全文获取类型
收费全文 | 2889篇 |
免费 | 135篇 |
国内免费 | 91篇 |
学科分类
工业技术 | 3115篇 |
出版年
2024年 | 2篇 |
2023年 | 21篇 |
2022年 | 26篇 |
2021年 | 44篇 |
2020年 | 41篇 |
2019年 | 39篇 |
2018年 | 40篇 |
2017年 | 58篇 |
2016年 | 101篇 |
2015年 | 69篇 |
2014年 | 168篇 |
2013年 | 229篇 |
2012年 | 146篇 |
2011年 | 223篇 |
2010年 | 162篇 |
2009年 | 151篇 |
2008年 | 183篇 |
2007年 | 183篇 |
2006年 | 184篇 |
2005年 | 132篇 |
2004年 | 134篇 |
2003年 | 112篇 |
2002年 | 100篇 |
2001年 | 65篇 |
2000年 | 78篇 |
1999年 | 63篇 |
1998年 | 53篇 |
1997年 | 55篇 |
1996年 | 48篇 |
1995年 | 38篇 |
1994年 | 37篇 |
1993年 | 32篇 |
1992年 | 14篇 |
1991年 | 19篇 |
1990年 | 9篇 |
1989年 | 7篇 |
1988年 | 7篇 |
1987年 | 7篇 |
1986年 | 4篇 |
1985年 | 2篇 |
1984年 | 8篇 |
1983年 | 6篇 |
1982年 | 4篇 |
1980年 | 4篇 |
1978年 | 2篇 |
1976年 | 1篇 |
1975年 | 2篇 |
1974年 | 1篇 |
1971年 | 1篇 |
排序方式: 共有3115条查询结果,搜索用时 187 毫秒
71.
Quantitative performance modeling of complex information systems is of immense importance for designing enterprise e-business infrastructures and applications. In this paper, we present a traffic model of a server node in a typical transaction processing middleware system as well as a quantitative framework to model and analyze its performance. A multi-class open queueing network model is presented in which multi-class jobs are admitted to a number of server processes sharing hardware resources including the CPU and the disk. We have developed a viable approximation method, which decomposes the dependent components into their independent counterparts while preserving their relevant characteristics. We have conducted queueing-theoretic delay analyses and verified the approach using simulation. Results demonstrate the strength of our approach in predicting delays, elapsed times and other system performance measures. 相似文献
72.
The aim of our study was to further develop an understanding of social capital in organizational-knowledge-sharing. We first developed a measurement tool and then a theoretical framework in which three social capital factors (social network, social trust, and shared goals) were combined with the theory of reasoned action; their relationships were then examined using confirmatory factoring analysis. We then surveyed of 190 managers from Hong Kong firms, we confirm that a social network and shared goals significantly contributed to a person's volition to share knowledge, and directly contributed to the perceived social pressure of the organization. The social trust has however showed no direct effect on the attitude and subjective norm of sharing knowledge. 相似文献
73.
针对机载光电传感器获得的图像信息的不确定性与模糊性,提出利用D-S证据理论对多图像传感器信息进行融合处理的方法.首先对各图像传感器获得的同一场景图像分别进行预处理,然后对预处理后的图像提取其矩特征,通过与目标图像数据库中图像特征的对比分析,利用灰色系统理论方法获取各传感器的基本概率赋值,最后根据D-S证据理论的组合规则与决策规则获得多图像传感器的融合识别结果.仿真结果表明该方法能提高目标识别的准确度,降低传感器获取的信息的不确定性. 相似文献
74.
75.
目前,制约竞争情报发展的一个关键问题就是情报的收集与分析手段比较落后,远远不能胜任竞争情报系统所蕴含的特点和功效。本文将竞争情报作为一种特殊的知识,吸纳知识发现理论成果和方法,提升现有竞争情报系统的构造技术,真正做到快速、全面、准确和智能化的竞争情报生成和利用。 相似文献
76.
Several results in coding theory (e.g. the Carlitz-Uchiyama bound) show that the weight distributions of certain algebraic codes of lengthn are concentrated aroundn/2 within a range of width n. It is proved in this article that the extreme weights of a linear binary code of sufficiently high dual distance cannot be too close ton/2, the gap being of order n. The tools used involve the Pless identities and the orthogonality properties of Krawtchouk polynomials, as well as estimates on their zeroes. As a by-product upper bounds on the minimum distance of self-dual binary codes are derived. 相似文献
77.
Integrated agri-industrial systems (IAISs), such as sugarcane supply and processing systems, are complex systems and hence generally difficult to understand and manage. The large number factors in IAISs coupled with the complex interrelationships among the factors make it challenging to identify the points of intervention for improving their overall performance. Several approaches, such as the network theory and the Theory of Constraints have been used to identify important factors in systems with variations in success. This paper demonstrates a primary influence vertex approach for identifying and ranking the factors that drive the performance of IAISs. The approach is based on comprehensive causal network analyses and was tested in four relatively diverse large-scale sugarcane milling operations in South Africa. Results from the analyses were found to be consistent with the literature and external knowledge of the milling areas as at the time of the study. It is concluded that the approach can proffer a sound basis from which deeper rooted problems in systems can be identified on an ongoing basis. It is, however, recommended that the approach should be systematically compared with other relevant methods that are used to analyse complex systems. 相似文献
78.
79.
周敏 《网络安全技术与应用》2011,(3):68-69,75
支付系统在经济活动中扮演了重要角色,为了让金融及电子商务等专业学生掌握支付系统的业务流程和让科研人员对支付系统进行研究,有必要建立支付系统的实验环境.本文细致深入地分析了支付系统实验环境应具有的功能、建设目标和软硬件环境,对高校开设支付系统相关的课程和建设实验环境提供了有价值的参考. 相似文献
80.
曹琳琳 《网络安全技术与应用》2011,(12):65-67
目前,网络的发展极大推动了人类文明的进步,网络犯罪问题也络绎不绝的出现,而且呈现出平民化、反社会化、加速化、恶性化的特点,因此越来越成为社会关注的重点问题。网络犯罪作为新世纪各国共同面临的社会问题,理应也从社会学角度出发进行研究分析,本文试图应用社会解体理论,从网络犯罪所处的"虚拟社会"出发,探究其形成的原因,并提出相应的对策。 相似文献