首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   8926篇
  免费   431篇
  国内免费   575篇
电工技术   363篇
综合类   447篇
化学工业   156篇
金属工艺   215篇
机械仪表   499篇
建筑科学   179篇
矿业工程   118篇
能源动力   62篇
轻工业   57篇
水利工程   28篇
石油天然气   70篇
武器工业   63篇
无线电   1477篇
一般工业技术   262篇
冶金工业   70篇
原子能技术   61篇
自动化技术   5805篇
  2024年   15篇
  2023年   55篇
  2022年   107篇
  2021年   167篇
  2020年   186篇
  2019年   157篇
  2018年   162篇
  2017年   223篇
  2016年   279篇
  2015年   303篇
  2014年   510篇
  2013年   401篇
  2012年   499篇
  2011年   675篇
  2010年   455篇
  2009年   394篇
  2008年   486篇
  2007年   590篇
  2006年   547篇
  2005年   549篇
  2004年   439篇
  2003年   518篇
  2002年   396篇
  2001年   297篇
  2000年   283篇
  1999年   238篇
  1998年   172篇
  1997年   121篇
  1996年   135篇
  1995年   96篇
  1994年   79篇
  1993年   72篇
  1992年   57篇
  1991年   40篇
  1990年   23篇
  1989年   23篇
  1988年   21篇
  1987年   20篇
  1986年   15篇
  1985年   20篇
  1984年   18篇
  1983年   21篇
  1982年   16篇
  1981年   15篇
  1979年   8篇
  1978年   8篇
  1977年   4篇
  1976年   5篇
  1975年   3篇
  1974年   3篇
排序方式: 共有9932条查询结果,搜索用时 15 毫秒
91.
ContextSoftware networks are directed graphs of static dependencies between source code entities (functions, classes, modules, etc.). These structures can be used to investigate the complexity and evolution of large-scale software systems and to compute metrics associated with software design. The extraction of software networks is also the first step in reverse engineering activities.ObjectiveThe aim of this paper is to present SNEIPL, a novel approach to the extraction of software networks that is based on a language-independent, enriched concrete syntax tree representation of the source code.MethodThe applicability of the approach is demonstrated by the extraction of software networks representing real-world, medium to large software systems written in different languages which belong to different programming paradigms. To investigate the completeness and correctness of the approach, class collaboration networks (CCNs) extracted from real-world Java software systems are compared to CCNs obtained by other tools. Namely, we used Dependency Finder which extracts entity-level dependencies from Java bytecode, and Doxygen which realizes language-independent fuzzy parsing approach to dependency extraction. We also compared SNEIPL to fact extractors present in language-independent reverse engineering tools.ResultsOur approach to dependency extraction is validated on six real-world medium to large-scale software systems written in Java, Modula-2, and Delphi. The results of the comparative analysis involving ten Java software systems show that the networks formed by SNEIPL are highly similar to those formed by Dependency Finder and more precise than the comparable networks formed with the help of Doxygen. Regarding the comparison with language-independent reverse engineering tools, SNEIPL provides both language-independent extraction and representation of fact bases.ConclusionSNEIPL is a language-independent extractor of software networks and consequently enables language-independent network-based analysis of software systems, computation of design software metrics, and extraction of fact bases for reverse engineering activities.  相似文献   
92.
ContextEmpowerment of employees at work has been known to have a positive impact on job motivation and satisfaction. Software development is a field of knowledge work wherein one should also expect to see these effects, and the idea of empowerment has become particularly visible in agile methodologies, in which proponents emphasise team empowerment and individual control of the work activities as a central concern.ObjectiveThis research aims to get a better understanding of how empowerment is enabled in software development teams, both agile and non-agile, to identify differences in empowering practices and levels of individual empowerment.MethodTwenty-five interviews with agile and non-agile developers from Norway and Canada on decision making and empowerment are analysed. The analysis is conducted using a conceptual model with categories for involvement, structural empowerment and psychological empowerment.ResultsBoth kinds of development organisations are highly empowered and they are similar in most aspects relating to empowerment. However, there is a distinction in the sense that agile developers have more possibilities to select work tasks and influence the priorities in a development project due to team empowerment. Agile developers seem to put a higher emphasis on the value of information in decision making, and have more prescribed activities to enable low-cost information flow. More power is obtained through the achievement of managing roles for the non-agile developers who show interest and are rich in initiatives.ConclusionAgile developers have a higher sense of being able to impact the organisation than non-agile developers and have information channels that is significantly differently from non-agile developers. For non-agile teams, higher empowerment can be obtained by systematically applying low-cost participative decision making practices in the manager–developer relation and among peer developers. For agile teams, it is essential to more rigorously follow the empowering practices already established.  相似文献   
93.
ContextDuring requirements engineering, prioritization is performed to grade or rank requirements in their order of importance and subsequent implementation releases. It is a major step taken in making crucial decisions so as to increase the economic value of a system.ObjectiveThe purpose of this study is to identify and analyze existing prioritization techniques in the context of the formulated research questions.MethodSearch terms with relevant keywords were used to identify primary studies that relate requirements prioritization classified under journal articles, conference papers, workshops, symposiums, book chapters and IEEE bulletins.Results73 Primary studies were selected from the search processes. Out of these studies; 13 were journal articles, 35 were conference papers and 8 were workshop papers. Furthermore, contributions from symposiums as well as IEEE bulletins were 2 each while the total number of book chapters amounted to 13.ConclusionPrioritization has been significantly discussed in the requirements engineering domain. However, it was generally discovered that, existing prioritization techniques suffer from a number of limitations which includes: lack of scalability, methods of dealing with rank updates during requirements evolution, coordination among stakeholders and requirements dependency issues. Also, the applicability of existing techniques in complex and real setting has not been reported yet.  相似文献   
94.
Using competitions to motivate students is a well-known practice that has proved to be successful. Nevertheless, grading students only through their results in the competition could unfairly limit the range of grades that each student can get: regardless of the quality of the different teams participating, one student must necessarily win the tournament, another must be second, and so on until the last place. In fact, player rankings are relative assessments that are conditioned by the performance of every student. In this paper, we propose solving this issue by making students do a code review before betting on the competition. By betting, the grade of students depends both on the performance of their own solution and the one they bet on. This way, grades represent not only coding skills, but also code analysis skills, widening the attainable range of grades and allowing for a fairer grade distribution. As a result, students that are not so proficient in coding are rewarded if they demonstrate they can do a good analysis of the source code written by others, which is a very valuable skill in the professional world. We provide a case study in an undergraduate course, showing positive results.  相似文献   
95.
The viability of networked communities depends on the creation and disclosure of user-generated content and the frequency of user visitation (Facebook 10-K Annual Report, 2012). However, little is known about how to align the interests of user and social networking sites. In this study, we draw upon the principal-agent perspective to extend Pavlou et al.’s uncertainty mitigation model of online exchange relationships (2007) and propose an empirically tested model for aligning the incentives of the principal (user) and the agent (service provider). As suggested by Pavlou et al., we incorporated a multi-dimensional measure of trust: trust of provider and trust of members. The proposed model is empirically tested with survey data from 305 adults aged 20-55. The results support our model, delineating how real individuals with bounded rationality actually make decision about information disclosure under uncertainty in the social networking site context. There is show little to no relationship between online privacy concerns and information disclosure on online social network sites. Perceived benefits provide the linkage between the incentives of principal (user) and agent (provider) while usage intensity demonstrated the most significant impact on information disclosure. We argue that the phenomenon may be explained through Communication Privacy Management Theory. The present study enhances our understanding of agency theory and human judgment theory in the context of social media. Practical implications for understanding and facilitating online social exchange relationships are also discussed.  相似文献   
96.
Social networking sites (SNS) have transformed how individuals interact, build and maintain social relationships. We proposed a research model on the determinants of user continuance using Bagozzi's framework of self-regulation as the theoretical foundation. Following the process of appraisal → emotional reactions → coping responses, we developed the model by leveraging findings from social presence and IS continuance research. Based on survey data from Facebook users, we found that appraisal factors (pleasure, awareness, connectedness, and system quality) were strong determinants of emotional reaction (user satisfaction and sense of belonging). User satisfaction and sense of belonging together positively influenced continuance intention.  相似文献   
97.
针对目前的网络仿真工具在对软件定义网络(SDN)的仿真过程中,未考虑交换机的处理时延的问题,提出一种处理时延的仿真方法,目的是为了使仿真结果更加真实和准确。该方法首先将交换机的转发处理过程分解为对流表的查询操作和执行不同的动作;然后,利用交换机的处理器频率和访存周期,将查询流表和执行动作转换为处理时间。实验中测量了真实环境中不同配置的交换机处理时延,并与利用该方法仿真出的处理时延进行对比。实验结果表明,利用该方法仿真出的处理时延和真实交换机的处理时延基本一致,该方法能够较准确地仿真交换机处理时延。  相似文献   
98.
介绍了一种液压试验管理系统软件的设计与实现,该软件使用Visual Basic语言编写完成,由试验流程管理和数据存储管理等几部分组成。使用该软件,试验操作人员可以自由定义试验流程和数据报表。  相似文献   
99.
认知无线电技术被认为是解决目前频谱资源利用率低下问题最有前景的技术,基于该技术,认知无线电网络采用动态频谱接入方式有效地提高了授权频段的利用率.然而,动态变化的信道可用性极大地增加了认知无线电网络组网的难度.信道交汇旨在为用户通信提供公共传输媒介,是实现无线网络组网的基础.介绍了认知无线电网络信道交汇的基本概念和特点,并阐述了信道交汇策略设计面临的挑战以及应考虑的性能指标.提出了信道交汇策略的分类标准和系统模型,根据该分类标准,详细剖析了当前信道交汇策略相关的研究工作.最后,讨论了认知无线电网络信道交汇研究的开放性问题,以期为未来的研究指出可能的方向和重点.  相似文献   
100.
为实现面向能力的人才培养,在CDIO工程教育理论的指导下,从《软件工程》的工程性特点着手,讨论如何全面实施CDIO人才培养理念,以CDIO能力培养大纲为依据,以CDIO的人才培养模式指导课程建设,建立理论与实践相结合,多维度、立体化的《软件工程》课程内容体系,为培养具有国际竞争力的软件工程师奠定坚实基础。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号