首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1839篇
  免费   7篇
电工技术   4篇
化学工业   52篇
金属工艺   4篇
机械仪表   17篇
建筑科学   18篇
矿业工程   1篇
能源动力   14篇
轻工业   36篇
水利工程   2篇
石油天然气   8篇
无线电   77篇
一般工业技术   88篇
冶金工业   1411篇
原子能技术   4篇
自动化技术   110篇
  2022年   7篇
  2020年   5篇
  2019年   6篇
  2017年   5篇
  2016年   5篇
  2015年   5篇
  2014年   6篇
  2013年   18篇
  2012年   12篇
  2011年   21篇
  2010年   11篇
  2009年   16篇
  2008年   19篇
  2007年   21篇
  2006年   17篇
  2005年   20篇
  2004年   13篇
  2003年   19篇
  2002年   11篇
  2001年   17篇
  2000年   16篇
  1999年   55篇
  1998年   409篇
  1997年   237篇
  1996年   157篇
  1995年   93篇
  1994年   98篇
  1993年   91篇
  1992年   16篇
  1991年   18篇
  1990年   20篇
  1989年   20篇
  1988年   15篇
  1987年   25篇
  1986年   21篇
  1985年   16篇
  1984年   8篇
  1983年   13篇
  1982年   8篇
  1981年   16篇
  1980年   19篇
  1979年   12篇
  1978年   7篇
  1977年   48篇
  1976年   97篇
  1975年   6篇
  1973年   4篇
  1972年   4篇
  1970年   4篇
  1968年   4篇
排序方式: 共有1846条查询结果,搜索用时 12 毫秒
51.
Conducted an empirically based study in which the judgments of experts were used to identify the theoretical/methodological structure of the field of personality and social psychology, as well as the core "interest communities" extant in these disciplines. The similarities of figures prominent in the history of the field were judged by 16 of the American Psychological Association's Division 8 (Society of Personality and Social Psychology) Fellows. Multidimensional scaling of these similarity judgments revealed 3 general dimensions along which the figures varied: synthetic vs analytic, internal vs external determinants of behavior, and prominence. An alternate view of the field was provided by a taxonomic scheme in which the figures were grouped along major ideological, substantive, and methodological lines. The following 5 contemporary interest communities were identified from the self-characterizations of the Fellows: (a) psychoanalysis and psychiatry, (b) modern personality theory, (c) measurement and individual differences, (d) sociology, and (e) social psychology. Statements of implications for future directions in the field were also obtained from Ss. (38 ref) (PsycINFO Database Record (c) 2010 APA, all rights reserved)  相似文献   
52.
During the period 1970-80, there were reported 146 cases of in-flight sudden incapacitation in the USAF. Of these, 62 involved pilots, 14 were navigators, and 70 were student pilots. The etiologies of sudden incapacitation included illness without loss of consciousness, loss of consciousness, spatial disorientation, and improper M-1 maneuver. Each of these categories is analyzed with emphasis upon prevention, for example, not flying with symptomatic preexisting disease, continued emphasis upon spatial disorientation training, and correct performance of the M-1 maneuver. Based upon the data, conclusions and recommendations are suggested to minimize the risk of episodes of in-flight sudden incapacitation.  相似文献   
53.
Programming Internet telephony services   总被引:1,自引:0,他引:1  
The Internet offers an opportunity to enhance traditional telephony services, such as call forwarding, through interaction with e-mail, the Web, and directory services, as well as traditional media types. How do you effectively program these services? The authors propose a CGI (common gateway interface) solution for trusted user/developers (such as administrators) and the Call Processing Language (CPL)-a simple, robust, safe, call processing language-for untrusted user/developers  相似文献   
54.
55.
Earlier work has developed the underpinnings of the IC-scheduling theory, a framework for scheduling computations having intertask dependencies - modeled via directed acyclic graphs (DAGs) - for Internet-based computing. The goal of the schedules produced is to render tasks eligible for execution at the maximum possible rate, with the dual aim of 1) utilizing remote clients' computational resources well by always having work to allocate to an available client and 2) lessening the likelihood of a computation's stalling for lack of eligible tasks. The DAGs handled by the theory thus far are those that can be decomposed into a given collection of bipartite building block DAGs via the operation of DAG decomposition. A basic tool in constructing schedules is a relation >, which allows one to "prioritize" the scheduling of a complex DAG's building blocks. The current paper extends the IC-scheduling theory in two ways: by expanding significantly the repertoire of DAGs that the theory can schedule optimally and by allowing one sometimes to shortcut the algorithmic process required to find optimal schedules. The expanded repertoire now allows the theory to schedule optimally, among other DAGs, a large range of DAGs that are either "expansive", in the sense that they grow outward from their sources, or "reductive", in the sense that they grow inward toward their sinks. The algorithmic shortcuts allow one to "read off" an optimal schedule for a DAG from a given optimal schedule for the DAG's dual, which is obtained by reversing all arcs (thereby exchanging the roles of sources and sinks).  相似文献   
56.
In cybersecurity competitions, participants either create new or protect preconfigured information systems and then defend these systems against attack in a real-world setting. Institutions should consider important structural and resource-related issues before establishing such a competition. Critical infrastructures increasingly rely on information systems and on the Internet to provide connectivity between systems. Maintaining and protecting these systems requires an education in information warfare that doesn't merely theorize and describe such concepts. A hands-on, active learning experience lets students apply theoretical concepts in a physical environment. Craig Kaucher and John Saunders found that even for management-oriented graduate courses in information assurance, such an experience enhances the students' understanding of theoretical concepts. Cybersecurity exercises aim to provide this experience in a challenging and competitive environment. Many educational institutions use and implement these exercises as part of their computer science curriculum, and some are organizing competitions with commercial partners as capstone exercises, ad hoc hack-a-thons, and scenario-driven, multiday, defense-only competitions. Participants have exhibited much enthusiasm for these exercises, from the DEFCON capture-the-flag exercise to the US Military Academy's Cyber Defense Exercise (CDX). In February 2004, the US National Science Foundation sponsored the Cyber Security Exercise Workshop aimed at harnessing this enthusiasm and interest. The educators, students, and government and industry representatives attending the workshop discussed the feasibility and desirability of establishing regular cybersecurity exercises for postsecondary-level students. This article summarizes the workshop report.  相似文献   
57.
58.
Aconstraint system includes a set of variables and a set of relations among these variables, calledconstraints. The solution of a constraint system is an assignment of values to variables so that all, or many, of the relations are made true. A simple and efficient method for constraint resolution has been proposed in the work of B.N. Freeman-Benson, J. Maloney, and A. Borning. We show how their method is related to the classical problem of graph matching, and from this connection we derive new resolution algorithms.  相似文献   
59.
Cancer chemoprevention approaches use either pharmacological or dietary agents to impede, arrest or reverse the carcinogenic process. Although several agents have shown effectiveness against colon cancer, present intervention strategies provide only partial reduction. In this study, we utilized high-resolution endoscopy to obtain colon tumor biopsy specimens from Apc mutant mice before and after 2-wk sulindac intervention. To acquire information beyond genomics, proteome analysis using the ProteomeLab PF2D platform was implemented to generate 2-D protein expression maps from biopsies. Chromatograms produced common signature profiles between sulindac and nonsulindac treated samples, and contrasting profiles termed "fingerprints". We selected a double peak that appeared in tumor biopsies from sulindac-treated mice. Further analyses using MS sequencing identified this protein as histone H2B. The location of H2B in the 1(st) dimension strongly suggested PTM, consistent with identification of two oxidized methionines. While further studies on sulindac proteomic fingerprints are underway, this study demonstrates the feasibility and advantages of "real-time" proteomic analysis for obtaining information on biomarker discovery and drug activity that would not be revealed by a genetic assay. This approach should be broadly applicable for assessing lesion responsiveness in a wide range of translational and human clinical studies.  相似文献   
60.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号