全文获取类型
收费全文 | 287篇 |
免费 | 43篇 |
国内免费 | 31篇 |
专业分类
化学 | 63篇 |
力学 | 24篇 |
综合类 | 17篇 |
数学 | 129篇 |
物理学 | 128篇 |
出版年
2024年 | 1篇 |
2023年 | 3篇 |
2022年 | 17篇 |
2021年 | 12篇 |
2020年 | 4篇 |
2019年 | 4篇 |
2018年 | 6篇 |
2017年 | 12篇 |
2016年 | 9篇 |
2015年 | 11篇 |
2014年 | 17篇 |
2013年 | 21篇 |
2012年 | 14篇 |
2011年 | 18篇 |
2010年 | 15篇 |
2009年 | 10篇 |
2008年 | 20篇 |
2007年 | 27篇 |
2006年 | 13篇 |
2005年 | 10篇 |
2004年 | 14篇 |
2003年 | 13篇 |
2002年 | 15篇 |
2001年 | 15篇 |
2000年 | 9篇 |
1999年 | 15篇 |
1998年 | 4篇 |
1997年 | 10篇 |
1996年 | 8篇 |
1995年 | 4篇 |
1994年 | 3篇 |
1993年 | 1篇 |
1991年 | 3篇 |
1986年 | 1篇 |
1985年 | 1篇 |
1957年 | 1篇 |
排序方式: 共有361条查询结果,搜索用时 15 毫秒
61.
62.
Genevieve S. Walsh 《Topology》2005,44(5):947-958
We show that all two-bridge knot and link complements are virtually fibered. We also show that spherical Montesinos knot and link complements are virtually fibered. This is accomplished by showing that such manifolds are finitely covered by great circle link complements. 相似文献
63.
Leandro Chaves Rêgo Andrea Maria dos Santos 《European Journal of Operational Research》2019,272(2):587-594
We generalize a network formation model for co-authorship introducing the possibility of the connections having different link strengths. Different link strengths represent the fact that authors may put different efforts into different collaborations. To evaluate the model, we consider the notions of efficiency and pairwise stability, which are based on a utility function that measures the benefits for an author to belonging to a certain network structure. We divide the analysis in two cases, considering that link strengths are unbounded or bounded. In the first case, we show that if there are more than two authors in the network, then there is no pairwise stable network. In the second case, we show that the pairwise stable networks consist of completely connected disjoint components where essentially all link strengths are maximal. Regarding efficiency, in both cases, if the number of authors is even, then the unique efficient network structure consists of pairs of connected authors. 相似文献
64.
Many similarity measure algorithms of nodes in weighted graph data have been proposed by employing the degree of nodes in recent years. Despite these algorithms obtaining great results, there may be still some limitations. For instance, the strength of nodes is ignored. Aiming at this issue, the relative entropy of the distance distribution based similarity measure of nodes is proposed in this paper. At first, the structural weights of nodes are given by integrating their degree and strength. Next, the distance between any two nodes is calculated with the help of their structural weights and the Euclidean distance formula to further obtain the distance distribution of each node. After that, the probability distribution of nodes is constructed by normalizing their distance distributions. Thus, the relative entropy can be applied to measure the difference between the probability distributions of the top d important nodes and all nodes in graph data. Finally, the similarity of two nodes can be measured in terms of this above-mentioned difference calculated by relative entropy. Experimental results demonstrate that the algorithm proposed by considering the strength of node in the relative entropy has great advantages in the most similar node mining and link prediction. 相似文献
65.
Harold J. Kushner 《Queueing Systems》2006,54(4):317-329
Consider a communications network consisting of mobiles and random external data processes, each destined to a particular
destination. Each mobile can serve as a node in the multi-hop path from source to destination. At each mobile the data is
queued according to the source destination pair. The quality of the connecting channels are randomly varying. Time is divided
into small scheduling intervals. At the beginning of each interval, the channels are estimated and this information is used
for the decisions concerning allocation of transmission power and/or time, bandwidth, and perhaps antennas, in a queue and
channel-state dependent way. Under a natural (and “almost” necessary) “average flow” condition, stochastic stability methods
are used to develop scheduling policies that assure stability. The policies are readily implementable and allow a range of
tradeoffs between current rates and queue lengths, under very weak conditions. Because of the non-Markovian nature of the
problem, we use the perturbed Stochastic Liapunov function method. The choice of Liapunov function allows a choice of the
effective performance criteria. All essential factors are incorporated into a “mean rate” function, so that the results cover
many different systems. Extensions concerning acknowledgments, multicasting, non-unique routes, and others are given to illustrate
the versatility of the method, and a useful method for getting the a priori routes is discussed. 相似文献
66.
67.
68.
69.
Iain Moffatt 《Journal of Graph Theory》2016,81(4):329-341
In this article we consider minors of ribbon graphs (or, equivalently, cellularly embedded graphs). The theory of minors of ribbon graphs differs from that of graphs in that contracting loops is necessary and doing this can create additional vertices and components. Thus, the ribbon graph minor relation is incompatible with the graph minor relation. We discuss excluded minor characterizations of minor closed families of ribbon graphs. Our main result is an excluded minor characterization of the family of ribbon graphs that represent knot and link diagrams. 相似文献
70.
We describe an algorithm for computing boundary slopes of 2-bridge links. As an example, we work out the slopes of the links obtained by surgery on one component of the Borromean rings. A table of all boundary slopes of all 2-bridge links with 10 or less crossings is also included.