首页 | 官方网站   微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1568篇
  免费   137篇
  国内免费   3篇
工业技术   1708篇
  2023年   35篇
  2022年   18篇
  2021年   75篇
  2020年   54篇
  2019年   55篇
  2018年   54篇
  2017年   37篇
  2016年   76篇
  2015年   66篇
  2014年   66篇
  2013年   103篇
  2012年   139篇
  2011年   171篇
  2010年   117篇
  2009年   81篇
  2008年   102篇
  2007年   96篇
  2006年   73篇
  2005年   51篇
  2004年   44篇
  2003年   35篇
  2002年   28篇
  2001年   17篇
  2000年   14篇
  1999年   8篇
  1998年   10篇
  1997年   12篇
  1996年   9篇
  1995年   14篇
  1994年   4篇
  1993年   4篇
  1992年   2篇
  1991年   2篇
  1990年   2篇
  1989年   2篇
  1988年   2篇
  1987年   4篇
  1985年   4篇
  1982年   2篇
  1981年   2篇
  1980年   3篇
  1978年   1篇
  1973年   1篇
  1972年   2篇
  1971年   1篇
  1969年   2篇
  1966年   1篇
  1955年   1篇
  1954年   1篇
  1944年   1篇
排序方式: 共有1708条查询结果,搜索用时 15 毫秒
31.
Autonomous vehicles are on the cusp of disrupting the entire transportation industry and current privacy legislation is not yet equipped to deal with the changes being spurred by this innovation. This paper enumerates and elucidates on the various privacy concerns that are specific autonomous vehicles. It also proposes the principles of “Privacy-by-Design”, an industry trend pertaining to other arenas of privacy, be adapted and used for regulating privacy around autonomous vehicles. It calls for the NHTSA (National Highway Transportation Safety Administration), with guidance from the FCC, and the FTC, to use their expertise in creating administrative rules that will protect the privacy of the public. Having learned valuable lessons from recent privacy concerns in the mobile device industry, the Privacy-by-Design approach would help ease the transition into this useful, but potentially intrusive technology. Currently, privacy is receiving significant attention in publications, but with autonomous vehicles being a nascent industry, there is very little being said about the privacy concerns specifically pertaining to these technology autonomous vehicles. Recent strides in the technology and the legislative acceptance of these vehicles have made them a widely discussed topic, and thus makes a thorough discussion of privacy related specifically to this technology both timely and relevant. This paper provides an early assessment of an area of concern that is growing as rapidly as are autonomous vehicles. The technology is being proven effective and safe, so the real focus will shift to use concerns, like privacy. The autonomous vehicle industry is still early in its development, and there is imminent opportunity to anchor privacy into the fundamentals of autonomous vehicles, preempting numerous potential infringements.  相似文献   
32.
This article describes the psychometric properties of the Emotional Metric Outcomes (EMO) questionnaire and the System Usability Scale (SUS) using data collected as part of a large-sample unmoderated usability study (n = 471). The EMO is a concise multifactor standardized questionnaire that provides an assessment of transaction-driven personal and relationship emotional outcomes, both positive and negative. The SUS is a well-known standardized usability questionnaire designed to assess perceived usability. In previous research, psychometric evaluation using data from a series of online surveys showed that the EMO and its component scales had high reliability and concurrent validity with loyalty and overall experience metrics but did not find the expected four-factor structure. Previous structural analyses of the SUS have had mixed results. Analysis of the EMO data from the usability study revealed the expected four-factor structure. The factor structure of the SUS appeared to be driven by item tone. The estimated reliability of the SUS (.90) was consistent with previous estimates. The EMO and its subscales were also quite reliable, with the estimates of reliability for the various EMO scales ranging from .86 to .96. Regression analysis using SUS, EMO, and Effort as predictors revealed different key drivers for the outcome metrics of Satisfaction and Likelihood-to-Recommend. The key recommendations are to include the EMO as part of the battery of poststudy standardized questionnaires, along with the SUS (or similar questionnaire), but to be cautious in reporting SUS subscales such as Usable and Learnable.  相似文献   
33.
34.
This paper explores potential improvements to the trust modeling of agents in multi-agent systems when a social network of advisors is employed as part of the trust modeling, and in particular, examines means of optimizing the number of advisors that should be maintained in the social network. We propose three such improvements, two directly relating to the limit of advisor network size by either setting a maximum size for a buyer’s advisor network or setting a minimum trustworthiness threshold for agents to be accepted into that advisor network, and a third which uses an advisor referral system in combination with one of the first two network-limiting techniques. We provide experimental results in defence of our approach for two distinct trust modeling systems, and show how these optimizations can improve, sometimes significantly, the accuracy of different trust models (in the context of electronic marketplaces). We believe that the proposed techniques will be very useful for trust researchers seeking to improve the accuracy of their own trust models by setting the size and composition of advisor networks.  相似文献   
35.
36.
Assembling 2D-material (2DM) nanosheets into micro- and macro-architectures with augmented functionalities requires effective strategies to overcome nanosheet restacking. Conventional assembly approaches involve external binders and/or functionalization, which inevitably sacrifice 2DM's nanoscale properties. Noble metal ions (NMI) are promising ionic crosslinkers, which can simultaneously assemble 2DM nanosheets and induce synergistic properties. Herein, a collection of NMI–2DM complexes are screened and categorized into two sub-groups. Based on the zeta potentials, two assembly approaches are developed to obtain 1) NMI-crosslinked 2DM hydrogels/aerogels for heterostructured catalysts and 2) NMI–2DM inks for templated synthesis. First, tetraammineplatinum(II) nitrate (TPtN) serves as an efficient ionic crosslinker to agglomerate various 2DM dispersions. By utilizing micro-textured assembly platforms, various TPtN–2DM hydrogels are fabricated in a scalable fashion. Afterward, these hydrogels are lyophilized and thermally reduced to synthesize Pt-decorated 2DM aerogels (Pt@2DM). The Pt@2DM heterostructures demonstrate high, substrate-dependent catalytic activities and promote different reaction pathways in the hydrogenation of 3-nitrostyrene. Second, PtCl4 can be incorporated into 2DM dispersions at high NMI molarities to prepare a series of PtCl4–2DM inks with high colloidal stability. By adopting the PtCl4–graphene oxide ink, various Pt micro-structures with replicated topographies are synthesized with accurate control of grain sizes and porosities.  相似文献   
37.
38.
We explore the impact of edge states in three types of transition metal dichalcogenides (TMDs), namely metallic Td-phase WTe2 and semiconducting 2H-phase MoTe2 and MoS2, by patterning thin flakes into ribbons with varying channel widths. No obvious charge depletion at the edges is observed for any of these three materials, in contrast to observations made for graphene nanoribbon devices. The semiconducting ribbons are characterized in a three-terminal field-effect transistor (FET) geometry. In addition, two ribbon array designs have been carefully investigated and found to exhibit current levels higher than those observed for conventional one-channel devices. Our results suggest that device structures incorporating a high number of edges can improve the performance of TMD FETs. This improvement is attributed to a higher local electric field, resulting from the edges, increasing the effective number of charge carriers, and the absence of any detrimental edge-related scattering.
  相似文献   
39.
Instructors in higher education are disseminating instructional content via podcasting, as many rally behind the technology’s potential benefits. Others have expressed concern about the risks of deleterious effects that might accompany the adoption of podcasting, such as lower class attendance. Yet, relatively few studies have investigated students’ perceptions of podcasting for educational purposes, especially in relation to different podcasting forms: repetitive and supplemental. The present study explored students’ readiness and attitudes towards these two forms of podcasting to provide fundamental information for future researchers and educators. The results indicated that students may not be as ready or eager to use podcasting for repetitive or supplemental educational purposes as much as we think they are, but they could be persuaded.  相似文献   
40.
Privacy policies for shared content in social network sites   总被引:1,自引:0,他引:1  
Social networking is one of the major technological phenomena of the Web 2.0, with hundreds of millions of subscribed users. Social networks enable a form of self-expression for users and help them to socialize and share content with other users. In spite of the fact that content sharing represents one of the prominent features of existing Social network sites, they do not provide any mechanisms for collective management of privacy settings for shared content. In this paper, using game theory, we model the problem of collective enforcement of privacy policies on shared data. In particular, we propose a solution that offers automated ways to share images based on an extended notion of content ownership. Building upon the Clarke-Tax mechanism, we describe a simple mechanism that promotes truthfulness and that rewards users who promote co-ownership. Our approach enables social network users to compose friendship based policies based on distances from an agreed upon central user selected using several social networks metrics. We integrate our design with inference techniques that free the users from the burden of manually selecting privacy preferences for each picture. To the best of our knowledge, this is the first time such a privacy protection mechanism for social networking has been proposed. We also extend our mechanism so as to support collective enforcement across multiple social network sites. In the paper, we also show a proof-of-concept application, which we implemented in the context of Facebook, one of today’s most popular social networks. Through our implementation, we show the feasibility of such approach and show that it can be implemented with a minimal increase in overhead to end-users. We complete our analysis by conducting a user study to investigate users’ understanding of co-ownership, usefulness and understanding of our approach. Users responded favorably to the approach, indicating a general understanding of co-ownership and the auction, and found the approach to be both useful and fair.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号