全文获取类型
收费全文 | 539篇 |
免费 | 27篇 |
专业分类
566篇 |
出版年
2022年 | 4篇 |
2021年 | 4篇 |
2020年 | 6篇 |
2018年 | 6篇 |
2017年 | 12篇 |
2016年 | 16篇 |
2015年 | 15篇 |
2014年 | 23篇 |
2013年 | 33篇 |
2012年 | 45篇 |
2011年 | 30篇 |
2010年 | 12篇 |
2009年 | 18篇 |
2008年 | 25篇 |
2007年 | 16篇 |
2006年 | 17篇 |
2005年 | 5篇 |
2004年 | 10篇 |
2003年 | 12篇 |
2002年 | 16篇 |
2001年 | 19篇 |
2000年 | 7篇 |
1999年 | 13篇 |
1998年 | 7篇 |
1997年 | 4篇 |
1996年 | 6篇 |
1995年 | 4篇 |
1993年 | 6篇 |
1992年 | 7篇 |
1991年 | 9篇 |
1990年 | 6篇 |
1989年 | 8篇 |
1987年 | 4篇 |
1986年 | 4篇 |
1985年 | 6篇 |
1984年 | 7篇 |
1983年 | 7篇 |
1982年 | 10篇 |
1981年 | 5篇 |
1980年 | 6篇 |
1979年 | 11篇 |
1978年 | 5篇 |
1977年 | 8篇 |
1976年 | 7篇 |
1975年 | 5篇 |
1974年 | 8篇 |
1973年 | 5篇 |
1972年 | 12篇 |
1971年 | 7篇 |
1969年 | 6篇 |
排序方式: 共有566条查询结果,搜索用时 0 毫秒
521.
522.
Hidden persistent malware in guest virtual machine instances are among the most common internal threats in cloud computing, affecting the security of both cloud customers and providers. With the growing sophistication of modern malware, traditional methods are becoming increasingly ineffective for tackling cloud security problems. Moreover, given the pay-per-use model of clouds, consumption of resources by these malwares and malicious services can cause huge losses to both the cloud provider and customer. Thus, it is important to develop mechanisms that can limit the scale of malicious attacks in order to minimize their resources consumption. Trust management is a fundamental technique for assessing and increasing the reliability and security of cloud services. Unfortunately, majority of existing mechanisms for trust management in clouds have limitations that prevent them from being fully effective. In this paper, we propose a novel limited-trust capacity model to mitigate the threats of internal malicious software and services in cloud computing using concepts from flow networks to reduce the scale of malicious software or services. Our limited-trust capacity model can be utilized in the following two ways: (1) to manage the trust relationship among the guest services and to evaluate the threats of unknown malicious services, and (2) to minimize risk associated with renting cloud services and limiting the resource drain caused by malicious guest services. Finally, experimental results show that our limited-trust capacity model can effectively restrict the scale of malicious services and significantly mitigate the threats of internal attacks. 相似文献
523.
524.
Specific inhibition of DNA polymerase beta by its 14 kDa domain: role of single- and double-stranded DNA binding and 5'-phosphate recognition. 总被引:2,自引:1,他引:1 下载免费PDF全文
I Husain B S Morton W A Beard R K Singhal R Prasad S H Wilson J M Besterman 《Nucleic acids research》1995,23(9):1597-1603
DNA polymerase beta (beta-polymerase) has been implicated in short-patch DNA synthesis in the DNA repair pathway known as base excision repair. The native 39 kDa enzyme is organized into four structurally and functionally distinct domains. In an effort to examine this enzyme as a potential therapeutic target, we analyzed the effect of various beta-polymerase domains on the activity of the enzyme in vitro. We show that the 14 kDa N-terminal segment of beta-polymerase, which binds to both single- and double-stranded DNA, but lacks DNA polymerase activity, inhibits beta-polymerase activity in vitro. Most importantly, the 8, 27 and 31 kDa domains of beta-polymerase do not inhibit beta-polymerase activity, demonstrating that the inhibition by the 14 kDa domain is specific. The inhibition of beta-polymerase activity in vitro is abolished by increasing the concentrations of both of the substrates (template-primer and deoxynucleoside triphosphate). In contrast, an in vitro base excision repair assay is inhibited in a domain specific manner by the 14 kDa domain even in the presence of saturating substrates. The inhibition of beta-polymerase activity by the 14 kDa domain appears specific to beta-polymerase as this domain does not inhibit either mammalian DNA polymerase alpha or Escherichia coli polymerase I (Klenow fragment). These data suggest that the 14 kDa domain could be used as a potential inhibitor of intracellular beta-polymerase and that it may provide a means for sensitizing cells to therapeutically relevant DNA damaging agents. 相似文献
525.
Ashok Kumar Singhal Pritish Kumar Chowdhury Ram Prakash Sharma Jogendra Nath Baruah Werner Herz 《Phytochemistry》1982,21(2):462-463
Cynaropicrin and 11,13-dihydrodesacylcynaropicrin were isolated from Tricholepis glaberrima. 相似文献
526.
R Gilberto González Reza Hakimelahi Pamela W Schaefer Luca Roccatagliata A Gregory Sorensen Aneesh B Singhal 《BMC neurology》2010,10(1):13
Background
The stability of hypoperfused brain tissue in stroke patients with major artery occlusions is unknown. The purpose of this study was to determine the persistence of a diffusion/perfusion mismatch in patients with ICA or proximal MCA occlusions. 相似文献527.
Mathematical expressions, to investigate the effects of mederate departure from normality assumption on the point estimate and on the probability of getting a negative estimate of genetic heritability, in a balanced situation, have been derived. The numerical results show that the point estimate is over sensitive whereas the probability of a negative estimate is insensitive to this violation. 相似文献
528.
Spatial compression among the longer DNA fragments occurs during DNA electrophoresis in agarose and non-agarose gels when using certain ions in the conductive buffer, impairing the range of fragment sizes resolved well in a single gel. Substitutions using various polyhydroxyl anions supported the underlying phenomenon as the complexation of Lewis acids to DNA. We saw significant improvements using conditions (lithium borate 10 mM cations, pH 6.5) favoring the formation of borate polyanions and having lower conductance and Joule heating, delayed electrolyte exhaustion, faster electrophoretic run-speed, and sharper separation of DNA bands from 100bp to 12 kb in a single run. 相似文献
529.
530.