全文获取类型
收费全文 | 86472篇 |
免费 | 1033篇 |
国内免费 | 424篇 |
专业分类
电工技术 | 901篇 |
综合类 | 2319篇 |
化学工业 | 11719篇 |
金属工艺 | 4837篇 |
机械仪表 | 3072篇 |
建筑科学 | 2308篇 |
矿业工程 | 572篇 |
能源动力 | 1186篇 |
轻工业 | 3853篇 |
水利工程 | 1284篇 |
石油天然气 | 354篇 |
武器工业 | 1篇 |
无线电 | 9565篇 |
一般工业技术 | 16611篇 |
冶金工业 | 3059篇 |
原子能技术 | 271篇 |
自动化技术 | 26017篇 |
出版年
2022年 | 33篇 |
2021年 | 45篇 |
2020年 | 29篇 |
2019年 | 47篇 |
2018年 | 14531篇 |
2017年 | 13425篇 |
2016年 | 9996篇 |
2015年 | 644篇 |
2014年 | 312篇 |
2013年 | 386篇 |
2012年 | 3296篇 |
2011年 | 9516篇 |
2010年 | 8435篇 |
2009年 | 5714篇 |
2008年 | 6967篇 |
2007年 | 7892篇 |
2006年 | 271篇 |
2005年 | 1346篇 |
2004年 | 1201篇 |
2003年 | 1267篇 |
2002年 | 621篇 |
2001年 | 145篇 |
2000年 | 247篇 |
1999年 | 123篇 |
1998年 | 123篇 |
1997年 | 88篇 |
1996年 | 95篇 |
1995年 | 56篇 |
1994年 | 49篇 |
1993年 | 44篇 |
1992年 | 45篇 |
1991年 | 46篇 |
1990年 | 24篇 |
1989年 | 28篇 |
1988年 | 24篇 |
1986年 | 23篇 |
1969年 | 24篇 |
1968年 | 43篇 |
1967年 | 35篇 |
1966年 | 44篇 |
1965年 | 46篇 |
1963年 | 29篇 |
1962年 | 22篇 |
1960年 | 30篇 |
1959年 | 35篇 |
1958年 | 37篇 |
1957年 | 36篇 |
1956年 | 34篇 |
1955年 | 63篇 |
1954年 | 68篇 |
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
81.
82.
83.
84.
In this paper, we argue that successful integration of knowledge across work domains in the short-term can mask the generation of long-term consequences. We explore a setting, the introduction of environmental considerations into semiconductor manufacturing, where the eventual adoption of common measurement artifacts and associated practices enabled knowledge integration, but failed to address significant underlying consequences. Drawing from observational, interview, and archival data we develop an understanding of the work practices of the Tech and EnviroTech groups as structured by the material world and broader collective conventions. We introduce the concept of knowledge regime to outline the differences in knowledge across these work domains. More specifically, we find that differences in the causal specificity and developmental time horizon of knowledge and the measurement artifacts that result contribute to the relative power of one knowledge regime over another. Understanding these sources of incompatibility provides insight into the design requirements of information systems as boundary objects for knowledge integration, but also specifies the potential limits to any design effort. 相似文献
85.
86.
87.
88.
Understanding consumer behaviour is of vital importance to consumer-oriented e-business models today. In this paper, we study the relationships between consumer perceptions of risk and trust and the attitude towards purchasing at a consumer-to-consumer electronic marketplace (EM). Typical for EM settings is that consumer behaviour is subject to perceptions of the selling party as well as of the institutional structures of the intermediary that is operating the EM. Building upon the well-established literature of trust, we consider the concepts of intermediary trust and seller trust. We extend this categorisation by introducing the concepts of intermediary risk and seller risk. We developed measurement instruments for intermediary risk and seller risk. All measurement scales have acceptable alphas and are unidimensional. An empirical study is conducted to explore the relationships between the risk and trust types and consumer purchase attitude. The results reveal significant, direct effects of seller trust and seller risk. Second-order effects of intermediary trust and intermediary risk are investigated and reported. The paper concludes with general observations and recommendations for research and practice. 相似文献
89.
Salama H.F. Reeves D.S. Viniotis Y. 《Selected Areas in Communications, IEEE Journal on》1997,15(3):332-345
Multicast (MC) routing algorithms capable of satisfying the quality of service (QoS) requirements of real-time applications will be essential for future high-speed networks. We compare the performance of all of the important MC routing algorithms when applied to networks with asymmetric link loads. Each algorithm is judged based on the quality of the MC trees it generates and its efficiency in managing the network resources. Simulation results over random networks show that unconstrained algorithms are not capable of fulfilling the QoS requirements of real-time applications in wide-area networks. Simulations also reveal that one of the unconstrained algorithms, reverse path multicasting (RPM), is quite inefficient when applied to asymmetric networks. We study how combining routing with resource reservation and admission control improves the RPM's efficiency in managing the network resources. The performance of one semiconstrained heuristic, MSC, three constrained Steiner tree (CST) heuristics, Kompella, Pasquale, and Polyzos (1992), constrained adaptive ordering (CAO), and bounded shortest multicast algorithm (BSMA), and one constrained shortest path tree (CSPT) heuristic, the constrained Dijkstra heuristic (CDKS) are also studied. Simulations show that the semiconstrained and constrained heuristics are capable of successfully constructing MC trees which satisfy the QoS requirements of real-time traffic. However, the cost performance of the heuristics varies. The BSMA's MC trees are lower in cost than all other constrained heuristics. Finally, we compare the execution times of all algorithms, unconstrained, semiconstrained, and constrained 相似文献
90.