首页 | 官方网站   微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   2716篇
  免费   130篇
  国内免费   2篇
工业技术   2848篇
  2023年   33篇
  2022年   78篇
  2021年   111篇
  2020年   63篇
  2019年   54篇
  2018年   63篇
  2017年   74篇
  2016年   91篇
  2015年   55篇
  2014年   86篇
  2013年   163篇
  2012年   133篇
  2011年   170篇
  2010年   115篇
  2009年   133篇
  2008年   118篇
  2007年   91篇
  2006年   86篇
  2005年   74篇
  2004年   53篇
  2003年   65篇
  2002年   52篇
  2001年   36篇
  2000年   32篇
  1999年   47篇
  1998年   196篇
  1997年   116篇
  1996年   97篇
  1995年   44篇
  1994年   52篇
  1993年   46篇
  1992年   22篇
  1991年   14篇
  1990年   9篇
  1989年   22篇
  1988年   11篇
  1987年   9篇
  1986年   17篇
  1985年   17篇
  1984年   8篇
  1983年   10篇
  1982年   8篇
  1981年   12篇
  1980年   4篇
  1979年   4篇
  1977年   8篇
  1976年   15篇
  1974年   3篇
  1969年   3篇
  1967年   7篇
排序方式: 共有2848条查询结果,搜索用时 15 毫秒
61.

Context

Adopting IT innovation in organizations is a complex decision process driven by technical, social and economic issues. Thus, those organizations that decide to adopt innovation take a decision of uncertain success of implementation, as the actual use of a new technology might not be the one expected. The misalignment between planned and effective use of innovation is called assimilation gap.

Objective

This research aims at defining a quantitative instrument for measuring the assimilation gap and applying it to the case of the adoption of OSS.

Method

In this paper, we use the theory of path dependence and increasing returns of Arthur. In particular, we model the use of software applications (planned or actual) by stochastic processes defined by the daily amounts of files created with the applications. We quantify the assimilation gap by comparing the resulting models by measures of proximity.

Results

We apply and validate our method to a real case study of introduction of OpenOffice. We have found a gap between the planned and the effective use despite well-defined directives to use the new OS technology. These findings suggest a need of strategy re-calibration that takes into account environmental factors and individual attitudes.

Conclusions

The theory of path dependence is a valid instrument to model the assimilation gap provided information on strategy toward innovation and quantitative data on actual use are available.  相似文献   
62.
Coordinated multirobot exploration involves autonomous discovering and mapping of the features of initially unknown environments by using multiple robots. Autonomously exploring mobile robots are usually driven, both in selecting locations to visit and in assigning them to robots, by knowledge of the already explored portions of the environment, often represented in a metric map. In the literature, some works addressed the use of semantic knowledge in exploration, which, embedded in a semantic map, associates spatial concepts (like ‘rooms’ and ‘corridors’) with metric entities, showing its effectiveness in improving the total area explored by robots. In this paper, we build on these results and propose a system that exploits semantic information to push robots to explore relevant areas of initially unknown environments, according to a priori information provided by human users. Discovery of relevant areas is significant in some search and rescue settings, in which human rescuers can instruct robots to search for victims in specific areas, for example in cubicles if a disaster happened in an office building during working hours. We propose to speed up the exploration of specific areas by using semantic information both to select locations to visit and to determine the number of robots to allocate to those locations. In this way, for example, more robots could be assigned to a candidate location in a corridor, so the attached rooms can be explored faster. We tested our semantic-based multirobot exploration system within a reliable robot simulator and we evaluated its performance in realistic search and rescue indoor settings with respect to state-of-the-art approaches.  相似文献   
63.
64.
The recent availability of reliable schemes for physically unclonable constants (PUC) opens interesting possibilities in the field of security. In this paper, we explore the possibility of using PUCs to embed in a chip random permutations to be used, for example, as building blocks in cryptographic constructions such as sponge functions, substitution–permutation networks, and so on. We show that the most difficult part is the generation of random integers using as the only randomness source the bit-string produced by the PUC. In order to solve the integer generation problem, we propose a partial rejection method that allows the designer to trade-off between entropy and efficiency. The results show that the proposed schemes can be implemented with reasonable complexity.  相似文献   
65.
We examine four approaches for dealing with the logical omniscience problem and their potential applicability: the syntactic approach, awareness, algorithmic knowledge, and impossible possible worlds. Although in some settings these approaches are equi-expressive and can capture all epistemic states, in other settings of interest (especially with probability in the picture), we show that they are not equi-expressive. We then consider the pragmatics of dealing with logical omniscience—how to choose an approach and construct an appropriate model.  相似文献   
66.
The design of an adaptive learning regulator is addressed for uncertain minimum phase linear systems (with known bounds, known upper bound on system order, known relative degree, known high frequency gain sign) and for unknown exosystems (with unknown order, uncertain frequencies). On the basis of a known bound on system uncertainties and a known bound on the modeled exosystem frequencies, a new adaptive output error feedback control algorithm is proposed which guarantees exponential convergence of both the output and the control input errors into residual bounds which decrease as the exosystem modeling error decreases. Exponential convergence of both errors to zero is obtained when the regulator exactly models all exosystem excited frequencies, while asymptotic convergence of both errors to zero is achieved when the actual exosystem is overmodeled by the regulator. The new algorithm generalizes existing learning controllers since, in the case of periodic references and/or disturbances, the knowledge of the period is not required.  相似文献   
67.
68.
An alternative procedure for drought risk assessment and for the mitigation of drought risk is proposed in the paper. An analysis of the relationship between failure of water supply systems and reservoir volumes for the urban area of Firenze in central Tuscany, in central Italy, is performed. Long term simulations are carried out using the software package WEAP. A simplified model of the water resources system is built to assess the threshold values and the management rules. The probability to have definite degree of shortage in the water supply system is evaluated in function of the volume stored in the reservoir at the beginning of the month with Monte Carlo simulations. The reservoir levels and volumes are simulated using time series of the period 1970–2005. Four scenarios (i.e. normal, pre-alert, alert and emergency) associated with different levels of severity of drought are defined. Threshold values are identified considering the probability to assure a given fraction of the demand in a certain time horizon, and are calibrated with an optimization method, which try to minimize the water shortages, especially the heavier. The critical situations are assessed month by month in order to evaluate optimal management rules during the year and avoid conditions of total water shortage.  相似文献   
69.
This paper addresses the problem of target coverage for wireless sensor networks, where the sensing range of sensors can vary, thereby saving energy when only close targets need to be monitored. Two versions of this problem are addressed. In the first version, sensing ranges are supposed to be continuously adjustable (up to the maximum sensing range). In the second version, sensing ranges have to be chosen among a set of predefined values common to all sensors. An exact approach based on a column generation algorithm is proposed for solving these problems. The use of a genetic algorithm within the column generation scheme significantly decreases computation time, which results in an efficient exact approach.  相似文献   
70.
Experimental tests are described to check solid 241Am radioactive sources used to monitor operation of liquid xenon detectors. In particular, radioactive leakage was tested in extreme temperature conditions following immersion in liquid nitrogen for different time periods. No radioactivity loss was detected from the sources considered. The paper describes the source characteristics, test methods and results obtained.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号