全文获取类型
收费全文 | 1168篇 |
免费 | 25篇 |
国内免费 | 3篇 |
专业分类
电工技术 | 15篇 |
综合类 | 5篇 |
化学工业 | 178篇 |
金属工艺 | 19篇 |
机械仪表 | 42篇 |
建筑科学 | 61篇 |
矿业工程 | 22篇 |
能源动力 | 36篇 |
轻工业 | 126篇 |
水利工程 | 19篇 |
石油天然气 | 2篇 |
无线电 | 94篇 |
一般工业技术 | 153篇 |
冶金工业 | 159篇 |
原子能技术 | 3篇 |
自动化技术 | 262篇 |
出版年
2023年 | 9篇 |
2022年 | 10篇 |
2021年 | 20篇 |
2020年 | 11篇 |
2019年 | 20篇 |
2018年 | 17篇 |
2017年 | 19篇 |
2016年 | 23篇 |
2015年 | 24篇 |
2014年 | 24篇 |
2013年 | 62篇 |
2012年 | 53篇 |
2011年 | 89篇 |
2010年 | 58篇 |
2009年 | 91篇 |
2008年 | 59篇 |
2007年 | 61篇 |
2006年 | 55篇 |
2005年 | 63篇 |
2004年 | 39篇 |
2003年 | 46篇 |
2002年 | 30篇 |
2001年 | 23篇 |
2000年 | 21篇 |
1999年 | 28篇 |
1998年 | 29篇 |
1997年 | 24篇 |
1996年 | 16篇 |
1995年 | 12篇 |
1994年 | 7篇 |
1993年 | 11篇 |
1992年 | 14篇 |
1991年 | 6篇 |
1990年 | 12篇 |
1989年 | 8篇 |
1988年 | 6篇 |
1987年 | 10篇 |
1986年 | 6篇 |
1985年 | 9篇 |
1984年 | 5篇 |
1983年 | 7篇 |
1980年 | 4篇 |
1979年 | 5篇 |
1978年 | 6篇 |
1977年 | 4篇 |
1976年 | 7篇 |
1939年 | 4篇 |
1932年 | 4篇 |
1929年 | 5篇 |
1926年 | 3篇 |
排序方式: 共有1196条查询结果,搜索用时 15 毫秒
71.
Prior meta-analytic evidence has indicated no association between relationship length and perceived trustworthiness. Viewing trustors as information processors, the authors propose a model in which relationship length, although having no direct effect on perceived trustworthiness, moderates the association between perceived trustworthiness and the basis on which people decide to trust each other. Specifically, as trustors learn about others, they base their trust on different kinds of information (demographic similarity, trustworthy behavior, and shared perspective). Hierarchical multiple regression analyses of a field survey of supervisors and subordinates from 3 companies (N = 88) provide evidence consistent with this prediction: Perceived trustworthiness is associated with demographic similarity in newer relationships, with trustworthy behavior in relationships that are neither brand new nor old but in-between, and with shared perspective in older relationships. (PsycINFO Database Record (c) 2010 APA, all rights reserved) 相似文献
72.
Rob Cook 《Computer Graphics Forum》2005,24(3):xix-xix
This talk takes you behind the scenes at Pixar Animation Studios for an in‐depth look at how its 3d computer graphics films are made. Making a computer animated film involves people with artistic talent and people with technical skills working together in close collaboration. The process starts with the development of the story and continues with modeling the geometry, adding articulation controls, using those controls to animate the characters, simulating things like water and cloth and hair, defining the look of the surfaces, putting lights in the scene, adding special effects, rendering, and post‐production. Special emphasis is given to the roles of technology and computer graphics research in supporting the filmmaker. 相似文献
73.
We consider a network providing Differentiated
Services (DiffServ), which allow Internet Service
Providers (ISPs) to offer different levels of
Quality of Service (QoS) to different traffic streams.
We study two types of buffering policies that are used in network
switches supporting QoS. In the FIFO
type, packets must be transmitted in the order they arrive.
In the uniform bounded delay type, there is a maximal delay time
associated with the switch and each packet
must be transmitted within this time, or otherwise it is dropped.
In both models the buffer space is limited, and packets are lost
when the buffer overflows.
Each packet has an intrinsic value, and the goal is to
maximize the total value of transmitted packets.
Our main contribution is an algorithm
for the FIFO model with arbitrary packet values
that for the first time achieves a competitive ratio
better than 2, namely 2-ε for a constant ε gt; 0.
We also describe an algorithm for the uniform bounded delay
model which simulates our algorithm for the FIFO
model, and show that it achieves the same competitive ratio. 相似文献
74.
Bradley T. Vander Zanden Richard Halterman Brad A. Myers Rob Miller Pedro Szekely Dario A. Giuse David Kosbie Rich McDaniel 《Software》2005,35(13):1275-1298
One‐way constraints have been incorporated in many graphical user interface toolkits because they are simple to learn, easy to write, and can express many types of useful graphical relationships. This paper is an evaluative paper that examines users' experience with one‐way constraints in two user interface development toolkits, Garnet and Amulet, over a 15‐year time span. The lessons gained from this examination can help guide the design of future constraint systems. The most important lessons are that (1) constraints should be allowed to contain arbitrary code that is written in the underlying toolkit language and does not require any annotations, such as parameter declarations, (2) constraints are difficult to debug and better debugging tools are needed, and (3) programmers will readily use one‐way constraints to specify the graphical layout of an application, but must be carefully and time‐consumingly trained to use them for other purposes. Copyright © 2005 John Wiley & Sons, Ltd. 相似文献
75.
Mitsutoshi Miyasaka Hiroyuki Hara Hiroki Takao Simon Tam Rob Payne Prem Rajalingham Satoshi Inoue Tatsuya Shimoda 《Journal of the Society for Information Display》2005,13(3):187-191
Abstract— Thin‐film transistors (TFTs) are field‐effect transistors that can be used to create large‐scale‐integrated (LSI) circuits. The combination of high‐performance TFTs and transfer technology of the TFTs has the potential to foster the rise of a new flexible microelectronics industry. This paper discusses the current status of flexible microelectronics, using a TFT fingerprint sensor (FPS) as an example. Technology used in active‐matrix displays can easily be applied to the TFT FPS. TFT technology should not be confined to the display industry; its use should be expanded into the semiconductor industry. With the result presented in this paper, we declare a new era of flexible microelectronics open. 相似文献
76.
Retrospective analyses of data from the authors' program of research on hypnosis and memory are presented, with special emphasis on effects observed among low hypnotizable individuals. In Experiment 1, participants completed seven forced-recall trials in an attempt to remember a series of pictures that had been shown 1 week earlier. For half the participants, the middle five trials were carried out using hypnotic procedures; the remaining participants performed all recall attempts in a motivated waking condition. Hypnosis failed to enhance correct recall for either high or low hypnotizable participants beyond the hypermnesia and reminiscence effects associated with repeated retrieval attempts over time. However, whereas high hypnotizable participants produced substantial numbers of confident recall errors (i.e., intrusions) independent of the use of hypnosis, low hypnotizable participants exposed to hypnotic procedures reported significantly more intrusions than their counterparts in the waking condition. In Experiment 2, participants were asked to identify whether specific recollections, reported during two forced-interrogatory recall tests conducted 1 week earlier, had originated in the first or second of those tests. A general bias to misattribute previously reported recollections to the first of two recall occasions was observed; however, the effect was greatest among low hypnotizables who had undergone the second recall attempt in hypnosis. The findings imply that highly hypnotizable individuals are not unique in their vulnerability to distortions of memory induced by hypnotic techniques. Individuals of lesser hypnotic capacity also manifest memory alterations when exposed to such procedures. 相似文献
77.
78.
Contemporary Reviews of Mine Water Studies in Europe 总被引:2,自引:0,他引:2
79.
Terrorist and criminal acts are now considered credible risks in the process industries. Deliberate attacks on the nation's petroleum refineries and chemical plants would pose a significant threat to public welfare, national security, and the US economy. To-date, the primary response of government and industry has been on improved security to prevent attacks and the associated consequences. While prevention is clearly preferred, the potential for successful attacks must be addressed. If plant security is breached, the extent of the inflicted damage is determined by the available plant safety systems and procedures. We refer to this "inside the gate" response as process threat management. The authors have initiated a joint industry/academia study to address: the level of safety provided by existing plant equipment and safety systems in response to a terrorist act, and identification of process (rather than security) needs or opportunities to address this new safety concern. This paper describes the initial perspectives and issues identified by the team at the beginning of the study. 相似文献
80.