全文获取类型
收费全文 | 848篇 |
免费 | 10篇 |
专业分类
电工技术 | 57篇 |
化学工业 | 146篇 |
金属工艺 | 11篇 |
机械仪表 | 10篇 |
建筑科学 | 16篇 |
矿业工程 | 4篇 |
能源动力 | 8篇 |
轻工业 | 134篇 |
水利工程 | 5篇 |
石油天然气 | 1篇 |
无线电 | 37篇 |
一般工业技术 | 106篇 |
冶金工业 | 211篇 |
原子能技术 | 1篇 |
自动化技术 | 111篇 |
出版年
2023年 | 6篇 |
2022年 | 7篇 |
2021年 | 11篇 |
2020年 | 7篇 |
2019年 | 17篇 |
2018年 | 16篇 |
2017年 | 23篇 |
2016年 | 12篇 |
2014年 | 14篇 |
2013年 | 54篇 |
2012年 | 35篇 |
2011年 | 32篇 |
2010年 | 37篇 |
2009年 | 37篇 |
2008年 | 30篇 |
2007年 | 26篇 |
2006年 | 14篇 |
2005年 | 13篇 |
2004年 | 24篇 |
2003年 | 12篇 |
2002年 | 17篇 |
2001年 | 21篇 |
2000年 | 15篇 |
1999年 | 15篇 |
1998年 | 60篇 |
1997年 | 36篇 |
1996年 | 16篇 |
1995年 | 21篇 |
1994年 | 17篇 |
1993年 | 17篇 |
1992年 | 13篇 |
1991年 | 7篇 |
1990年 | 8篇 |
1989年 | 8篇 |
1988年 | 13篇 |
1986年 | 11篇 |
1985年 | 5篇 |
1984年 | 5篇 |
1983年 | 10篇 |
1982年 | 7篇 |
1981年 | 6篇 |
1979年 | 6篇 |
1977年 | 7篇 |
1976年 | 11篇 |
1975年 | 9篇 |
1973年 | 8篇 |
1971年 | 6篇 |
1970年 | 6篇 |
1969年 | 9篇 |
1968年 | 5篇 |
排序方式: 共有858条查询结果,搜索用时 515 毫秒
91.
Alok Gupta Boris Jukic Mingzhi Li Dale O. Stahl Andrew B. Whinston 《Computational Economics》2001,17(2-3):203-218
We investigate two parametric approaches and one non-parametric approach toestimating Internet users' value-of-time, an important characteristic ofdemand for Internet services. The advantages of these approaches are madeclear and their limitations discussed. The models are tested with datagenerated from our similation model of the Internet economy. Given thecharacteristics of the data, we investigate parametric count-data modelsfirst. While reasonably good results are obtained on all medium- andlarge-sized jobs, the method fails on small-sized ones. Second, we develop anonparametric quasi-Bayesian update algorithm for retrieving the underlyingdistribution function of Internet users' value-of-time purely fromobservations on their choices. Compared with the parametric count-data models,good results are obtained in every case. 相似文献
92.
93.
94.
An information-theoretic private information retrieval (PIR) protocol allows a user to retrieve a data item of its choice
from a database replicated amongst several servers, such that each server gains absolutely no information on the identity
of the item being retrieved. One problem with this approach is that current systems do not guarantee availability of servers
at all times for many reasons, e.g., crash of server or communication problems. In this work we design robust PIR protocols,
i.e., protocols which still work correctly even if only some servers are available during the protocol's operation. We present
various robust PIR protocols giving different tradeoffs between the different parameters. We first present a generic transformation
from regular PIR protocols to robust PIR protocols. We then present two constructions of specific robust PIR protocols. Finally,
we construct robust PIR protocols which can tolerate Byzantine servers, i.e., robust PIR protocols which still work in the
presence of malicious servers or servers with a corrupted or obsolete database. 相似文献
95.
Yeates Keith Owen; Taylor H. Gerry; Wade Shari L.; Drotar Dennis; Stancin Terry; Minich Nori 《Canadian Metallurgical Quarterly》2002,16(4):514
Longitudinal neuropsychological outcomes of traumatic brain injury (TBI) were investigated in 53 children with severe TBI, 56 children with moderate TBI, and 80 children with orthopedic injuries only. Neuropsychological functioning was assessed at baseline, at 6- and 12-month follow-ups, and at an extended follow-up (a mean of 4 years postinjury). Mixed model analyses revealed persistent neuropsychological sequelae of TBI that generally did not vary as a function of time postinjury. Some recovery occurred during the first year postinjury, but recovery reached a plateau after that time, and deficits were still apparent at the extended follow-up. Further recovery was uncommon after the first year postinjury. Family factors did not moderate neuropsychological outcomes, despite their demonstrated influence on behavior and academic achievement after childhood TBI. (PsycINFO Database Record (c) 2010 APA, all rights reserved) 相似文献
96.
Kevin Curran Colman Morrissey Colm Fagan Colm Murphy Brian O'Donnell Gerry Fitzpatrick Stephen Condit 《International Journal of Network Management》2005,15(2):123-134
The Honeynet Project was founded by 30 US based security professionals with the intention of researching the techniques, tools, tactics and motives of hackers and the ‘blackhat’ community in general. A Honeynet Project is an all volunteer, non‐profit organization committed to sharing and learning the motives, tools, and tactics of the hacking community. It is comprised of a number of information security professionals dedicated to honeynet research and information security. This paper outlines the technical configuration of a honeynet, presents some of the key attacks on the honeynet to date and provides recommendations for securing networked systems. Copyright © 2005 John Wiley & Sons, Ltd. 相似文献
97.
PT Wingfield SJ Stahl DR Thomsen FL Homa FP Booy BL Trus AC Steven 《Canadian Metallurgical Quarterly》1997,71(12):8955-8961
VP26 is a 12-kDa capsid protein of herpes simplex virus 1. Although VP26 is dispensable for assembly, the native capsid (a T=16 icosahedron) contains 900 copies: six on each of the 150 hexons of VP5 (149 kDa) but none on the 12 VP5 pentons at its vertices. We have investigated this interaction by expressing VP26 in Escherichia coli and studying the properties of the purified protein in solution and its binding to capsids. Circular dichroism spectroscopy reveals that the conformation of purified VP26 consists mainly of beta-sheets (approximately 80%), with a small alpha-helical component (approximately 15%). Its state of association was determined by analytical ultracentrifugation to be a reversible monomer-dimer equilibrium, with a dissociation constant of approximately 2 x 10(-5) M. Bacterially expressed VP26 binds to capsids in the normal amount, as determined by quantitative sodium dodecyl sulfate-polyacrylamide gel electrophoresis. Cryoelectron microscopy shows that the protein occupies its usual sites on hexons but does not bind to pentons, even when available in 100-fold molar excess. Quasi-equivalence requires that penton VP5 must differ in conformation from hexon VP5: our data show that in mature capsids, this difference is sufficiently pronounced to abrogate its ability to bind VP26. 相似文献
98.
99.
100.