首页 | 官方网站   微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   795篇
  免费   19篇
  国内免费   28篇
工业技术   842篇
  2024年   2篇
  2023年   11篇
  2022年   10篇
  2021年   25篇
  2020年   22篇
  2019年   11篇
  2018年   29篇
  2017年   28篇
  2016年   47篇
  2015年   38篇
  2014年   55篇
  2013年   60篇
  2012年   55篇
  2011年   58篇
  2010年   61篇
  2009年   53篇
  2008年   63篇
  2007年   47篇
  2006年   59篇
  2005年   36篇
  2004年   16篇
  2003年   21篇
  2002年   11篇
  2001年   7篇
  2000年   4篇
  1999年   7篇
  1998年   4篇
  1996年   1篇
  1994年   1篇
排序方式: 共有842条查询结果,搜索用时 237 毫秒
1.
In the Internet of Things (IoT), a huge amount of valuable data is generated by various IoT applications. As the IoT technologies become more complex, the attack methods are more diversified and can cause serious damages. Thus, establishing a secure IoT network based on user trust evaluation to defend against security threats and ensure the reliability of data source of collected data have become urgent issues, in this paper, a Data Fusion and transfer learning empowered granular Trust Evaluation mechanism (DFTE) is proposed to address the above challenges. Specifically, to meet the granularity demands of trust evaluation, time–space empowered fine/coarse grained trust evaluation models are built utilizing deep transfer learning algorithms based on data fusion. Moreover, to prevent privacy leakage and task sabotage, a dynamic reward and punishment mechanism is developed to encourage honest users by dynamically adjusting the scale of reward or punishment and accurately evaluating users’ trusts. The extensive experiments show that: (i) the proposed DFTE achieves high accuracy of trust evaluation under different granular demands through efficient data fusion; (ii) DFTE performs excellently in participation rate and data reliability.  相似文献   
2.
This paper examines what influences trust in mobile social commerce environment. Drawing on trust-based acceptance model (i.e. cognitive and emotional trust) and online review features (i.e. profile photo, linguistic style, and reported experience), we examine how these factors affect trust in mobile social commerce. Hypotheses were tested using survey data. The results of our model showed that there are significant influences of profile photo, reported experience, cognitive, and emotional trust towards trust in ms-commerce. This work contributes to existing literature by examining the roles of previous trust in mobile payments and online reviews on trust in mobile social commerce.  相似文献   
3.
Risk allocation decisions are of critical importance in project management. The present study proposes an explanation for how risk allocation in a contract motivates a contractor to cooperate with a project owner. Theories of risk allocation and trust were used to motivate the research. Using a survey methodology, we collected data concerning 124 construction projects in China. We found that risk allocation influenced the contractor’s role behavior through the contractor’s feeling of being trusted but not the contractor’s trust in the owner. Feeling of being trusted partially mediated the effect of risk allocation on the contractor’s in-role (i.e., contractual) behavior and fully mediated the effect on extra-role behavior. The study introduces a social and psychological view of the impacts of risk allocation to the project and engineering management literature. We contribute to theory by arguing and demonstrating the mediating effect of trust on the relationship between risk allocation and contractor behavior. From a practical standpoint, we conclude that contractual risk allocation has a significant impact on building a trusting relationship between owners and contractors and that contractors who feel trusted perform both contractually mandated actions and actions external to the contract more diligently, resulting in the likelihood of improved outcomes for both parties.  相似文献   
4.
Web服务在信用信息工程中的应用   总被引:2,自引:2,他引:0  
目前的社会信用信息工程中,许多的政府部门都建立了自己的信用信息数据库,但在政府各级部门数据库之间进行数据交流和共享存在着许多的问题,在许多地方,数据共享还是一片空白。Web服务技术是应用程序通过内联网或者因特网发布和利用软件服务的一种标准机制。利用WEB服务可以方便地实现不同系统之间的数据交换和集成。该文提出利用web服务技术来解决信用信息工程中的信息数据共享问题。并在此基础上提出利用WEB服务工作流技术将信用评估整合到电子商务过程,以实现可信用电子商务  相似文献   
5.
In 1993, the Wildfowl and Wetlands Trust constructed a demonstration reedbed treatment system at its Castle Espie Visitor Centre in Northern Ireland. The objectives of the project included (a) the treatment of septic-tank effluent, (b) the protection of water quality in Strangford Lough, and (c) the establishment of a research base for constructed wetland systems. Parallel beds of equally sized sub-surface and surface flow were constructed and planted, and a research project was initiated to provide data on performance.  相似文献   
6.
作为新型的劫持系统内核技术,Windows Bootkit具有较强的隐蔽性和免杀能力,引发了严峻的计算机安全问题。通过分析研究Windows Bootkit的实现方式,并结合可信计算检测原理,设计了一种基于可信计算技术的Windows Bootkit检测系统,应用结果表明,该系统能检测出各种形式的Windows Bootkit,可有效增强Windows操作系统下计算机的安全性。  相似文献   
7.
The issue of trust is a research problem in emerging open environments, such as ubiquitous networks. Such environments are highly dynamic and they contain diverse number of services and autonomous entities. Entities in open environments have different security needs from services. Trust computations related to the security systems of services necessitate information that meets needs of each entity. Obtaining such information is a challenging issue for entities. In this paper, we propose a model for extracting trust information from the security system of a service based on the needs of an entity. We formally represent security policies and security systems to extract trust information according to needs of an entity. The formal representation ensures an entity to extract trust information about a security property of a service and trust information about whole security system of the service. The proposed model is applied to Dental Clinic Patient Service as a case study with two scenarios. The scenarios are analyzed experimentally with simulations. The experimental evaluation shows that the proposed model provides trust information related to the security system of a service based on the needs of an entity and it is applicable in emerging open environments.  相似文献   
8.
Clegg and Spencer's (2007) model of job design synthesizes and extends recent conceptions of the job design process by incorporating variables such as knowledge, motivation, and trust into a cyclical and dynamic system. The objective of this study was to examine the sequential organization of variables that comprise the model, as a basis from which to justify further investigations of the model's dynamic properties. Data were collected via questionnaires from 432 participants in two work organizations. Results obtained from structural equation modeling are broadly supportive of the proposed relationships between the variables. Implications of this initial study for future research and practice are discussed. © 2011 Wiley Periodicals, Inc.  相似文献   
9.
The viability of networked communities depends on the creation and disclosure of user-generated content and the frequency of user visitation (Facebook 10-K Annual Report, 2012). However, little is known about how to align the interests of user and social networking sites. In this study, we draw upon the principal-agent perspective to extend Pavlou et al.’s uncertainty mitigation model of online exchange relationships (2007) and propose an empirically tested model for aligning the incentives of the principal (user) and the agent (service provider). As suggested by Pavlou et al., we incorporated a multi-dimensional measure of trust: trust of provider and trust of members. The proposed model is empirically tested with survey data from 305 adults aged 20-55. The results support our model, delineating how real individuals with bounded rationality actually make decision about information disclosure under uncertainty in the social networking site context. There is show little to no relationship between online privacy concerns and information disclosure on online social network sites. Perceived benefits provide the linkage between the incentives of principal (user) and agent (provider) while usage intensity demonstrated the most significant impact on information disclosure. We argue that the phenomenon may be explained through Communication Privacy Management Theory. The present study enhances our understanding of agency theory and human judgment theory in the context of social media. Practical implications for understanding and facilitating online social exchange relationships are also discussed.  相似文献   
10.
推荐系统是用来解决当今时代信息过载的重要工具。随着在线社交网络的出现和普及,一些基于网络推荐算法研究的出现,已经引起研究者的广泛关注。信任是社会网络中的重要信息之一,通常用来改进基于社交网络的推荐系统,然而,大多数信任感知的推荐系统忽略了用户有不同行为偏好在不同的兴趣域;本文不仅考虑了用户间特定域信任网络,并且结合推荐项目之间特征属性信息,提出了一种新型社会化推荐算法(H-PMF)。实验表明,H-PMF算法在评分误差和推荐精度上都取得了更好的效果。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号