首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   848篇
  免费   10篇
电工技术   57篇
化学工业   146篇
金属工艺   11篇
机械仪表   10篇
建筑科学   16篇
矿业工程   4篇
能源动力   8篇
轻工业   134篇
水利工程   5篇
石油天然气   1篇
无线电   37篇
一般工业技术   106篇
冶金工业   211篇
原子能技术   1篇
自动化技术   111篇
  2023年   6篇
  2022年   7篇
  2021年   11篇
  2020年   7篇
  2019年   17篇
  2018年   16篇
  2017年   23篇
  2016年   12篇
  2014年   14篇
  2013年   54篇
  2012年   35篇
  2011年   32篇
  2010年   37篇
  2009年   37篇
  2008年   30篇
  2007年   26篇
  2006年   14篇
  2005年   13篇
  2004年   24篇
  2003年   12篇
  2002年   17篇
  2001年   21篇
  2000年   15篇
  1999年   15篇
  1998年   60篇
  1997年   36篇
  1996年   16篇
  1995年   21篇
  1994年   17篇
  1993年   17篇
  1992年   13篇
  1991年   7篇
  1990年   8篇
  1989年   8篇
  1988年   13篇
  1986年   11篇
  1985年   5篇
  1984年   5篇
  1983年   10篇
  1982年   7篇
  1981年   6篇
  1979年   6篇
  1977年   7篇
  1976年   11篇
  1975年   9篇
  1973年   8篇
  1971年   6篇
  1970年   6篇
  1969年   9篇
  1968年   5篇
排序方式: 共有858条查询结果,搜索用时 515 毫秒
91.
We investigate two parametric approaches and one non-parametric approach toestimating Internet users' value-of-time, an important characteristic ofdemand for Internet services. The advantages of these approaches are madeclear and their limitations discussed. The models are tested with datagenerated from our similation model of the Internet economy. Given thecharacteristics of the data, we investigate parametric count-data modelsfirst. While reasonably good results are obtained on all medium- andlarge-sized jobs, the method fails on small-sized ones. Second, we develop anonparametric quasi-Bayesian update algorithm for retrieving the underlyingdistribution function of Internet users' value-of-time purely fromobservations on their choices. Compared with the parametric count-data models,good results are obtained in every case.  相似文献   
92.
93.
94.
An information-theoretic private information retrieval (PIR) protocol allows a user to retrieve a data item of its choice from a database replicated amongst several servers, such that each server gains absolutely no information on the identity of the item being retrieved. One problem with this approach is that current systems do not guarantee availability of servers at all times for many reasons, e.g., crash of server or communication problems. In this work we design robust PIR protocols, i.e., protocols which still work correctly even if only some servers are available during the protocol's operation. We present various robust PIR protocols giving different tradeoffs between the different parameters. We first present a generic transformation from regular PIR protocols to robust PIR protocols. We then present two constructions of specific robust PIR protocols. Finally, we construct robust PIR protocols which can tolerate Byzantine servers, i.e., robust PIR protocols which still work in the presence of malicious servers or servers with a corrupted or obsolete database.  相似文献   
95.
Longitudinal neuropsychological outcomes of traumatic brain injury (TBI) were investigated in 53 children with severe TBI, 56 children with moderate TBI, and 80 children with orthopedic injuries only. Neuropsychological functioning was assessed at baseline, at 6- and 12-month follow-ups, and at an extended follow-up (a mean of 4 years postinjury). Mixed model analyses revealed persistent neuropsychological sequelae of TBI that generally did not vary as a function of time postinjury. Some recovery occurred during the first year postinjury, but recovery reached a plateau after that time, and deficits were still apparent at the extended follow-up. Further recovery was uncommon after the first year postinjury. Family factors did not moderate neuropsychological outcomes, despite their demonstrated influence on behavior and academic achievement after childhood TBI. (PsycINFO Database Record (c) 2010 APA, all rights reserved)  相似文献   
96.
The Honeynet Project was founded by 30 US based security professionals with the intention of researching the techniques, tools, tactics and motives of hackers and the ‘blackhat’ community in general. A Honeynet Project is an all volunteer, non‐profit organization committed to sharing and learning the motives, tools, and tactics of the hacking community. It is comprised of a number of information security professionals dedicated to honeynet research and information security. This paper outlines the technical configuration of a honeynet, presents some of the key attacks on the honeynet to date and provides recommendations for securing networked systems. Copyright © 2005 John Wiley & Sons, Ltd.  相似文献   
97.
VP26 is a 12-kDa capsid protein of herpes simplex virus 1. Although VP26 is dispensable for assembly, the native capsid (a T=16 icosahedron) contains 900 copies: six on each of the 150 hexons of VP5 (149 kDa) but none on the 12 VP5 pentons at its vertices. We have investigated this interaction by expressing VP26 in Escherichia coli and studying the properties of the purified protein in solution and its binding to capsids. Circular dichroism spectroscopy reveals that the conformation of purified VP26 consists mainly of beta-sheets (approximately 80%), with a small alpha-helical component (approximately 15%). Its state of association was determined by analytical ultracentrifugation to be a reversible monomer-dimer equilibrium, with a dissociation constant of approximately 2 x 10(-5) M. Bacterially expressed VP26 binds to capsids in the normal amount, as determined by quantitative sodium dodecyl sulfate-polyacrylamide gel electrophoresis. Cryoelectron microscopy shows that the protein occupies its usual sites on hexons but does not bind to pentons, even when available in 100-fold molar excess. Quasi-equivalence requires that penton VP5 must differ in conformation from hexon VP5: our data show that in mature capsids, this difference is sufficiently pronounced to abrogate its ability to bind VP26.  相似文献   
98.
99.
100.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号