全文获取类型
收费全文 | 1353篇 |
免费 | 166篇 |
国内免费 | 69篇 |
专业分类
化学 | 278篇 |
晶体学 | 2篇 |
力学 | 34篇 |
综合类 | 16篇 |
数学 | 956篇 |
物理学 | 302篇 |
出版年
2023年 | 18篇 |
2022年 | 30篇 |
2021年 | 44篇 |
2020年 | 41篇 |
2019年 | 39篇 |
2018年 | 37篇 |
2017年 | 43篇 |
2016年 | 54篇 |
2015年 | 31篇 |
2014年 | 78篇 |
2013年 | 80篇 |
2012年 | 48篇 |
2011年 | 79篇 |
2010年 | 78篇 |
2009年 | 78篇 |
2008年 | 91篇 |
2007年 | 104篇 |
2006年 | 80篇 |
2005年 | 76篇 |
2004年 | 48篇 |
2003年 | 52篇 |
2002年 | 52篇 |
2001年 | 38篇 |
2000年 | 36篇 |
1999年 | 32篇 |
1998年 | 34篇 |
1997年 | 27篇 |
1996年 | 13篇 |
1995年 | 14篇 |
1994年 | 16篇 |
1993年 | 9篇 |
1992年 | 6篇 |
1991年 | 9篇 |
1990年 | 5篇 |
1989年 | 6篇 |
1988年 | 5篇 |
1987年 | 5篇 |
1986年 | 6篇 |
1985年 | 3篇 |
1984年 | 6篇 |
1983年 | 5篇 |
1982年 | 8篇 |
1981年 | 4篇 |
1980年 | 6篇 |
1979年 | 2篇 |
1978年 | 4篇 |
1977年 | 2篇 |
1974年 | 2篇 |
1970年 | 1篇 |
1957年 | 1篇 |
排序方式: 共有1588条查询结果,搜索用时 312 毫秒
11.
Ross Anderson Cunsheng Ding Tor Helleseth Torleiv Klove 《Designs, Codes and Cryptography》1998,15(2):111-124
Previous researchers have designed shared control schemes with a view to minimising the likelihood that participants will conspire to perform an unauthorised act. But, human nature being what it is, systems inevitably fail; so shared control schemes should also be designed so that the police can identify conspirators after the fact. This requirement leads us to search for schemes with sparse access structures. We show how this can be done using ideas from coding theory. In particular, secret sharing schemes based on geometric codes whose dual [n,k,d] codes have d and n as their only nonzero weights are suitable. We determine their access structures and analyse their properties. We have found almost all of them, and established some relations among codes, designs and secret-sharing schemes. 相似文献
12.
In this paper we consider the (t, n)-threshold visual secret sharing scheme (VSSS) in which black pixels in a secret black-white images is reproduced perfectly
as black pixels when we stack arbitrary t shares. This paper provides a new characterization of the (t, n)-threshold visual secret sharing scheme with such a property (hereafter, we call such a VSSS the (t, n)-PBVSSS for short). We use an algebraic method to characterize basis matrices of the (t, n)-PBVSSS in a certain class of matrices. We show that the set of all homogeneous polynomials each element of which yields
basis matrices of the (t, n)-PBVSSS becomes a set of lattice points in an (n−t+1)-dimensional linear space. In addition, we prove that the optimal basis matrices in the sense of maximizing the relative
difference among all the basis matrices in the class coincides with the basis matrices given by Blundo, Bonis and De Santis
[3] for all n≥ t ≥ 2. 相似文献
13.
Djamel Meraghni Abdelhakim Necir 《Methodology and Computing in Applied Probability》2007,9(4):557-572
The characteristic exponent α of a Lévy-stable law S
α
(σ, β, μ) was thoroughly studied as the extreme value index of a heavy tailed distribution. For 1 < α < 2, Peng (Statist. Probab. Lett. 52: 255–264, 2001) has proposed, via the extreme value approach, an asymptotically normal estimator for the location parameter μ. In this paper, we derive by the same approach, an estimator for the scale parameter σ and we discuss its limiting behavior.
相似文献
14.
We provide an approximate analysis of the transient sojourn time for a processor sharing queue with time varying arrival and
service rates, where the load can vary over time, including periods of overload. Using the same asymptotic technique as uniform
acceleration as demonstrated in [12] and [13], we obtain fluid and diffusion limits for the sojourn time of the Mt/Mt/1 processor-sharing queue. Our analysis is enabled by the introduction of a “virtual customer” which differs from the notion
of a “tagged customer” in that the former has no effect on the processing time of the other customers in the system. Our analysis
generalizes to non-exponential service and interarrival times, when the fluid and diffusion limits for the queueing process
are known. 相似文献
15.
We study the existence and the continuity properties of the boundary values on the real axis of the resolvent of a self-adjoint operator H in the framework of the conjugate operator method initiated by Mourre. We allow the conjugate operator A to be the generator of a C0-semigroup (finer estimates require A to be maximal symmetric) and we consider situations where the first commutator [H,iA] is not comparable to H. The applications include the spectral theory of zero mass quantum field models. 相似文献
16.
We prove equivalence of the definitions by the author and by Korevaar and Schoen of the Sobolev classes of mappings of a domain of an arithmetic n-dimensional space to a metric space. 相似文献
17.
High-resolution Fourier transform spectra of CH3OH have been investigated in the infrared region from 930 to 1450 cm−1 in order to map the torsion-rotation energy manifolds associated with the ν7 in-plane CH3 rock, the ν11 out-of-plane CH3 rock, and the ν6 OH bend. Upper-state term values have been determined from the assigned spectral subbands, and have been fitted to power-series expansions to obtain substate origins and effective B-values for the three modes. The substate origins have been grouped into related families according to systematic trends observed in the torsion-vibration energy map, but there are substantial differences from the traditional torsional patterns. There appears to be significant torsion-mediated spectral mixing, and a variety of “forbidden” torsional combination subbands with |Δυt|>1 have been observed, where υt denotes the torsional quantum number (equivalent to υ12). For example, coupling of the (υ6,υt)=(1,0) OH bend to nearby torsionally excited (υ7,υt)=(1,1) CH3-rock and (υ8,υt)=(1,1) CO-stretch states introduces (υ6,υt)=(1,0)←(0,1) subbands into the spectrum and makes the ν7+ν12−ν12 torsional hot band stronger than the ν7 fundamental. The results suggest a picture of strong coupling among the OH-bending, CH3-rocking, and CO-stretching modes that significantly modifies the traditional energy structure and raises interesting and provocative questions about the torsion-vibration identity of a number of the observed states. 相似文献
18.
进一步研究了具有三个cM公共值的亚纯函数的唯一性,改进了H.Ueda和仪洪勋等人的有关结果. 相似文献
19.
On a question of Gross 总被引:1,自引:0,他引:1
Abhijit Banerjee 《Journal of Mathematical Analysis and Applications》2007,327(2):1273-1283
Using the notion of weighted sharing of sets we prove two uniqueness theorems which improve the results proved by Fang and Qiu [H. Qiu, M. Fang, A unicity theorem for meromorphic functions, Bull. Malaysian Math. Sci. Soc. 25 (2002) 31-38], Lahiri and Banerjee [I. Lahiri, A. Banerjee, Uniqueness of meromorphic functions with deficient poles, Kyungpook Math. J. 44 (2004) 575-584] and Yi and Lin [H.X. Yi, W.C. Lin, Uniqueness theorems concerning a question of Gross, Proc. Japan Acad. Ser. A 80 (2004) 136-140] and thus provide an answer to the question of Gross [F. Gross, Factorization of meromorphic functions and some open problems, in: Proc. Conf. Univ. Kentucky, Lexington, KY, 1976, in: Lecture Notes in Math., vol. 599, Springer, Berlin, 1977, pp. 51-69], under a weaker hypothesis. 相似文献
20.
Gerhard Starke 《Numerische Mathematik》1997,78(1):103-117
Summary. The convergence rate of Krylov subspace methods for the solution of nonsymmetric systems of linear equations, such as GMRES
or FOM, is studied. Bounds on the convergence rate are presented which are based on the smallest real part of the field of
values of the coefficient matrix and of its inverse. Estimates for these quantities are available during the iteration from
the underlying Arnoldi process. It is shown how these bounds can be used to study the convergence properties, in particular,
the dependence on the mesh-size and on the size of the skew-symmetric part, for preconditioners for finite element discretizations
of nonsymmetric elliptic boundary value problems. This is illustrated for the hierarchical basis and multilevel preconditioners
which constitute popular preconditioning strategies for such problems.
Received May 3, 1996 相似文献