全文获取类型
收费全文 | 26261篇 |
免费 | 2193篇 |
国内免费 | 1632篇 |
专业分类
电工技术 | 609篇 |
技术理论 | 3篇 |
综合类 | 2242篇 |
化学工业 | 5166篇 |
金属工艺 | 2145篇 |
机械仪表 | 670篇 |
建筑科学 | 4766篇 |
矿业工程 | 733篇 |
能源动力 | 580篇 |
轻工业 | 1071篇 |
水利工程 | 307篇 |
石油天然气 | 519篇 |
武器工业 | 155篇 |
无线电 | 1085篇 |
一般工业技术 | 3266篇 |
冶金工业 | 3315篇 |
原子能技术 | 190篇 |
自动化技术 | 3264篇 |
出版年
2024年 | 104篇 |
2023年 | 446篇 |
2022年 | 773篇 |
2021年 | 910篇 |
2020年 | 945篇 |
2019年 | 877篇 |
2018年 | 798篇 |
2017年 | 952篇 |
2016年 | 977篇 |
2015年 | 981篇 |
2014年 | 1347篇 |
2013年 | 1441篇 |
2012年 | 1588篇 |
2011年 | 1989篇 |
2010年 | 1471篇 |
2009年 | 1783篇 |
2008年 | 1790篇 |
2007年 | 1682篇 |
2006年 | 1595篇 |
2005年 | 1366篇 |
2004年 | 1043篇 |
2003年 | 938篇 |
2002年 | 759篇 |
2001年 | 615篇 |
2000年 | 402篇 |
1999年 | 369篇 |
1998年 | 270篇 |
1997年 | 248篇 |
1996年 | 183篇 |
1995年 | 138篇 |
1994年 | 135篇 |
1993年 | 99篇 |
1992年 | 80篇 |
1991年 | 65篇 |
1990年 | 76篇 |
1989年 | 55篇 |
1988年 | 31篇 |
1987年 | 35篇 |
1986年 | 40篇 |
1984年 | 35篇 |
1980年 | 31篇 |
1979年 | 28篇 |
1966年 | 28篇 |
1965年 | 31篇 |
1964年 | 50篇 |
1963年 | 39篇 |
1960年 | 26篇 |
1959年 | 29篇 |
1958年 | 30篇 |
1955年 | 46篇 |
排序方式: 共有10000条查询结果,搜索用时 0 毫秒
101.
《国际互联网参考资料服务季刊》2013,18(3-4):29-36
Abstract Libraries are in competition with other entities that provide information access to students, scholars and the general public. This constitutes a radical change in the information environment. The library profession's failure to take seriously the change that has taken place in the information environment, and to respond with fundamental changes of its own, may well spell disaster for the library as we know it. 相似文献
102.
《国际互联网参考资料服务季刊》2013,18(2-3):11-33
Abstract Library professionals in the information age are called upon to provide user-friendly information environments. To accomplish this, more detailed knowledge is needed about the information behavior of users. The concept “information counseling” reflects this new orientation and involves instruction activities such as: orienting, advising, and reassuring novice learners. The taxonomic approach transforms self-witnessing reports into classified segments of information behaviors at three levels of internalization and in three behavioral domains, including: affective, cognitive, and sensorimotor behavior. Reference librarians and instructors are invited to contribute to the taxonomy and make use of it in planning and designing programs and facilities. This behavioral inventory of information behaviors learning the Internet is presented with illustrative entries under each category for affective and cognitive behavior. Suggested uses for the inventory include promoting information self-counseling skills, helping learners overcome technophobia through generational self-witnessing reports, and creating better point-of-use instructions for novices using complex information systems. 相似文献
103.
《国际互联网参考资料服务季刊》2013,18(4):29-39
ABSTRACT Designing a successful library Web site for an engineering audience means researching how engineers find and use information. It also requires the special librarian to conduct usability tests to determine what is and isn't working on the site. The special librarian is more than simply a librarian, he or she must be able to take the research and the test results and either build the Web site or make sure the site is built by a team. The librarian must be able to play several roles: researcher, tester, project leader, and Web manager. The more successful the librarian is at involving users in site design, the more used and usable the site will be. This article describes one librarian's experience with designing a special library Intranet. It also includes an extensive bibliography of related articles. 相似文献
104.
《国际互联网参考资料服务季刊》2013,18(1):31-51
Abstract This study investigates the effects of gender, college status, and prior Internet experience on the use of Internet resources. The subjects were 96 patrons randomly selected from those using the Internet terminals at the University Library of the University at Albany, SUNY, during the first two months of 1995. We found that the majority of users shared the following characteristics: they are male undergraduates affiliated with the social sciences and are novice users who have less than six months experience. Respondents felt strongly that the Internet is useful, and has been an important resource for their research and assignments. Users have high expectations of searching capabilities, while they feel neutral or disappointed with browsing. Our findings indicate that libraries should provide access to the Internet. They also suggest that libraries should take the lead in developing searchable indexes and making info-bases better organized for the ease and effectiveness of browsing. 相似文献
105.
从泛系理论的视角,运用泛系快深频方法对管理科学各理论学派进行审视,对相关理论进行详细解读,将管理科学与方法看成某种特化的泛系方法与泛系管理哲学,在泛系理法基础上实现某种三大显生(系统,关系,泛对称//泛系真善美禅极值原理)及技术化具体建构的分类对策巧显生. 相似文献
106.
107.
Juha K. Laurila Daniel Gatica-Perez Imad Aad Jan Blom Olivier Bornet Trinh Minh Tri Do Olivier Dousse Julien Eberle Markus Miettinen 《Pervasive and Mobile Computing》2013,9(6):752-771
This paper presents an overview of the Mobile Data Challenge (MDC), a large-scale research initiative aimed at generating innovations around smartphone-based research, as well as community-based evaluation of mobile data analysis methodologies. First, we review the Lausanne Data Collection Campaign (LDCC), an initiative to collect unique longitudinal smartphone dataset for the MDC. Then, we introduce the Open and Dedicated Tracks of the MDC, describe the specific datasets used in each of them, discuss the key design and implementation aspects introduced in order to generate privacy-preserving and scientifically relevant mobile data resources for wider use by the research community, and summarize the main research trends found among the 100+ challenge submissions. We finalize by discussing the main lessons learned from the participation of several hundred researchers worldwide in the MDC Tracks. 相似文献
108.
绝大部分认证子系统无法保证账户的真实性,它会将冒用盗窃账户的入侵者视为‘合法’用户。为了过滤这类非法用户,存储安全子系统必须进行访问行为诊断。为了增强存储预警能力,提出一种基于人工免疫的异常检测方案来监控用户的访问行为。若一个访问请求违反了访问控制规则,它就被视为‘异己’,从而给存储安全子系统提供一些警告提示。本方案(Storage Anomaly Detection System,SADS)针对存储层的入侵检测,并关注读/写数据请求,同时与网络入侵检测系统协同构筑了两层检测体系。仿真结果显示,SADS能达到相当高的检测率和较低的误警率,验证了方案可行性。而开销测试表明,SADS子模块的时间开销是可接受的(如对3MB的数据,其开销控制在11.6%以内)。 相似文献
109.
110.
社区问答系统研究综述 总被引:1,自引:0,他引:1
作为一种新兴的知识共享模式,社区问答系统(CQA)具有交互性、开放性的特点,能够更好地满足为用户提供个性化的信息服务的需求。对社区问答系统的研究及应用现状进行综述,系统阐述了用户行为模式、内容质量检测、问题检索等CQA中主要问题的研究以及CQA在其他媒体中的应用。最后展望了CQA中下一步值得研究的问题。本讨论有助于进一步丰富和拓展CQA的研究。 相似文献