首页 | 官方网站   微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   2228篇
  免费   151篇
  国内免费   2篇
工业技术   2381篇
  2023年   10篇
  2021年   47篇
  2020年   32篇
  2019年   44篇
  2018年   50篇
  2017年   66篇
  2016年   67篇
  2015年   76篇
  2014年   88篇
  2013年   131篇
  2012年   110篇
  2011年   165篇
  2010年   103篇
  2009年   105篇
  2008年   123篇
  2007年   110篇
  2006年   101篇
  2005年   79篇
  2004年   59篇
  2003年   63篇
  2002年   42篇
  2001年   41篇
  2000年   43篇
  1999年   40篇
  1998年   50篇
  1997年   41篇
  1996年   40篇
  1995年   29篇
  1994年   18篇
  1993年   29篇
  1992年   21篇
  1991年   20篇
  1990年   17篇
  1989年   21篇
  1988年   18篇
  1987年   11篇
  1986年   23篇
  1985年   20篇
  1984年   20篇
  1983年   15篇
  1982年   13篇
  1981年   18篇
  1980年   13篇
  1979年   17篇
  1978年   16篇
  1977年   16篇
  1976年   12篇
  1974年   12篇
  1973年   10篇
  1970年   9篇
排序方式: 共有2381条查询结果,搜索用时 78 毫秒
61.
We present an algorithm that finds out-trees and out-branchings with at least k leaves in directed graphs. These problems are known as Directed Maximum Leaf Out-Tree and Directed Maximum Leaf Out-Branching, respectively, and—in the case of undirected graphs—as Maximum Leaf Spanning Tree. The run time of our algorithm is O(4 k nm) on directed graphs and O(poly(n)+4 k k 2) on undirected graphs. This improves over the previously fastest algorithms for these problems with run times of 2 O(klog k) poly(n) and O(poly(n)+6.75 k poly(k)) respectively.  相似文献   
62.
Knowledge visualization for evaluation tasks   总被引:1,自引:1,他引:0  
Although various methods for the evaluation of intelligent systems have been proposed in the past, almost no techniques are present that support the manual inspection of knowledge bases by the domain specialist. Manual knowledge base inspection is an important and frequently applied method in knowledge engineering. Since it can hardly be performed in an automated manner, it is a time-consuming and costly task. In this paper, we discuss a collection of appropriate visualization techniques that help developers to interactively browse and analyze the knowledge base in order to find deficiencies and semantic errors in their implementation. We describe standard visualization methods adapted to specifically support the analysis of the static knowledge base structure, but also of the usage of knowledge base objects such as questions or solutions. Additionally, we introduce a novel visualization technique that supports the validation of the derivation and interview behavior of a knowledge system in a semi-automatic manner. The application of the presented methods was motivated by the daily practice of knowledge base development.  相似文献   
63.
Metaphors are often used to provide the user with a mental model to ease the use of computers. An example of such a metaphor is the commonly used “Desktop Metaphor”. Metaphors also can be used to ease context-aware information access for the users of mobile information systems. In this paper we present a taxonomy that allows the categorisation of such metaphors. Furthermore, we give an overview of existing metaphors and their implementations. After introducing some new metaphors we conclude our considerations with a classification of new and existing metaphors using our taxonomy.  相似文献   
64.
An Internet-based negotiation server for e-commerce   总被引:6,自引:0,他引:6  
This paper describes the design and implementation of a replicable, Internet-based negotiation server for conducting bargaining-type negotiations between enterprises involved in e-commerce and e-business. Enterprises can be buyers and sellers of products/services or participants of a complex supply chain engaged in purchasing, planning, and scheduling. Multiple copies of our server can be installed to complement the services of Web servers. Each enterprise can install or select a trusted negotiation server to represent his/her interests. Web-based GUI tools are used during the build-time registration process to specify the requirements, constraints, and rules that represent negotiation policies and strategies, preference scoring of different data conditions, and aggregation methods for deriving a global cost-benefit score for the item(s) under negotiation. The registration information is used by the negotiation servers to automatically conduct bargaining type negotiations on behalf of their clients. In this paper, we present the architecture of our implementation as well as a framework for automated negotiations, and describe a number of communication primitives which are used in the underlying negotiation protocol. A constraint satisfaction processor (CSP) is used to evaluate a negotiation proposal or counterproposal against the registered requirements and constraints of a client company. In case of a constraint violation, an event is posted to trigger the execution of negotiation strategic rules, which either automatically relax the violated constraint, ask for human intervention, invoke an application, or perform other remedial operations. An Event-Trigger-Rule (ETR) server is used to manage events, triggers, and rules. Negotiation strategic rules can be added or modified at run-time. A cost-benefit analysis component is used to perform quantitative analysis of alternatives. The use of negotiation servers to conduct automated negotiation has been demonstrated in the context of an integrated supply chain scenario. Received: 30 October 2000 / Accepted: 12 January 2001 Published online: 2 August 2001  相似文献   
65.
Relations Between Regularization and Diffusion Filtering   总被引:4,自引:0,他引:4  
Regularization may be regarded as diffusion filtering with an implicit time discretization where one single step is used. Thus, iterated regularization with small regularization parameters approximates a diffusion process. The goal of this paper is to analyse relations between noniterated and iterated regularization and diffusion filtering in image processing. In the linear regularization framework, we show that with iterated Tikhonov regularization noise can be better handled than with noniterated. In the nonlinear framework, two filtering strategies are considered: the total variation regularization technique and the diffusion filter technique of Perona and Malik. It is shown that the Perona-Malik equation decreases the total variation during its evolution. While noniterated and iterated total variation regularization is well-posed, one cannot expect to find a minimizing sequence which converges to a minimizer of the corresponding energy functional for the Perona–Malik filter. To overcome this shortcoming, a novel regularization technique of the Perona–Malik process is presented that allows to construct a weakly lower semi-continuous energy functional. In analogy to recently derived results for a well-posed class of regularized Perona–Malik filters, we introduce Lyapunov functionals and convergence results for regularization methods. Experiments on real-world images illustrate that iterated linear regularization performs better than noniterated, while no significant differences between noniterated and iterated total variation regularization have been observed.  相似文献   
66.
A common challenge in many situations of computer-supported collaborative learning is increasing the willingness of those involved to share their knowledge with other group members. As a prototypical situation of computer-supported information exchange, a shared-database setting was chosen for the current study. This information-exchange situation represented a social dilemma: while the contribution of information to a shared database induced costs and provided no benefit for the individual, the entire group suffered when all members decided to withhold information. In order to alleviate the information-exchange dilemma, a group-awareness tool was employed. It was hypothesized that participants would use group awareness for self-presentational purposes. For the examination of this assumption, the personality variable ‘protective self-presentation’ (PSP) was measured. An interaction effect of group awareness and PSP was found: when an awareness tool provided information concerning the contribution behavior of each individual, this tool was used as a self-presentation opportunity. In order to understand this effect in more detail, single items of the PSP-scale were analyzed.  相似文献   
67.
When artists portray human faces, they generally endow their portraits with properties that render the faces esthetically more pleasing. To obtain insight into the changes introduced by artists, we compared Fourier power spectra in photographs of faces and in portraits by artists. Our analysis was restricted to a large set of monochrome or lightly colored portraits from various Western cultures and revealed a paradoxical result. Although face photographs are not scale-invariant, artists draw human faces with statistical properties that deviate from the face photographs and approximate the scale-invariant, fractal-like properties of complex natural scenes. This result cannot be explained by systematic differences in the complexity of patterns surrounding the faces or by reproduction artifacts. In particular, a moderate change in gamma gradation has little influence on the results. Moreover, the scale-invariant rendering of faces in artists' portraits was found to be independent of cultural variables, such as century of origin or artistic techniques. We suggest that artists have implicit knowledge of image statistics and prefer natural scene statistics (or some other rules associated with them) in their creations. Fractal-like statistics have been demonstrated previously in other forms of visual art and may be a general attribute of esthetic visual stimuli.  相似文献   
68.
Visualization algorithms can have a large number of parameters, making the space of possible rendering results rather high-dimensional. Only a systematic analysis of the perceived quality can truly reveal the optimal setting for each such parameter. However, an exhaustive search in which all possible parameter permutations are presented to each user within a study group would be infeasible to conduct. Additional complications may result from possible parameter co-dependencies. Here, we will introduce an efficient user study design and analysis strategy that is geared to cope with this problem. The user feedback is fast and easy to obtain and does not require exhaustive parameter testing. To enable such a framework we have modified a preference measuring methodology, conjoint analysis, that originated in psychology and is now also widely used in market research. We demonstrate our framework by a study that measures the perceived quality in volume rendering within the context of large parameter spaces.  相似文献   
69.
The focus of this article is to review recent techniques in proteomic analysis of ocular fluids. These fluids include tears, aqueous humor, and vitreous, they will also be compared to serum analysis. Furthermore, we attempt to summarize some disease correlated biomarkers in ocular fluids that were discovered through different proteomic techniques in eye diseases like dry eye, glaucoma, age-related macular degeneration, uveitis, or diabetic retinopathy. This review is trying to point out the importance of these biomarkers for clinical applications.  相似文献   
70.
Colorectal cancer is the second leading cause of cancer death, and it develops from benign colorectal adenomas in over 95% of patients. Early detection of these cancer precursors by screening tests and their removal can potentially eradicate more than 95% of colorectal cancers before they develop. To discover sensitive and specific biomarkers for improvement of pre‐clinical diagnosis of colorectal adenoma and cancer, we analysed in two independent studies (n = 87 and n = 83 patients) serum samples from colorectal cancer (stage III), colorectal adenoma and control patients using SELDI‐TOF‐MS. Extensive statistical analysis was performed to establish homogeneous patient groups based on their clinical data. Two biomarkers that were each able to distinguish control patients from either colorectal adenoma or colorectal cancer patients (p<0.001) were identified as transthyretin (pre‐albumin) and C3a‐desArg by MS/MS and were further validated by antibody‐based assays (radial immunodiffusion, ELISA). A combination of both proteins clearly indicated the presence of colorectal adenoma or carcinoma. Using a cut‐off of <0.225 g/L for transthyretin and >1974 ng/mL for C3a‐desArg, we found a sensitivity and specificity for colorectal adenoma of 96% and 70%, respectively.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号