全文获取类型
收费全文 | 253篇 |
免费 | 30篇 |
国内免费 | 4篇 |
专业分类
化学 | 13篇 |
力学 | 1篇 |
综合类 | 10篇 |
数学 | 64篇 |
物理学 | 19篇 |
无线电 | 180篇 |
出版年
2025年 | 2篇 |
2024年 | 5篇 |
2023年 | 9篇 |
2022年 | 11篇 |
2021年 | 15篇 |
2020年 | 12篇 |
2019年 | 8篇 |
2018年 | 10篇 |
2017年 | 8篇 |
2016年 | 12篇 |
2015年 | 14篇 |
2014年 | 15篇 |
2013年 | 27篇 |
2012年 | 15篇 |
2011年 | 16篇 |
2010年 | 13篇 |
2009年 | 9篇 |
2008年 | 8篇 |
2007年 | 14篇 |
2006年 | 15篇 |
2005年 | 16篇 |
2004年 | 8篇 |
2003年 | 7篇 |
2002年 | 7篇 |
2001年 | 2篇 |
2000年 | 1篇 |
1999年 | 2篇 |
1998年 | 1篇 |
1997年 | 2篇 |
1996年 | 2篇 |
1959年 | 1篇 |
排序方式: 共有287条查询结果,搜索用时 15 毫秒
81.
In this paper, we propose a user‐centric conflict management method for media services which exploits personal companions for the harmonious detection and resolution of service conflicts. To detect conflicts based on the varying characteristics of individual users, the proposed method exploits the unified context describing all users attempting to access media services. It recommends and mediates users' preferred media contents through a shared screen and personal companions to resolve the detected conflicts. During the recommendation, a list of preferred media contents is displayed on the shared screen, and a personally preferred content list is shown on the user's personal companion comprising the selection of media contents. Mediation assists the selection of a consensual service by gathering the users' selections and highlighting the common media contents. In experiments carried out in a ubiHome, we observed that recommendations and mediation are useful in harmoniously resolving conflicts by encouraging user participation in conflict situations. 相似文献
82.
对于不同的待映射本体,各种映射策略的表现可能有较大差异,传统的映射方法并没有根据具体语境和策略的可信度进行映射结果集成,对产生的映射对也没有做进一步的语义挖掘。为了解决这个问题,根据本体和谐度对各策略权值进行自适应计算;利用结构语义信息进行语义传播(或利用在线本体作为背景知识)挖掘新的映射对。实验表明改进的方法可以明显提高查准率,获得更准确的映射结果。 相似文献
83.
限制基于上下文的二进制算术解码(CABAD)速度的几个主要环节入手,提出了优化的上下文存储模式,改进的重归一化单元,并使用流水线提高解码速度.在Synopsys公司的CoCentric System Studio平台进行了二进制算术解码器体系结构设计,仿真结果表明,本结构能够满足主要档次(main profile)CIF 30fps的实时解码的要求. 相似文献
84.
G. M. Køien 《Wireless Personal Communications》2007,40(3):443-455
In this paper, we investigate location- and identity privacy issues related to the access procedures. The investigation includes
subscriber identity management, mobility management at the link layer and the security setup (authentication and key agreement)
procedures. The paper also presents a Privacy Enhanced Mobile Authentication and Key Agreement (PEMAKA) protocol that illustrates
the concepts and demonstrates that future mobile systems can provide both improved access security and enhanced subscriber
privacy. 相似文献
85.
With the advent of ubiquitous computing environments, it has become increasingly important for applications to take full advantage of contextual information, such as the user's location, to offer greater services to the user without any explicit requests. In this paper, we propose context‐aware active services based on context‐aware middleware for URC systems (CAMUS). The CAMUS is a middleware that provides context‐aware applications with a development and execution methodology. Accordingly, the applications based on CAMUS respond in a timely fashion to contextual information. This paper presents the system architecture of CAMUS and illustrates the content recommendation and control service agents with the properties, operations, and tasks for context‐aware active services. To evaluate CAMUS, we apply the proposed active services to a TV application domain. We implement and experiment with a TV content recommendation service agent, a control service agent, and TV tasks based on CAMUS. The implemented content recommendation service agent divides the user's preferences into common and specific models to apply other recommendations and applications easily, including the TV content recommendations. 相似文献
86.
文章简要说明了传统人机交互系统所存在的问题并提出了一种新的人机交互系统的设计平台。应用组件设计的思想以及模拟消息映射的技术,采用客户/中间层朋&务器的结构模式,开发了基于该平台的新一代监控软件的服务器程序及客户程序。由于服务器程序和客户程序遵循平台的协议规范,不同的客户程序与服务器程序之间可以使用通用的方式进行数据交换,从而大大加强人机交互程序的扩展性和灵活性。 相似文献
87.
Research Issues in Ad-Hoc Distributed Personal Networking 总被引:1,自引:1,他引:0
This paper discusses the research issues that need to be addressed in order to create a personal distributed environment where
people interact with various companion, embedded, or invisible computers not only in their close vicinity but potentially
anywhere. These systems are called personal networks (PNs). They constitute a category of distributed systems with very specific
characteristics. They are configured in an ad hoc fashion, as the opportunity and the demand arise, to support personal applications.
PNs consist of communicating clusters of personal digital devices, devices shared with other people and even infrastructure-based
systems. At the heart of a PN is a core Personal Area Network (PAN), which is physically associated with the owner of the
PN. Unlike the present PANs that have a geographically limited coverage, the Personal Operating Space, PNs have an unrestricted
geographical span, and incorporate devices into the personal environment regardless of their geographic location. In order
to do this they need the services of infrastructure-based networks and ad-hoc networks to extend their reach. A PN extends
and complements the concept of pervasive computing. We show that PNs introduce new design challenges due to the heterogeneity
of the involved technologies, the need for self-organization, the dynamics of the system composition, the application-driven
nature, the co-operation with infrastructure-based networks, and the security hazards. We discuss the impact of these problems
on network design, assess present and proposed solutions, and identify the research issues.
This revised version was published online in August 2006 with corrections to the Cover Date. 相似文献
88.
We study the interaction between the lattices of relations of members of a general Morita context. The pairs of reversing-order
maps are defined, which determine the dualities between the lattices of ‘closed’ relations. Under rather weak conditions,
these dualities can be composed obtaining the projectivities defined by simple maps.
PACS: 02.10.De,02.10.Hh. 相似文献
89.
Andrej Ule 《Acta Analytica》2004,19(33):9-30
I analyze some classical solutions of the skeptical argument and some of their week points (especially the contextualist solution).
First I have proposed some possible improvement of the contextualist solution (the introduction of the explicit-implicit belief
and knowledge distinction beside the differences in the relevance of some counter-factual alternatives). However, this solution
does not block too fast jumps of the everyday context (where empirical knowledge is possible) into skeptical context (where
empirical knowledge is impossible). Then I analyze some formal analogies between some modal arguments on the contingency of
empirical facts (and the world as whole) and the skeptical arguments against empirical knowledge. I try to show that the skeptical
conclusion “Empirical knowledge does not exist” is logically coherent with the thesis that they are empirical facts and that
we have true belief on them. In order to do that without contradictions I have to accept a non-classical definition of knowledge:
S knows that p:= S is not justified to allow that non-p. Knowledge and justified allowance function here as some pseudo-theoretical
concepts which allow only some partial and conditional definitions by some “empirical” terms and logical conditions. 相似文献
90.
关联情境下物流服务外包商选择的混合型决策分析方法 总被引:1,自引:0,他引:1
现实中影响物流服务外包商选择的诸多因素通常具有主客观特性和关联性,针对此问题给出一种关联情境下物流服务外包商选择的混合型决策分析方法.首先,利用二元语义表示模型分别处理和集结专家给出的语言短语形式的因素关联信息和主观评价信息,并通过多因素关联分析确定因素的重要性和归类;然后,分别定义主客观测度因素的正负理想点,利用范数的概念构建规范化评价矩阵;进一步地,借鉴多准则优化妥协解(VIKOR)法的思想,计算每个备选外包商的群效用值和个体遗憾值以及折衷排序值,并根据折衷排序值选择出最理想的外包商.最后,通过一个实例分析说明给出方法的可行性和实用性. 相似文献