全文获取类型
收费全文 | 1563篇 |
免费 | 145篇 |
国内免费 | 53篇 |
专业分类
化学 | 63篇 |
力学 | 103篇 |
综合类 | 28篇 |
数学 | 1421篇 |
物理学 | 146篇 |
出版年
2023年 | 4篇 |
2022年 | 35篇 |
2021年 | 44篇 |
2020年 | 31篇 |
2019年 | 37篇 |
2018年 | 28篇 |
2017年 | 60篇 |
2016年 | 67篇 |
2015年 | 36篇 |
2014年 | 76篇 |
2013年 | 103篇 |
2012年 | 89篇 |
2011年 | 67篇 |
2010年 | 79篇 |
2009年 | 117篇 |
2008年 | 103篇 |
2007年 | 99篇 |
2006年 | 84篇 |
2005年 | 78篇 |
2004年 | 49篇 |
2003年 | 45篇 |
2002年 | 45篇 |
2001年 | 33篇 |
2000年 | 18篇 |
1999年 | 24篇 |
1998年 | 37篇 |
1997年 | 38篇 |
1996年 | 38篇 |
1995年 | 21篇 |
1994年 | 20篇 |
1993年 | 16篇 |
1992年 | 16篇 |
1991年 | 16篇 |
1990年 | 8篇 |
1989年 | 10篇 |
1988年 | 7篇 |
1987年 | 7篇 |
1986年 | 9篇 |
1985年 | 11篇 |
1984年 | 6篇 |
1983年 | 3篇 |
1982年 | 6篇 |
1981年 | 9篇 |
1980年 | 9篇 |
1979年 | 6篇 |
1978年 | 3篇 |
1977年 | 6篇 |
1976年 | 2篇 |
1974年 | 3篇 |
1973年 | 2篇 |
排序方式: 共有1761条查询结果,搜索用时 296 毫秒
61.
S. T. Glad 《Journal of Optimization Theory and Applications》1979,28(2):135-156
The convergence properties of different updating methods for the multipliers in augmented Lagrangians are considered. It is assumed that the updating of the multipliers takes place after each line search of a quasi-Newton method. Two of the updating methods are shown to be linearly convergent locally, while a third method has superlinear convergence locally. Modifications of the algorithms to ensure global convergence are considered. The results of a computational comparison with other methods are presented.This work was supported by the Swedish Institute of Applied Mathematics. 相似文献
62.
D. G. Luenberger 《Journal of Optimization Theory and Applications》1974,14(5):477-495
A new programming algorithm for nonlinear constrained optimization problems is proposed. The method is based on the penalty function approach and thereby circumyents the necessity to maintain feasibility at each iteration, but it also behaves much like the gradient projection method. Although only first-order information is used, the algorithm converges asymptotically at a rate which is independent of the magnitude of the penalty term; hence, unlike the simple gradient method, the asymptotic rate of the proposed method is not affected by the ill-conditioning associated with the introduction of the penalty term. It is shown that the asymptotic rate of convergence of the proposed method is identical with that of the gradient projection method.Dedicated to Professor M. R. HestenesThis research was supported by the National Science Foundation, Grant No. GK-16125. 相似文献
63.
64.
Karol?Horodecki Micha??HorodeckiEmail author Pawel?Horodecki Jonathan?Oppenheim 《Foundations of Physics》2005,35(12):2027-2040
There are aspects of privacy theory that are analogous to quantum theory. In particular one can define distillable key and
key cost in parallel to distillable entanglement and entanglement cost. We present here classical privacy theory as a particular
case of information theory with adversaries, where similar general laws hold as in entanglement theory. We place the result
of Renner and Wolf—that intrinsic information is lower bound for key cost—into this general formalism. Then we show that the
question of whether intrinsic information is equal to key cost is equivalent to the question of whether Alice and Bob can
create a distribution product with Eve using IM bits of secret key. We also propose a natural analogue of relative entropy of entanglement in privacy theory and show that
it is equal to the intrinsic information. We also provide a formula analogous to the entanglement of formation for classical
distributions.
It is our pleasure to dedicate this paper to Asher Peres on the occasion of his seventieth birthday. 相似文献
65.
66.
提出了一种低串扰无损耗的光开关矩阵.该结构是在扩展Benes(DB)结构的基础上通过改进得到的称为改进的扩展Benes(IDB)结构,并通过进一步的改进得到各级改进的扩展Benes(GIDB)结构.理论分析了IDB结构和GIDB结构中串扰产生的机理和对信号的影响,比较了几种结构的信噪比和光交换容量之间的关系.发现随着光交换规模的扩大,GIDB结构相对于DB结构信噪比明显提高.实验研究了4×4的IDB、GIDB结构中串扰引起的误码率降低以及眼图的恶化情况.结果表明GIDB结构能有效减少串扰的影响. 相似文献
67.
《Journal of computational and graphical statistics》2013,22(3):569-589
A rather common problem of data analysis is to find interesting features, such as local minima, maxima, and trends in a scatterplot. Variance in the data can then be a problem and inferences about features must be made at some selected level of significance. The recently introduced SiZer technique uses a family of nonparametric smooths of the data to uncover features in a whole range of scales. To aid the analysis, a color map is generated that visualizes the inferences made about the significance of the features. The purpose of this article is to present Bayesian versions of SiZer methodology. Both an analytically solvable regression model and a fully Bayesian approach that uses Gibbs sampling are presented. The prior distributions of the smooths are based on a roughness penalty. Simulation based algorithms are proposed for making simultaneous inferences about the features in the data. 相似文献
68.
The dividends-penalty identity is a relation between three functions: the discounted penalty function without dividends, the discounted penalty function if a barrier dividend strategy is applied, and the expected discounted dividends until ruin. The classical model of risk theory is modified in that the deterministic premiums are replaced by a compound Poisson process with exponential jumps. In this model, the dividends-penalty identity is new and can be derived by interpretation. Then the dividends-penalty identity in the classical model is obtained as a limit. 相似文献
69.
索赔次数为复合Poisson-Geometric过程的常利率风险模型的罚金函数 总被引:3,自引:0,他引:3
讨论了常利率下索赔次数为复合Poisson-Geometric过程的风险模型的罚金函数,得到了罚金函数的期望所满足的积分方程,并由所得到的积分方程推出了破产概率所满足的积分方程,初始盈余为0时,得到了罚金函数的期望及破产概率的精确解. 相似文献
70.
In location-routing problems, the objective is to locate one or many depots within a set of sites (representing customer locations or cities) and to construct delivery routes from the selected depot or depots to the remaining sites at least system cost. The objective function is the sum of depot operating costs, vehicle acquisition costs and routing costs. This paper considers one such problem in which a weight is assigned to each site and where sites are to be visited by vehicles having a given capacity. The solution must be such that the sum of the weights of sites visited on any given route does not exceed the capacity of the visiting vehicle. The formulation of an integer linear program for this problem involves degree constraints, generalized subtour elimination constraints, and chain barring constraints. An exact algorithm, using initial relaxation of most of the problem constraints, is presented which is capable of solving problems with up to twenty sites within a reasonable number of iterations. 相似文献