全文获取类型
收费全文 | 4674篇 |
免费 | 272篇 |
专业分类
公路运输 | 1312篇 |
综合类 | 1567篇 |
水路运输 | 1207篇 |
铁路运输 | 687篇 |
综合运输 | 173篇 |
出版年
2024年 | 15篇 |
2023年 | 42篇 |
2022年 | 112篇 |
2021年 | 206篇 |
2020年 | 122篇 |
2019年 | 87篇 |
2018年 | 86篇 |
2017年 | 88篇 |
2016年 | 73篇 |
2015年 | 137篇 |
2014年 | 212篇 |
2013年 | 283篇 |
2012年 | 366篇 |
2011年 | 353篇 |
2010年 | 414篇 |
2009年 | 409篇 |
2008年 | 355篇 |
2007年 | 389篇 |
2006年 | 402篇 |
2005年 | 311篇 |
2004年 | 158篇 |
2003年 | 72篇 |
2002年 | 44篇 |
2001年 | 89篇 |
2000年 | 92篇 |
1999年 | 15篇 |
1998年 | 2篇 |
1997年 | 2篇 |
1996年 | 4篇 |
1995年 | 3篇 |
1994年 | 1篇 |
1992年 | 1篇 |
1991年 | 1篇 |
排序方式: 共有4946条查询结果,搜索用时 15 毫秒
971.
文章介绍面向对象编程的程序设计方法和ActiveX控件的特点,并通过具体实例说明运用VB编程语言设计锅炉模拟器控制箱仪表控件的方法。 相似文献
972.
973.
WU Xiao-lin GU Ming-min CUI Bing LI Xi-hua LU Zhen-yu WANG Zhu-gang YUAN Wen-tao SONG Huai-dong 《上海交通大学学报(医学英文版)》2007,19(1):8-11
Objective To detect the peculiar mutation in a Chinese family with osteogenesis imperfecta,COL1A1 and COL1A2 being analysed. Methods A genome screen was undertaken covering COL1A1 at 17q21-22 and COL1A2 at 7q22.1. The Linkage ( Version 5.1 ) was used for 2-point analysis. DNA sequencing was used to screen and identify the mutation. Results A linkage to the markers on chromosome 17q21-22 was observed. Sequence analysis of COL1A1 revealed a splicing mutation ( IVS8-2A > G) that converted the 3' end of intron 8 from AG to GG. Conclusion This mutation ( IVS 8-2A > G) is novel, and has not yet been registered in the Human Type Ⅰ and Type Ⅲ Collagen Mutations Database. 相似文献
974.
Yang and Shieh proposed a timestamp-based password authentication scheme. Fan and Shen gave different improvements on it. Wang claimed that Fan's improvement is insecure and gave his attack. Yang did the similar things on Shen's scheme. This paper gave further cryptanalysis on Wang's and Yang's attacks and pointed out that both of their attacks are infeasible. Wang and Yang made the same mathematic mistake and their attacks are pseudo. 相似文献
975.
Growing numbers of users and many access control policies which involve many different resource attributes in service-oriented environments bring various problems in protecting resource.This paper analyzes the relationships of resource attributes to user attributes in all policies, and propose a general attribute and rule based role-based access control(GAR-RBAC) model to meet the security needs. The model can dynamically assign users to roles via rules to meet the need of growing numbers of users. These rules use different attribute expression and permission as a part of authorization constraints, and are defined by analyzing relations of resource attributes to user attributes in many access policies that are defined by the enterprise. The model is a general access control model, and can support many access control policies, and also can be used to wider application for service. The paper also describes how to use the GAR-RBAC model in Web service environments. 相似文献
976.
977.
978.
979.
980.