首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   673篇
  免费   119篇
  国内免费   8篇
化学   6篇
力学   5篇
综合类   11篇
数学   217篇
物理学   24篇
无线电   537篇
  2024年   1篇
  2023年   10篇
  2022年   29篇
  2021年   32篇
  2020年   36篇
  2019年   13篇
  2018年   24篇
  2017年   43篇
  2016年   37篇
  2015年   43篇
  2014年   69篇
  2013年   52篇
  2012年   61篇
  2011年   63篇
  2010年   31篇
  2009年   26篇
  2008年   34篇
  2007年   33篇
  2006年   24篇
  2005年   25篇
  2004年   13篇
  2003年   14篇
  2002年   14篇
  2001年   8篇
  2000年   22篇
  1999年   7篇
  1998年   4篇
  1997年   6篇
  1996年   6篇
  1995年   6篇
  1994年   2篇
  1993年   1篇
  1992年   1篇
  1991年   1篇
  1990年   3篇
  1989年   2篇
  1988年   3篇
  1985年   1篇
排序方式: 共有800条查询结果,搜索用时 15 毫秒
1.
Trust for Ubiquitous,Transparent Collaboration   总被引:1,自引:0,他引:1  
Shand  Brian  Dimmock  Nathan  Bacon  Jean 《Wireless Networks》2004,10(6):711-721
In this paper, trust-based recommendations control the exchange of personal information between handheld computers. Combined with explicit risk analysis, this enables unobtrusive information exchange, while limiting access to confidential information. The same model can be applied to a wide range of mobile computing tasks, such as managing personal address books and electronic diaries, to automatically provide an appropriate level of security. Recommendations add structure to the information, by associating categories with data and with each other, with degrees of trust belief and disbelief. Since categories also in turn confer privileges and restrict actions, they are analogous to rôles in a Rôle-Based Access Control system, while principals represent their trust policies in recommendations. Participants first compute their trust in information, by combining their own trust assumptions with others' policies. Recommendations are thus linked together to compute a considered, local trust assessment. Actions are then moderated by a risk assessment, which weighs up costs and benefits, including the cost of the user's time, before deciding whether to allow or forbid the information exchange, or ask for help. By unifying trust assessments and access control, participants can take calculated risks to automatically yet safely share their personal information.  相似文献   
2.
In this paper, we present the new trust region method for nonlinear equations with the trust region converging to zero. The new method preserves the global convergence of the traditional trust region methods in which the trust region radius will be larger than a positive constant. We study the convergence rate of the new method under the local error bound condition which is weaker than the nonsingularity. An example given by Y.X. Yuan shows that the convergence rate can not be quadratic. Finally, some numerical results are given. This work is supported by Chinese NSFC grants 10401023 and 10371076, Research Grants for Young Teachers of Shanghai Jiao Tong University, and E-Institute of Computational Sciences of Shanghai Universities. An erratum to this article is available at .  相似文献   
3.
把分子结构和分子、离子静电作用力作为影响溶质保留值和选择性的基本点,提出了液相色谱专家系统柱系统推荐的基本规则,由此可以从溶质所包含的基团或官能团的信息进行色谱柱系统推荐。为了验证这些规则的正确性,应用几类常用的或典型的样品从分子结构通道进行液相色谱柱系统推荐,获得满意的结果。  相似文献   
4.
针对我国医患关系日趋紧张,医患矛盾逐渐凸显这一问题,在对中国近五年医患事件进行分析的基础上,分别从信任程度、信息不对称程度、诊疗代价等多个视角出发,利用演化博弈理论和复制动态方程,构建了医患双方合作策略选择演化博弈模型,探究了影响医患关系演化的相关因素。研究表明:从长期来看,医患关系博弈系统存在两种演化路径:主动合作和被动合作;增大医患双方的信任程度,减小医患双方的信息不对称程度,降低医患双方合作成本,增大以政府为主导的仲裁机构对医患双方的奖励和惩罚都将会促使医患双方由被动合作转向主动合作。  相似文献   
5.
《Optimization》2012,61(7):857-878
In this article, by means of an active set and limited memory strategy, we propose a trust-region method for box-constrained nonsmooth equations. The global convergence and the superlinear convergence are established under suitable conditions.  相似文献   
6.
The rapid growth in the mobile application market presents a significant challenge to find interesting and relevant applications for users. An experimental study was conducted through the use of a specifically designed mobile application, on users’ mobile phones. The goals were; first, to learn about the users’ personality and the applications they downloaded to their mobile phones, second to recommend applications to users via notifications through the use of experimental mobile application and learn about user behavior in mobile environment. The question of how the personality features of users affect their compliance to recommendations is explored in this study. It is found that conscientiousness is positively related with accepting recommended applications and being agreeable is related with the preference for the applications of editor’s choice. Furthermore, in this study, applications owned by the user and the composition of applications under categories and their relation with personality features are explored. It is shown that the number of user owned applications and their category differ according to gender and personality. Having similar applications and the number of applications owned under specific categories increase the probability of accepting recommended applications.  相似文献   
7.
We put forward an algorithm on friend-recommendation of social networking sites based on SimRank and ant colony optimization, which broadens the appliance of the algorithm in this academic question. The algorithm focuses on the existing relationships between the members as the initial measurement and constructs artificial ants’ completed routing graph. Finally, an ordered and limited list of personalized recommendations through recursive optimization is produced. In the end, we verify the algorithm's rationality and validity through simulation and the result shows that it can improve the precision of friend-recommendation.  相似文献   
8.
陈佳  杨少鹏  余双波  贾悠 《通信技术》2020,(5):1277-1279
当前,骚扰电话乱象屡禁不止,严重影响了人民群众的正常生活,甚至威胁到个人财产安全,因此简单有效地识别骚扰电话技术成为亟待解决的问题。区别于现有的对电话号码进行黑白名单标记、大数据分析等识别方法,提出基于信任链的骚扰电话预判技术,从可信度量的角度计算来电号码的可靠程度,并针对高危受害群体的典型应用场景进行分析,通过对骚扰电话的预判,降低其受到电话骚扰甚至电话诈骗的可能性。  相似文献   
9.
10.
South Korea has the highest expenditure on telecommunications among OECD countries, drawing national attention to the issue of reducing high prices. In response, the Korean government enacted the Mobile Device Distribution Improvement (MDDI) Act to eliminate information asymmetry by limiting mobile carriers’ mobile handset subsidies to consumers. This study examined factors affecting public trust in the MDDI based by analyzing responses to a questionnaire survey using the ordered probit model. The results show that the knowledge, expectations, and perceived effects of the MDDI have a meaningful effect on public trust in the policy. The results of this study confirm that it is essential for governments to promote their policies by continuously educating the public, especially in this case because the policy has a direct effect on telecommunications expenditures.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号