首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   5079篇
  免费   95篇
  国内免费   5篇
电工技术   56篇
综合类   4篇
化学工业   759篇
金属工艺   170篇
机械仪表   114篇
建筑科学   229篇
矿业工程   20篇
能源动力   100篇
轻工业   325篇
水利工程   43篇
石油天然气   21篇
无线电   331篇
一般工业技术   728篇
冶金工业   1573篇
原子能技术   35篇
自动化技术   671篇
  2022年   36篇
  2021年   37篇
  2020年   31篇
  2019年   36篇
  2018年   58篇
  2017年   54篇
  2016年   68篇
  2015年   59篇
  2014年   80篇
  2013年   242篇
  2012年   139篇
  2011年   194篇
  2010年   133篇
  2009年   126篇
  2008年   196篇
  2007年   165篇
  2006年   166篇
  2005年   140篇
  2004年   142篇
  2003年   136篇
  2002年   149篇
  2001年   91篇
  2000年   95篇
  1999年   121篇
  1998年   294篇
  1997年   173篇
  1996年   149篇
  1995年   108篇
  1994年   123篇
  1993年   113篇
  1992年   83篇
  1991年   53篇
  1990年   78篇
  1989年   67篇
  1988年   71篇
  1987年   67篇
  1986年   63篇
  1985年   64篇
  1984年   80篇
  1983年   76篇
  1982年   72篇
  1981年   61篇
  1980年   48篇
  1979年   48篇
  1978年   59篇
  1977年   56篇
  1976年   77篇
  1975年   46篇
  1974年   46篇
  1973年   47篇
排序方式: 共有5179条查询结果,搜索用时 22 毫秒
71.
Aspect-oriented modeling (AOM) allows software designers to describe features that address pervasive concerns separately as aspects, and to systematically incorporate the features into a design model using model composition techniques. The goal of this paper is to analyze the performance effects of different security features that may be represented as aspect models. This is part of a larger research effort to integrate methodologies and tools for the analysis of security and performance properties early in the software development process. In this paper, we describe an extension to the AOM approach that provides support for performance analysis. We use the performance analysis techniques developed previously in the PUMA project, which take as input UML models annotated with the standard UML Profile for Schedulability, Performance and Time (SPT), and transform them first into Core Scenario Model (CSM), and then into different performance models. The composition of the aspects with the primary (base) model is performed at the CSM level. A new formal definition of CSM properties and operations is described as a foundation for scenario-based weaving. The proposed approach is illustrated with an example that utilizes two standards, TPC-W and SSL.  相似文献   
72.
Software development is a global activity unconstrained by the bounds of time and space. A major effect of this increasing scale and distribution is that the shared understanding that developers previously acquired by formal and informal face-to-face meetings is difficult to obtain. This paper proposes a shared awareness model that uses information gathered automatically from developer IDE interactions to make explicit orderings of tasks, artefacts and developers that are relevant to particular work contexts in collaborative, and potentially distributed, software development projects. The research findings suggest that such a model can be used to: identify entities (developers, tasks, artefacts) most associated with a particular work context in a software development project; identify relevance relationships amongst tasks, developers and artefacts e.g. which developers and artefacts are currently most relevant to a task or which developers have contributed to a task over time; and, can be used to identify potential bottlenecks in a project through a ‘social graph’ view. Furthermore, this awareness information is captured and provided as developers work in different locations and at different times.  相似文献   
73.
Wool handling is an important rural occupation where workers process 200 or more fleeces daily, separating them into various quality components. Loads and postures they experience carry substantial risk of low back pain (LBP). Although a formal skill training structure exists, interaction with loads and LBP is unknown. We examined whether skill and LBP influenced trunk postures and loads of 60 wool handlers representing 3 skill levels. LBP prevalence ranged from 20% for junior (lowest skill) to 45% for open class (highest skill) wool handlers. Open class wool handlers demonstrated increased lateral bend and more axially twisted postures, generating greater medio-lateral shear forces and lateral bend and axial twist moments. LBP was associated with open class wool handlers spending more time in severe axially twisted postures. These findings suggest that skill-based training needs to be reviewed to reduce the quantity of axially twisted posture which may help reduce the prevalence of LBP in this workforce.  相似文献   
74.
The genomics, proteomics, clinical, and drug discovery laboratories have a growing need to maintain valuable samples at ultra-low (−80°C) temperatures in a validated, secure environment. Automated sample processing systems have until now required manual (off-line) storage of samples at −80°C, reducing system reliability and speed. Both of these important needs are addressed by the Sample Process Management System being introduced by BIOPHILE Inc. Conventional sample management processes, such as storage, retrieval, and cataloging, are increasingly strained by the growing sample populations. There are variable sample types, access requirements and storage requirements. Security and inventory procedures are implemented manually. The evolving technologies present in the laboratory cannot interface with conventional manual storage techniques. Addressing these limitations, the primary benefits of BIOPHILE's solutions are:
• Fully validated sample management process that coordinates the life-cycles of samples and their related data.
• Robotic technology to securely store and retrieve samples, improving their accessibility and stability. Thermal shock is reduced, improving sample longevity and quality. The robotic technology allows integration with larger automation systems.
• A process program to develop a Sample Management Strategy. This strategy is developed by analyzing long-term research goals, current baseline processes, and identification of current sample life cycles. A full validation documentation package can be generated, providing a high level of quality assurance.
• Improved sample visibility and quality assurance - automated sample population cataloging; controlled sample management access and security.
  相似文献   
75.
Fail-stop failures in distributed environments are often tolerated by checkpointing or message logging. In this paper, we show that fail-stop process failures in ScaLAPACK matrix-matrix multiplication kennel can be tolerated without checkpointing or message logging. It has been proved in previous algorithm-based fault tolerance that, for matrix-matrix multiplication, the checksum relationship in the input checksum matrices is preserved at the end of the computation no mater which algorithm is chosen. From this checksum relationship in the final computation results, processor miscalculations can be detected, located, and corrected at the end of the computation. However, whether this checksum relationship can be maintained in the middle of the computation or not remains open. In this paper, we first demonstrate that, for many matrix matrix multiplication algorithms, the checksum relationship in the input checksum matrices is not maintained in the middle of the computation. We then prove that, however, for the outer product version algorithm, the checksum relationship in the input checksum matrices can be maintained in the middle of the computation. Based on this checksum relationship maintained in the middle of the computation, we demonstrate that fail-stop process failures (which are often tolerated by checkpointing or message logging) in ScaLAPACK matrix-matrix multiplication can be tolerated without checkpointing or message logging.  相似文献   
76.
This work investigates the modeling of aggregate available bandwidth in multi-sender network applications. Unlike the well-established client–server model, where there is only one server sending the requested data, the available bandwidth of multiple senders when combined together does exhibit consistent properties and thus can be modeled and estimated. Through extensive experiments conducted in the Internet this work proposed to model the aggregate available bandwidth using a normal distribution and then illustrates its application through a hybrid download-streaming algorithm and a playback-adaptive streaming algorithm for video delivery under different bandwidth availability scenarios. This new multi-source bandwidth model opens a new way to provide probabilistic performance guarantee in best-effort networks such as the Internet, and is particularly suitable for the emerging peer-to-peer applications, where having multiple sources is the norm rather than the exception.
Jack Y. B. LeeEmail:
  相似文献   
77.
OBJECTIVE: The objective of the study was to evaluate the differences between sitting on a stability ball and in an office chair in terms of trunk muscle activation and lumbar spine posture. BACKGROUND: Stability balls have become increasingly popular as an alternative to office chairs to help reduce the prevalence of low back pain; however, little research has been conducted on their use as office chairs. METHODS: The 14 participants (7 men, 7 women) were required to sit on both a stability ball and an office chair for 1 hour each while performing various computer workstation tasks throughout the sitting periods. The activation of eight muscles and lumbar spine posture were measured and analyzed. RESULTS: Increased muscle activation in thoracic erector spinae (p = .0352), decreased pelvic tilt (p = .0114), and increased perceived discomfort (p < .0001) while sitting on the stability ball were observed. CONCLUSIONS: The small changes in biological responses when sitting on a stability ball as compared with an office chair, combined with the increased reported discomfort while on the ball, suggests its use for prolonged sitting may not be advantageous. APPLICATION: Prolonged sitting on a stability ball does not greatly alter the manner in which an individual sits, yet it appears to increase the level of discomfort. Therefore, it is important to fully explore a new chair design and consult scientific research before implementing its use.  相似文献   
78.
79.
Murray R 《Architectural record》1993,181(11):48-51, 120-3
Constrained by the excesses of the previous decade and tepid performance in the general economy, the rebound by construction from its 1990-91 downturn could best be described as subdued and selective. Single-family housing led the way before faltering this year, and only scattered help has come from the industry's other sectors. The big question facing construction at the end of 1993 is whether the current recovery is in danger of stalling or, put differently, does it have the stamina to become more broad-based?  相似文献   
80.
The it Imperative in Business Transformation   总被引:2,自引:0,他引:2  
The IT imperative is to construct enterprisewide systems and capabilities needed by business to compete. For IS managers, this means embracing the viewpoint that IT plays a crucial role in building the business of the future. IS and business management must act as true partners, each supporting the other in creating an optimally performing company.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号