首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   2553篇
  免费   71篇
  国内免费   54篇
化学   251篇
晶体学   2篇
力学   318篇
综合类   1篇
数学   1711篇
物理学   395篇
  2023年   31篇
  2022年   31篇
  2021年   39篇
  2020年   65篇
  2019年   67篇
  2018年   60篇
  2017年   63篇
  2016年   66篇
  2015年   59篇
  2014年   106篇
  2013年   176篇
  2012年   75篇
  2011年   161篇
  2010年   116篇
  2009年   158篇
  2008年   165篇
  2007年   171篇
  2006年   113篇
  2005年   96篇
  2004年   83篇
  2003年   78篇
  2002年   47篇
  2001年   57篇
  2000年   52篇
  1999年   62篇
  1998年   46篇
  1997年   34篇
  1996年   27篇
  1995年   34篇
  1994年   32篇
  1993年   23篇
  1992年   18篇
  1991年   20篇
  1990年   27篇
  1989年   17篇
  1988年   22篇
  1987年   19篇
  1986年   25篇
  1985年   20篇
  1984年   14篇
  1983年   3篇
  1982年   13篇
  1981年   14篇
  1980年   13篇
  1979年   16篇
  1978年   6篇
  1977年   9篇
  1976年   19篇
  1974年   6篇
  1966年   1篇
排序方式: 共有2678条查询结果,搜索用时 20 毫秒
91.
92.
We derive moderate deviation principles for the overlap parameter in the Hopfield model of spin glasses and neural networks. If the inverse temperature is different from the critical inverse temperature c=1 and the number of patterns M(N) satisfies M(N)/N 0, the overlap parameter multiplied by N, 1/2 < < 1, obeys a moderate deviation principle with speed N1–2 and a quadratic rate function (i.e. the Gaussian limit for = 1/2 remains visible on the moderate deviation scale). At the critical temperature we need to multiply the overlap parameter by N, 1/4 < < 1. If then M(N) satisfies (M(N)6 log N M(N)2N4 log N)/N 0, the rescaled overlap parameter obeys a moderate deviation principle with speed N1–4 and a rate function that is basically a fourth power. The random term occurring in the Central Limit theorem for the overlap at c = 1 is no longer present on a moderate deviation scale. If the scaling is even closer to N1/4, e.g. if we multiply the overlap parameter by N1/4 log log N the moderate deviation principle breaks down. The case of variable temperature converging to one is also considered. If N converges to c fast enough, i.e. faster than the non-Gaussian rate function persists, whereas for N converging to one slower than the moderate deviations principle is given by the Gaussian rate. At the borderline the moderate deviation rate function is the one at criticality plus an additional Gaussian term.Research supported by the Volkswagen-Stiftung (RiP-program at Oberwolfach, Germany).Mathematics Subject Classification (2000): 60F10 (primary), 60K35, 82B44, 82D30 (secondary)  相似文献   
93.
In this note we show that the mathematical tools of cooperative game theory allow a successful approach to the statistical problem of estimating a density function. Specifically, any random sample of an absolutely continuous random variable determines a transferable utility game, the Shapley value of which proves to be an estimator of the density function of binned kernel and WARPing types, with good computational and statistical properties.Authors acknowledge the financial support of Spanish Ministry for Science and Technology and FEDER through projects BFM2002-03213 and BEC2002-04102-C02-02 and of Xunta de Galicia through projects PGIDT00PXI20104PR and PGIDT03PXIC20701PN. They also thank the comments of two anonymous referees.  相似文献   
94.
In this paper we consider standard fixed tree games, for which each vertex unequal to the root is inhabited by exactly one player. We present two weighted allocation rules, the weighted down-home allocation and the weighted neighbour-home allocation, both inspired by the painting story in Maschler et al. (1995) . We show, in a constructive way, that the core equals both the set of weighted down-home allocations and the set of weighted neighbour allocations. Since every weighted down-home allocation specifies a weighted Shapley value (Kalai and Samet (1988)) in a natural way, and vice versa, our results provide an alternative proof of the fact that the core of a standard fixed tree game equals the set of weighted Shapley values. The class of weighted neighbour allocations is a generalization of the nucleolus, in the sense that the latter is in this class as the special member where players have all equal weights.  相似文献   
95.
Trading by Quantum Rules: Quantum Anthropic Principle   总被引:1,自引:0,他引:1  
This is a short review of the background and recent development in quantum game theory and its possible application in economics and finance. The intersection of science and society is discussed and Quantum Anthropic Principle is put forward. The review is addressed to nonspecialists.  相似文献   
96.
The consistent value is an extension of the Shapley value to the class of games with non-transferable utility.? In this paper, the consistent value will be characterized for market games with a continuum of players of two types. We will show that for such games the consistent value need not belong to the core, and provide conditions under which there is equivalence between the two concepts. Received: October 1998 RID="*" ID="*"  This thesis was completed under the supervision of Professor Sergiu Hart, The Center for Rationality and Interactive Decision Theory, Department of Mathematics, Department of Economics, The Hebrew University of Jerusalem. I would like to thank Professor Hart for introducing me to this area of research, for his help and guidance, and, especially, for all his patience.? I would also like to thank Michael Borns for improving the style, and an anonymous referee for helpful comments.  相似文献   
97.
Closed kernel systems of the coalition matrix turn out to correspond to cones of games on which the core correspondence is additive and on which the related barycentric solution is additive, stable and continuous. Different perfect cones corresponding to closed kernel systems are described. Received: December 2001/Revised: July 2002 RID="*" ID="*"  This note contains the new results, which were presented by the first author in an invited lecture at the XIV Italian Meeting on Game Theory and Applications in Ischia, July 2001. The lecture was dedicated to Irinel Dragan on the occasion of his seventieth birthday.  相似文献   
98.
In the assignment game framework, we try to identify those assignment matrices in which no entry can be increased without changing the core of the game. These games will be called buyer-seller exact games and satisfy the condition that each mixed-pair coalition attains the corresponding matrix entry in the core of the game. For a given assignment game, a unique buyer-seller exact assignment game with the same core is proved to exist. In order to identify this matrix and to provide a characterization of those assignment games which are buyer-seller exact in terms of the assignment matrix, attainable upper and lower core bounds for the mixed-pair coalitions are found. As a consequence, an open question posed in Quint (1991) regarding a canonical representation of a “45o-lattice” by means of the core of an assignment game can now be answered. Received: March 2002/Revised version: January 2003 RID="*" ID="*"  Institutional support from research grants BEC 2002-00642 and SGR2001-0029 is gratefully acknowledged RID="**" ID="**"  The authors thank the referees for their comments  相似文献   
99.
Consider an n-person stochastic game with Borel state space S, compact metric action sets A 1,A 2,,A n , and law of motion q such that the integral under q of every bounded Borel measurable function depends measurably on the initial state x and continuously on the actions (a 1,a 2,,a n ) of the players. If the payoff to each player i is 1 or 0 according to whether or not the stochastic process of states stays forever in a given Borel set G i , then there is an -equilibrium for every >0. AMS (1991) subject classification: 60G40, 91A60, 60E15, 46A55.  相似文献   
100.
We address the problem of finding the worst possible traffic a user of a telecommunications network can send. We take worst to mean having the highest effective bandwidth, a concept that arises in the Large Deviation theory of queueing networks. The traffic is assumed to be stationary and to satisfy leaky bucket constraints, which represent the a priori knowledge the network operator has concerning the traffic. Firstly, we show that this optimization problem may be reduced to an optimization over periodic traffic sources. Then, using convexity methods, we show that the realizations of a worst case source must have the following properties: at each instant the transmission rate must be either zero, the peak rate, or the leaky bucket rate; it may only be the latter when the leaky bucket is empty or full; each burst of activity must either start with the leaky bucket empty or end with it full.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号