咨询与建议

限定检索结果

文献类型

  • 572 篇 期刊文献
  • 199 篇 会议
  • 102 册 图书
  • 16 篇 学位论文

馆藏范围

  • 889 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 422 篇 工学
    • 225 篇 计算机科学与技术...
    • 91 篇 电气工程
    • 78 篇 机械工程
    • 75 篇 信息与通信工程
    • 50 篇 软件工程
    • 43 篇 控制科学与工程
    • 35 篇 建筑学
    • 30 篇 土木工程
    • 18 篇 电子科学与技术(可...
    • 17 篇 材料科学与工程(可...
    • 16 篇 网络空间安全
    • 12 篇 仪器科学与技术
  • 285 篇 教育学
    • 222 篇 教育学
    • 156 篇 心理学(可授教育学...
  • 155 篇 管理学
    • 134 篇 管理科学与工程(可...
    • 17 篇 图书情报与档案管...
    • 16 篇 工商管理
    • 10 篇 公共管理
  • 72 篇 文学
    • 56 篇 外国语言文学
    • 27 篇 中国语言文学
    • 16 篇 新闻传播学
  • 71 篇 理学
    • 23 篇 化学
    • 22 篇 数学
    • 12 篇 物理学
  • 46 篇 医学
    • 32 篇 临床医学
  • 37 篇 法学
    • 37 篇 社会学
  • 24 篇 艺术学
    • 19 篇 艺术学理论
    • 13 篇 设计学(可授艺术学...
  • 13 篇 哲学
    • 13 篇 哲学
  • 11 篇 经济学
    • 9 篇 应用经济学
  • 4 篇 农学
  • 2 篇 历史学
  • 1 篇 军事学

主题

  • 889 篇 protocol analysi...
  • 101 篇 eric archive
  • 87 篇 cognitive proces...
  • 81 篇 problem solving
  • 80 篇 higher education
  • 63 篇 reading comprehe...
  • 54 篇 foreign countrie...
  • 48 篇 interviews
  • 47 篇 design cognition
  • 46 篇 teaching methods
  • 45 篇 second language ...
  • 40 篇 learning strateg...
  • 40 篇 metacognition
  • 38 篇 college students
  • 37 篇 case studies
  • 33 篇 reading strategi...
  • 32 篇 comparative anal...
  • 32 篇 english (second ...
  • 32 篇 undergraduate st...
  • 28 篇 qualitative rese...

机构

  • 4 篇 univ new south w...
  • 4 篇 univ trier d-542...
  • 3 篇 purdue univ dept...
  • 3 篇 univ n carolina ...
  • 3 篇 sun yat sen univ...
  • 3 篇 univ n carolina ...
  • 3 篇 univ newcastle s...
  • 3 篇 univ sydney key ...
  • 3 篇 tech univ darmst...
  • 3 篇 naval postgradua...
  • 3 篇 univ georgia ath...
  • 2 篇 tech univ denmar...
  • 2 篇 technical univer...
  • 2 篇 utah state univ ...
  • 2 篇 australian fed p...
  • 2 篇 indian inst sci ...
  • 2 篇 univ south austr...
  • 2 篇 univ illinois de...
  • 2 篇 univ strathclyde...
  • 2 篇 s china univ tec...

作者

  • 16 篇 gero john s.
  • 8 篇 lee ju hyun
  • 7 篇 gu ning
  • 6 篇 ostwald michael ...
  • 6 篇 kuesters ralf
  • 5 篇 truderung tomasz
  • 5 篇 yu rongrong
  • 5 篇 xiao ming-ming
  • 4 篇 yu shun-zheng
  • 4 篇 guenther felix
  • 4 篇 fischlin marc
  • 4 篇 cash philip
  • 3 篇 cohen m. i.
  • 3 篇 paterson kenneth...
  • 3 篇 mizuyama hajime
  • 3 篇 valadas rui
  • 3 篇 nogueira antonio
  • 3 篇 christensen bo t...
  • 3 篇 kim mi jeong
  • 3 篇 lawson bryan

语言

  • 866 篇 英文
  • 18 篇 其他
  • 4 篇 中文
  • 1 篇 法文
检索条件"主题词=Protocol Analysis"
889 条 记 录,以下是1-10 订阅
排序:
protocol analysis OF THE CORRESPONDENCE OF VERBAL-BEHAVIOR AND EQUIVALENCE CLASS FORMATION
收藏 引用
JOURNAL OF THE EXPERIMENTAL analysis OF BEHAVIOR 1991年 第3期56卷 489-504页
作者: WULFERT, E DOUGHER, MJ GREENWAY, DE UNIV NEW MEXICO ALBUQUERQUE NM 87131 USA
In two equivalence experiments, a "think aloud" procedure modeled after Ericsson and Simon's (1980) protocol analysis was implemented to examine subjects' covert verbal responses during matching to s... 详细信息
来源: 评论
protocol analysis Data Collection Technique Implemented for Artificial Intelligence Design
收藏 引用
IEEE TRANSACTIONS ON ENGINEERING MANAGEMENT 2023年 71卷 6842页
作者: Rodgers, Waymond Al-Shaikh, Sinan Khalil, Mohamed Univ Hull Hull Univ Business Sch Kingston Upon Hull HU6 7RX England Univ Texas El Paso El Paso TX 79968 USA Univ Calif Riverside Riverside CA 92521 USA Mustansiriyah Univ Fac Management & Econ Accounting Dept Baghdad 14022 Iraq Tanta Univ Fac Commerce Tanta 6632110 Egypt
This article suggests that artificial intelligence (AI) can automate protocol analysis, a form of data analysis in cognitive psychology for inferring the information processes used by individuals from their verbal beh... 详细信息
来源: 评论
protocol analysis of designers using an interactive evolutionary computation
收藏 引用
Frontiers of Architectural Research 2012年 第1期1卷 44-50页
作者: Weixin Huang Daisuke Matsushita Junzo Munemoto School of Architecture Tsinghua UniversityBeijing 100084China Department of Architecture Okayama University of ScienceJapan
This paper explores the problem-solving behavior of people in design activities through a protocol analysis of verbal reports on the interior work design process simulated by an interactive evolutionary computation (... 详细信息
来源: 评论
protocol analysis of a federated search tool: Designing for users
收藏 引用
Internet Reference Services Quarterly 2007年 第1-2期12卷 195-210页
作者: Alling, Emily Naismith, Rachael Learning Commons and Undergraduate Library Services W. E. B. Du Bois Library University of Massachusetts Amherst MA 01003 154 Hicks Way United States Babson Library Springfield College Springfield MA 01109 263 Alden Street United States
Librarians at Springfield College conducted usability testing of Endeavor's federated search tool, ENCompass for Resource Access. The purpose of the testing was to make informed decisions prior to customizing the ... 详细信息
来源: 评论
protocol analysis and Online Forensics in IPv6 Network Environment
Protocol Analysis and Online Forensics in IPv6 Network Envir...
收藏 引用
8th International Conference on Wireless Communications, Networking and Mobile Computing (WiCOM)
作者: Liu Wu Ren Ping Sun Donghong Zhao, Yawei Wu Jian-ping Tsinghua Univ Network Res Ctr Beijing 100084 Peoples R China Chongqing Normal Univ Coll Math Sci Chongqing Peoples R China Chinese Acad Sci Coll Comp & Commun Engn Grad Univ Beijing Peoples R China
Although IPv6 protocol has considered and implemented many security mechanisms compared with IPv4, there are still many security threatens in IPv6 Networks. In this paper, we has designed and implemented a network for... 详细信息
来源: 评论
protocol analysis of VSAT Satellite Control Channel
Protocol Analysis of VSAT Satellite Control Channel
收藏 引用
IEEE International Conference on Electronic Information and Communication Technology (ICEICT)
作者: Yi-Jia, Zhang Rui-Ying, Liu Sci & Technol Commun Informat Secur Control Lab Jiaxing Peoples R China Jiaxing Univ Coll Mech & Elect Engn Jiaxing Peoples R China
This paper processes protocol analysis for Very Small Aperture Terminal (VSAT) control channel without knowing detailed protocol specifications. analysis methods including flooding algorithm, bits statistics and clust... 详细信息
来源: 评论
Using protocol analysis to evaluate the usability of a commercial web site
收藏 引用
INFORMATION & MANAGEMENT 2001年 第2期39卷 151-163页
作者: Benbunan-Fich, R Seton Hall Univ Comp & Decis Sci Dept Stillman Sch Business S Orange NJ 07079 USA
Despite the increasing popularity of electronic commerce, there appears to be little evidence of the methodical evaluation of the usability of commercial web sites. The usability of a web site defines how well and how... 详细信息
来源: 评论
On the reliability of identifying design moves in protocol analysis
收藏 引用
DESIGN STUDIES 2013年 第5期34卷 612-635页
作者: Perry, Gabriela Trindade Krippendorff, Klaus Univ Fed Rio Grande do Sul Dept Design & Expressao Graf BR-90040060 Porto Alegre RS Brazil Univ Penn Annenberg Sch Commun Philadelphia PA 19104 USA
This paper discusses issues and ways of measuring the reliability of segmenting verbal protocols of design activity, a central focus of design research. Reliability is an important issue in distinguishing 'design ... 详细信息
来源: 评论
Applying protocol analysis to security device interfaces
收藏 引用
IEEE SECURITY & PRIVACY 2006年 第4期4卷 84-87页
作者: Herzog, Jonathan Inst. for Inf. Infrastructure Protection Mitre Bedford MA Abstract Authors References Cited By Keywords Metrics Similar Download Citation Email Print Request Permissions
Despite best efforts, general-purpose computing platforms and servers continue to be insecure. Due to their complexity, furthermore, it seems unlikely that a completely secure system can be built in the foreseeable fu... 详细信息
来源: 评论
Symbolic protocol analysis for monoidal equational theories
收藏 引用
INFORMATION AND COMPUTATION 2008年 第2-4期206卷 312-351页
作者: Delaune, Stephanie Lafourcade, Pascal Lugiez, Denis Treinen, Ralf ENS Cachan & INRIA Futurs CNRS UMR 8643 LSV Cachan France ETH Dept Comp Sci Informat Secur Grp Zurich Switzerland Aix Marseille Univ LIF Marseille France CNRS UMR 6166 F-75700 Paris France
We are interested in the design of automated procedures for analyzing the (in)security of cryptographic protocols in the Dolev-Yao model for a bounded number of sessions when we take into account some algebraic proper... 详细信息
来源: 评论