全文获取类型
收费全文 | 1344篇 |
国内免费 | 17篇 |
完全免费 | 68篇 |
专业分类
数学 | 1429篇 |
出版年
2023年 | 8篇 |
2022年 | 13篇 |
2021年 | 22篇 |
2020年 | 7篇 |
2019年 | 8篇 |
2018年 | 41篇 |
2017年 | 52篇 |
2016年 | 46篇 |
2015年 | 51篇 |
2014年 | 67篇 |
2013年 | 122篇 |
2012年 | 136篇 |
2011年 | 138篇 |
2010年 | 111篇 |
2009年 | 148篇 |
2008年 | 93篇 |
2007年 | 69篇 |
2006年 | 66篇 |
2005年 | 44篇 |
2004年 | 32篇 |
2003年 | 22篇 |
2002年 | 17篇 |
2001年 | 6篇 |
2000年 | 4篇 |
1999年 | 6篇 |
1998年 | 5篇 |
1997年 | 5篇 |
1996年 | 11篇 |
1995年 | 2篇 |
1994年 | 4篇 |
1993年 | 6篇 |
1992年 | 7篇 |
1991年 | 3篇 |
1990年 | 5篇 |
1989年 | 1篇 |
1988年 | 7篇 |
1987年 | 5篇 |
1986年 | 1篇 |
1985年 | 8篇 |
1984年 | 4篇 |
1983年 | 9篇 |
1982年 | 4篇 |
1981年 | 4篇 |
1980年 | 3篇 |
1979年 | 1篇 |
1977年 | 1篇 |
1976年 | 1篇 |
1974年 | 1篇 |
1973年 | 1篇 |
1971年 | 1篇 |
排序方式: 共有1429条查询结果,搜索用时 156 毫秒
1.
2.
General Uniqueness Results and Variation Speed for Blow-Up Solutions of Elliptic Equations 总被引:7,自引:0,他引:7
Let be a smooth bounded domain in RN. We prove general uniquenessresults for equations of the form u = au b(x)f(u) in , subject to u = on . Our uniqueness theorem is establishedin a setting involving Karamata's theory on regularly varyingfunctions, which is used to relate the blow-up behavior of u(x)with f(u) and b(x), where b 0 on and a certain ratio involvingb is bounded near . A key step in our proof of uniqueness usesa modification of an iteration technique due to Safonov. 2000Mathematics Subject Classification 35J25 (primary), 35B40, 35J60(secondary). 相似文献
3.
An implicit method is developed for the numerical solution ofoption pricing models where it is assumed that the underlyingprocess is a jump diffusion. This method can be applied to avariety of contingent claim valuations, including American options,various kinds of exotic options, and models with uncertain volatilityor transaction costs. Proofs of timestepping stability and convergenceof a fixed-point iteration scheme are presented. For typicalmodel parameters, it is shown the error is reduced by two ordersof magnitude at each iteration. The correlation integral iscomputed using a fast Fourier transform method. Numerical testsof convergence for a variety of options are presented. 相似文献
4.
A Tabu-Search Hyperheuristic for Timetabling and Rostering 总被引:4,自引:0,他引:4
Hyperheuristics can be defined to be heuristics which choose between heuristics in order to solve a given optimisation problem. The main motivation behind the development of such approaches is the goal of developing automated scheduling methods which are not restricted to one problem. In this paper we report the investigation of a hyperheuristic approach and evaluate it on various instances of two distinct timetabling and rostering problems. In the framework of our hyperheuristic approach, heuristics compete using rules based on the principles of reinforcement learning. A tabu list of heuristics is also maintained which prevents certain heuristics from being chosen at certain times during the search. We demonstrate that this tabu-search hyperheuristic is an easily re-usable method which can produce solutions of at least acceptable quality across a variety of problems and instances. In effect the proposed method is capable of producing solutions that are competitive with those obtained using state-of-the-art problem-specific techniques for the problems studied here, but is fundamentally more general than those techniques. 相似文献
5.
Pattern matching for clone and concept detection 总被引:4,自引:0,他引:4
K. A. Kontogiannis R. Demori E. Merlo M. Galler M. Bernstein 《Applied Categorical Structures》1996,3(1-2):77-108
6.
The Lanczos algorithm for tridiagonalizing a symmetric matrixis the basis for several methods for solving sets of linearequations as well as for solving the eigenproblem. These methodsare very useful when the matrix is large and sparse. A completerounding error analysis of the algorithm is presented here,giving among other results an important expression for the lossof orthogonality of the computed vectors. The results here canbe used to analyze the many methods which are basedon the Lanczosalgorithm. 相似文献
7.
We present a new characterization of semi-bent and bent quadratic functions on finite fields. First, we determine when a GF(2)-linear combination of Gold functions Tr(x2i+1) is semi-bent over GF(2n), n odd, by a polynomial GCD computation. By analyzing this GCD condition, we provide simpler characterizations of semi-bent
functions. For example, we deduce that all linear combinations of Gold functions give rise to semi-bent functions over GF(2p) when p belongs to a certain class of primes. Second, we generalize our results to fields GF(pn) where p is an odd prime and n is odd. In that case, we can determine whether a GF(p)-linear combination of Gold functions Tr(xpi+1) is (generalized) semi-bent or bent by a polynomial GCD computation. Similar to the binary case, simple characterizations
of these p-ary semi-bent and bent functions are provided.
Parts of this paper were presented at the 2002 IEEE International Symposium on Information Theory [10] 相似文献
8.
The Inverse Resonance Problem for Jacobi Operators 总被引:3,自引:0,他引:3
It is proved in this paper that super-exponentially decaying,possibly non-selfadjoint perturbations of the free Jacobi operatorare uniquely determined by the location of all their eigenvaluesand resonances. 2000 Mathematics Subject Classification 39A70,34K29. 相似文献
9.
The pricing equations derived from uncertain volatility modelsin finance are often cast in the form of nonlinear partial differentialequations. Implicit timestepping leads to a set of nonlinearalgebraic equations which must be solved at each timestep. Tosolve these equations, an iterative approach is employed. Inthis paper, we prove the convergence of a particular iterativescheme for one factor uncertain volatility models. We also demonstratehow non-monotone discretization schemes (such as standard CrankNicolsontimestepping) can converge to incorrect solutions, or lead toinstability. Numerical examples are provided. 相似文献
10.
Group decision making using fuzzy sets theory for evaluating the rate of aggregative risk in software development 总被引:3,自引:0,他引:3
Huey-Ming Lee 《Fuzzy Sets and Systems》1996,80(3):261-271
The purpose of this study is not only to build a group decision making structure model of risk in software development but also to propose two algorithms to tackle the rate of aggregative risk in a fuzzy environment by fuzzy sets theory during any phase of the life cycle. While evaluating the rate of aggregative risk, one may adjust or improve the weights or grades of the factors until she/he can accept it. Moreover, our result will be more objective and unbiased since it is generated by a group of evaluators. 相似文献