首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1353篇
  免费   166篇
  国内免费   69篇
化学   278篇
晶体学   2篇
力学   34篇
综合类   16篇
数学   956篇
物理学   302篇
  2023年   18篇
  2022年   30篇
  2021年   44篇
  2020年   41篇
  2019年   39篇
  2018年   37篇
  2017年   43篇
  2016年   54篇
  2015年   31篇
  2014年   78篇
  2013年   80篇
  2012年   48篇
  2011年   79篇
  2010年   78篇
  2009年   78篇
  2008年   91篇
  2007年   104篇
  2006年   80篇
  2005年   76篇
  2004年   48篇
  2003年   52篇
  2002年   52篇
  2001年   38篇
  2000年   36篇
  1999年   32篇
  1998年   34篇
  1997年   27篇
  1996年   13篇
  1995年   14篇
  1994年   16篇
  1993年   9篇
  1992年   6篇
  1991年   9篇
  1990年   5篇
  1989年   6篇
  1988年   5篇
  1987年   5篇
  1986年   6篇
  1985年   3篇
  1984年   6篇
  1983年   5篇
  1982年   8篇
  1981年   4篇
  1980年   6篇
  1979年   2篇
  1978年   4篇
  1977年   2篇
  1974年   2篇
  1970年   1篇
  1957年   1篇
排序方式: 共有1588条查询结果,搜索用时 312 毫秒
11.
Previous researchers have designed shared control schemes with a view to minimising the likelihood that participants will conspire to perform an unauthorised act. But, human nature being what it is, systems inevitably fail; so shared control schemes should also be designed so that the police can identify conspirators after the fact. This requirement leads us to search for schemes with sparse access structures. We show how this can be done using ideas from coding theory. In particular, secret sharing schemes based on geometric codes whose dual [n,k,d] codes have d and n as their only nonzero weights are suitable. We determine their access structures and analyse their properties. We have found almost all of them, and established some relations among codes, designs and secret-sharing schemes.  相似文献   
12.
In this paper we consider the (t, n)-threshold visual secret sharing scheme (VSSS) in which black pixels in a secret black-white images is reproduced perfectly as black pixels when we stack arbitrary t shares. This paper provides a new characterization of the (t, n)-threshold visual secret sharing scheme with such a property (hereafter, we call such a VSSS the (t, n)-PBVSSS for short). We use an algebraic method to characterize basis matrices of the (t, n)-PBVSSS in a certain class of matrices. We show that the set of all homogeneous polynomials each element of which yields basis matrices of the (t, n)-PBVSSS becomes a set of lattice points in an (nt+1)-dimensional linear space. In addition, we prove that the optimal basis matrices in the sense of maximizing the relative difference among all the basis matrices in the class coincides with the basis matrices given by Blundo, Bonis and De Santis [3] for all nt ≥ 2.  相似文献   
13.
The characteristic exponent α of a Lévy-stable law S α (σ, β, μ) was thoroughly studied as the extreme value index of a heavy tailed distribution. For 1 < α < 2, Peng (Statist. Probab. Lett. 52: 255–264, 2001) has proposed, via the extreme value approach, an asymptotically normal estimator for the location parameter μ. In this paper, we derive by the same approach, an estimator for the scale parameter σ and we discuss its limiting behavior.   相似文献   
14.
We provide an approximate analysis of the transient sojourn time for a processor sharing queue with time varying arrival and service rates, where the load can vary over time, including periods of overload. Using the same asymptotic technique as uniform acceleration as demonstrated in [12] and [13], we obtain fluid and diffusion limits for the sojourn time of the Mt/Mt/1 processor-sharing queue. Our analysis is enabled by the introduction of a “virtual customer” which differs from the notion of a “tagged customer” in that the former has no effect on the processing time of the other customers in the system. Our analysis generalizes to non-exponential service and interarrival times, when the fluid and diffusion limits for the queueing process are known.  相似文献   
15.
We study the existence and the continuity properties of the boundary values on the real axis of the resolvent of a self-adjoint operator H in the framework of the conjugate operator method initiated by Mourre. We allow the conjugate operator A to be the generator of a C0-semigroup (finer estimates require A to be maximal symmetric) and we consider situations where the first commutator [H,iA] is not comparable to H. The applications include the spectral theory of zero mass quantum field models.  相似文献   
16.
We prove equivalence of the definitions by the author and by Korevaar and Schoen of the Sobolev classes of mappings of a domain of an arithmetic n-dimensional space to a metric space.  相似文献   
17.
High-resolution Fourier transform spectra of CH3OH have been investigated in the infrared region from 930 to 1450 cm−1 in order to map the torsion-rotation energy manifolds associated with the ν7 in-plane CH3 rock, the ν11 out-of-plane CH3 rock, and the ν6 OH bend. Upper-state term values have been determined from the assigned spectral subbands, and have been fitted to power-series expansions to obtain substate origins and effective B-values for the three modes. The substate origins have been grouped into related families according to systematic trends observed in the torsion-vibration energy map, but there are substantial differences from the traditional torsional patterns. There appears to be significant torsion-mediated spectral mixing, and a variety of “forbidden” torsional combination subbands with |Δυt|>1 have been observed, where υt denotes the torsional quantum number (equivalent to υ12). For example, coupling of the (υ6,υt)=(1,0) OH bend to nearby torsionally excited (υ7,υt)=(1,1) CH3-rock and (υ8,υt)=(1,1) CO-stretch states introduces (υ6,υt)=(1,0)←(0,1) subbands into the spectrum and makes the ν7+ν12ν12 torsional hot band stronger than the ν7 fundamental. The results suggest a picture of strong coupling among the OH-bending, CH3-rocking, and CO-stretching modes that significantly modifies the traditional energy structure and raises interesting and provocative questions about the torsion-vibration identity of a number of the observed states.  相似文献   
18.
李效敏 《数学研究》2003,36(2):151-162
进一步研究了具有三个cM公共值的亚纯函数的唯一性,改进了H.Ueda和仪洪勋等人的有关结果.  相似文献   
19.
On a question of Gross   总被引:1,自引:0,他引:1  
Using the notion of weighted sharing of sets we prove two uniqueness theorems which improve the results proved by Fang and Qiu [H. Qiu, M. Fang, A unicity theorem for meromorphic functions, Bull. Malaysian Math. Sci. Soc. 25 (2002) 31-38], Lahiri and Banerjee [I. Lahiri, A. Banerjee, Uniqueness of meromorphic functions with deficient poles, Kyungpook Math. J. 44 (2004) 575-584] and Yi and Lin [H.X. Yi, W.C. Lin, Uniqueness theorems concerning a question of Gross, Proc. Japan Acad. Ser. A 80 (2004) 136-140] and thus provide an answer to the question of Gross [F. Gross, Factorization of meromorphic functions and some open problems, in: Proc. Conf. Univ. Kentucky, Lexington, KY, 1976, in: Lecture Notes in Math., vol. 599, Springer, Berlin, 1977, pp. 51-69], under a weaker hypothesis.  相似文献   
20.
Summary. The convergence rate of Krylov subspace methods for the solution of nonsymmetric systems of linear equations, such as GMRES or FOM, is studied. Bounds on the convergence rate are presented which are based on the smallest real part of the field of values of the coefficient matrix and of its inverse. Estimates for these quantities are available during the iteration from the underlying Arnoldi process. It is shown how these bounds can be used to study the convergence properties, in particular, the dependence on the mesh-size and on the size of the skew-symmetric part, for preconditioners for finite element discretizations of nonsymmetric elliptic boundary value problems. This is illustrated for the hierarchical basis and multilevel preconditioners which constitute popular preconditioning strategies for such problems. Received May 3, 1996  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号