为核心构建分类器。实验表明,此方法具有较高的准确率和召回率。 相似文献
84.
符丁 《电脑与微电子技术》2012,(11):29-32,40
针对隐藏于组织业务海量数据中的隐性软件需求获取提出一种方法。该方法的基本思想是:组织业务海量数据中隐含软件需求,它是以隐性知识形式存在于海量数据中的,隐性知识利用的解决方案就是组织及利益相关者对待开发软件系统的要求(软件需求)。首先,构建一个完整的、无冲突的、正确的待开发软件系统目标及其关系模型,并在待开发系统目标指导下,利用数据挖掘技术对数据进行挖掘,从中发现隐性知识;然后,识别知识的有用性和可用性;最后为可用性知识的利用提供解决方案。进而获取隐藏于大量数据中的隐性软件需求. 相似文献
85.
In this paper we give a formal definition of the requirements translation language Behavior Trees. This language has been used with success in industry to systematically translate large, complex, and often erroneous requirements documents into a structured model of the system. It contains a mixture of state-based manipulations, synchronisation, message passing, and parallel, conditional, and iterative control structures. The formal semantics of a Behavior Tree is given via a translation to a version of Hoare’s process algebra CSP, extended with state-based constructs such as guards and updates, and a message passing facility similar to that used in publish/subscribe protocols. We first provide the extension of CSP and its operational semantics, which preserves the meaning of the original CSP operators, and then the Behavior Tree notation and its translation into the extended version of CSP. 相似文献
86.
基于DCT系数的伪二维隐马尔可夫人脸模型(P2D HMM)由于更好的利用了人脸图像 的二维统计特性,所以与基于KLT系数的一维隐马尔可夫人脸模型相比,识别效果更好,但是结构复 杂、运算量大。一维隐马尔可夫模型(1D HMM)表现二维人脸存在不足,但训练识别比较简单。综合 考虑二者的优缺点,结合支持向量机(SVM)对静态数据识别效率明显的长处,建立了SVM和HMM 的混合人脸识别模型。采用独立分量分析(ICA)的方法提取人脸区域的特征,作为SVM的输入。在 ORL人脸库中,测试基于SVM/HMM的人脸识别方法,实验结果表明该方法在获得与P2D HMM相应 的识别率的前提下,结构简单,运算量小。 相似文献
87.
杨维亮 《网络安全技术与应用》2005,(12):73-75
计算机取证过程中,取证人员往往要对涉及MicrosoftOffice文件进行取证分析,以发现线索,获取证据,但是其安全性功能的设置往往对侦查人员的取证活动造成障碍,本文主要介绍一款名为AdvancedOfficePasswordRecovery(AOPR)的软件,该软件使用多种方法破解文件,获取密码,最终成功打开文件,以及在使用中的优点和应当注意的问题。 相似文献
88.
Haruhiko Kaiya Daisuke Shinbara Jinichi Kawano Motoshi Saeki 《Requirements Engineering》2005,10(4):289-303
This paper introduces a technique to identify requirements discordances among stakeholders. This technique is validated in
experiments. An extended version of the goal-oriented requirements elicitation method, named attributed goal-oriented analysis
(AGORA), and its supporting tool are used. Two types of requirements discordances among stakeholders are defined: the first
arises from the different interpretations by the stakeholders and the second is the result of different evaluations of preferences.
Discordances are detected by the preference matrices in AGORA. Each preference matrix represents both preferences of each
stakeholder and the estimated preferences of other stakeholders. A supporting tool for the AGORA method was developed. This
tool is a groupware that seamlessly combines face-to-face meetings for goal elicitation and distributed individual sessions
for scoring preference values. The experimental results showed that the proposed classification of discordances was sound
and that the occurrences of the requirements discordances could be detected by preference matrices. 相似文献
89.
Automating Content Extraction of HTML Documents 总被引:5,自引:0,他引:5
Suhit?GuptaEmail author Gail?E.?Kaiser Peter?Grimm Michael?F.?Chiang Justin?Starren 《World Wide Web》2005,8(2):179-224
Web pages often contain clutter (such as unnecessary images and extraneous links) around the body of an article that distracts a user from actual content. Extraction of useful and relevant content from web pages has many applications, including cell phone and PDA browsing, speech rendering for the visually impaired, and text summarization. Most approaches to making content more readable involve changing font size or removing HTML and data components such as images, which takes away from a webpages inherent look and feel. Unlike Content Reformatting, which aims to reproduce the entire webpage in a more convenient form, our solution directly addresses Content Extraction. We have developed a framework that employs an easily extensible set of techniques. It incorporates advantages of previous work on content extraction. Our key insight is to work with DOM trees, a W3C specified interface that allows programs to dynamically access document structure, rather than with raw HTML markup. We have implemented our approach in a publicly available Web proxy to extract content from HTML web pages. This proxy can be used both centrally, administered for groups of users, as well as by individuals for personal browsers. We have also, after receiving feedback from users about the proxy, created a revised version with improved performance and accessibility in mind. 相似文献
90.
文章首先对信息安全项目管理及其管理文档系统的构成和特点进行了详细的论述和分析,然后在此基础上,结合一个项目实例给出了信息安全项目管理文档系统的结构设计和计算机程序实现,最后,对我国信息安全工程项目管理的发展方向提出了自己的观点。 相似文献