全文获取类型
收费全文 | 673篇 |
免费 | 119篇 |
国内免费 | 8篇 |
专业分类
化学 | 6篇 |
力学 | 5篇 |
综合类 | 11篇 |
数学 | 217篇 |
物理学 | 24篇 |
无线电 | 537篇 |
出版年
2024年 | 1篇 |
2023年 | 10篇 |
2022年 | 29篇 |
2021年 | 32篇 |
2020年 | 36篇 |
2019年 | 13篇 |
2018年 | 24篇 |
2017年 | 43篇 |
2016年 | 37篇 |
2015年 | 43篇 |
2014年 | 69篇 |
2013年 | 52篇 |
2012年 | 61篇 |
2011年 | 63篇 |
2010年 | 31篇 |
2009年 | 26篇 |
2008年 | 34篇 |
2007年 | 33篇 |
2006年 | 24篇 |
2005年 | 25篇 |
2004年 | 13篇 |
2003年 | 14篇 |
2002年 | 14篇 |
2001年 | 8篇 |
2000年 | 22篇 |
1999年 | 7篇 |
1998年 | 4篇 |
1997年 | 6篇 |
1996年 | 6篇 |
1995年 | 6篇 |
1994年 | 2篇 |
1993年 | 1篇 |
1992年 | 1篇 |
1991年 | 1篇 |
1990年 | 3篇 |
1989年 | 2篇 |
1988年 | 3篇 |
1985年 | 1篇 |
排序方式: 共有800条查询结果,搜索用时 15 毫秒
1.
Trust for Ubiquitous,Transparent Collaboration 总被引:1,自引:0,他引:1
In this paper, trust-based recommendations control the exchange of personal information between handheld computers. Combined with explicit risk analysis, this enables unobtrusive information exchange, while limiting access to confidential information. The same model can be applied to a wide range of mobile computing tasks, such as managing personal address books and electronic diaries, to automatically provide an appropriate level of security. Recommendations add structure to the information, by associating categories with data and with each other, with degrees of trust belief and disbelief. Since categories also in turn confer privileges and restrict actions, they are analogous to rôles in a Rôle-Based Access Control system, while principals represent their trust policies in recommendations. Participants first compute their trust in information, by combining their own trust assumptions with others' policies. Recommendations are thus linked together to compute a considered, local trust assessment. Actions are then moderated by a risk assessment, which weighs up costs and benefits, including the cost of the user's time, before deciding whether to allow or forbid the information exchange, or ask for help. By unifying trust assessments and access control, participants can take calculated risks to automatically yet safely share their personal information. 相似文献
2.
Jinyan Fan 《Computational Optimization and Applications》2006,34(2):215-227
In this paper, we present the new trust region method for nonlinear equations with the trust region converging to zero. The
new method preserves the global convergence of the traditional trust region methods in which the trust region radius will
be larger than a positive constant. We study the convergence rate of the new method under the local error bound condition
which is weaker than the nonsingularity. An example given by Y.X. Yuan shows that the convergence rate can not be quadratic.
Finally, some numerical results are given.
This work is supported by Chinese NSFC grants 10401023 and 10371076, Research Grants for Young Teachers of Shanghai Jiao Tong
University, and E-Institute of Computational Sciences of Shanghai Universities.
An erratum to this article is available at . 相似文献
3.
4.
针对我国医患关系日趋紧张,医患矛盾逐渐凸显这一问题,在对中国近五年医患事件进行分析的基础上,分别从信任程度、信息不对称程度、诊疗代价等多个视角出发,利用演化博弈理论和复制动态方程,构建了医患双方合作策略选择演化博弈模型,探究了影响医患关系演化的相关因素。研究表明:从长期来看,医患关系博弈系统存在两种演化路径:主动合作和被动合作;增大医患双方的信任程度,减小医患双方的信息不对称程度,降低医患双方合作成本,增大以政府为主导的仲裁机构对医患双方的奖励和惩罚都将会促使医患双方由被动合作转向主动合作。 相似文献
5.
《Optimization》2012,61(7):857-878
In this article, by means of an active set and limited memory strategy, we propose a trust-region method for box-constrained nonsmooth equations. The global convergence and the superlinear convergence are established under suitable conditions. 相似文献
6.
The rapid growth in the mobile application market presents a significant challenge to find interesting and relevant applications for users. An experimental study was conducted through the use of a specifically designed mobile application, on users’ mobile phones. The goals were; first, to learn about the users’ personality and the applications they downloaded to their mobile phones, second to recommend applications to users via notifications through the use of experimental mobile application and learn about user behavior in mobile environment. The question of how the personality features of users affect their compliance to recommendations is explored in this study. It is found that conscientiousness is positively related with accepting recommended applications and being agreeable is related with the preference for the applications of editor’s choice. Furthermore, in this study, applications owned by the user and the composition of applications under categories and their relation with personality features are explored. It is shown that the number of user owned applications and their category differ according to gender and personality. Having similar applications and the number of applications owned under specific categories increase the probability of accepting recommended applications. 相似文献
7.
《中国邮电高校学报(英文版)》2014
We put forward an algorithm on friend-recommendation of social networking sites based on SimRank and ant colony optimization, which broadens the appliance of the algorithm in this academic question. The algorithm focuses on the existing relationships between the members as the initial measurement and constructs artificial ants’ completed routing graph. Finally, an ordered and limited list of personalized recommendations through recursive optimization is produced. In the end, we verify the algorithm's rationality and validity through simulation and the result shows that it can improve the precision of friend-recommendation. 相似文献
8.
9.
10.
Junghun Kim Sangkyu Park Heecheon Cho Junsang Kim Jae Young Choi 《Telematics and Informatics》2017,34(2):540-547
South Korea has the highest expenditure on telecommunications among OECD countries, drawing national attention to the issue of reducing high prices. In response, the Korean government enacted the Mobile Device Distribution Improvement (MDDI) Act to eliminate information asymmetry by limiting mobile carriers’ mobile handset subsidies to consumers. This study examined factors affecting public trust in the MDDI based by analyzing responses to a questionnaire survey using the ordered probit model. The results show that the knowledge, expectations, and perceived effects of the MDDI have a meaningful effect on public trust in the policy. The results of this study confirm that it is essential for governments to promote their policies by continuously educating the public, especially in this case because the policy has a direct effect on telecommunications expenditures. 相似文献