首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   87篇
  免费   9篇
  国内免费   17篇
电工技术   4篇
综合类   11篇
化学工业   2篇
建筑科学   1篇
矿业工程   1篇
石油天然气   1篇
无线电   13篇
一般工业技术   2篇
冶金工业   5篇
自动化技术   73篇
  2020年   1篇
  2019年   1篇
  2016年   2篇
  2014年   6篇
  2013年   5篇
  2012年   10篇
  2011年   8篇
  2010年   7篇
  2009年   6篇
  2008年   14篇
  2007年   20篇
  2006年   5篇
  2005年   7篇
  2004年   8篇
  2002年   2篇
  2001年   1篇
  2000年   5篇
  1996年   2篇
  1995年   1篇
  1994年   1篇
  1992年   1篇
排序方式: 共有113条查询结果,搜索用时 15 毫秒
1.
针对朴素贝叶斯算法应用于反垃圾邮件过滤时,其有效性十分依赖于对邮件内容的有效建模,而邮件内容建模方面研究尚不成熟限制了贝叶斯方法在垃圾邮件过滤中的性能.采用了三种概率分布对邮件内容进行建模,据此提出了3种概率分布下的朴素贝叶斯算法.为了提高训练效率,算法采用了一种增量式的垃圾邮件过滤方法.在trec05p-1、trec06p两个公开数据集上对这3种贝叶斯算法进行了实验对比,分析出三种贝叶斯分布的适用范围.从不同分布的邮件内容建模角度出发,为过滤垃圾邮件的方法选择提供了有效依据.  相似文献   
2.
SUMMARY

The advent of library services and collections on the Internet revolutionized reference services to students enrolled in distance learning programs. Prior to the Internet, reference librarians who supported distance learning programs had few methods, and many of them costly, to provide the equivalent library services advocated by the ACRL Guidelines. Through the Internet, these librarians were able to approximate the services and resources that had always been available to students who came into the library. This article describes the development of reference services on the Internet in a variety of libraries that support distance learners.  相似文献   
3.
针对电子邮件内容的安全问题,提出了电子邮件监控系统的体系结构,把整个系统分为邮件捕获层、邮件还原层、用户层三个部分来设计并用Java语言实现;重点研究了双机协作方式的邮件数据获取方法及邮件内容的解码与还原方法.实验结果表明该系统能够对电子邮件内容进行有效的监控.  相似文献   
4.
The market's leading Hungarian Global System for Mobile Communications (GSM) operator—Westel—has recently introduced a Hungarian e-mail reading system as a regular service. It was implemented on the basis of an experimental system developed at the Department of Telecommunications and Telematics of the Budapest University of Technology and Economics (DTT BUTE). In this article, the considerations involved in the design and implementation decisions of both the experimental and the industrial systems will be described. Results of the first 10 weeks of regular use of the industrial system will also be given.  相似文献   
5.
为了解决电子邮件在网络传输中的安全问题,防止邮件机密信息被他人截取,文章在充分研究了椭圆曲线加密技术和安全电子邮件的前提下,设计并实现了基于椭圆曲线加密技术的安全电子邮件系统。实验证明该系统相对于一般的电子邮件系统,安全性大大提高,有效地解决了邮件传输过程中的泄密问题。  相似文献   
6.
基于内容的垃圾邮件过滤问题是Internet安全技术研究的一个重点问题,而基于贝叶斯的分类方法在垃圾邮件处理上表现出了很高的准确度,因此受到了广泛的关注。在朴素贝叶斯算法的基础上,提出了一种基于最小风险贝叶斯方法同Boosting算法相结合的邮件过滤改进算法,提高了分类的精确度。实验证明,算法在邮件过滤中有更好的表现。  相似文献   
7.
王彤彤  韩文报  窦勇 《通信技术》2007,40(12):299-301
随着互联网的发展,电子邮件成为了一类重要应用。然而垃圾邮件的产生极大的制约了电子邮件的应用。文中提出了一类基于矢量空间模型的垃圾邮件去重复技术(VMF),从删除重复邮件的角度,给出了一种垃圾邮件过滤的方法。与现存技术相比,VMF在召回率和适应性等方面均有显著提高。  相似文献   
8.
Abstract. The recent proliferation of low-cost computer networks has driven the development of a new type of organization, in which geographical and time constraints to collaboration among process teams have been gradually removed. As these organizations have to cope with a fast pace of change, they rely increasingly on distributed and asynchronous process improvement (PI) groups to redesign their processes. Yet little is known about the effects of asynchronous group support systems (GSSs) on PI groups. We investigate the effects of asynchronous GSSs on PI groups through a two-stage action research study of 38 such groups in three organizations, one in Brazil and two in New Zealand, over 4 years and 4 months. Different PI groups voluntarily conducted all, part or none of their communication through an e-mail conferencing (EC) tool. The research suggests that EC support causes a decrease in the organizational costs associated with PI groups, which, combined with an increase in the number of possible simultaneous PI groups, generates an increase in overall organizational PI efficiency. The research also suggests a neutral overall effect of EC support on PI group outcome quality. Two explanatory causal models summarizing these effects are developed, and implications for research and industry practice are discussed.  相似文献   
9.
The finer points of lying online: E-mail versus pen and paper.   总被引:1,自引:0,他引:1  
The authors present 3 experimental studies that build on moral disengagement theory by exploring lying in online environments. Findings indicate that, when e-mail is compared with pen and paper communication media (both of which are equal in terms of media richness, as both are text only), people are more willing to lie when communicating via e-mail than via pen and paper and feel more justified in doing so. The findings were consistent whether the task assured participants that their lie either would or would not be discovered by their counterparts. Implications for theory and practice are discussed. (PsycINFO Database Record (c) 2010 APA, all rights reserved)  相似文献   
10.
Formal analysis techniques, such as probabilistic model checking, offer an effective mechanism for model-based performance and verification studies of communication systems’ behavior that can be abstractly described by a set of rules i.e., a protocol. This article presents an integrated approach for the quantitative analysis of the Certified E-mail Message Delivery (CEMD) protocol that provides security properties to electronic mail services. The proposed scheme employs a probabilistic model checking analysis and provides for the first time insights on the impact of CEMD’s error tolerance on computational and transmission cost. It exploits an efficient combination of quantitative analysis and specific computational and communication parameters, i.e., the widely used Texas Instruments TMS320C55x Family operating in an High Speed Downlink Packet Access (HSDPA) mobile environment, where multiple CEMD participants execute parallel sessions with high bit error rates (BERs). Furthermore, it offers a tool-assistant approach for the protocol designers and analysts towards the verification of their products under varying parameters. Finally, this analysis can be also utilized towards reliably addressing cost-related issues of certain communication protocols and deciding on their cost-dependent viability, taking into account limitations that are introduced by hardware specifications of mobile devices and noisy mobile environments.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号