全文获取类型
收费全文 | 548篇 |
免费 | 15篇 |
国内免费 | 31篇 |
专业分类
594篇 |
出版年
2023年 | 9篇 |
2022年 | 13篇 |
2021年 | 17篇 |
2020年 | 8篇 |
2019年 | 8篇 |
2018年 | 12篇 |
2017年 | 6篇 |
2016年 | 3篇 |
2015年 | 14篇 |
2014年 | 31篇 |
2013年 | 32篇 |
2012年 | 24篇 |
2011年 | 27篇 |
2010年 | 15篇 |
2009年 | 20篇 |
2008年 | 24篇 |
2007年 | 35篇 |
2006年 | 29篇 |
2005年 | 26篇 |
2004年 | 24篇 |
2003年 | 21篇 |
2002年 | 17篇 |
2001年 | 15篇 |
2000年 | 10篇 |
1999年 | 7篇 |
1998年 | 14篇 |
1997年 | 7篇 |
1996年 | 7篇 |
1995年 | 8篇 |
1994年 | 13篇 |
1993年 | 17篇 |
1992年 | 9篇 |
1991年 | 15篇 |
1990年 | 10篇 |
1989年 | 7篇 |
1988年 | 6篇 |
1987年 | 3篇 |
1986年 | 10篇 |
1985年 | 14篇 |
1984年 | 3篇 |
1983年 | 3篇 |
1980年 | 1篇 |
排序方式: 共有594条查询结果,搜索用时 0 毫秒
591.
Grid Computing consists of a collection of heterogeneous computers and resources spread across multiple administrative domains with the intent of providing users uniform access to these resources. There are many ways to access the resources of a Grid, each with unique security requirements and implications for both the resource user and the resource provider. A comprehensive set of Grid usage scenarios is presented and analyzed with regard to security requirements such as authentication, authorization, integrity, and confidentiality. The main value of these scenarios and the associated security discussions is to provide a library of situations against which an application designer can match, thereby facilitating security-aware application use and development from the initial stages of the application design and invocation. A broader goal of these scenarios is to increase the awareness of security issues in Grid Computing. 相似文献
592.
Josep Tomas Jordi Batlle Maria Rosa Fenoll Manel Santaf Maria Angel Lanuza 《Biology of the cell / under the auspices of the European Cell Biology Organization》1993,79(2):133-137
Summary— Small and short-lasting physiologic variations in the locomotor activity of normal adult rats can induce remodelling in the motor nerve endings of the fast extensor digitorum longus muscle. The specificity and relative importance of the different plastic adaptations occurring in the presynaptic axonal tree have been studied, in silver impregnated nerve endings, by using an automatic image analysis treatment of the nerve terminals' geometric properties and a discriminant analysis of the morphometric parameters. Changes observed, like selective length variations in certain terminal segments and positional rearrangements, agree with a mechanism of neural connectivity regulation in the adult that arises as a consequence of normal neuromuscular activity. 相似文献
593.
594.
Summary We present a phenomenological theory expressing the constraints operating on the (G+C) contents of the three codon positions, i.e., first, second, and third bases of codons, by using the smallest number of constraint parameters having clear physical and genetic meaning. Theoretical curves displaying base composition at each of the three codon sites are given. The agreement between the theoretical curves and the data points of 1277 genes is quite good irrespective of the species from which the DNAs originated; the curves might be universal ones and the constraint parameters might have general biological meanings in relation to the DNA/RNA and protein functions. 相似文献