首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   930篇
  免费   162篇
  国内免费   10篇
化学   50篇
晶体学   1篇
力学   10篇
综合类   70篇
数学   565篇
物理学   406篇
  2023年   17篇
  2022年   42篇
  2021年   84篇
  2020年   42篇
  2019年   29篇
  2018年   14篇
  2017年   59篇
  2016年   57篇
  2015年   21篇
  2014年   63篇
  2013年   98篇
  2012年   48篇
  2011年   37篇
  2010年   39篇
  2009年   52篇
  2008年   58篇
  2007年   49篇
  2006年   47篇
  2005年   38篇
  2004年   32篇
  2003年   28篇
  2002年   32篇
  2001年   21篇
  2000年   19篇
  1999年   14篇
  1998年   10篇
  1997年   2篇
  1996年   6篇
  1995年   3篇
  1994年   1篇
  1993年   1篇
  1991年   5篇
  1989年   1篇
  1987年   3篇
  1986年   1篇
  1985年   1篇
  1984年   8篇
  1983年   10篇
  1982年   9篇
  1981年   1篇
排序方式: 共有1102条查询结果,搜索用时 15 毫秒
71.
This paper examines Dawes (1975) model on commons dilemma (CD) situation and proposes an alternative model which formulates CD. Firstly, it makes clear that Dawes model does not have the characteristics of CD. Secondly, it specifies “resource unit condition” which models of commons dilemma must satisfy. Thirdly, it presents CD model, which is obtained by setting the condition in Dawes model. And lastly, it examines some nature of the proposed model and find that in CD situation, fine is distributed proportionally to each player's property.  相似文献   
72.
This paper analyzes the aritrage-tree security markets and the general equilibrium ex-istence problem for a stochastic economy with incomplete financial markets. Information structure is given by an event tree. This paper restricts attention to puraly financial securities. It isassume that trading takes place in the sequence of spot markets and futures markets for securi-ties payable in units of account. Unlimited short-selling in securities is allowed. Financial markets may be incomplete, some consumption streams may be impossible to obtain by any tradingstrategy. Securities may be individually precluded from trade at arbitrary states and dates. Thesecurity price process is arbitrage-free the dividend process if and only if there exists a stochaticstate price (present value) process : the present value of the security prices at every vertex isthe present value of their dividend and capital values over the set of immediate successors ; thecurrent value of each security at every vertex is the present value of its future dividend streamover all succeeding vertices. The existence of such an equilibrium is proved under the followingcondition: continuous, weakly convex, strictly monotone and complete preferences, strictlypositive endowmenta and dividends processes.  相似文献   
73.
采用主成分因素结构分析和高阶因素结构分析的方法,对城市居民100种职业地位评价进行了实证研究,并据以分析研究了转型加速期城市居民职业和社会地位分层的结构模式,探讨了城市居民职业社会分层的多元性和整合性双重特性。  相似文献   
74.
The Dynamics of Cultural Influence Networks   总被引:4,自引:0,他引:4  
This article investigates the behavior of cultural influence networks over time, using a computer simulation based on a formal model of cultural transmission in organizations. In the formal model, every organizational member exerts some cultural influence on, and is influenced by, every other member; these influence paths constitute a dense social network and the weights of paths (ties) vary throughout the network. Over time, each organizational member's enculturation level changes in response to influence from other members, and the influence weight of each path changes in relationship to the cultural similarity of the individuals connected by the path. Virtual experiments explore the configuration and evolution of the cultural influence network under varying demographic conditions and influence principles. Demographic effects are studied by varying organizational size, hiring selectivity and turnover rates. Two principles for determining initial influence path weights are examined, cohort-based influence and random influence. The simulations show that the cultural influence network evolves over time to a robust configuration, fluctuating around a stable dynamic equilibrium as individuals enter and leave the organization. As turnover rates rise, cohort-based influence strengthens the influence network and reduces network inequality. In this model, cohort-based influence processes promote cultural stability in organizations.  相似文献   
75.
In this paper, a scalar game is derived from a zero-sum multicriteria matrix game, and it is proved that the solution of the new game with strictly positive scalarization is a necessary and sufficient condition for a strategy to be a Pareto-optimal security strategy (POSS) for one of the players in the original game. This is done by proving that a certain set, which is the extension of the set of security level vectors in the criterion function space, is convex and polyhedral. It is also established that only a finite number of scalarizations are necessary to obtain all the POSS for a player. An example is included to illustrate the main steps in the proof.This work was done while the author was a Research Associate in the Department of Electrical Engineering at the Indian Institute of Science and was financially supported by the Council of Scientific and Industrial Research, Delhi, India.The author wishes to express his gratefulness to Professor U. R. Prasad for helpful discussions and to two anonymous referees for suggestions which led to an improved presentation.  相似文献   
76.
范秋芳 《运筹与管理》2007,16(5):100-105
为保障国家石油安全、保障国民经济安全运行,本文根据石油安全预警的特点,采用神经网络方法进行预警,设计了BP神经网络模型,应用BP神经网络建立了中国石油安全预警系统,并进行了预警研究和实证分析,得出我国石油安全属于重警区,需加强安全防范。  相似文献   
77.
The article describes a computational model for the simulation of the emergence of social structure or social order, respectively. The model is theoretically based on the theory of social typifying by Berger and Luckmann. It consists of interacting artificial actors (agents), which are represented by two neural networks, an action net, and a perception net. By mutually adjusting of their actions, the agents are able to constitute a self‐organized social order in dependency of their personal characteristics and certain features of their environment. A fictitious example demonstrates the applicability of the model to problems of extra‐terrestrial robotics. © 2007 Wiley Periodicals, Inc. Complexity 12: 41–52, 2007  相似文献   
78.
2000年,Hwang和Li提出了一个新的智能卡远程用户认证方案,随后Chan和Cheng对该方案进行了成功的攻击.最近Shen,Lin和Hwang针对该方案提出了一种不同的攻击方法,并提供了一个改进方案用于抵御这些攻击.2003年,Leung等认为Shen-Lin-Hwang改进方案仍然不能抵御Chan和Cheng的攻击,他们用改进后的Chang-Hwang攻击方法进行了攻击.文中主要在Hwang-Li方案的基础上,提出了一个新的远程用户认证方案,该方案主要在注册阶段和登录阶段加强了安全性,抵御了类似Chan-Cheng和Chang-Hwang的攻击.  相似文献   
79.
80.
We focus on the heterogeneity of social networks and its role to the emergence of prevailing cooperators and sustainable cooperation. The social networks are representative of the interaction relationships between players and their encounters in each round of games. We study an evolutionary Prisoner's Dilemma game on a variant of Newman-Watts small-world network, whose heterogeneity can be tuned by a parameter. It is found that optimal cooperation level exists at some intermediate topological heterogeneity for different temptations to defect. That is, frequency of cooperators peaks at a certain specific value of degree heterogeneity — neither the most heterogeneous case nor the most homogeneous one would favor the cooperators. Besides, the average degree of networks and the adopted update rule also affect the cooperation level.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号