首页 | 官方网站   微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   484篇
  免费   11篇
工业技术   495篇
  2024年   1篇
  2023年   5篇
  2022年   7篇
  2021年   8篇
  2020年   5篇
  2019年   7篇
  2018年   13篇
  2017年   14篇
  2016年   13篇
  2015年   12篇
  2014年   23篇
  2013年   30篇
  2012年   34篇
  2011年   38篇
  2010年   25篇
  2009年   32篇
  2008年   41篇
  2007年   26篇
  2006年   22篇
  2005年   13篇
  2004年   16篇
  2003年   13篇
  2002年   14篇
  2001年   9篇
  2000年   7篇
  1999年   5篇
  1998年   10篇
  1997年   6篇
  1996年   5篇
  1995年   8篇
  1994年   5篇
  1993年   4篇
  1992年   2篇
  1990年   1篇
  1988年   4篇
  1987年   1篇
  1986年   2篇
  1985年   1篇
  1982年   2篇
  1981年   1篇
  1980年   2篇
  1979年   2篇
  1977年   2篇
  1975年   4篇
排序方式: 共有495条查询结果,搜索用时 15 毫秒
1.
2.
Traditional approach to clustering is to fit a model (partition or prototypes) for the given data. We propose a completely opposite approach by fitting the data into a given clustering model that is optimal for similar pathological data of equal size and dimensions. We then perform inverse transform from this pathological data back to the original data while refining the optimal clustering structure during the process. The key idea is that we do not need to find optimal global allocation of the prototypes. Instead, we only need to perform local fine-tuning of the clustering prototypes during the transformation in order to preserve the already optimal clustering structure.  相似文献   
3.
Human movement in virtual environments (VEs) is a largely unstudied area, and there are no well-established methods of measuring it in VEs. Consequently, it is unclear how movement affects the experiential side of VEs. We introduce a novel method of measuring and modelling human movement. A specific information entropy-based modelling method enabled us to identify different movement patterns and analyse the experiential components related to them. The data was collected by registering the movement patterns of 68 participants who were in a virtual house doing a search task. The experiential side of the VE was measured with the Experimental Virtual Environment Questionnaire (EVEQ). Four movement patterns were identified. In addition, fluent movement in VEs was related to a high sense of presence. Moreover, the participants who moved fluently in the environment assessed their skills high. The results show how movement is related the way in which people experience the VE. The movement analysis method introduced here is applicable to other related research areas as well.  相似文献   
4.
It is widely agreed that employee non-adherence to information security policies poses a major problem for organizations. Previous research has pointed to the potential of theories of moral reasoning to better understand this problem. However, we find no empirical studies that examine the influence of moral reasoning on compliance with information security policies. We address this research gap by proposing a theoretical model that explains non-compliance in terms of moral reasoning and values. The model integrates two well-known psychological theories: the Theory of Cognitive Moral Development by Kohlberg and the Theory of Motivational Types of Values by Schwartz. Our empirical findings largely support the proposed model and suggest implications for practice and research on how to improve information security policy compliance.  相似文献   
5.
A quantum multimeter is a programmable device that can implement measurements of different observables depending on the programming quantum state inserted into it. The advantage of this arrangement over a single-purpose device is in its versatility: one can realize various measurements simply by changing the programming state. The classical manipulation of measurement output data is known as post-processing. In this work we study the post-processing assisted quantum programming, which is a protocol where quantum programming and classical post-processing are combined. We provide examples showing that these two processes combined can be more efficient than either of them used separately. Furthermore, we derive an inequality relating the programming resources to their corresponding programmed observables, thereby enabling us to study the limitations on post-processing assisted quantum programming.  相似文献   
6.
7.
We report a study where software project risk factors were solicited in Nigeria. The study repeats a research design, which has been used in a Delphi study in the U.S., Finland, and Hong Kong to rank software development risks. The study produces a rank-order list of software risk factors and compares results with the earlier study, showing significant differences. Obtained rankings signal the importance of the infrastructure related and socio-economic software risks in developing countries like Nigeria. This demonstrates the importance of understanding the broader socio-economic context in identifying and managing software risks. The study also shows that some risks in Nigeria are located on a different scale. The choice of contingent mitigation strategies of project managers play a less important role, because the risks are so deeply engrained with the poor quality of basic infrastructure services.  相似文献   
8.
The problem of weight initialization in multilayer perceptron networks is considered. A new computationally simple weight initialization method based on the usage of reference patterns is presented. A reference pattern is a vector which is used to represent data points that fall in its vicinity in the data space. On one hand, the proposed method aims to set the initial weight values to be such that inputs to network nodes are within the active region (in other words, nodes are not saturated). On the other hand, the goal is to distribute the discriminant functions formed by the hidden units evenly into the input space area where training data is located. The proposed method is tested with the widely used two-spirals classification benchmark problem and channel equalization problem where several alternatives for obtaining suitable reference patterns are investigated. Also, the effect of the initialization is studied when two commonly used cost functions are used in the training phase. These are the mean square error and relative entropy cost functions. A comparison with the conventional random initialization shows that significant improvement in convergence can be achieved with the proposed method. In addition, the computational cost of the initialization was found to be negligible compared with the cost of training.  相似文献   
9.
10.
The open source approach to software development has been used by software organizations in tandem with their existing business models, which are based on proprietary software licensing. This led to the creation of hybrid business models that merge open source and proprietary paradigms. This paper explores the practices used by software product vendors using hybrid business models and proposes strategies emerging out of these practices using interpretive, single case study research design.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号