全文获取类型
收费全文 | 1662篇 |
免费 | 363篇 |
国内免费 | 455篇 |
专业分类
电工技术 | 22篇 |
综合类 | 207篇 |
化学工业 | 2篇 |
机械仪表 | 7篇 |
建筑科学 | 30篇 |
矿业工程 | 2篇 |
能源动力 | 2篇 |
轻工业 | 3篇 |
武器工业 | 2篇 |
无线电 | 465篇 |
一般工业技术 | 53篇 |
冶金工业 | 25篇 |
自动化技术 | 1660篇 |
出版年
2024年 | 43篇 |
2023年 | 81篇 |
2022年 | 163篇 |
2021年 | 167篇 |
2020年 | 184篇 |
2019年 | 131篇 |
2018年 | 141篇 |
2017年 | 134篇 |
2016年 | 134篇 |
2015年 | 157篇 |
2014年 | 157篇 |
2013年 | 154篇 |
2012年 | 150篇 |
2011年 | 127篇 |
2010年 | 96篇 |
2009年 | 80篇 |
2008年 | 74篇 |
2007年 | 63篇 |
2006年 | 56篇 |
2005年 | 41篇 |
2004年 | 23篇 |
2003年 | 21篇 |
2002年 | 13篇 |
2001年 | 11篇 |
2000年 | 15篇 |
1999年 | 8篇 |
1998年 | 1篇 |
1997年 | 5篇 |
1996年 | 6篇 |
1995年 | 7篇 |
1994年 | 1篇 |
1993年 | 1篇 |
1992年 | 2篇 |
1991年 | 1篇 |
1990年 | 3篇 |
1985年 | 4篇 |
1984年 | 3篇 |
1983年 | 3篇 |
1982年 | 6篇 |
1981年 | 2篇 |
1980年 | 2篇 |
1979年 | 2篇 |
1978年 | 1篇 |
1973年 | 1篇 |
1969年 | 1篇 |
1966年 | 2篇 |
1965年 | 1篇 |
1956年 | 1篇 |
排序方式: 共有2480条查询结果,搜索用时 15 毫秒
41.
Why would people use Short Message Service (SMS) to say something they would not say in person? There is a trend that SMS is becoming more and more popular because it facilitates more extended modes of communications. Using technology acceptance model, we hypothesize the attitude of SMS would be influenced by its perceived effectiveness for communications, perceived ease of use, and subjective norm. Besides the special aspects of communications, conflict avoidance and privacy protection will enforce the impact of perceived effectiveness of SMS for communication. We investigated 953 SMS users and the results support most of our hypotheses. Furthermore, our analyses also show there are differences between females and males on the influence mechanism behind their attitude towards SMS. 相似文献
42.
经典命题演算形式系统(CPC)中的公式只是一些形式符号,这些形式符号的意义是由具体的解释给出的.概率逻辑是在标准概率空间上建立的一种逻辑体系,是CPC的随机事件语义,对联结词的解释就是集合运算,对形式公式的解释就是事件函数,对逻辑蕴涵和逻辑等价的解释就是事件(集合)包含和事件相等=.由于不存在处处适用的真值函数(算子),概率逻辑不能在CPC内实现概率演算,但可在CPC内实现事件演算,CPC完全适用于概率命题演算. 相似文献
43.
44.
Soft groups and normalistic soft groups 总被引:1,自引:0,他引:1
Soft set theory, proposed by Molodtsov, has been regarded as an effective mathematical tool to deal with uncertainties. In this paper, first we correct some of the problematic cases in a previous paper by Akta? and Çag˜man [H. Akta?, N. Çag˜man, Soft sets and soft groups, Inf. Sci. 177 (2007) 2726-2735]. Moreover, we introduce the concepts of normalistic soft group and normalistic soft group homomorphism, study their several related properties, and investigate some structures that are preserved under normalistic soft group homomorphisms. 相似文献
45.
Soft set theory, introduced by Molodtsov, has been considered as an effective mathematical tool for modeling uncertainties. In this paper, we initiate the study of algebraic hyperstructures of soft sets. The concepts of soft polygroups, normal soft polygroups, soft subpolygroups and normal soft subpolygroups are introduced, and some related properties are investigated. Furthermore, we propose the homomorphism and isomorphism of soft polygroups, and establish three isomorphism theorems for soft polygroups. 相似文献
46.
Bae Jun Young 《Information Sciences》2009,179(24):4284-1770
The idea of (faithful) intuitionistic fuzzy transformation semigroup, intuitionistic admissible relation, and intuitionistic (strong) homomorphism are introduced and their basic properties are examined. 相似文献
47.
Privacy‐preserving targeted mobile advertising: requirements,design and a prototype implementation 下载免费PDF全文
With the continued proliferation of mobile devices, the collection of information associated with such devices and their users—such as location, installed applications and cookies associated with built‐in browsers—has become increasingly straightforward. By analysing such information, organisations are often able to deliver more relevant and better focused advertisements. Of course, such targeted mobile advertising gives rise to a number of concerns, with privacy‐related concerns being prominent. In this paper, we discuss the necessary balance that needs to be struck between privacy and utility in this emerging area and propose privacy‐preserving targeted mobile advertising as a solution that tries to achieve that balance. Our aim is to develop a solution that can be deployed by users but is also palatable to businesses that operate in this space. This paper focuses on the requirements and design of privacy‐preserving targeted mobile advertising and also describes an initial prototype. We also discuss how more detailed technical aspects and a complete evaluation will underpin our future work in this area. Copyright © 2016 John Wiley & Sons, Ltd. 相似文献
48.
针对手机短信存在的用户隐私泄露问题,设计一种面向手机短信的隐私保护方案.本方案结合非对称加密技术,通过使用信息接收者的公钥对原始短信进行加密获得短信密文,并结合预设的生命周期信息封装成短信自毁对象(Message Self-destructing Object,MSO)并通过运营商发送给接收者,接收者接收到MSO后对其生命周期进行验证,只有当前时间处于其生命周期内时,才能进一步使用其私钥对短信密文进行解密获取原始短信内容,一旦超过MSO的生命周期,则MSO将被自动删除以保护用户隐私安全.实验分析表明,本方案能够有效保护用户手机短信的隐私安全,实现生命周期控制并自动删除过期短信,并且对硬件系统要求低,开销合理,适合在人们日常生活中进行推广使用. 相似文献
49.
Privacy preserving technologies are likely to become an essential component of adaptive services in pervasive and mobile computing. Although privacy issues have been studied for a long time in computer science as well as in other fields, most studies are focused on the release of data from large repositories. Mobile and pervasive computing pose new challenges, requiring specific formal models for attacks and new privacy preserving techniques. This paper considers a specific pervasive computing scenario, and shows that the application of state-of-the-art techniques for the anonymization of service requests is insufficient to protect the privacy of users. A specific class of attacks, called shadow attacks, is formally defined and a defense technique is proposed. This defense is formally proved to be correct, and its effectiveness is validated by extensive experiments in a simulated environment. 相似文献
50.
《Behaviour & Information Technology》2012,31(4):355-370
Instant messaging (IM) has evolved into an important tool for collaborative work. It supports informal near-synchronous communication and fosters awareness of the online presence of one's communication partners. Like all awareness systems, IM runs into concerns regarding privacy. Drawing upon prior literature and exploratory interviews, we postulate a model that posits impression management as an underlying cause for privacy desires of IM users. We verify our hypotheses using linear structural modelling on data from a large online survey of IM users across the US. The model establishes that the desire for privacy in IM arises due to the desire for impression management (both directly, as well as indirectly through the desire for visibility of one's impression to oneself). Based on this model, we suggest that IM systems could support privacy needs of users better by providing them with more knowledge and control over aspects that affect their IM-conveyed impression on others (i.e. by making impression management functionality available). Specifically, to help convey and sustain appropriate impressions on IM contacts, IM systems should allow for increased visibility of one's actions to oneself, facilitate easy comparison of one's practices with those of others, and allow one to view oneself from the perspective of others and to make finer-grained adjustments to IM settings than is possible today. 相似文献