全文获取类型
收费全文 | 3067篇 |
免费 | 135篇 |
学科分类
工业技术 | 3202篇 |
出版年
2023年 | 15篇 |
2022年 | 17篇 |
2021年 | 86篇 |
2020年 | 32篇 |
2019年 | 40篇 |
2018年 | 61篇 |
2017年 | 74篇 |
2016年 | 70篇 |
2015年 | 64篇 |
2014年 | 96篇 |
2013年 | 143篇 |
2012年 | 155篇 |
2011年 | 173篇 |
2010年 | 140篇 |
2009年 | 132篇 |
2008年 | 145篇 |
2007年 | 127篇 |
2006年 | 141篇 |
2005年 | 109篇 |
2004年 | 116篇 |
2003年 | 110篇 |
2002年 | 69篇 |
2001年 | 53篇 |
2000年 | 39篇 |
1999年 | 56篇 |
1998年 | 142篇 |
1997年 | 84篇 |
1996年 | 76篇 |
1995年 | 46篇 |
1994年 | 50篇 |
1993年 | 58篇 |
1992年 | 32篇 |
1991年 | 27篇 |
1990年 | 19篇 |
1989年 | 17篇 |
1988年 | 22篇 |
1987年 | 22篇 |
1986年 | 27篇 |
1985年 | 28篇 |
1984年 | 24篇 |
1983年 | 19篇 |
1982年 | 17篇 |
1981年 | 26篇 |
1980年 | 21篇 |
1979年 | 21篇 |
1977年 | 18篇 |
1976年 | 33篇 |
1975年 | 17篇 |
1974年 | 13篇 |
1973年 | 17篇 |
排序方式: 共有3202条查询结果,搜索用时 312 毫秒
81.
Ronen Gradwohl Moni Naor Benny Pinkas Guy N. Rothblum 《Theory of Computing Systems》2009,44(2):245-268
We consider cryptographic and physical zero-knowledge proof schemes for Sudoku, a popular combinatorial puzzle. We discuss
methods that allow one party, the prover, to convince another party, the verifier, that the prover has solved a Sudoku puzzle,
without revealing the solution to the verifier. The question of interest is how a prover can show: (i) that there is a solution
to the given puzzle, and (ii) that he knows the solution, while not giving away any information about the solution to the
verifier.
In this paper we consider several protocols that achieve these goals. Broadly speaking, the protocols are either cryptographic
or physical. By a cryptographic protocol we mean one in the usual model found in the foundations of cryptography literature.
In this model, two machines exchange messages, and the security of the protocol relies on computational hardness. By a physical
protocol we mean one that is implementable by humans using common objects, and preferably without the aid of computers. In
particular, our physical protocols utilize items such as scratch-off cards, similar to those used in lotteries, or even just
simple playing cards.
The cryptographic protocols are direct and efficient, and do not involve a reduction to other problems. The physical protocols
are meant to be understood by “lay-people” and implementable without the use of computers.
Research of R. Gradwohl was supported by US-Israel Binational Science Foundation Grant 2002246.
Research of M. Naor was supported in part by a grant from the Israel Science Foundation.
Research of B. Pinkas was supported in part by the Israel Science Foundation (grant number 860/06).
Research of G.N. Rothblum was supported by NSF grant CNS-0430450 and NSF grant CFF-0635297. 相似文献
82.
Ernest B. Cady Ann Lorek Yakito Takei John S. Wyatt Juliet M. Penrice A. David Edwards Donald Peebles Marzena Wylezinska Huw Owen-Reece Vincent Kirkbride Christopher E. Cooper Richard F. Aldridge Simon C. Roth Guy Brown David T. Delpy E. Osmund R. Reynolds 《Magma (New York, N.Y.)》1994,2(3):437-439
The aim of this study was to reproduce the delayed (secondary) cerebral energy failure previously described in birth-asphyxiated newborn infants and to investigate relationships between primary insult severity and the extent of the delayed energy failure. Phosphorus (31P) magnetic resonance spectroscopy (MRS) at 7 T was used to study the brains of 12 newborn piglets during an acute, reversible, cerebral hypoxic-ischemic episode which continued until nucleotide triphosphates (NTP) were depleted. After reperfusion and reoxygenation, spectroscopy was continued for 48 h. High-energy metabolite concentrations returned to near normal levels after the insult, but later they fell as delayed energy failure developed. The time integral of NTP depletion in the primary insult correlated strongly with the minimum [phosphocreatine (PCr)]/[inorganic orthophosphate (Pi)] observed 24–48 h after the insult. (Linear regression analysis gave slope –8.04 h–1; ordinate intercept=1.23;r=0.92;P<0.0001.) This model is currently being used to investigate the therapeutic potential of various cerebroprotective strategies including hypothermia. 相似文献
83.
Patrice Le Boudec François Sanchez Pierre-Luc FranÇois Jean-François Bayon Guy Michel StÉphan 《电信纪事》1994,49(3-4):178-192
The dynamics of the erbium doped fiber laser is analysed both experimentally and theoretically. This laser operates spontaneously in self-pulsing, in sinusoidal or in CW regime. Experiments have allowed to determine the control parameters : the cavity losses, the pumping rate and the ion pairs concentration. An antiphase dynamics is observed when the laser operates simultaneously at 1.55 µn and 1.536 µm. The self-pulsing behavior is attributed to a fast energy transfer which occurs between two neighboring ions (pair induced quenching). A simple model considering the active medium as a mixture of isolated ions and ions pairs is developped and leads to a good qualitative agreement with the experimental results. 相似文献
84.
The goal of this paper is twofold : at first, to present the stochastic timed Pétri nets model by emphasizing its ability to express the main characteristics of real time distributed systems (parallelism, synchronization by message exchange, time attributes and in particular time constraints) and to allow both qualitative and quantitative analysis (concept of randomized states graph); second, to show a modeling methodology based on this model that allows a rigorous modeling of theDqdb protocol (Qa access, bwb mechanism role,Pa access influence). A new contribution to theQa mechanism has been done (1). 相似文献
85.
86.
Hammam Al‐Bustami Guy Koplovitz Darinka Primc Shira Yochelis Eyal Capua Danny Porath Ron Naaman Yossi Paltiel 《Small (Weinheim an der Bergstrasse, Germany)》2018,14(30)
There is an increasing demand for the development of a simple Si‐based universal memory device at the nanoscale that operates at high frequencies. Spin‐electronics (spintronics) can, in principle, increase the efficiency of devices and allow them to operate at high frequencies. A primary challenge for reducing the dimensions of spintronic devices is the requirement for high spin currents. To overcome this problem, a new approach is presented that uses helical chiral molecules exhibiting spin‐selective electron transport, which is called the chiral‐induced spin selectivity (CISS) effect. Using the CISS effect, the active memory device is miniaturized for the first time from the micrometer scale to 30 nm in size, and this device presents memristor‐like nonlinear logic operation at low voltages under ambient conditions and room temperature. A single nanoparticle, along with Au contacts and chiral molecules, is sufficient to function as a memory device. A single ferromagnetic nanoplatelet is used as a fixed hard magnet combined with Au contacts in which the gold contacts act as soft magnets due to the adsorbed chiral molecules. 相似文献
87.
Giordano Maria C. Longhi Stefano Barelli Matteo Mazzanti Andrea Buatier de Mongeot Francesco Della Valle Giuseppe 《Nano Research》2018,11(7):3943-3956
Nano Research - The engineering of self-organized plasmonic metasurfaces is demonstrated using a maskless technique with defocused ion-beam sputtering and kinetically controlled deposition. The... 相似文献
88.
Nima Taghipour Mariona Dalmases Guy L. Whitworth Miguel Dosil Andreas Othonos Sotirios Christodoulou Shanti Maria Liga Gerasimos Konstantatos 《Advanced materials (Deerfield Beach, Fla.)》2023,35(1):2207678
The use of colloidal quantum dots (CQDs) as a gain medium in infrared laser devices has been underpinned by the need for high pumping intensities, very short gain lifetimes, and low gain coefficients. Here, PbS/PbSSe core/alloyed-shell CQDs are employed as an infrared gain medium that results in highly suppressed Auger recombination with a lifetime of 485 ps, lowering the amplified spontaneous emission (ASE) threshold down to 300 µJ cm−2, and showing a record high net modal gain coefficient of 2180 cm−1. By doping these engineered core/shell CQDs up to nearly filling the first excited state, a significant reduction of optical gain threshold is demonstrated, measured by transient absorption, to an average-exciton population-per-dot 〈Nth〉g of 0.45 due to bleaching of the ground state absorption. This in turn have led to a fivefold reduction in ASE threshold at 〈Nth〉ASE = 0.70 excitons-per-dot, associated with a gain lifetime of 280 ps. Finally, these heterostructured QDs are used to achieve near-infrared lasing at 1670 nm at a pump fluences corresponding to sub-single-exciton-per-dot threshold (〈Nth〉Las = 0.87). This work brings infrared CQD lasing thresholds on par to their visible counterparts, and paves the way toward solution-processed infrared laser diodes. 相似文献
89.
The concept of risk, in relation to human health, is a topic of primary interest for occupational health professionals. A new legislation recently established in Italy (626/94) according to European Community directives in the field of Preventive Medicine, called attention to this topic, and in particular to risk assessment and evaluation. Motivated by this context and by the impression that the concept of risk is frequently misunderstood, the present paper has two aims: the identification of the different meanings of the term "risk" in the new Italian legislation and the critical discussion of some commonly used definitions; and the proposal of a general definition, with the specification of a mathematical expression for quantitative risk estimation. The term risk (and risk estimation, assessment, or evaluation) has mainly referred to three different contexts: hazard identification, exposure assessment, and adverse health effects occurrence. Unfortunately, there are contexts in the legislation in which it is difficult to identify the true meaning of the term. This might cause equivocal interpretations and erroneous applications of the law because hazard evaluation, exposure assessment, and adverse health effects identification are completely different topics that require integrated but distinct approaches to risk management. As far as a quantitative definition of risk is of concern, we suggest an algorithm which connects the three basic risk elements (hazard, exposure, adverse health effects) by means of their probabilities of occurrence: the probability of being exposed (to a definite dose) given that a specific hazard is present (Pr(e[symbol: see text]p)), and the probability of occurrence of an adverse health effect as a consequence of that exposure (Pr(d[symbol: see text]e)). Using these quantitative components, risk can be defined as a sequence of measurable events that starts with hazard identification and terminates with disease occurrence; therefore, the following formal definition of risk is proposed: the probability of occurrence, in a given period of time, of an adverse health effect as a consequence of the existence of an hazard. In formula: R(d[symbol: see text]p) = Pr(e[symbol: see text]p) x Pr(d[symbol: see text]e). While Pr(e[symbol: see text]p) (exposure given hazard) must be evaluated in the situation under study, two alternatives exist for the estimation of the occurrence of adverse health effects (Pr(d[symbol: see text]e)): a "direct" estimation of the damage (Pr(d[symbol: see text]e) through formal epidemiologic studies conducted in the situation under observation; and an "indirect" estimation of Pr(d[symbol: see text]e) using information taken from the scientific literature (epidemiologic evaluations, dose-response relationships, extrapolations, ...). Both conditions are presented along with their respective advantages, disadvantages, and uncertainties. The usefulness of the proposed algorithm is discussed with respect to commonly used applications of risk assessment in occupational medicine; the relevance of time for risk estimation (both in the term of duration of observation, duration of exposure, and latency of effect) is briefly explained; and how the proposed algorithm takes into account (in terms of prevention and public health) both the etiologic relevance of the exposure and the consequences of exposure removal is highlighted. As a last comment, it is suggested that the diffuse application of good work practices (technical, behavioral, organizational, ...), or the exhaustive use of check lists, can be relevant in terms of improvement of prevention efficacy, but does not represent any quantitative procedure of risk assessment which, in any circumstance, must be considered the elective approach to adverse health effect prevention. 相似文献
90.
We address the problem of contour inference from partial data, as obtained from state-of-the-art edge detectors.We argue that in order to obtain more pereeptually salient contours, it is necessary to impose generic constraints such as continuity and co-curvilinearity.The implementation is in the form of a convolution with a mask which encodes both the orientation and the strength of the possible continuations. We first show how the mask, called the Extension field is derived, then how the contributions from different sites are collected to produce a saliency map.We show that the scheme can handle a variety of input data, from dot patterns to oriented edgels in a unified manner, and demonstrate results on a variety of input stimuli.We also present a similar approach to the problem of inferring contours formed by end points. In both cases, the scheme is non-linear, non iterative, and unified in the sense that all types of input tokens are handled in the same manner.This research was supported by the Advanced Research Projects Agency of the Department of Defense and was monitored by the Air Force Office of Scientific Research under Contract No. F49620-90-C-0078, and by a NSF Grant under award No. IRI-9024369. The United States Government is authorized to reproduce and distribute reprints for governmental purposes notwithstanding any copyright notation hereon. 相似文献