首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   963篇
  免费   43篇
  国内免费   28篇
化学   7篇
晶体学   3篇
力学   6篇
综合类   18篇
数学   822篇
物理学   178篇
  2024年   1篇
  2023年   33篇
  2022年   39篇
  2021年   51篇
  2020年   46篇
  2019年   26篇
  2018年   19篇
  2017年   24篇
  2016年   31篇
  2015年   18篇
  2014年   35篇
  2013年   39篇
  2012年   13篇
  2011年   32篇
  2010年   22篇
  2009年   62篇
  2008年   75篇
  2007年   54篇
  2006年   61篇
  2005年   26篇
  2004年   29篇
  2003年   36篇
  2002年   53篇
  2001年   41篇
  2000年   33篇
  1999年   53篇
  1998年   29篇
  1997年   24篇
  1996年   15篇
  1995年   3篇
  1994年   1篇
  1993年   1篇
  1992年   3篇
  1991年   1篇
  1984年   1篇
  1983年   1篇
  1982年   1篇
  1979年   1篇
  1977年   1篇
排序方式: 共有1034条查询结果,搜索用时 31 毫秒
991.
Motivated by the discovery that the eighth root of the theta series of the E8 lattice and the 24th root of the theta series of the Leech lattice both have integer coefficients, we investigate the question of when an arbitrary element fR (where R=1+xZ?x?) can be written as f=gn for gR, n?2. Let Pn:={gn|gR} and let . We show among other things that (i) for fR, fPnf (mod μn)∈Pn, and (ii) if fPn, there is a unique gPn with coefficients mod μn/n such that fgn (mod μn). In particular, if f≡1 (mod μn) then fPn. The latter assertion implies that the theta series of any extremal even unimodular lattice in Rn (e.g. E8 in R8) is in Pn if n is of the form i2j3k5 (i?3). There do not seem to be any exact analogues for codes, although we show that the weight enumerator of the rth order Reed-Muller code of length m2 is in Pr2 (and similarly that the theta series of the Barnes-Wall lattice BWm2 is in Pm2). We give a number of other results and conjectures, and establish a conjecture of Paul D. Hanna that there is a unique element fPn (n?2) with coefficients restricted to the set {1,2,…,n}.  相似文献   
992.
We investigate the structure of codes over rings with respect to the Rosenbloom-Tsfasman (RT) metric. We define a standard form generator matrix and show how we can determine the minimum distance of a code by taking advantage of its standard form. We define MDR (maximum distance rank) codes with respect to this metric and give the weights of the codewords of an MDR code. We explore the structure of cyclic codes over and show that all cyclic codes over rings are MDR. We propose a decoding algorithm for linear codes over these rings with respect to the RT metric. AMS Classification: 94B05, 94B60  相似文献   
993.
Let G: = G(1,n,q) denote the Grassmannian of lines in PG(n,q), embedded as a point-set in PG(N, q) with For n = 2 or 3 the characteristic function of the complement of G is contained in the linear code generated by characteristic functions of complements of n-flats in PG(N, q). In this paper we prove this to be true for all cases (n, q) with q = 2 and we conjecture this to be true for all remaining cases (n, q). We show that the exact polynomial degree of is for δ: = δ(n, q) = 0 or 1, and that the possibility δ = 1 is ruled out if the above conjecture is true. The result deg( for the binary cases (n,2) can be used to construct quantum codes by intersecting G with subspaces of dimension at least   相似文献   
994.
Olof Heden   《Discrete Mathematics》2009,309(21):6169-6180
A vector space partition of a finite dimensional vector space V=V(n,q) of dimension n over a finite field with q elements, is a collection of subspaces U1,U2,…,Ut with the property that every non zero vector of V is contained in exactly one of these subspaces. The tail of consists of the subspaces of least dimension d1 in , and the length n1 of the tail is the number of subspaces in the tail. Let d2 denote the second least dimension in .Two cases are considered: the integer qd2d1 does not divide respective divides n1. In the first case it is proved that if 2d1>d2 then n1qd1+1 and if 2d1d2 then either n1=(qd2−1)/(qd1−1) or n1>2qd2d1. These lower bounds are shown to be tight and the elements in the subspaces in tails of minimal length will constitute a subspace of V of dimension 2d1 respectively d2.In case qd2d1 divides n1 it is shown that if d2<2d1 then n1qd2qd1+qd2d1 and if 2d1d2 then n1qd2. The last bound is also shown to be tight.The results considerably improve earlier found lower bounds on the length of the tail.  相似文献   
995.
Very recently, an operator channel was defined by Koetter and Kschischang when they studied random network coding. They also introduced constant dimension codes and demonstrated that these codes can be employed to correct errors and/or erasures over the operator channel. Constant dimension codes are equivalent to the so-called linear authentication codes introduced by Wang, Xing and Safavi-Naini when constructing distributed authentication systems in 2003. In this paper, we study constant dimension codes. It is shown that Steiner structures are optimal constant dimension codes achieving the Wang-Xing-Safavi-Naini bound. Furthermore, we show that constant dimension codes achieve the Wang-Xing-Safavi-Naini bound if and only if they are certain Steiner structures. Then, we derive two Johnson type upper bounds, say I and II, on constant dimension codes. The Johnson type bound II slightly improves on the Wang-Xing-Safavi-Naini bound. Finally, we point out that a family of known Steiner structures is actually a family of optimal constant dimension codes achieving both the Johnson type bounds I and II.   相似文献   
996.
A conflict-avoiding code of length n and weight k is defined as a set of binary vectors, called codewords, all of Hamming weight k such that the distance of arbitrary cyclic shifts of two distinct codewords in C is at least 2k−2. In this paper, we obtain direct constructions for optimal conflict-avoiding codes of length n = 16m and weight 3 for any m by utilizing Skolem type sequences. We also show that for the case n = 16m + 8 Skolem type sequences can give more concise constructions than the ones obtained earlier by Jimbo et al.   相似文献   
997.
In (M. Buratti, J Combin Des 7:406–425, 1999), Buratti pointed out the lack of systematic treatments of constructions for relative difference families. The concept of strong difference families was introduced to cover such a problem. However, unfortunately, only a few papers consciously using the useful concept have appeared in the literature in the past 10 years. In this paper, strong difference families, difference covers and their connections with relative difference families and optical orthogonal codes are discussed.   相似文献   
998.
We present the full classification of Hadamard 2-(31,15,7), Hadamard 2-(35, 17,8) and Menon 2-(36,15,6) designs with automorphisms of odd prime order. We also give partial classifications of such designs with automorphisms of order 2. These classifications lead to related Hadamard matrices and self-dual codes. We found 76166 Hadamard matrices of order 32 and 38332 Hadamard matrices of order 36, arising from the classified designs. Remarkably, all constructed Hadamard matrices of order 36 are Hadamard equivalent to a regular Hadamard matrix. From our constructed designs, we obtained 37352 doubly-even [72,36,12] codes, which are the best known self-dual codes of this length until now.   相似文献   
999.
We construct self-dual codes over small fields with q = 3, 4, 5, 7, 8, 9 of moderate length with long cycles in the automorphism group. With few exceptions, the codes achieve or improve the known lower bounds on the minimum distance of self-dual codes.   相似文献   
1000.
We recover the first linear programming bound of McEliece, Rodemich, Rumsey, and Welch for binary error-correcting codes and designs via a covering argument. It is possible to show, interpreting the following notions appropriately, that if a code has a large distance, then its dual has a small covering radius and, therefore, is large. This implies the original code to be small. We also point out that this bound is a natural isoperimetric constant of the Hamming cube, related to its Faber–Krahn minima. While our approach belongs to the general framework of Delsarte’s linear programming method, its main technical ingredient is Fourier duality for the Hamming cube. In particular, we do not deal directly with Delsarte’s linear program or orthogonal polynomial theory. This research was partially supported by ISF grant 039-7682.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号