首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1168篇
  免费   25篇
  国内免费   3篇
电工技术   15篇
综合类   5篇
化学工业   178篇
金属工艺   19篇
机械仪表   42篇
建筑科学   61篇
矿业工程   22篇
能源动力   36篇
轻工业   126篇
水利工程   19篇
石油天然气   2篇
无线电   94篇
一般工业技术   153篇
冶金工业   159篇
原子能技术   3篇
自动化技术   262篇
  2023年   9篇
  2022年   10篇
  2021年   20篇
  2020年   11篇
  2019年   20篇
  2018年   17篇
  2017年   19篇
  2016年   23篇
  2015年   24篇
  2014年   24篇
  2013年   62篇
  2012年   53篇
  2011年   89篇
  2010年   58篇
  2009年   91篇
  2008年   59篇
  2007年   61篇
  2006年   55篇
  2005年   63篇
  2004年   39篇
  2003年   46篇
  2002年   30篇
  2001年   23篇
  2000年   21篇
  1999年   28篇
  1998年   29篇
  1997年   24篇
  1996年   16篇
  1995年   12篇
  1994年   7篇
  1993年   11篇
  1992年   14篇
  1991年   6篇
  1990年   12篇
  1989年   8篇
  1988年   6篇
  1987年   10篇
  1986年   6篇
  1985年   9篇
  1984年   5篇
  1983年   7篇
  1980年   4篇
  1979年   5篇
  1978年   6篇
  1977年   4篇
  1976年   7篇
  1939年   4篇
  1932年   4篇
  1929年   5篇
  1926年   3篇
排序方式: 共有1196条查询结果,搜索用时 15 毫秒
71.
Prior meta-analytic evidence has indicated no association between relationship length and perceived trustworthiness. Viewing trustors as information processors, the authors propose a model in which relationship length, although having no direct effect on perceived trustworthiness, moderates the association between perceived trustworthiness and the basis on which people decide to trust each other. Specifically, as trustors learn about others, they base their trust on different kinds of information (demographic similarity, trustworthy behavior, and shared perspective). Hierarchical multiple regression analyses of a field survey of supervisors and subordinates from 3 companies (N = 88) provide evidence consistent with this prediction: Perceived trustworthiness is associated with demographic similarity in newer relationships, with trustworthy behavior in relationships that are neither brand new nor old but in-between, and with shared perspective in older relationships. (PsycINFO Database Record (c) 2010 APA, all rights reserved)  相似文献   
72.
This talk takes you behind the scenes at Pixar Animation Studios for an in‐depth look at how its 3d computer graphics films are made. Making a computer animated film involves people with artistic talent and people with technical skills working together in close collaboration. The process starts with the development of the story and continues with modeling the geometry, adding articulation controls, using those controls to animate the characters, simulating things like water and cloth and hair, defining the look of the surfaces, putting lights in the scene, adding special effects, rendering, and post‐production. Special emphasis is given to the roles of technology and computer graphics research in supporting the filmmaker.  相似文献   
73.
We consider a network providing Differentiated Services (DiffServ), which allow Internet Service Providers (ISPs) to offer different levels of Quality of Service (QoS) to different traffic streams. We study two types of buffering policies that are used in network switches supporting QoS. In the FIFO type, packets must be transmitted in the order they arrive. In the uniform bounded delay type, there is a maximal delay time associated with the switch and each packet must be transmitted within this time, or otherwise it is dropped. In both models the buffer space is limited, and packets are lost when the buffer overflows. Each packet has an intrinsic value, and the goal is to maximize the total value of transmitted packets. Our main contribution is an algorithm for the FIFO model with arbitrary packet values that for the first time achieves a competitive ratio better than 2, namely 2-ε for a constant ε gt; 0. We also describe an algorithm for the uniform bounded delay model which simulates our algorithm for the FIFO model, and show that it achieves the same competitive ratio.  相似文献   
74.
One‐way constraints have been incorporated in many graphical user interface toolkits because they are simple to learn, easy to write, and can express many types of useful graphical relationships. This paper is an evaluative paper that examines users' experience with one‐way constraints in two user interface development toolkits, Garnet and Amulet, over a 15‐year time span. The lessons gained from this examination can help guide the design of future constraint systems. The most important lessons are that (1) constraints should be allowed to contain arbitrary code that is written in the underlying toolkit language and does not require any annotations, such as parameter declarations, (2) constraints are difficult to debug and better debugging tools are needed, and (3) programmers will readily use one‐way constraints to specify the graphical layout of an application, but must be carefully and time‐consumingly trained to use them for other purposes. Copyright © 2005 John Wiley & Sons, Ltd.  相似文献   
75.
Abstract— Thin‐film transistors (TFTs) are field‐effect transistors that can be used to create large‐scale‐integrated (LSI) circuits. The combination of high‐performance TFTs and transfer technology of the TFTs has the potential to foster the rise of a new flexible microelectronics industry. This paper discusses the current status of flexible microelectronics, using a TFT fingerprint sensor (FPS) as an example. Technology used in active‐matrix displays can easily be applied to the TFT FPS. TFT technology should not be confined to the display industry; its use should be expanded into the semiconductor industry. With the result presented in this paper, we declare a new era of flexible microelectronics open.  相似文献   
76.
Retrospective analyses of data from the authors' program of research on hypnosis and memory are presented, with special emphasis on effects observed among low hypnotizable individuals. In Experiment 1, participants completed seven forced-recall trials in an attempt to remember a series of pictures that had been shown 1 week earlier. For half the participants, the middle five trials were carried out using hypnotic procedures; the remaining participants performed all recall attempts in a motivated waking condition. Hypnosis failed to enhance correct recall for either high or low hypnotizable participants beyond the hypermnesia and reminiscence effects associated with repeated retrieval attempts over time. However, whereas high hypnotizable participants produced substantial numbers of confident recall errors (i.e., intrusions) independent of the use of hypnosis, low hypnotizable participants exposed to hypnotic procedures reported significantly more intrusions than their counterparts in the waking condition. In Experiment 2, participants were asked to identify whether specific recollections, reported during two forced-interrogatory recall tests conducted 1 week earlier, had originated in the first or second of those tests. A general bias to misattribute previously reported recollections to the first of two recall occasions was observed; however, the effect was greatest among low hypnotizables who had undergone the second recall attempt in hypnosis. The findings imply that highly hypnotizable individuals are not unique in their vulnerability to distortions of memory induced by hypnotic techniques. Individuals of lesser hypnotic capacity also manifest memory alterations when exposed to such procedures.  相似文献   
77.
78.
79.
Terrorist and criminal acts are now considered credible risks in the process industries. Deliberate attacks on the nation's petroleum refineries and chemical plants would pose a significant threat to public welfare, national security, and the US economy. To-date, the primary response of government and industry has been on improved security to prevent attacks and the associated consequences. While prevention is clearly preferred, the potential for successful attacks must be addressed. If plant security is breached, the extent of the inflicted damage is determined by the available plant safety systems and procedures. We refer to this "inside the gate" response as process threat management. The authors have initiated a joint industry/academia study to address: the level of safety provided by existing plant equipment and safety systems in response to a terrorist act, and identification of process (rather than security) needs or opportunities to address this new safety concern. This paper describes the initial perspectives and issues identified by the team at the beginning of the study.  相似文献   
80.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号