首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   539篇
  免费   27篇
  566篇
  2022年   4篇
  2021年   4篇
  2020年   6篇
  2018年   6篇
  2017年   12篇
  2016年   16篇
  2015年   15篇
  2014年   23篇
  2013年   33篇
  2012年   45篇
  2011年   30篇
  2010年   12篇
  2009年   18篇
  2008年   25篇
  2007年   16篇
  2006年   17篇
  2005年   5篇
  2004年   10篇
  2003年   12篇
  2002年   16篇
  2001年   19篇
  2000年   7篇
  1999年   13篇
  1998年   7篇
  1997年   4篇
  1996年   6篇
  1995年   4篇
  1993年   6篇
  1992年   7篇
  1991年   9篇
  1990年   6篇
  1989年   8篇
  1987年   4篇
  1986年   4篇
  1985年   6篇
  1984年   7篇
  1983年   7篇
  1982年   10篇
  1981年   5篇
  1980年   6篇
  1979年   11篇
  1978年   5篇
  1977年   8篇
  1976年   7篇
  1975年   5篇
  1974年   8篇
  1973年   5篇
  1972年   12篇
  1971年   7篇
  1969年   6篇
排序方式: 共有566条查询结果,搜索用时 0 毫秒
521.
522.
Hidden persistent malware in guest virtual machine instances are among the most common internal threats in cloud computing, affecting the security of both cloud customers and providers. With the growing sophistication of modern malware, traditional methods are becoming increasingly ineffective for tackling cloud security problems. Moreover, given the pay-per-use model of clouds, consumption of resources by these malwares and malicious services can cause huge losses to both the cloud provider and customer. Thus, it is important to develop mechanisms that can limit the scale of malicious attacks in order to minimize their resources consumption. Trust management is a fundamental technique for assessing and increasing the reliability and security of cloud services. Unfortunately, majority of existing mechanisms for trust management in clouds have limitations that prevent them from being fully effective. In this paper, we propose a novel limited-trust capacity model to mitigate the threats of internal malicious software and services in cloud computing using concepts from flow networks to reduce the scale of malicious software or services. Our limited-trust capacity model can be utilized in the following two ways: (1) to manage the trust relationship among the guest services and to evaluate the threats of unknown malicious services, and (2) to minimize risk associated with renting cloud services and limiting the resource drain caused by malicious guest services. Finally, experimental results show that our limited-trust capacity model can effectively restrict the scale of malicious services and significantly mitigate the threats of internal attacks.  相似文献   
523.
524.
DNA polymerase beta (beta-polymerase) has been implicated in short-patch DNA synthesis in the DNA repair pathway known as base excision repair. The native 39 kDa enzyme is organized into four structurally and functionally distinct domains. In an effort to examine this enzyme as a potential therapeutic target, we analyzed the effect of various beta-polymerase domains on the activity of the enzyme in vitro. We show that the 14 kDa N-terminal segment of beta-polymerase, which binds to both single- and double-stranded DNA, but lacks DNA polymerase activity, inhibits beta-polymerase activity in vitro. Most importantly, the 8, 27 and 31 kDa domains of beta-polymerase do not inhibit beta-polymerase activity, demonstrating that the inhibition by the 14 kDa domain is specific. The inhibition of beta-polymerase activity in vitro is abolished by increasing the concentrations of both of the substrates (template-primer and deoxynucleoside triphosphate). In contrast, an in vitro base excision repair assay is inhibited in a domain specific manner by the 14 kDa domain even in the presence of saturating substrates. The inhibition of beta-polymerase activity by the 14 kDa domain appears specific to beta-polymerase as this domain does not inhibit either mammalian DNA polymerase alpha or Escherichia coli polymerase I (Klenow fragment). These data suggest that the 14 kDa domain could be used as a potential inhibitor of intracellular beta-polymerase and that it may provide a means for sensitizing cells to therapeutically relevant DNA damaging agents.  相似文献   
525.
Cynaropicrin and 11,13-dihydrodesacylcynaropicrin were isolated from Tricholepis glaberrima.  相似文献   
526.

Background  

The stability of hypoperfused brain tissue in stroke patients with major artery occlusions is unknown. The purpose of this study was to determine the persistence of a diffusion/perfusion mismatch in patients with ICA or proximal MCA occlusions.  相似文献   
527.
Mathematical expressions, to investigate the effects of mederate departure from normality assumption on the point estimate and on the probability of getting a negative estimate of genetic heritability, in a balanced situation, have been derived. The numerical results show that the point estimate is over sensitive whereas the probability of a negative estimate is insensitive to this violation.  相似文献   
528.
Spatial compression among the longer DNA fragments occurs during DNA electrophoresis in agarose and non-agarose gels when using certain ions in the conductive buffer, impairing the range of fragment sizes resolved well in a single gel. Substitutions using various polyhydroxyl anions supported the underlying phenomenon as the complexation of Lewis acids to DNA. We saw significant improvements using conditions (lithium borate 10 mM cations, pH 6.5) favoring the formation of borate polyanions and having lower conductance and Joule heating, delayed electrolyte exhaustion, faster electrophoretic run-speed, and sharper separation of DNA bands from 100bp to 12 kb in a single run.  相似文献   
529.
530.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号