全文获取类型
收费全文 | 268篇 |
免费 | 10篇 |
学科分类
工业技术 | 278篇 |
出版年
2023年 | 5篇 |
2022年 | 1篇 |
2021年 | 7篇 |
2020年 | 7篇 |
2019年 | 10篇 |
2018年 | 9篇 |
2017年 | 5篇 |
2016年 | 8篇 |
2015年 | 1篇 |
2014年 | 10篇 |
2013年 | 22篇 |
2012年 | 14篇 |
2011年 | 29篇 |
2010年 | 21篇 |
2009年 | 14篇 |
2008年 | 13篇 |
2007年 | 10篇 |
2006年 | 16篇 |
2005年 | 10篇 |
2004年 | 7篇 |
2003年 | 3篇 |
2002年 | 3篇 |
2001年 | 2篇 |
2000年 | 4篇 |
1999年 | 6篇 |
1998年 | 7篇 |
1997年 | 7篇 |
1996年 | 3篇 |
1995年 | 3篇 |
1994年 | 1篇 |
1992年 | 1篇 |
1991年 | 1篇 |
1990年 | 1篇 |
1989年 | 1篇 |
1988年 | 1篇 |
1987年 | 2篇 |
1985年 | 1篇 |
1984年 | 1篇 |
1982年 | 1篇 |
1981年 | 2篇 |
1979年 | 1篇 |
1978年 | 1篇 |
1977年 | 1篇 |
1975年 | 3篇 |
1973年 | 1篇 |
1972年 | 1篇 |
排序方式: 共有278条查询结果,搜索用时 15 毫秒
31.
Tal A 《Environmental science & technology》1997,31(10):470A-476A
Risk Assessment. 相似文献
32.
This study was undertaken to evaluate clinically and histologically root resorption in extracted human second molars in close proximity to non-erupted third molars. The control group consisted of extracted second molars that were proximal to fully erupted third molars. Eight out of the 11 teeth in the study group presented different degrees of radiographic root resorption, nine presented clinical resorption, and all 11 had histologic evidence of root resorption. In the control group, no signs of root resorption were seen radiographically or clinically. Histologically, limited sites of resorption were identified in all teeth, which were partially repaired by cellular cementum. Histologic observation of study specimens revealed root surface resorption in 10 out of the 11 teeth, one showing replacement resorption as well. Inflammatory resorption was observed in the three most advanced cases in the study group. Reparative cementum partially lining resorbed areas was evident in all teeth with surface resorption. Within the limits of this study, radiographic identification of distal root resorption of second molars in close proximity to non-erupted third molars appears reliable. The findings may support the hypothesis that the presence of a non-erupted third molar in close proximity to the distal root of the second results in root resorption. 相似文献
33.
We describe the fabrication of a broad stripe optical wave-guide in z-cut lithium niobate by electric-field-assisted thermal proton exchange in a benzoic acid melt. Electric fields of 5 × 104V/m to 105V/m were laterally applied by means of in-contact gold thin-film electrodes 1 mm apart, producing an asymmetric depth across the width of the stripe. Similar vertical fields, applied across the thickness of the wafer, increased the stripe depth in the region of applied field. Refractive index profiles are given for both cases. 相似文献
34.
Previous research conducted on a Western sample has shown that people are less apt to exhibit in-group favoritism when they perform well individually while their in-group performs poorly. The authors evaluated whether this finding would be moderated by the cultural dimension of individual–collective primacy, which refers to whether people give more weight to their personal interests rather than their in-group's interests when forced to choose between the two. The authors hypothesized that relative to their counterparts from the United States, participants from the People's Republic of China would have more of a collective-primacy orientation and therefore would exhibit more in-group favoritism when they performed well individually while their in-group performed poorly. The results supported the hypothesis. Implications for the literatures on in-group favoritism and cross-cultural differences are discussed. (PsycINFO Database Record (c) 2010 APA, all rights reserved) 相似文献
35.
A Distributed Key Generation (DKG) protocol is an essential component of threshold cryptosystems required to initialize the
cryptosystem securely and generate its private and public keys. In the case of discrete-log-based (dlog-based) threshold signature
schemes (ElGamal and its derivatives), the DKG protocol is further used in the distributed signature generation phase to generate
one-time signature randomizers (r = gk). In this paper we show that a widely used dlog-based DKG protocol suggested by Pedersen does not guarantee a uniformly random
distribution of generated keys: we describe an efficient active attacker controlling a small number of parties which successfully
biases the values of the generated keys away from uniform. We then present a new DKG protocol for the setting of dlog-based
cryptosystems which we prove to satisfy the security requirements from DKG protocols and, in particular, it ensures a uniform
distribution of the generated keys. The new protocol can be used as a secure replacement for the many applications of Pedersen's
protocol. Motivated by the fact that the new DKG protocol incurs additional communication cost relative to Pedersen's original
protocol, we investigate whether the latter can be used in specific applications which require relaxed security properties
from the DKG protocol. We answer this question affirmatively by showing that Pedersen's protocol suffices for the secure implementation
of certain threshold cryptosystems whose security can be reduced to the hardness of the discrete logarithm problem. In particular,
we show Pedersen's DKG to be sufficient for the construction of a threshold Schnorr signature scheme. Finally, we observe
an interesting trade-off between security (reductions), computation, and communication that arises when comparing Pedersen's
DKG protocol with ours. 相似文献
36.
37.
Measurements of particle deposition and mobilization in water-saturated porous columns were performed using nuclear magnetic resonance imaging (MRI). The use of MRI enabled the acquisition of detailed, noninvasive measurements that quantify spatial and temporal evolution of particle transport patterns and porosity changes due to particle deposition. Measurements indicate that for the considered particle sizes and flow conditions significant particle deposition occurs at some distance into the column. Because identification of unique parametrizations for processes of particle straining, deposition, and detachment is complex and nonunique, a simple phenomenological model of particle deposition and porosity reduction is suggested. This model captures the essential features of the experimental measurements on spatial and temporal flow and deposition patterns. 相似文献
38.
39.
40.
Masi Iacopo Trần Anh Tuấn Hassner Tal Sahin Gozde Medioni Gérard 《International Journal of Computer Vision》2019,127(6-7):642-667
International Journal of Computer Vision - We identify two issues as key to developing effective face recognition systems: maximizing the appearance variations of training images and minimizing... 相似文献