首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1563篇
  免费   145篇
  国内免费   53篇
化学   63篇
力学   103篇
综合类   28篇
数学   1421篇
物理学   146篇
  2023年   4篇
  2022年   35篇
  2021年   44篇
  2020年   31篇
  2019年   37篇
  2018年   28篇
  2017年   60篇
  2016年   67篇
  2015年   36篇
  2014年   76篇
  2013年   103篇
  2012年   89篇
  2011年   67篇
  2010年   79篇
  2009年   117篇
  2008年   103篇
  2007年   99篇
  2006年   84篇
  2005年   78篇
  2004年   49篇
  2003年   45篇
  2002年   45篇
  2001年   33篇
  2000年   18篇
  1999年   24篇
  1998年   37篇
  1997年   38篇
  1996年   38篇
  1995年   21篇
  1994年   20篇
  1993年   16篇
  1992年   16篇
  1991年   16篇
  1990年   8篇
  1989年   10篇
  1988年   7篇
  1987年   7篇
  1986年   9篇
  1985年   11篇
  1984年   6篇
  1983年   3篇
  1982年   6篇
  1981年   9篇
  1980年   9篇
  1979年   6篇
  1978年   3篇
  1977年   6篇
  1976年   2篇
  1974年   3篇
  1973年   2篇
排序方式: 共有1761条查询结果,搜索用时 296 毫秒
61.
The convergence properties of different updating methods for the multipliers in augmented Lagrangians are considered. It is assumed that the updating of the multipliers takes place after each line search of a quasi-Newton method. Two of the updating methods are shown to be linearly convergent locally, while a third method has superlinear convergence locally. Modifications of the algorithms to ensure global convergence are considered. The results of a computational comparison with other methods are presented.This work was supported by the Swedish Institute of Applied Mathematics.  相似文献   
62.
A new programming algorithm for nonlinear constrained optimization problems is proposed. The method is based on the penalty function approach and thereby circumyents the necessity to maintain feasibility at each iteration, but it also behaves much like the gradient projection method. Although only first-order information is used, the algorithm converges asymptotically at a rate which is independent of the magnitude of the penalty term; hence, unlike the simple gradient method, the asymptotic rate of the proposed method is not affected by the ill-conditioning associated with the introduction of the penalty term. It is shown that the asymptotic rate of convergence of the proposed method is identical with that of the gradient projection method.Dedicated to Professor M. R. HestenesThis research was supported by the National Science Foundation, Grant No. GK-16125.  相似文献   
63.
64.
There are aspects of privacy theory that are analogous to quantum theory. In particular one can define distillable key and key cost in parallel to distillable entanglement and entanglement cost. We present here classical privacy theory as a particular case of information theory with adversaries, where similar general laws hold as in entanglement theory. We place the result of Renner and Wolf—that intrinsic information is lower bound for key cost—into this general formalism. Then we show that the question of whether intrinsic information is equal to key cost is equivalent to the question of whether Alice and Bob can create a distribution product with Eve using IM bits of secret key. We also propose a natural analogue of relative entropy of entanglement in privacy theory and show that it is equal to the intrinsic information. We also provide a formula analogous to the entanglement of formation for classical distributions. It is our pleasure to dedicate this paper to Asher Peres on the occasion of his seventieth birthday.  相似文献   
65.
66.
管爱红  孙军强 《光子学报》2007,36(1):99-103
提出了一种低串扰无损耗的光开关矩阵.该结构是在扩展Benes(DB)结构的基础上通过改进得到的称为改进的扩展Benes(IDB)结构,并通过进一步的改进得到各级改进的扩展Benes(GIDB)结构.理论分析了IDB结构和GIDB结构中串扰产生的机理和对信号的影响,比较了几种结构的信噪比和光交换容量之间的关系.发现随着光交换规模的扩大,GIDB结构相对于DB结构信噪比明显提高.实验研究了4×4的IDB、GIDB结构中串扰引起的误码率降低以及眼图的恶化情况.结果表明GIDB结构能有效减少串扰的影响.  相似文献   
67.
A rather common problem of data analysis is to find interesting features, such as local minima, maxima, and trends in a scatterplot. Variance in the data can then be a problem and inferences about features must be made at some selected level of significance. The recently introduced SiZer technique uses a family of nonparametric smooths of the data to uncover features in a whole range of scales. To aid the analysis, a color map is generated that visualizes the inferences made about the significance of the features. The purpose of this article is to present Bayesian versions of SiZer methodology. Both an analytically solvable regression model and a fully Bayesian approach that uses Gibbs sampling are presented. The prior distributions of the smooths are based on a roughness penalty. Simulation based algorithms are proposed for making simultaneous inferences about the features in the data.  相似文献   
68.
The dividends-penalty identity is a relation between three functions: the discounted penalty function without dividends, the discounted penalty function if a barrier dividend strategy is applied, and the expected discounted dividends until ruin. The classical model of risk theory is modified in that the deterministic premiums are replaced by a compound Poisson process with exponential jumps. In this model, the dividends-penalty identity is new and can be derived by interpretation. Then the dividends-penalty identity in the classical model is obtained as a limit.  相似文献   
69.
讨论了常利率下索赔次数为复合Poisson-Geometric过程的风险模型的罚金函数,得到了罚金函数的期望所满足的积分方程,并由所得到的积分方程推出了破产概率所满足的积分方程,初始盈余为0时,得到了罚金函数的期望及破产概率的精确解.  相似文献   
70.
An exact algorithm for solving a capacitated location-routing problem   总被引:2,自引:0,他引:2  
In location-routing problems, the objective is to locate one or many depots within a set of sites (representing customer locations or cities) and to construct delivery routes from the selected depot or depots to the remaining sites at least system cost. The objective function is the sum of depot operating costs, vehicle acquisition costs and routing costs. This paper considers one such problem in which a weight is assigned to each site and where sites are to be visited by vehicles having a given capacity. The solution must be such that the sum of the weights of sites visited on any given route does not exceed the capacity of the visiting vehicle. The formulation of an integer linear program for this problem involves degree constraints, generalized subtour elimination constraints, and chain barring constraints. An exact algorithm, using initial relaxation of most of the problem constraints, is presented which is capable of solving problems with up to twenty sites within a reasonable number of iterations.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号