首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   922篇
  免费   57篇
  国内免费   56篇
化学   207篇
力学   59篇
综合类   26篇
数学   586篇
物理学   157篇
  2023年   12篇
  2022年   16篇
  2021年   19篇
  2020年   16篇
  2019年   15篇
  2018年   26篇
  2017年   25篇
  2016年   21篇
  2015年   23篇
  2014年   35篇
  2013年   44篇
  2012年   45篇
  2011年   43篇
  2010年   37篇
  2009年   48篇
  2008年   72篇
  2007年   64篇
  2006年   43篇
  2005年   38篇
  2004年   30篇
  2003年   25篇
  2002年   34篇
  2001年   29篇
  2000年   17篇
  1999年   31篇
  1998年   25篇
  1997年   28篇
  1996年   18篇
  1995年   17篇
  1994年   16篇
  1993年   25篇
  1992年   21篇
  1991年   10篇
  1990年   14篇
  1989年   7篇
  1988年   2篇
  1987年   4篇
  1986年   8篇
  1985年   6篇
  1984年   3篇
  1982年   6篇
  1981年   4篇
  1980年   1篇
  1979年   5篇
  1978年   1篇
  1977年   1篇
  1976年   1篇
  1975年   1篇
  1972年   1篇
  1967年   1篇
排序方式: 共有1035条查询结果,搜索用时 15 毫秒
1.
It is long known that the Fokker-Planck equation with prescribed constant coefficients of diffusion and linear friction describes the ensemble average of the stochastic evolutions in velocity space of a Brownian test particle immersed in a heat bath of fixed temperature. Apparently, it is not so well known that the same partial differential equation, but now with constant coefficients which are functionals of the solution itself rather than being prescribed, describes the kinetic evolution (in the N→∞ limit) of an isolated N-particle system with certain stochastic interactions. Here we discuss in detail this recently discovered interpretation. An erratum to this article can be found at  相似文献   
2.
MC模式下顾客需求与厂商供应的纳什均衡   总被引:3,自引:0,他引:3  
在大规模定制(MC,Mass Customization)模式下,基于市场需求的复杂化,厂商对个性化的顾客需求很难做出及时准确的反应,而且由于其自身生产能力的限制,不可能对所有的个性化用户进行一一地满足,只可能对已经存在的个性化需求,根据自身的生产能力和规模,以利润最大化及顾客对产品的满意度为目标,对个性化需求进行较准确地预测,从而正确指导生产。本通过博弈论的方法,提出了一个基于顾客对产品的满意度及企业的利润的一个非合作博弈模型,并给出求解纳什均衡的方法。  相似文献   
3.
The projective method for solving linear matrix inequalities   总被引:2,自引:0,他引:2  
Numerous problems in control and systems theory can be formulated in terms of linear matrix inequalities (LMI). Since solving an LMI amounts to a convex optimization problem, such formulations are known to be numerically tractable. However, the interest in LMI-based design techniques has really surged with the introduction of efficient interior-point methods for solving LMIs with a polynomial-time complexity. This paper describes one particular method called the Projective Method. Simple geometrical arguments are used to clarify the strategy and convergence mechanism of the Projective algorithm. A complexity analysis is provided, and applications to two generic LMI problems (feasibility and linear objective minimization) are discussed.  相似文献   
4.
This paper analyzes the requirements that CASE tools should meet for effective database reverse engineering (DBRE), and proposes a general architecture for data-centered applications reverse engineering CASE environments. First, the paper describes a generic DBMS-independent DBRE methodology, then it analyzes the main characteristics of DBRE activities in order to collect a set of desirable requirements. Finally, it describes DB-MAIN, an operational CASE tool developed according to these requirements. The main features of this tool that are described in this paper are its unique generic specification model, its repository, its transformation toolkit, its user interface, the text processors, the assistants, the methodological control and its functional extensibility. Finally, the paper describes five real-world projects in which the methodology and the CASE tool were applied. This is a heavily revised and extended version of “Requirements for Information System Reverse Engineering Support” by J.-L. Hainaut, V. Englebert, J. Henrard, J.-M. Hick, D. Roland, which first appeared in the Proceedings of the Second Working Conference on Reverse Engineering, IEEE Computer Society Press, pp. 136–145, July 1995. This paper presents some results of the DB-MAIN project. This project is partially supported by the Région Wallonne, the European Union, and by a consortium comprising ACEC-OSI (Be), ARIANE-II (Be), Banque UCL (Lux), BBL (Be), Centre de recherche public H. Tudor (Lux), CGER (Be), Cockerill-Sambre (Be), CONCIS (Fr), D'Ieteren (Be), DIGITAL, EDF (Fr), EPFL (CH), Groupe S (Be), IBM, OBLOG Software (Port), ORIGIN (Be), Ville de Namur (Be), Winterthur (Be), 3 Suisses (Be). The DB-Process subproject is supported by the Communauté Fran?aise de Belgique.  相似文献   
5.
Given a data matrix, we find its nearest symmetric positive-semidefinite Toeplitz matrix. In this paper, we formulate the problem as an optimization problem with a quadratic objective function and semidefinite constraints. In particular, instead of solving the so-called normal equations, our algorithm eliminates the linear feasibility equations from the start to maintain exact primal and dual feasibility during the course of the algorithm. Subsequently, the search direction is found using an inexact Gauss-Newton method rather than a Newton method on a symmetrized system and is computed using a diagonal preconditioned conjugate-gradient-type method. Computational results illustrate the robustness of the algorithm.  相似文献   
6.
We give a hierarchy of semidefinite upper bounds for the maximum size A(n,d) of a binary code of word length n and minimum distance at least d. At any fixed stage in the hierarchy, the bound can be computed (to an arbitrary precision) in time polynomial in n; this is based on a result of de Klerk et al. (Math Program, 2006) about the regular ∗-representation for matrix ∗-algebras. The Delsarte bound for A(n,d) is the first bound in the hierarchy, and the new bound of Schrijver (IEEE Trans. Inform. Theory 51:2859–2866, 2005) is located between the first and second bounds in the hierarchy. While computing the second bound involves a semidefinite program with O(n 7) variables and thus seems out of reach for interesting values of n, Schrijver’s bound can be computed via a semidefinite program of size O(n 3), a result which uses the explicit block-diagonalization of the Terwilliger algebra. We propose two strengthenings of Schrijver’s bound with the same computational complexity. Supported by the Netherlands Organisation for Scientific Research grant NWO 639.032.203.  相似文献   
7.
We propose an alternative method for computing effectively the solution of non-linear, fixed-terminal-time, optimal control problems when they are given in Lagrange, Bolza or Mayer forms. This method works well when the nonlinearities in the control variable can be expressed as polynomials. The essential of this proposal is the transformation of a non-linear, non-convex optimal control problem into an equivalent optimal control problem with linear and convex structure. The method is based on global optimization of polynomials by the method of moments. With this method we can determine either the existence or lacking of minimizers. In addition, we can calculate generalized solutions when the original problem lacks of minimizers. We also present the numerical schemes to solve several examples arising in science and technology.  相似文献   
8.
A BRANCH BOUND METHOD FOR SUBSET SUM PROBLEM   总被引:1,自引:0,他引:1  
ABRANCHBOUNDMETHODFORSUBSETSUMPROBLEMWUSHIQUAN(吴士泉)(InstituteofAppliedMathematics,theChineseAcademyofSciences,Beijing100080,C...  相似文献   
9.
Limit and shakedown analysis problems of Computational Mechanics lead to convex optimization problems, characterized by linear objective functions, linear equality constraints and constraints expressing the restrictions imposed by the material strength. It is shown that two important strength criteria, the Mohr–Coulomb and the Tresca criterion, can be represented as systems of semidefinite constraints, leading this way to semidefinite programming problems.  相似文献   
10.
We give a linear time algorithm for the continuous quadratic knapsack problem which is simpler than existing methods and competitive in practice. Encouraging computational results are presented for large-scale problems. The author thanks the Associate Editor and an anonymous referee for their helpful comments.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号