首页 | 官方网站   微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   2847篇
  免费   203篇
  国内免费   3篇
工业技术   3053篇
  2024年   8篇
  2023年   29篇
  2022年   52篇
  2021年   148篇
  2020年   112篇
  2019年   123篇
  2018年   129篇
  2017年   127篇
  2016年   132篇
  2015年   95篇
  2014年   132篇
  2013年   249篇
  2012年   189篇
  2011年   199篇
  2010年   162篇
  2009年   190篇
  2008年   137篇
  2007年   113篇
  2006年   93篇
  2005年   57篇
  2004年   50篇
  2003年   56篇
  2002年   59篇
  2001年   31篇
  2000年   24篇
  1999年   26篇
  1998年   67篇
  1997年   56篇
  1996年   39篇
  1995年   28篇
  1994年   22篇
  1993年   16篇
  1992年   12篇
  1991年   10篇
  1990年   5篇
  1989年   10篇
  1988年   5篇
  1987年   4篇
  1986年   8篇
  1985年   5篇
  1981年   2篇
  1980年   7篇
  1979年   6篇
  1978年   3篇
  1977年   5篇
  1976年   3篇
  1973年   3篇
  1970年   3篇
  1968年   3篇
  1967年   2篇
排序方式: 共有3053条查询结果,搜索用时 15 毫秒
61.
62.
Facilitating meetings is not an easy task. To assist the facilitator, we have been designing intelligent support systems, which can help contextual sensemaking, decision making and action. However, these systems are constructed based on behavioral models that provide guidelines to understand participant behaviors. This paper presents an ontology to describe participants’ behaviors in collaborative design meetings and rules that correlate them with the group’s acceptance of the final product. This ontology describes the group dynamics at collocated meetings, using verbal and non-verbal cues of attention shifts and attention maintenance as its basic constructs. The objective of creating this ontology was to better understand face-to-face meetings to eventually help meeting facilitators identify issues that may lead to dissatisfaction with the final product through behavioral cues. The ontology was derived through extensive analysis of a series of engineering design session videos. The design group was composed of experts with similar backgrounds, but working in different divisions of the same company. Different points of view were argued and decisions were made at the end of each meeting. After each meeting, participants were asked to asynchronously commit to the decisions made in the group. Our ontology can be used to identify the factors that lead to an undesired outcome, and now serves as a basis for a new project, which uses rules to support design meetings, improve final artifact acceptance and reduce rework. Our conclusions point out correlations between designers’ behaviors and future artifact acceptance and actions that interrupt or bring back group attention. The ontology was validated through application to other meeting situations. These findings may guide software developers in the creation of tools to support group design, and may be applied by an intelligent system.  相似文献   
63.
This paper presents modular dynamics for dual-arms, expressed in terms of the kinematics and dynamics of each of the stand-alone manipulators. The two arms are controlled as a single manipulator in the task space that is relative to the two end-effectors of the dual-arm robot. A modular relative Jacobian, derived from a previous work, is used which is expressed in terms of the stand-alone manipulator Jacobians. The task space inertia is expressed in terms of the Jacobians and dynamics of each of the stand-alone manipulators. When manipulators are combined and controlled as a single manipulator, as in the case of dual-arms, our proposed approach will not require an entirely new dynamics model for the resulting combined manipulator. But one will use the existing Jacobians and dynamics model for each of the stand-alone manipulators to come up with the dynamics model of the combined manipulator. A dual-arm KUKA is used in the experimental implementation.  相似文献   
64.
Deduplication is the task of identifying the entities in a data set which refer to the same real world object. Over the last decades, this problem has been largely investigated and many techniques have been proposed to improve the efficiency and effectiveness of the deduplication algorithms. As data sets become larger, such algorithms may generate critical bottlenecks regarding memory usage and execution time. In this context, cloud computing environments have been used for scaling out data quality algorithms. In this paper, we investigate the efficacy of different machine learning techniques for scaling out virtual clusters for the execution of deduplication algorithms under predefined time restrictions. We also propose specific heuristics (Best Performing Allocation, Probabilistic Best Performing Allocation, Tunable Allocation, Adaptive Allocation and Sliced Training Data) which, together with the machine learning techniques, are able to tune the virtual cluster estimations as demands fluctuate over time. The experiments we have carried out using multiple scale data sets have provided many insights regarding the adequacy of the considered machine learning algorithms and proposed heuristics for tackling cloud computing provisioning.  相似文献   
65.
Cloud computing systems handle large volumes of data by using almost unlimited computational resources, while spatial data warehouses (SDWs) are multidimensional databases that store huge volumes of both spatial data and conventional data. Cloud computing environments have been considered adequate to host voluminous databases, process analytical workloads and deliver database as a service, while spatial online analytical processing (spatial OLAP) queries issued over SDWs are intrinsically analytical. However, hosting a SDW in the cloud and processing spatial OLAP queries over such database impose novel obstacles. In this article, we introduce novel concepts as cloud SDW and spatial OLAP as a service, and afterwards detail the design of novel schemas for cloud SDW and spatial OLAP query processing over cloud SDW. Furthermore, we evaluate the performance to process spatial OLAP queries in cloud SDWs using our own query processor aided by a cloud spatial index. Moreover, we describe the cloud spatial bitmap index to improve the performance to process spatial OLAP queries in cloud SDWs, and assess it through an experimental evaluation. Results derived from our experiments revealed that such index was capable to reduce the query response time from 58.20 up to 98.89 %.  相似文献   
66.
Nowadays, the prevailing use of networks based on traditional centralized management systems reflects on a fast increase of the management costs. The growth in the number of network equipments and services reinforces the need to distribute the management responsibilities throughout the network devices. In this approach, each device executes common network management functionalities, being part of the overall network management platform. In this paper, we present a Unified Distributed Network Management (UDNM) framework that provides a unified (wired and wireless) management network solution, where further different network services can take part of this infrastructure, e.g., flow monitoring, accurate routing decisions, distributed policies dissemination, etc. This framework is divided in two main components: (A) Situation awareness, which sets up initial information through bootstrapping, discovery, fault-management process and exchange of management information; (B) Autonomic Decision System (ADS) that performs distributed decisions in the network with incomplete information. We deploy the UDNM framework in a testbed which involves two cities (\(\approx\)250 km between), different standards (IEEE 802.3, IEEE 802.11 and IEEE 802.16e) and network technologies, such as, wired virtual grid, wireless ad-hoc gateways, ad-hoc mobile access devices. The UDNM framework integrates management functionalities into the managed devices, proving to be a lightweight and easy-respond framework. The performance analysis shows that the UDNM framework is feasible to unify devices management functionalities and to take accurate decisions on top of a real network.  相似文献   
67.
Minimal Learning Machine (MLM) is a recently proposed supervised learning algorithm with performance comparable to most state-of-the-art machine learning methods. In this work, we propose ensemble methods for classification and regression using MLMs. The goal of ensemble strategies is to produce more robust and accurate models when compared to a single classifier or regression model. Despite its successful application, MLM employs a computationally intensive optimization problem as part of its test procedure (out-of-sample data estimation). This becomes even more noticeable in the context of ensemble learning, where multiple models are used. Aiming to provide fast alternatives to the standard MLM, we also propose the Nearest Neighbor Minimal Learning Machine and the Cubic Equation Minimal Learning Machine to cope with classification and single-output regression problems, respectively. The experimental assessment conducted on real-world datasets reports that ensemble of fast MLMs perform comparably or superiorly to reference machine learning algorithms.  相似文献   
68.
Compromising legitimate accounts has been the most used strategy to spread malicious content on OSN (Online Social Network). To address this problem, we propose a pure text mining approach to check if an account has been compromised based on its posts content. In the first step, the proposed approach extracts the writing style from the user account. The second step comprehends the k-Nearest Neighbors algorithm (k-NN) to evaluate the post content and identify the user. Finally, Baseline Updating (third step) consists of a continuous updating of the user baseline to support the current trends and seasonality issues of user’s posts. Experiments were carried out using a dataset from Twitter composed by tweets of 1000 users. All the three steps were individually evaluated, and the results show that the developed method is stable and can detect the compromised accounts. An important observation is the Baseline Updating contribution, which leads to an enhancement of accuracy superior of 60 %. Regarding average accuracy, the developed method achieved results over 93 %.  相似文献   
69.
Feature annotations (e.g., code fragments guarded by #ifdef C-preprocessor directives) control code extensions related to features. Feature annotations have long been said to be undesirable. When maintaining features that control many annotations, there is a high risk of ripple effects. Also, excessive use of feature annotations leads to code clutter, hinder program comprehension and harden maintenance. To prevent such problems, developers should monitor the use of feature annotations, for example, by setting acceptable thresholds. Interestingly, little is known about how to extract thresholds in practice, and which values are representative for feature-related metrics. To address this issue, we analyze the statistical distribution of three feature-related metrics collected from a corpus of 20 well-known and long-lived C-preprocessor-based systems from different domains. We consider three metrics: scattering degree of feature constants, tangling degree of feature expressions, and nesting depth of preprocessor annotations. Our findings show that feature scattering is highly skewed; in 14 systems (70 %), the scattering distributions match a power law, making averages and standard deviations unreliable limits. Regarding tangling and nesting, the values tend to follow a uniform distribution; although outliers exist, they have little impact on the mean, suggesting that central statistics measures are reliable thresholds for tangling and nesting. Following our findings, we then propose thresholds from our benchmark data, as a basis for further investigations.  相似文献   
70.
If a wireless sensor network (WSN) is to be completely integrated into the Internet as part of the Internet of Things (IoT), it is necessary to consider various security challenges, such as the creation of a secure channel between an Internet host and a sensor node. In order to create such a channel, it is necessary to provide key management mechanisms that allow two remote devices to negotiate certain security credentials (e.g. secret keys) that will be used to protect the information flow. In this paper we will analyse not only the applicability of existing mechanisms such as public key cryptography and pre-shared keys for sensor nodes in the IoT context, but also the applicability of those link-layer oriented key management systems (KMS) whose original purpose is to provide shared keys for sensor nodes belonging to the same WSN.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号