首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   600篇
  免费   17篇
电工技术   12篇
化学工业   71篇
金属工艺   5篇
机械仪表   8篇
建筑科学   45篇
能源动力   10篇
轻工业   43篇
水利工程   4篇
石油天然气   2篇
无线电   42篇
一般工业技术   52篇
冶金工业   248篇
原子能技术   2篇
自动化技术   73篇
  2022年   13篇
  2021年   10篇
  2020年   9篇
  2018年   5篇
  2017年   7篇
  2016年   13篇
  2015年   6篇
  2014年   10篇
  2013年   18篇
  2012年   14篇
  2011年   19篇
  2010年   15篇
  2009年   14篇
  2008年   16篇
  2007年   21篇
  2006年   21篇
  2005年   17篇
  2004年   16篇
  2003年   17篇
  2002年   18篇
  2001年   14篇
  2000年   16篇
  1999年   20篇
  1998年   44篇
  1997年   39篇
  1996年   27篇
  1995年   15篇
  1994年   12篇
  1993年   13篇
  1992年   4篇
  1989年   14篇
  1988年   7篇
  1987年   5篇
  1986年   6篇
  1985年   6篇
  1984年   6篇
  1983年   6篇
  1982年   5篇
  1981年   4篇
  1979年   7篇
  1978年   4篇
  1977年   10篇
  1976年   4篇
  1975年   5篇
  1972年   4篇
  1969年   3篇
  1965年   3篇
  1957年   3篇
  1956年   3篇
  1955年   3篇
排序方式: 共有617条查询结果,搜索用时 15 毫秒
1.
Schools often use peer-tutoring as a corrective program for students who are experiencing difficulties academically. Given appropriate behavioral structure, peer-tutoring can become a powerful classwide instructional intervention. An historical perspective on the use of students as teachers for their peers is given in this selective literature review. Also, information on the efficacy of considering behavioral function and structure and data addressing ecobehavioral variables to establish a productive learning environment are provided. The authors emphasize infusing peer-tutoring programs with applied behavior analysis techniques to increase the academic success of large numbers of students cost effectively. Peer-tutoring programs are considered to be a way for applied behavior analysts to gain greater access to American school learning environments. (PsycINFO Database Record (c) 2010 APA, all rights reserved)  相似文献   
2.
This study, guided in part by G. A. Marlatt and J. R. Gordon's (1985) abstinence violation effect (AVE) model, examined whether variability in cognitive and emotional reactions to binges accounts for recurrence of binge eating. Attributional, cognitive, and affective reactions to 2 successive binges, as well as the latencies between each binge and a subsequent binge, were evaluated through a series of structured phone interviews with 50 nonpurging normal-weight female bingers. Reported mood after binging was unrelated to binge latency. However, when Ss made more intense internal, global, and uncontrollable causal attributions for a binge, a subsequent binge followed significantly sooner. Within-subject variations in AVEs across binges prospectively predicted within-subject variations in the speed with which another binge followed. Analyses suggested that cognitive states (e.g., AVE and guilt) evoked by particular events were better predictors of how quickly binging repeats than were stable differences in attributional style. (PsycINFO Database Record (c) 2010 APA, all rights reserved)  相似文献   
3.
Multidimensional security protocol engineering is effective for creating cryptographic protocols since it encompasses a variety of design, analysis, and deployment techniques, thereby providing a higher level of confidence than individual approaches offer. SPEAR II, the Security Protocol Engineering and Analysis Resource II, is a protocol engineering tool built on the foundation of previous experience garnered during the SPEAR I project in 1997. The goal of the SPEAR II tool is to facilitate cryptographic protocol engineering and to aid users in distilling the critical issues during an engineering session by presenting them with an appropriate level of detail and guiding them as much as possible during design, analysis and implementation. The SPEAR II tool currently consists of four components that have been integrated into one consistent and unified graphical interface: a protocol specification environment (GYPSIE), a GNY statement construction interface (visual GNY), a Prolog-based GNY analysis engine (GYNGER), and a message rounds calculator. The multidimensional approach realized by SPEAR II is combined with a graphical interface that focuses on making specification of a protocol and its associated conditions for formal analysis as straight forward and painless as possible. Experiments that we have conducted confirm that the analysis engine is able to generate accurate proofs for achievable GNY-based goals, while preliminary usability experiments have indicated that the interface utilized by SPEAR II is both expressive and simple to use for specifying cryptographic protocols and constructing logic statements pertaining to these protocols.  相似文献   
4.
This brief essay was sparked by a long overdue new book (Person, 2001) dealing with Freud's 1921 monograph on group psychology. This volume, regrettably, failed to relate Freud's promising, precursory ideas to his own behavior as a leader, as well as to subsequent seminal contributions to psychoanalytic and group theories and to group psychotherapy. (PsycINFO Database Record (c) 2010 APA, all rights reserved)  相似文献   
5.
6.
We examined situational antecedents of dieting relapse crises and dieters' attempts to cope with temptations to overeat. We analyzed postreatment interviews with 57 obese Ss with Type II diabetes, comparing situations in which Ss lapsed with those in which they overcame temptation to overeat. Cluster analysis yielded 3 categories of relapse crises: mealtime, low-arousal, and emotional upset situations. The cluster differed in outcome: Upset situations almost always resulted in overeating; situational factors, especially food-related cues, increased relapse risk; but performance of coping was the strongest correlate of outcome. Cognitive and behavioral coping responses were each equally associated with positive outcomes. When Ss reported combining both types of coping, they were less likely to report overeating. The dynamics of relapse crises among dieters resemble those that govern relapse crises in addictive behaviors. (PsycINFO Database Record (c) 2010 APA, all rights reserved)  相似文献   
7.
8.
The uptake of digital photos vs. print photos has altered the practice of photo-sharing. Print photos are easy to share within the home, but much harder to share outside of it. The opposite is true of digital photos. People easily share digital photos outside the home, e.g., to family and friends by e-mail gift-giving, and to social networks and the broader public by web publishing. Yet within the home, collocated digital photo-sharing is harder, primarily because digital photos are typically stored on personal accounts in desktop computers located in home offices. This leads to several consequences. (1) The invisibility of digital photos implies few opportunities for serendipitous photo-sharing. (2) Access control and navigation issues inhibit family members from retrieving photo collections. (3) Photo viewing is compromised as digital photos are displayed on small screens in an uncomfortable viewing setting.To mitigate some of these difficulties, we explore how physical memorabilia collected by family members can create opportunities that encourage social and collocated digital photo-sharing. First, we studied (via contextual interviews with 20 households) how families currently practice photo-sharing and how they keep memorabilia. We identified classes of memorabilia that can serve as memory triggers to family events, trips, and times when people took photos. Second, we designed Souvenirs, a photo-viewing system that exploits memorabilia as a social instrument. Using Souvenirs, a family member can meaningfully associate physical memorabilia with particular photo-sets. Later, any family member can begin their story-telling with others through the physical memento, and then enrich the story by displaying its associated photos simply by moving the memento close to the home's large-format television screen. Third, we re-examined our design premises by evoking household reactions to an early version of Souvenirs. Based on these interviews, we redesigned Souvenirs to better reflect the preferences and real practices of photo and memorabilia use in the home.  相似文献   
9.
Emergent semantics through interaction in image databases   总被引:9,自引:0,他引:9  
In this paper, we briefly discuss some aspects of image semantics and the role that it plays for the design of image databases. We argue that images don't have an intrinsic meaning, but that they are endowed with a meaning by placing them in the context of other images and by the user interaction. From this observation, we conclude that, in an image, database users should be allowed to manipulate not only the individual images, but also the relation between them. We present an interface model based on the manipulation of configurations of images  相似文献   
10.
Measurements of the shear viscosity at saturated vapor pressure through the lambda transition indicate a singular behavior of the form |1 – (/)|=A x , (where =|1–(T/T )|, with equal values for the critical exponent on both sides of the transition.Work sponsored by Consiglio Nazionale delle Ricerche, Rome (Italy).  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号