全文获取类型
收费全文 | 4814篇 |
免费 | 751篇 |
国内免费 | 506篇 |
学科分类
工业技术 | 6071篇 |
出版年
2024年 | 21篇 |
2023年 | 72篇 |
2022年 | 181篇 |
2021年 | 199篇 |
2020年 | 231篇 |
2019年 | 146篇 |
2018年 | 144篇 |
2017年 | 156篇 |
2016年 | 227篇 |
2015年 | 245篇 |
2014年 | 379篇 |
2013年 | 339篇 |
2012年 | 386篇 |
2011年 | 473篇 |
2010年 | 359篇 |
2009年 | 322篇 |
2008年 | 361篇 |
2007年 | 396篇 |
2006年 | 320篇 |
2005年 | 237篇 |
2004年 | 198篇 |
2003年 | 158篇 |
2002年 | 124篇 |
2001年 | 86篇 |
2000年 | 72篇 |
1999年 | 53篇 |
1998年 | 34篇 |
1997年 | 31篇 |
1996年 | 25篇 |
1995年 | 9篇 |
1994年 | 17篇 |
1993年 | 13篇 |
1992年 | 5篇 |
1991年 | 8篇 |
1990年 | 4篇 |
1989年 | 6篇 |
1988年 | 4篇 |
1986年 | 3篇 |
1985年 | 5篇 |
1984年 | 1篇 |
1982年 | 1篇 |
1981年 | 3篇 |
1979年 | 2篇 |
1978年 | 3篇 |
1977年 | 1篇 |
1976年 | 7篇 |
1974年 | 1篇 |
1973年 | 1篇 |
1972年 | 1篇 |
1959年 | 1篇 |
排序方式: 共有6071条查询结果,搜索用时 0 毫秒
41.
Due to the fast development in data communication systems and computer networks in recent years, the necessity to protect the secret data has become extremely imperative. Several methods have been proposed to protect the secret data; one of them is the secret sharing scheme. It is a method of distributing a secret K among a finite set of participants, in such a way that only predefined subset of participant is enabled to reconstruct a secret from their shares. A secret sharing scheme realizing uniform access structure described by a graph has received a considerable attention. In this scheme, each vertex represents a participant and each edge represents a minimum authorized subset. In this paper, an independent dominating set of vertices in a graph G is introduced and applied as a novel idea to construct a secret sharing scheme such that the vertices of the graph represent the participants and the dominating set of vertices in G represents the minimal authorized set. While most of the previous schemes were based on the principle of adjacent vertices, the proposed scheme is based upon the principle of non-adjacent vertices. We prove that the scheme is perfect, and the lower bound of the information rate of this new construction is improved when compared to some well-known previous constructions. We include an experiment involving security threats to demonstrate the effectiveness of the proposed scheme. 相似文献
42.
针对在Underlay频谱共享方式下的认知无线网络动态频谱分配问题,在满足主用户服务质量(QoS)的前提下,建立一种非合作博弈模型,并设计其效用函数。在借鉴VCG机制的基础上,设计相应的收益函数,提出一种可以最大化认知无线网络系统吞吐量且保证公平性的分布式动态频谱分配算法。仿真结果表明,该算法收敛速度快、公平性强。 相似文献
43.
44.
按照网上作业平台系统实现目标,完成了系统功能性需求分析。对文件的数据库方式存储和文件系统方式的存储进行了比较,并分析、设计了本系统的存储结构。完成了数据库概念模型设计和数据表物理模型设计,详细给出了数据库关系图。设计并实现了基于Internet的课程网上作业子系统、个人网络硬盘子系统、课程资源库共享等子系统。该系统已经应用到日常的教学管理中,并取得了不错的效果。 相似文献
45.
互联网环境下分享已经成为一种新的趋势,而高校中的知识分享是目前普遍关注的热点问题,随之而来对于数字资源的版权保护面临着更多的挑战。本文以高校为例,从高校的实际情况出发,分析现有的数字资源版权保护模式的实现方式及其存在的问题,并从格式、环节和权限三个方面分别对其进行讨论,提出版权保护模型。 相似文献
46.
47.
Abstract Previous research shows that although collaboration technology can improve the exchange of information during team decision making, one of the challenges is that this better discussion often does not lead to better decisions. In this paper, we investigate the impact of individual information processing on team decision making. We investigated the effects of two types of collaboration technology when participants were either the member of a team majority or a team minority. There was little impact due to the majority/minority, but the use of collaboration technology that required users to categorize the comments they received from others resulted in increased information processing, which in turn led to better decisions and more satisfied participants. 相似文献
48.
Paul Gray 《Information Systems Management》2013,30(4):356-359
Abstract The research in this paper considers the complex and dynamic arrangements for potential and actual knowledge sharing in interorganizational networks. The essence of this stance is that “knowledge” relates to affirmative managerial action beyond the necessary collection of information facilitated through technology. The issue is to determine the nature and extent of the degree of organizational agreement that may be achieved as competitors either cooperate or continue to compete in the face of challenging and pervasive market conditions. The theory relating to network formulation is reviewed, findings from empirical analyses from the experiences from automobile distributors in a large USA city, and one scientific collaborators network are presented. A framework is proposed identifying the factors necessary to initially construct the network and then to further sustain it over time. A number of lessons learned are developed, which are believed to be of value to researchers and practitioners engaged in these processes. 相似文献
49.
针对太湖流域水文遥测系统数据读取和转发效率不高的情况,设计并实现了太湖流域水文遥测系统的共享服务软件,介绍了该软件的架构、设计思路、各模块设计流程、主要功能及其在太湖流域水文遥测系统中的实际安装和应用情况. 相似文献
50.