全文获取类型
收费全文 | 87篇 |
免费 | 9篇 |
国内免费 | 17篇 |
专业分类
电工技术 | 4篇 |
综合类 | 11篇 |
化学工业 | 2篇 |
建筑科学 | 1篇 |
矿业工程 | 1篇 |
石油天然气 | 1篇 |
无线电 | 13篇 |
一般工业技术 | 2篇 |
冶金工业 | 5篇 |
自动化技术 | 73篇 |
出版年
2020年 | 1篇 |
2019年 | 1篇 |
2016年 | 2篇 |
2014年 | 6篇 |
2013年 | 5篇 |
2012年 | 10篇 |
2011年 | 8篇 |
2010年 | 7篇 |
2009年 | 6篇 |
2008年 | 14篇 |
2007年 | 20篇 |
2006年 | 5篇 |
2005年 | 7篇 |
2004年 | 8篇 |
2002年 | 2篇 |
2001年 | 1篇 |
2000年 | 5篇 |
1996年 | 2篇 |
1995年 | 1篇 |
1994年 | 1篇 |
1992年 | 1篇 |
排序方式: 共有113条查询结果,搜索用时 15 毫秒
1.
针对朴素贝叶斯算法应用于反垃圾邮件过滤时,其有效性十分依赖于对邮件内容的有效建模,而邮件内容建模方面研究尚不成熟限制了贝叶斯方法在垃圾邮件过滤中的性能.采用了三种概率分布对邮件内容进行建模,据此提出了3种概率分布下的朴素贝叶斯算法.为了提高训练效率,算法采用了一种增量式的垃圾邮件过滤方法.在trec05p-1、trec06p两个公开数据集上对这3种贝叶斯算法进行了实验对比,分析出三种贝叶斯分布的适用范围.从不同分布的邮件内容建模角度出发,为过滤垃圾邮件的方法选择提供了有效依据. 相似文献
2.
《国际互联网参考资料服务季刊》2013,18(3-4):5-17
SUMMARY The advent of library services and collections on the Internet revolutionized reference services to students enrolled in distance learning programs. Prior to the Internet, reference librarians who supported distance learning programs had few methods, and many of them costly, to provide the equivalent library services advocated by the ACRL Guidelines. Through the Internet, these librarians were able to approximate the services and resources that had always been available to students who came into the library. This article describes the development of reference services on the Internet in a variety of libraries that support distance learners. 相似文献
3.
针对电子邮件内容的安全问题,提出了电子邮件监控系统的体系结构,把整个系统分为邮件捕获层、邮件还原层、用户层三个部分来设计并用Java语言实现;重点研究了双机协作方式的邮件数据获取方法及邮件内容的解码与还原方法.实验结果表明该系统能够对电子邮件内容进行有效的监控. 相似文献
4.
Géza Németh Csaba Zainkó László Fekete Gábor Olaszy Gábor Endrédi Péter Olaszi Géza Kiss Péter Kis 《International Journal of Speech Technology》2000,3(3-4):217-236
The market's leading Hungarian Global System for Mobile Communications (GSM) operator—Westel—has recently introduced a Hungarian e-mail reading system as a regular service. It was implemented on the basis of an experimental system developed at the Department of Telecommunications and Telematics of the Budapest University of Technology and Economics (DTT BUTE). In this article, the considerations involved in the design and implementation decisions of both the experimental and the industrial systems will be described. Results of the first 10 weeks of regular use of the industrial system will also be given. 相似文献
5.
为了解决电子邮件在网络传输中的安全问题,防止邮件机密信息被他人截取,文章在充分研究了椭圆曲线加密技术和安全电子邮件的前提下,设计并实现了基于椭圆曲线加密技术的安全电子邮件系统。实验证明该系统相对于一般的电子邮件系统,安全性大大提高,有效地解决了邮件传输过程中的泄密问题。 相似文献
6.
基于内容的垃圾邮件过滤问题是Internet安全技术研究的一个重点问题,而基于贝叶斯的分类方法在垃圾邮件处理上表现出了很高的准确度,因此受到了广泛的关注。在朴素贝叶斯算法的基础上,提出了一种基于最小风险贝叶斯方法同Boosting算法相结合的邮件过滤改进算法,提高了分类的精确度。实验证明,算法在邮件过滤中有更好的表现。 相似文献
7.
8.
Ned Kock 《Information Systems Journal》2001,11(2):87-110
Abstract. The recent proliferation of low-cost computer networks has driven the development of a new type of organization, in which geographical and time constraints to collaboration among process teams have been gradually removed. As these organizations have to cope with a fast pace of change, they rely increasingly on distributed and asynchronous process improvement (PI) groups to redesign their processes. Yet little is known about the effects of asynchronous group support systems (GSSs) on PI groups. We investigate the effects of asynchronous GSSs on PI groups through a two-stage action research study of 38 such groups in three organizations, one in Brazil and two in New Zealand, over 4 years and 4 months. Different PI groups voluntarily conducted all, part or none of their communication through an e-mail conferencing (EC) tool. The research suggests that EC support causes a decrease in the organizational costs associated with PI groups, which, combined with an increase in the number of possible simultaneous PI groups, generates an increase in overall organizational PI efficiency. The research also suggests a neutral overall effect of EC support on PI group outcome quality. Two explanatory causal models summarizing these effects are developed, and implications for research and industry practice are discussed. 相似文献
9.
The finer points of lying online: E-mail versus pen and paper. 总被引:1,自引:0,他引:1
Naquin Charles E.; Kurtzberg Terri R.; Belkin Liuba Y. 《Canadian Metallurgical Quarterly》2010,95(2):387
The authors present 3 experimental studies that build on moral disengagement theory by exploring lying in online environments. Findings indicate that, when e-mail is compared with pen and paper communication media (both of which are equal in terms of media richness, as both are text only), people are more willing to lie when communicating via e-mail than via pen and paper and feel more justified in doing so. The findings were consistent whether the task assured participants that their lie either would or would not be discovered by their counterparts. Implications for theory and practice are discussed. (PsycINFO Database Record (c) 2010 APA, all rights reserved) 相似文献
10.
S. BasagiannisAuthor Vitae S. Petridou Author VitaeN. Alexiou Author Vitae G. Papadimitriou Author VitaeP. Katsaros Author Vitae 《Computers & Security》2011,30(4):257-272
Formal analysis techniques, such as probabilistic model checking, offer an effective mechanism for model-based performance and verification studies of communication systems’ behavior that can be abstractly described by a set of rules i.e., a protocol. This article presents an integrated approach for the quantitative analysis of the Certified E-mail Message Delivery (CEMD) protocol that provides security properties to electronic mail services. The proposed scheme employs a probabilistic model checking analysis and provides for the first time insights on the impact of CEMD’s error tolerance on computational and transmission cost. It exploits an efficient combination of quantitative analysis and specific computational and communication parameters, i.e., the widely used Texas Instruments TMS320C55x Family operating in an High Speed Downlink Packet Access (HSDPA) mobile environment, where multiple CEMD participants execute parallel sessions with high bit error rates (BERs). Furthermore, it offers a tool-assistant approach for the protocol designers and analysts towards the verification of their products under varying parameters. Finally, this analysis can be also utilized towards reliably addressing cost-related issues of certain communication protocols and deciding on their cost-dependent viability, taking into account limitations that are introduced by hardware specifications of mobile devices and noisy mobile environments. 相似文献