首页 | 官方网站   微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   2103篇
  免费   211篇
  国内免费   175篇
工业技术   2489篇
  2024年   2篇
  2023年   30篇
  2022年   45篇
  2021年   57篇
  2020年   63篇
  2019年   55篇
  2018年   39篇
  2017年   27篇
  2016年   75篇
  2015年   66篇
  2014年   133篇
  2013年   154篇
  2012年   151篇
  2011年   186篇
  2010年   182篇
  2009年   183篇
  2008年   191篇
  2007年   175篇
  2006年   137篇
  2005年   129篇
  2004年   91篇
  2003年   77篇
  2002年   52篇
  2001年   34篇
  2000年   26篇
  1999年   19篇
  1998年   12篇
  1997年   12篇
  1996年   11篇
  1995年   8篇
  1994年   9篇
  1993年   6篇
  1992年   6篇
  1991年   8篇
  1989年   3篇
  1988年   6篇
  1987年   4篇
  1983年   1篇
  1982年   4篇
  1981年   5篇
  1977年   1篇
  1974年   1篇
  1971年   1篇
  1969年   1篇
  1967年   1篇
  1966年   1篇
  1962年   1篇
  1961年   1篇
  1960年   1篇
  1959年   2篇
排序方式: 共有2489条查询结果,搜索用时 296 毫秒
141.
本文从泛系的观点来分析了Linux操作系统中观控的思想,辩异同的思想,以及形影关系。旨在通过这些实例来说明这些思想,为我们在认识复杂的计算机系统方面寻求理论上的支持。  相似文献   
142.
身份认证系统的设计与实现   总被引:3,自引:0,他引:3  
身份认证就是通过特定手段对用户所声称的身份进行认证的过程,它是实现网络安全的重要机制.本文介绍了动态口令身份认证的实现原理,并在著名的Schnorr身份认证协议的基础上.用Java语言设计并实现了一个动态口令身份认证系统.  相似文献   
143.
刘涛  侯整风 《微机发展》2004,14(3):116-119
椭圆曲线密码体制是基于代数曲线的一种公开密钥密码系统,它的安全性基于有限域上椭圆曲线离散对数问题。文中利用椭圆曲线密码体制对电子公文进行数字签名,以解决身份认证问题。而对于电子公文的加密则采用两种加密机制:利用典型的对称密码体制DES算法对电子公文的内容进行加密,而利用接收方和发送方的基于椭圆曲线密码体制的公开密钥和私有密钥,进行一定的计算得到DES算法进行加密/解密所需要的密钥。将公钥算法和私钥算法的有机结合,解决了密码体制中速度和安全性不能兼顾的问题。  相似文献   
144.
Software agents that play a role in E-commerce and E-government applications involving the Internet often contain information about the identity of their human user such as credit cards and bank accounts. This paper discusses whether this is necessary: whether human users and software agents are allowed to be anonymous under the relevant legal regimes and whether an adequate interaction and balance between law and anonymity can be realised from both the perspective of Computer Systems and the perspective of Law.This paper is an extended and fully revised version of Brazier, Kubbe, Oskamp and Wijngaards (2002) and Brazier, Oskamp, Prins, Schellekens and Wijngaards (2003).  相似文献   
145.
提出融合信息隐藏技术和超混沌加密技术的网络身份证新概念及其生成与验证模型,研究和实现了基于该网络身份证的认证系统,分析其在信息安全和电子商务等领域的应用模型和前景.  相似文献   
146.
Two experiments examined (a) if the gender of a randomly assigned character would affect individuals' inferences about an anonymous partner in computer-mediated communication (CMC) and (b) how the gender inference would moderate informational social influence. In Experiment 1, participants played a trivia game on a gender-biased topic (sports vs. fashion) with their ostensible partner via computer, represented by a gender-marked cartoon character. The results showed that both men and women, despite the arbitrary nature of character assignment, categorized the partner according to the character's gender. However, the effects of the gender inference on conformity were moderated by the topic and the participant's gender. First, when the topic matched the participant's gender, there was no character effect. Second, whereas women used “expertise heuristics”, exhibiting greater conformity to the male-charactered than female-charactered partner on a masculine topic, men displayed greater conformity to the male-charactered than female-charactered partner on a feminine topic, suggesting male resistance to female influence. Using a gender-neutral topic, Experiment 2 confirmed the explanations. Although the character triggered gender-stereotypical perception of the partner, when the gender was not diagnostic of expertise, the character's gender did not affect women's conformity behavior while men nonetheless showed greater conformity to the male-charactered partner.  相似文献   
147.
当用CAD软件系统设计组合夹具时,通过对夹紧力和定位支承反作用力之间的平衡作出评估,即可判定系统的定位可靠性.  相似文献   
148.
Abstract

This paper focuses on two areas of enquiry, the phenomenon of interactivity and how ideas from outside of interaction design can expand our understanding of interactivity. Although generally seen as the user's ability to access information, interactivity's capacity can extend to the shaping of content and meaning. The paper proposes that visualities produced by diasporic individuals reveal the potential of users for reflexivity and intervention. It draws on theories of postcolonial identity and the mixing of cultural meanings of diasporic people to highlight the importance of allowing users to experience autonomy, agency and self-determination in digital media.  相似文献   
149.
针对目前紧急切断阀校验装置集成程度低、检验精度差的现状,研发了一种紧急切断阀综合校验装置。该装置采用气液双相介质组成的循环系统,能够实现压力信号、流量信号的自动采集,可以直接读取数据和曲线图表,依次完成紧急切断阀的密封性能、耐压性能、切断时间性能、过流切断性能的校验。  相似文献   
150.
Sex role stereotyping by players in first-person shooter games and other online gaming environments may encourage a social environment that marginalizes and alienates female players. Consistent with the social identity model of deindividuation effects (SIDE), the anonymity of online games may engender endorsement of group-consistent attitudes and amplification of social stereotyping, such as the adherence to gender norms predicted by expectations states theory. A 2 × 3 × 2 virtual field experiment (N = 520) in an online first-person shooter video game examined effects of a confederate players’ sex, communication style, and skill on players’ compliance with subsequent online friend requests. We found support for the hypothesis that, in general, women would gain more compliance with friend requests than men. We also found support for the hypothesis that women making positive utterances would gain more compliance with friend requests than women making negative utterances, whereas men making negative utterances would gain more compliance with friend requests than men making positive utterances. The hypothesis that player skill (i.e., game scores) would predict compliance with friend requests was not supported. Implications for male and female game players and computer-mediated communication in online gaming environments are discussed.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号