首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   15087篇
  免费   341篇
  国内免费   73篇
化学   8740篇
晶体学   91篇
力学   507篇
数学   2077篇
物理学   4086篇
  2023年   68篇
  2021年   133篇
  2020年   190篇
  2019年   126篇
  2018年   148篇
  2017年   101篇
  2016年   222篇
  2015年   241篇
  2014年   275篇
  2013年   577篇
  2012年   629篇
  2011年   781篇
  2010年   432篇
  2009年   384篇
  2008年   659篇
  2007年   713篇
  2006年   719篇
  2005年   728篇
  2004年   591篇
  2003年   480篇
  2002年   434篇
  2001年   421篇
  2000年   383篇
  1999年   231篇
  1998年   202篇
  1997年   197篇
  1996年   251篇
  1995年   229篇
  1994年   216篇
  1993年   256篇
  1992年   234篇
  1991年   217篇
  1990年   168篇
  1989年   180篇
  1988年   205篇
  1987年   186篇
  1986年   144篇
  1985年   194篇
  1984年   182篇
  1983年   136篇
  1982年   178篇
  1981年   155篇
  1980年   155篇
  1979年   153篇
  1978年   156篇
  1977年   122篇
  1976年   139篇
  1975年   106篇
  1974年   121篇
  1973年   99篇
排序方式: 共有10000条查询结果,搜索用时 31 毫秒
91.
We prove new Lindstr?m theorems for the basic modal propositional language, and for some related fragments of first-order logic. We find difficulties with such results for modal languages without a finite-depth property, high-lighting the difference between abstract model theory for fragments and for extensions of first-order logic. In addition we discuss new connections with interpolation properties, and the modal invariance theorem. Mathematics Subject Classification (2000): Primary 03B45; Secondary 03C95  相似文献   
92.
Mixtures of colloidal silica spheres and polydimethylsiloxane in cyclohexane with a colloid-polymer size ratio of about one were found to phase separate into two fluid phases, one which is colloid-rich and one which is colloid-poor. In this work the phase separation kinetics of this fluid-fluid phase separation is studied for different compositions of the colloid-polymer mixtures, and at several degrees of supersaturation, with small angle light scattering and with light microscopy. The small angle light scattering curve exhibits a peak that grows in intensity and that shifts to smaller wave vector with time. The characteristic length scale that is obtained from the scattering peak is of the order of a few μm, in agreement with observations by light microscopy. The domain size increases with time as , which might be an indication of coarsening by diffusion and coalescence, like in the case of binary liquid mixtures and polymer blends. For sufficiently low degrees of supersaturation the angular scattering intensity curves satisfy dynamical scaling behavior.  相似文献   
93.
Theoriginal and theenhanced Maxwell-Garnett estimates for the permittivity of a particulate medium are applied to the reflection of light by a composite dielectric slab. The reflection coefficients for incident s and p polarizations are calculated and some curves are plotted and discussed.  相似文献   
94.
A modified expansion-shock tube for nucleation and condensation studies in a supersaturated vapour is described. An analysis is made of the gas-dynamical properties of the new tube configuration and numerical simulations with the Random Choice Method are compared with experiments. It is shown that with the modified configuration one single nucleation pulse can be realized.  相似文献   
95.
96.
In this paper we present a framework for solving stochastic programs with complete integer recourse and discretely distributed right-hand side vector, using Gröbner basis methods from computational algebra to solve the numerous second-stage integer programs. Using structural properties of the expected integer recourse function, we prove that under mild conditions an optimal solution is contained in a finite set. Furthermore, we present a basic scheme to enumerate this set and suggest improvements to reduce the number of function evaluations needed.  相似文献   
97.
Some New Results on Key Distribution Patterns and Broadcast Encryption   总被引:1,自引:0,他引:1  
This paper concerns methods by which a trusted authority can distribute keys and/or broadcast a message over a network, so that each member of a privileged subset of users can compute a specified key or decrypt the broadcast message. Moreover, this is done in such a way that no coalition is able to recover any information on a key or broadcast message they are not supposed to know. The problems are studied using the tools of information theory, so the security provided is unconditional (i.e., not based on any computational assumption).In a recent paper st95a, Stinson described a method of constructing key predistribution schemes by combining Mitchell-Piper key distribution patterns with resilient functions; and also presented a construction method for broadcast encryption schemes that combines Fiat-Naor key predistribution schemes with ideal secret sharing schemes. In this paper, we further pursue these two themes, providing several nice applications of these techniques by using combinatorial structures such as orthogonal arrays, perpendicular arrays, Steiner systems and universal hash families.  相似文献   
98.
We study a processor-sharing model in which users choose between a high- and a low-priority service, based on their utility functions and prices charged by the service provider. The latter aims at revenue maximization. The model is motivated by file transmissions in data networks with distributed congestion control.  相似文献   
99.
100.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号