首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1662篇
  免费   363篇
  国内免费   455篇
电工技术   22篇
综合类   207篇
化学工业   2篇
机械仪表   7篇
建筑科学   30篇
矿业工程   2篇
能源动力   2篇
轻工业   3篇
武器工业   2篇
无线电   465篇
一般工业技术   53篇
冶金工业   25篇
自动化技术   1660篇
  2024年   43篇
  2023年   81篇
  2022年   163篇
  2021年   167篇
  2020年   184篇
  2019年   131篇
  2018年   141篇
  2017年   134篇
  2016年   134篇
  2015年   157篇
  2014年   157篇
  2013年   154篇
  2012年   150篇
  2011年   127篇
  2010年   96篇
  2009年   80篇
  2008年   74篇
  2007年   63篇
  2006年   56篇
  2005年   41篇
  2004年   23篇
  2003年   21篇
  2002年   13篇
  2001年   11篇
  2000年   15篇
  1999年   8篇
  1998年   1篇
  1997年   5篇
  1996年   6篇
  1995年   7篇
  1994年   1篇
  1993年   1篇
  1992年   2篇
  1991年   1篇
  1990年   3篇
  1985年   4篇
  1984年   3篇
  1983年   3篇
  1982年   6篇
  1981年   2篇
  1980年   2篇
  1979年   2篇
  1978年   1篇
  1973年   1篇
  1969年   1篇
  1966年   2篇
  1965年   1篇
  1956年   1篇
排序方式: 共有2480条查询结果,搜索用时 15 毫秒
41.
Why would people use Short Message Service (SMS) to say something they would not say in person? There is a trend that SMS is becoming more and more popular because it facilitates more extended modes of communications. Using technology acceptance model, we hypothesize the attitude of SMS would be influenced by its perceived effectiveness for communications, perceived ease of use, and subjective norm. Besides the special aspects of communications, conflict avoidance and privacy protection will enforce the impact of perceived effectiveness of SMS for communication. We investigated 953 SMS users and the results support most of our hypotheses. Furthermore, our analyses also show there are differences between females and males on the influence mechanism behind their attitude towards SMS.  相似文献   
42.
经典命题演算形式系统(CPC)中的公式只是一些形式符号,这些形式符号的意义是由具体的解释给出的.概率逻辑是在标准概率空间上建立的一种逻辑体系,是CPC的随机事件语义,对联结词的解释就是集合运算,对形式公式的解释就是事件函数,对逻辑蕴涵和逻辑等价的解释就是事件(集合)包含和事件相等=.由于不存在处处适用的真值函数(算子),概率逻辑不能在CPC内实现概率演算,但可在CPC内实现事件演算,CPC完全适用于概率命题演算.  相似文献   
43.
基于代理随机数的低成本RFID安全协议   总被引:1,自引:0,他引:1       下载免费PDF全文
针对低成本电子标签安全隐私保护能力和防跟踪能力较弱的问题,采用读写器代理生成随机数的方法,提出一种面向大容量被动型标签的新型无线射频识别(RFID)安全认证协议。理论分析证明,该协议具有前向安全性,能够防止位置隐私攻击、窃听攻击,保障数据的保密性、可靠性和一致性,且硬件复杂度较低,适用于低成本电子标签。  相似文献   
44.
Soft groups and normalistic soft groups   总被引:1,自引:0,他引:1  
Soft set theory, proposed by Molodtsov, has been regarded as an effective mathematical tool to deal with uncertainties. In this paper, first we correct some of the problematic cases in a previous paper by Akta? and Çag˜man [H. Akta?, N. Çag˜man, Soft sets and soft groups, Inf. Sci. 177 (2007) 2726-2735]. Moreover, we introduce the concepts of normalistic soft group and normalistic soft group homomorphism, study their several related properties, and investigate some structures that are preserved under normalistic soft group homomorphisms.  相似文献   
45.
Soft polygroups     
Soft set theory, introduced by Molodtsov, has been considered as an effective mathematical tool for modeling uncertainties. In this paper, we initiate the study of algebraic hyperstructures of soft sets. The concepts of soft polygroups, normal soft polygroups, soft subpolygroups and normal soft subpolygroups are introduced, and some related properties are investigated. Furthermore, we propose the homomorphism and isomorphism of soft polygroups, and establish three isomorphism theorems for soft polygroups.  相似文献   
46.
The idea of (faithful) intuitionistic fuzzy transformation semigroup, intuitionistic admissible relation, and intuitionistic (strong) homomorphism are introduced and their basic properties are examined.  相似文献   
47.
Yang Liu  Andrew Simpson 《Software》2016,46(12):1657-1684
With the continued proliferation of mobile devices, the collection of information associated with such devices and their users—such as location, installed applications and cookies associated with built‐in browsers—has become increasingly straightforward. By analysing such information, organisations are often able to deliver more relevant and better focused advertisements. Of course, such targeted mobile advertising gives rise to a number of concerns, with privacy‐related concerns being prominent. In this paper, we discuss the necessary balance that needs to be struck between privacy and utility in this emerging area and propose privacy‐preserving targeted mobile advertising as a solution that tries to achieve that balance. Our aim is to develop a solution that can be deployed by users but is also palatable to businesses that operate in this space. This paper focuses on the requirements and design of privacy‐preserving targeted mobile advertising and also describes an initial prototype. We also discuss how more detailed technical aspects and a complete evaluation will underpin our future work in this area. Copyright © 2016 John Wiley & Sons, Ltd.  相似文献   
48.
针对手机短信存在的用户隐私泄露问题,设计一种面向手机短信的隐私保护方案.本方案结合非对称加密技术,通过使用信息接收者的公钥对原始短信进行加密获得短信密文,并结合预设的生命周期信息封装成短信自毁对象(Message Self-destructing Object,MSO)并通过运营商发送给接收者,接收者接收到MSO后对其生命周期进行验证,只有当前时间处于其生命周期内时,才能进一步使用其私钥对短信密文进行解密获取原始短信内容,一旦超过MSO的生命周期,则MSO将被自动删除以保护用户隐私安全.实验分析表明,本方案能够有效保护用户手机短信的隐私安全,实现生命周期控制并自动删除过期短信,并且对硬件系统要求低,开销合理,适合在人们日常生活中进行推广使用.  相似文献   
49.
Privacy preserving technologies are likely to become an essential component of adaptive services in pervasive and mobile computing. Although privacy issues have been studied for a long time in computer science as well as in other fields, most studies are focused on the release of data from large repositories. Mobile and pervasive computing pose new challenges, requiring specific formal models for attacks and new privacy preserving techniques. This paper considers a specific pervasive computing scenario, and shows that the application of state-of-the-art techniques for the anonymization of service requests is insufficient to protect the privacy of users. A specific class of attacks, called shadow attacks, is formally defined and a defense technique is proposed. This defense is formally proved to be correct, and its effectiveness is validated by extensive experiments in a simulated environment.  相似文献   
50.
Instant messaging (IM) has evolved into an important tool for collaborative work. It supports informal near-synchronous communication and fosters awareness of the online presence of one's communication partners. Like all awareness systems, IM runs into concerns regarding privacy. Drawing upon prior literature and exploratory interviews, we postulate a model that posits impression management as an underlying cause for privacy desires of IM users. We verify our hypotheses using linear structural modelling on data from a large online survey of IM users across the US. The model establishes that the desire for privacy in IM arises due to the desire for impression management (both directly, as well as indirectly through the desire for visibility of one's impression to oneself). Based on this model, we suggest that IM systems could support privacy needs of users better by providing them with more knowledge and control over aspects that affect their IM-conveyed impression on others (i.e. by making impression management functionality available). Specifically, to help convey and sustain appropriate impressions on IM contacts, IM systems should allow for increased visibility of one's actions to oneself, facilitate easy comparison of one's practices with those of others, and allow one to view oneself from the perspective of others and to make finer-grained adjustments to IM settings than is possible today.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号