首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   97篇
  免费   0篇
教育   23篇
科学研究   34篇
各国文化   2篇
体育   13篇
文化理论   7篇
信息传播   18篇
  2022年   2篇
  2021年   2篇
  2019年   5篇
  2018年   7篇
  2017年   8篇
  2016年   11篇
  2015年   5篇
  2014年   8篇
  2013年   19篇
  2012年   6篇
  2011年   5篇
  2010年   3篇
  2009年   3篇
  2008年   3篇
  2007年   1篇
  2006年   2篇
  2005年   2篇
  2003年   1篇
  2002年   2篇
  1999年   1篇
  1994年   1篇
排序方式: 共有97条查询结果,搜索用时 15 毫秒
91.
Constrained control for stochastic linear systems is generally a difficult task due to the possible infeasibility of state constraints. In this paper, we focus on a finite control horizon and propose a design methodology where the constrained control problem is formulated as a chance-constrained optimization problem depending on some parameter. This parameter can be tuned so as to decide the appropriate trade-off between control cost minimization and state constraints satisfaction. An approximate solution is computed via a randomized algorithm. Precise guarantees about its feasibility for the original chance-constrained problem are provided. A numerical example shows the efficacy of the proposed methodology.  相似文献   
92.
Kleinbergs HITS algorithm (Kleinberg 1999), which was originally developed in a Web context, tries to infer the authoritativeness of a Web page in relation to a specific query using the structure of a subgraph of the Web graph, which is obtained considering this specific query. Recent applications of this algorithm in contexts far removed from that of Web searching (Bacchin, Ferro and Melucci 2002, Ng et al. 2001) inspired us to study the algorithm in the abstract, independently of its particular applications, trying to mathematically illuminate its behaviour. In the present paper we detail this theoretical analysis. The original work starts from the definition of a revised and more general version of the algorithm, which includes the classic one as a particular case. We perform an analysis of the structure of two particular matrices, essential to studying the behaviour of the algorithm, and we prove the convergence of the algorithm in the most general case, finding the analytic expression of the vectors to which it converges. Then we study the symmetry of the algorithm and prove the equivalence between the existence of symmetry and the independence from the order of execution of some basic operations on initial vectors. Finally, we expound some interesting consequences of our theoretical results.Supported in part by a grant from the Italian National Research Council (CNR) research project Technologies and Services for Enhanced Content Delivery.  相似文献   
93.
Why do new technology-based firms (NTBFs) cooperate? Starting from Teece's [Teece, D.J., 1986. Profiting from technological innovation: implications for integration, collaboration, licensing, and public policy. Research Policy 15, 285-305] conceptual framework and taking advantage of subsequent literature on alliance formation in the resource and competence-based tradition and in the social structure perspective, we derive an empirical model that aims at highlighting the inducements and obstacles that these firms face in alliance formation according to firm-specific characteristics and the nature of the alliance. In particular, a distinction is made between exploitative commercial alliances and explorative technological alliances. The econometric estimates, based on a large sample of Italian young high-tech firms that are observed from 1994 to 2003, provide strong evidence supporting two key intuitions of Teece's work. First, the “combination of specialized complementary assets” appears to be a key driver of the formation of exploitative commercial alliances by NTBFs. More specifically, patent holding affects positively the likelihood to establish commercial alliances, but this propensity is found to rapidly decrease with firm size, suggesting that as long as NTBFs become larger and possess specialized commercial assets their urge for commercial alliances diminishes. Second, following the parallelism set forth by Teece between search for alliance partners and access to external financing, the analysis indicates that potentially beneficial alliances may not take place because of the high transaction costs faced by smaller NTBFs. In this respect, our results clearly support the view that sponsor institutions as public research organizations, venture and corporate venture capitalists may sensibly reduce these costs and that their role crucially depends on both the identity of the sponsor and the type of alliance.  相似文献   
94.
Vividness and controllability of relaxing and energizing imagery by efficient and less efficient imagers.  相似文献   
95.
Several recent reports pointed out how the practice of using a “second screen” while following a television program is becoming an increasingly widespread phenomenon. When the secondary device is used to read or to comment about a watched program, most of the discussion takes place on popular social media such as Facebook and Twitter. Previous research has shown that the analysis of these contents could lead to a better understanding of the behavior of networked publics and of the structure of the show itself. Nevertheless most of the existing research is focused on the content only and focused on a single episode analysis or on big media events. Leveraging this background, this article presents instead a study focused on the relationships between content and users across an entire airing season of a TV program. Through a quantitative network analysis of the tweets produced during 25 episodes of the Italian political talks show Servizio Pubblico, we identified a small loyal group of viewers. Despite the differences in quantity of content produced, the loyal viewers do not show any sign of forming a community-like structure. We also performed a qualitative analysis of the tweets produced during one specific episode and discussed the elements of the TV show that generated the higher level of engagement on Twitter.  相似文献   
96.
There is currently a growing interest in control of stretching of DNA inside nanoconfined regions due to the possibility to analyze and manipulate single biomolecules for applications such as DNA mapping and barcoding, which are based on stretching the DNA in a linear fashion. In the present work, we couple Finite Element Methods and Monte Carlo simulations in order to study the conformation of DNA molecules confined in nanofluidic channels with neutral and charged walls. We find that the electrostatic forces become more and more important when lowering the ionic strength of the solution. The influence of the nanochannel cross section geometry is also studied by evaluating the DNA elongation in square, rectangular, and triangular channels. We demonstrate that coupling electrostatically interacting walls with a triangular geometry is an efficient way to stretch DNA molecules at the scale of hundreds of nanometers. The paper reports experimental observations of λ-DNA molecules in poly(dimethylsiloxane) nanochannels filled with solutions of different ionic strength. The results are in good agreement with the theoretical predictions, confirming the crucial role of the electrostatic repulsion of the constraining walls on the molecule stretching.  相似文献   
97.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号