首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1440篇
  免费   104篇
电工技术   13篇
综合类   2篇
化学工业   470篇
金属工艺   32篇
机械仪表   29篇
建筑科学   104篇
矿业工程   7篇
能源动力   41篇
轻工业   231篇
水利工程   13篇
石油天然气   8篇
无线电   64篇
一般工业技术   243篇
冶金工业   123篇
原子能技术   4篇
自动化技术   160篇
  2024年   4篇
  2023年   14篇
  2022年   46篇
  2021年   103篇
  2020年   50篇
  2019年   39篇
  2018年   49篇
  2017年   60篇
  2016年   59篇
  2015年   40篇
  2014年   55篇
  2013年   101篇
  2012年   91篇
  2011年   108篇
  2010年   82篇
  2009年   80篇
  2008年   61篇
  2007年   49篇
  2006年   33篇
  2005年   39篇
  2004年   31篇
  2003年   29篇
  2002年   26篇
  2001年   20篇
  2000年   18篇
  1999年   22篇
  1998年   34篇
  1997年   23篇
  1996年   27篇
  1995年   18篇
  1994年   16篇
  1993年   11篇
  1992年   10篇
  1991年   7篇
  1990年   10篇
  1989年   9篇
  1988年   8篇
  1986年   7篇
  1985年   7篇
  1984年   5篇
  1982年   4篇
  1981年   3篇
  1980年   4篇
  1979年   6篇
  1977年   4篇
  1976年   9篇
  1975年   2篇
  1974年   2篇
  1968年   2篇
  1963年   2篇
排序方式: 共有1544条查询结果,搜索用时 953 毫秒
91.
The application of the tolerance paradigm to security - intrusion tolerance - has been raising a reasonable amount of attention in the dependability and security communities. In this paper we present a novel approach to intrusion tolerance. The idea is to use privileged components - generically designated by wormholes - to support the execution of intrusion-tolerant protocols, often called Byzantine-resilient in the literature.The paper introduces the design of wormhole-aware intrusion-tolerant protocols using a classical distributed systems problem: consensus. The system where the consensus protocol runs is mostly asynchronous and can fail in an arbitrary way, except for the wormhole, which is secure and synchronous. Using the wormhole to execute a few critical steps, the protocol manages to have a low time complexity: in the best case, it runs in two rounds, even if some processes are malicious. The protocol also shows how often theoretical partial synchrony assumptions can be substantiated in practical distributed systems. The paper shows the significance of the TTCB as an engineering paradigm, since the protocol manages to be simple when compared with other protocols in the literature.Published online: 29 October 2004This work was partially supported by the EC, through project IST-1999-11583 (MAFTIA), and by the FCT, through the Large-Scale Informatic Systems Laboratory (LASIGE) and projects POSI/1999/CHS/33996 (DEFEATS) and POSI/CHS/39815/2001 (COPE).  相似文献   
92.
Soft errors are an important challenge in contemporary microprocessors. Particle hits on the components of a processor are expected to create an increasing number of transient errors with each new microprocessor generation. In this paper we propose simple mechanisms that effectively reduce the vulnerability to soft errors In a processor. Our designs are generally motivated by the fact that many of the produced and consumed values in the processors are narrow and their upper order bits are meaningless. Soft errors canted by any particle strike to these higher order bits can be avoided by simply identifying these narrow values. Alternatively soft errors can be detected or corrected on the narrow values by replicating the vulnerable portion of the value inside the storage space provided for the upper order bits of these operands. We offer a variety of schemes that make use of narrow values and analyze their efficiency in reducing soft error vulnerability of level-1 data cache of the processor  相似文献   
93.
Interactive distance learning (IDL) is an evolving paradigm of instruction and learning that attempts to overcome both distance and time constraints found in traditional classroom learning. The electronic classrooms at two sites of the University of Oslo and two further sites in Norway overcome separations in space by exchanging digital audio, video, and whiteboard information via the Norwegian academic ATM-based network Supernett II. The electronic classrooms are used since 1993 for teaching graduate level courses. This paper presents measurements and analysis results of transport, application, and user level Quality-of-Service (QoS) of the electronic classrooms. We describe our general experiences with this system for synchronous IDL. The lessons learned represent the motivation for the ongoing extension to support asynchronous IDL by a multimedia database system (MMDBS) to manage all data used and generated in the electronic classrooms.  相似文献   
94.
The mechanical properties of rubber tubes produced by dip‐coating technique and the influence of the fabrication process on their structural properties were evaluated. Cyclic tension versus deformation tests were performed to investigate the elastic properties of the samples and to understand the changes in rubber tubes behavior under repetitive stress. The effect of the wall thickness on the elastic response of the tubes was also studied. The mechanical properties of opened tubes were also investigated for transversal and longitudinal directions to evaluate the influence of the fabrication process on the alignment of the polymer chains. This investigation indicated that the fabricated tubes are resistant and extremely elastic. They can be elongated up to 800% of its initial length before rupture, and thicker tubes are a bit more resistant to elongation than the thinner ones. In addition, the fabricated tubes have an anisotropic structure due to the fabrication process. Finally, natural rubber tubes may have a great potential to be used as vascular prosthesis, or in other applications that require a large range of resistance and elasticity. © 2006 Wiley Periodicals, Inc. J Appl Polym Sci 100: 702–707, 2006  相似文献   
95.
STUDY OBJECTIVE: To determine the usefulness of modifying Light's criteria for the separation of pleural transudates from exudates. DESIGN: Retrospective review of patients who underwent a diagnostic thoracentesis during a 2-year period. SETTING: Community teaching hospital in Lleida, Spain. PATIENTS AND METHODS: Clinical records and pleural fluid characteristics of 230 consecutive patients with pleural effusion underwent a detailed review. Thirty-five of these patients were excluded from the analysis. As suggested recently by Romero et al, different cutoff levels for the criteria of Light et al were applied and their accuracies were calculated. RESULTS: Thirty-nine (20%) pleural effusions were transudates and 156 (80%) were exudates. The accuracy of the criteria of Light et al for identifying exudates was 94.7% (confidence interval, 91.6 to 97.9) in comparison to our own modified criteria (93.1%; confidence interval, 89.5 to 96.7) and the criteria suggested by Romero et al (92.6%; confidence interval, 88.9 to 96.3). These differences were not statistically significant. CONCLUSION: Changing the classic Light's criteria with different cutoff points offers no advantages for discriminating between transudative and exudative pleural effusions.  相似文献   
96.
Seasonal affective disorder (SAD) is characterized by annual major depressive episodes. It occurs most commonly in young women during autumn and winter with full remission during the following spring. The patient's mood is a combination of depression and anxiety accompanied by fatigue, loss of libido, and a reduction of socialization. Most of these patients complain of atypical vegetative symptoms (e.g. hypersomnia, carbohydrate craving, and weight gain). Hypotheses on the underlying mechanisms of these behavioural disorders indicate that environmental variables, e.g. climate, latitude, light, and changes in neurotransmitter function that occur naturally with the seasons, may be important. Phototherapy is being used increasingly for the treatment of SAD. The antidepressant response is contingent on the exposure of the patients' eyes to light. The biological basis of the diverse psychological and biological changes in SAD and the underlying mechanism of action of phototherapy are still unclear and require further study.  相似文献   
97.
The glucose transporter protein syndrome (GTPS) is caused by defective transport of glucose across the blood-brain barrier via the glucose transporter GLUT1, resulting in hypoglycorrhachia, infantile seizures, and developmental delay. Recent reports indicated that GLUT1 is a multifunctional transporter. We investigated the transport of vitamin C in its oxidized form (dehydroascorbic acid) via GLUT1 into erythrocytes of 2 patients with GTPS. In both patients, uptake of oxidized vitamin C was 61% of the mothers' values. Our findings are consistent with recent observations that vitamin C is transported in its oxidized form via GLUT1. We speculate that impaired transport of this substrate and perhaps other substrates in GTPS might contribute to the pathophysiology of this condition.  相似文献   
98.
National, state, and local education reform agendas have been on a fast track for more than a decade. Although some psychologists have been active in promoting psychology and psychological services in education reform initiatives, knowledge about their efforts is fragmented. In order to educate psychologists about education reform, this article highlights the impetus for the recent education reform movement, briefly reviews the latest waves of education reform, and discusses the development of the National Education Goals. Then, an argument is made for the integration of education, health, and social reform initiatives; state-level education reform principles and initiatives are highlighted, illustrated by the systemic education reform mandate in Kentucky. Next, progress toward the development and implementation of an APA-sponsored response to the National Education Goals is discussed. Finally, objectives and roles for psychologists in advancing education reform are presented, and guidelines for the education and training of future psychologists are introduced. (PsycINFO Database Record (c) 2010 APA, all rights reserved)  相似文献   
99.
MARKTRAN II is an interactive FORTRAN IV program that computes Markov transition probabilities for two-dimensional patterns. The pattern is represented by a series of discrete states at each point on a rectangular grid composed of square cells. Transition probabilities in eight directions are computed. MARKTRAN II is useful for numerically describing the fabric of patterns that possess any degree of anisotropy. Geological applications include analysis of rock fabrics, outcrop patterns of geological maps, and variations in ore grade expressed as discrete states.  相似文献   
100.
The principles of vector computation are reviewed including a definition of “depth of parallelism”. The latter concept is related to algorithm performance on various computer architectures (in particular the CRAY-1 and the FPS AP120B). The challenge of providing efficient mathematical software libraries on vector computers and the subsequent trade-offs introduced by vector architecture are discussed. Boeng's multi-level library approach to meet vector computer user's needs is explained. Some timing comparisons for software on the CRAY-1 are also given.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号