全文获取类型
收费全文 | 5811篇 |
国内免费 | 449篇 |
完全免费 | 1107篇 |
专业分类
数学 | 7367篇 |
出版年
2020年 | 35篇 |
2019年 | 67篇 |
2018年 | 206篇 |
2017年 | 226篇 |
2016年 | 168篇 |
2015年 | 238篇 |
2014年 | 391篇 |
2013年 | 532篇 |
2012年 | 484篇 |
2011年 | 630篇 |
2010年 | 549篇 |
2009年 | 519篇 |
2008年 | 483篇 |
2007年 | 532篇 |
2006年 | 433篇 |
2005年 | 275篇 |
2004年 | 215篇 |
2003年 | 200篇 |
2002年 | 172篇 |
2001年 | 136篇 |
2000年 | 128篇 |
1999年 | 101篇 |
1998年 | 109篇 |
1997年 | 87篇 |
1996年 | 69篇 |
1995年 | 56篇 |
1994年 | 60篇 |
1993年 | 33篇 |
1992年 | 36篇 |
1991年 | 21篇 |
1990年 | 26篇 |
1989年 | 21篇 |
1988年 | 17篇 |
1987年 | 19篇 |
1986年 | 9篇 |
1985年 | 23篇 |
1984年 | 15篇 |
1983年 | 8篇 |
1982年 | 14篇 |
1981年 | 3篇 |
1980年 | 11篇 |
1979年 | 1篇 |
1956年 | 1篇 |
1955年 | 3篇 |
1954年 | 1篇 |
1953年 | 1篇 |
1951年 | 1篇 |
1940年 | 1篇 |
1939年 | 1篇 |
排序方式: 共有7367条查询结果,搜索用时 46 毫秒
1.
Normal Families and Shared Values 总被引:55,自引:0,他引:55
For f a meromorphic function on the plane domain D and a C,let f(a) = {z D: f(z) = a}. Let F be a family of meromorphicfunctions on D, all of whose zeros are of multiplicity at leastk. If there exist b 0 and h > 0 such that for every f F,f(0) = f(k)(b) and 0 < |f(k+1)(z)| h whenever z f(0), thenF is a normal family on D. The case f(0) = Ø is a celebratedresult of Gu [5]. 1991 Mathematics Subject Classification 30D45,30D35. 相似文献
2.
In this paper, the concepts of quasiconcave set and strictly quasiconcave set are introduced. By using these concepts, we get a new sufficient condition for the efficient outcome set to be connected. This leads to the connectedness of the efficient solution set in strictly quasiconcave vector maximization under the mild condition that the efficient frontier is closed.The authors would like to thank Professor E. U. Choo and the referees for their many valuable comments and helpful suggestions. 相似文献
3.
4.
关于两类污染数据回归分析的参数估计 总被引:21,自引:0,他引:21
研究简单回归模型:yj=a+βxj+εj,j=1,2,…,n,其中Eεj=0,Eε^2j=σ^2j;但y1,y2,…,yn受到另一独立同分布随机变量序列t,t2,…,tn两种不同方式的污染,tj与yj独立。本文给出了两种污染方式下的a、β和污染参数的估计。 相似文献
5.
The asymptotic stability of one-parameter methods for neutral differential equations 总被引:20,自引:0,他引:20
This paper deals with the asymptotic stability of theoretical solutions and numerical methods for systems of neutral differential equationsx=Ax(t–)+Bx(t)+Cx(t–), whereA, B, andC are constant complexN ×N matrices, and >0. A necessary and sufficient condition such that the differential equations are asymptotically stable is derived. We also focus on the numerical stability properties of adaptations of one-parameter methods. Further, we investigate carefully the characterization of the stability region. 相似文献
6.
Normality and shared values 总被引:19,自引:0,他引:19
LetF be a family of meromorphic functions on the unit disc Δ and leta andb be distinct values. If for everyf∈F,f andf′ sharea andb on Δ, thenF is normal on Δ.
The first author was supported by NNSF of China approved no. 19771038 and by the Research Institute for Mathematical Sciences,
Bar-Ilan University. 相似文献
7.
Introducing a suitable variational formulation for the localerror of scattered data interpolation by radial basis functions(r), the error can be bounded by a term depending on the Fouriertransform of the interpolated function f and a certain Krigingfunction, which allows a formulation as an integral involvingthe Fourier transform of . The explicit construction of locallywell-behaving admissible coefficient vectors makes the Krigingfunction bounded by some power of the local density h of datapoints. This leads to error estimates for interpolation of functionsf whose Fourier transform f is dominated by thenonnegative Fourier transform of (x) = (||x||) in the sense . Approximation orders are arbitrarily high for interpolationwith Hardy multiquadrics, inverse multiquadrics and Gaussiankernels. This was also proven in recent papers by Madych andNelson, using a reproducing kernel Hilbert space approach andrequiring the same hypothesis as above on f, which limits thepractical applicability of the results. This work uses a differentand simpler analytic technique and allows to handle the casesof interpolation with (r) = rs for s R, s > 1, s 2N, and(r) = rs log r for s 2N, which are shown to have accuracy O(hs/2) 相似文献
8.
区间值模糊集和区间值模糊推理 总被引:17,自引:3,他引:14
本文在单位区间的一切子区间集Ⅰ[0,1]上引入t-范、t-余范、交(∩)、并(∪)等概念,在此基础上定义了区间值模糊集中的新的交并运算和区间值模糊关系的新的合成运算,得出若干有趣的性质,并将其应用于区间值模糊推理的合成规则上。 相似文献
9.
ChengShixue WuBiao 《高校应用数学学报(英文版)》1999,14(1):67-74
The probabilities of the following events are first discussed in this paper: the insurance company survives to any fixed time k and the surplus at time k equals x≥1. The formulas for calculating such probabilities are deduced through analytical and probabilistic arguments respectively. Finally, other probability laws relating to risk are determined based on the probabilities mentioned above. 相似文献
10.
Due to avoiding the inherent escrow of identity-based cryptography and yet not requiring certificates to guarantee the authenticity of public keys, certificateless public key cryptography has received a significant attention. Due to various applications of bilinear pairings in cryptography, numerous pairing-based encryption schemes, signature schemes, and other cryptographic primitives have been proposed. In this paper, a new certificateless signature scheme based on bilinear pairings is presented. The signing algorithm of the proposed scheme is very simple and does not require any pairing computation. Combining our signature scheme with certificateless public key cryptography yields a complete solution of certificateless public key system. As an application of the proposed signature scheme, a certificateless proxy signature scheme is also presented. We analyze both schemes from security point of view.__________Published in Lietuvos Matematikos Rinkinys, Vol. 45, No. 1, pp. 95–103, January–March, 2005. 相似文献