全文获取类型
收费全文 | 1087篇 |
免费 | 10篇 |
专业分类
电工技术 | 12篇 |
化学工业 | 57篇 |
金属工艺 | 6篇 |
机械仪表 | 6篇 |
建筑科学 | 33篇 |
能源动力 | 12篇 |
轻工业 | 29篇 |
水利工程 | 4篇 |
石油天然气 | 2篇 |
无线电 | 75篇 |
一般工业技术 | 75篇 |
冶金工业 | 658篇 |
原子能技术 | 13篇 |
自动化技术 | 115篇 |
出版年
2021年 | 6篇 |
2020年 | 6篇 |
2016年 | 6篇 |
2015年 | 5篇 |
2013年 | 29篇 |
2012年 | 22篇 |
2011年 | 13篇 |
2010年 | 17篇 |
2009年 | 12篇 |
2008年 | 18篇 |
2007年 | 20篇 |
2006年 | 29篇 |
2005年 | 17篇 |
2004年 | 15篇 |
2003年 | 17篇 |
2002年 | 13篇 |
2001年 | 13篇 |
2000年 | 14篇 |
1999年 | 32篇 |
1998年 | 147篇 |
1997年 | 84篇 |
1996年 | 58篇 |
1995年 | 33篇 |
1994年 | 29篇 |
1993年 | 46篇 |
1992年 | 16篇 |
1991年 | 17篇 |
1990年 | 20篇 |
1989年 | 20篇 |
1988年 | 11篇 |
1987年 | 14篇 |
1986年 | 20篇 |
1985年 | 24篇 |
1984年 | 12篇 |
1983年 | 20篇 |
1982年 | 11篇 |
1981年 | 13篇 |
1980年 | 13篇 |
1979年 | 7篇 |
1978年 | 8篇 |
1977年 | 29篇 |
1976年 | 34篇 |
1975年 | 11篇 |
1974年 | 15篇 |
1973年 | 17篇 |
1972年 | 7篇 |
1971年 | 7篇 |
1970年 | 7篇 |
1969年 | 7篇 |
1966年 | 5篇 |
排序方式: 共有1097条查询结果,搜索用时 15 毫秒
31.
How Internet software companies negotiate quality 总被引:1,自引:0,他引:1
In Internet speed development, innovation and time-to-market work against software quality. Browser giants like Microsoft Internet Explorer and Netscape Navigator are openly dealing with quality issues. The practices of application and smaller niche firms are less clear, but there are important trends 相似文献
32.
DA Danford BM McManus SM Nielsen MG Levine HW Needelman 《Canadian Metallurgical Quarterly》1993,14(4):242-246
Correlative echocardiographic and pathological findings in a thoracopagus with conjoined hearts are reported. One twin had tricuspid atresia with discordant atrioventricular connections and concordant ventriculoarterial connections. The morphologic right ventricle was hypoplastic and there was a large muscular ventricular septal defect. The other twin had hypoplasia of the mitral valve anulus and left ventricle with double-outlet right ventricle and pulmonary valve atresia. The tricuspid valve was severely insufficient in part because of a large orifice and redundant, elongated leaflets with abnormal chordal attachments. The left ventricles of these two twins shared a perforated common "free wall" with at least two large defects allowing mixing of the circulations at that level. Not all anatomic details were established conclusively by fetal echocardiography; however, sufficient diagnostic information was obtained to support a decision not to aggressively resuscitate these twins after elective cesarean delivery at 31 weeks' gestation. 相似文献
33.
Levine MD Shaheen SI 《IEEE transactions on pattern analysis and machine intelligence》1981,(5):540-556
The objective of a computer vision system is to outline the objects in a picture and label them with an appropriate interpretation. This paper proposes a new paradigm for a modular computer vision system which is both data directed and knowledge based. The system consists of three different types of units, two of which are associative data memories implemented as relational databases. The short-term memory (STM) contains the raw color picture data and the most current interpretations and deductions about the original scene. The long-term memory (LTM) contains a detailed model of the scene under consideration. A collection of analysis processors, each of which is specialized for a particular task, can communicate with both of these memories. The information in the LTM remains unchanged during the analysis, while the STM is being continually updated and revised by the appropriate processors. The latter may be conceived of as being activated by certain data conditions in the STM, and using the information in both the LTM and STM to alter the status of the STM. 相似文献
34.
Geoffrey Levine Ugur Kuter Antons Rebguns Derek Green Diana Spears 《Computational Intelligence》2012,28(3):329-357
We present a Bayesian approach to learning flexible safety constraints and subsequently verifying whether plans satisfy these constraints. Our approach, called the Safety Constraint Learner/Checker (SCLC), infers safety constraints from a single expert demonstration trace and minimal background knowledge, and applies these constraints to the solutions proposed by multiple planning agents in an integrated and heterogeneous ensemble. The SCLC calculates how much to blame plan fragments (partial solutions) generated by the individual planning agents. This information is used when composing these fragments into a final overall plan. In particular, fragments whose safety violations exceed a threshold are rejected. This facilitates the generation of safe plans. We have integrated the SCLC within the Generalized Integrated Learning Architecture, which was designed for Defense Advanced Research Projects Agency (DARPA)’s Integrated Learning (IL) program. The main goal of the IL program is to promote the development and success of sophisticated systems that learn to solve challenging real‐world problems based on a simple demonstration by a human expert and exiguous domain knowledge. We present experimental results showing the advantages of the SCLC on two multiagent problem‐solving tasks that were benchmark applications in DARPA’s IL program. 相似文献
35.
Dr. Carolyn C. Woodroofe Dr. Joseph Ivanic Dr. Sarah Monti Dr. Rodney L. Levine Dr. Rolf E. Swenson 《Chembiochem : a European journal of chemical biology》2020,21(4):508-516
The reversible oxidation of methionine residues in proteins has emerged as a biologically important post-translational modification. However, detection and quantitation of methionine sulfoxide in proteins is difficult. Our aim is to develop a method for specifically derivatizing methionine sulfoxide residues. We report a Pummerer rearrangement of methionine sulfoxide treated sequentially with trimethylsilyl chloride and then 2-mercaptoimidazole or pyridine-2-thiol to produce a dithioacetal product. This derivative is stable to standard mass spectrometry conditions, and its formation identified oxidized methionine residues. The scope and requirements of dithioacetal formation are reported for methionine sulfoxide and model substrates. The reaction intermediates have been investigated by computational techniques and by 13C NMR spectroscopy. These provide evidence for an α-chlorinated intermediate. The derivatization allows for detection and quantitation of methionine sulfoxide in proteins by mass spectrometry and potentially by immunochemical methods. 相似文献
36.
37.
Gupta Saurabh Tolani Varun Davidson James Levine Sergey Sukthankar Rahul Malik Jitendra 《International Journal of Computer Vision》2020,128(5):1311-1330
International Journal of Computer Vision - We introduce a neural architecture for navigation in novel environments. Our proposed architecture learns to map from first-person views and plans a... 相似文献
38.
This research explores the relationship between campus political norms and student political participation. This study conceptualizes norms as a group‐level construct by collecting data at several universities (k = 32 universities, n = 1,389 students) where norms vary without campaign intervention. Multilevel modeling reveals that perceptions of political norms converge within universities. Further, frequency of political communication at the group‐ and individual‐level explains increases in normative perceptions. This increase is meaningful because norms at the group level were predictive of political behaviors at the individual level. This research documents the existence of political norms beyond the individual level of analysis and highlights the important role of political norms, political communication, and social context in understanding political participation. 相似文献
39.
This is Part II of a two-part paper on the problem of the title. In this part the analysis of the two-message problem started in Part I is completed. In addition a brief discussion is given of a computer-assisted solution. A list of twelve two-message problems involving several types of conditions is attached for the benefit of the reader. 相似文献
40.
In this part it is shown how the scalar unit coefficient a appearing in the W key formula (see Part I) can be replaced by an invertible matrix coefficient Γ. (A similar discussion with respect to the V key will appear In Part IV.) Various examples illustrate in detail the different procedures involved. Some examples in the encipherment and decipherment calculations are left as problems for the reader. The Appendix contains a proof of the main theorem. 相似文献