首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   829篇
  免费   19篇
化学   451篇
晶体学   4篇
力学   17篇
数学   122篇
物理学   254篇
  2022年   7篇
  2021年   10篇
  2020年   9篇
  2019年   5篇
  2018年   9篇
  2017年   13篇
  2016年   11篇
  2015年   13篇
  2014年   21篇
  2013年   55篇
  2012年   61篇
  2011年   76篇
  2010年   35篇
  2009年   39篇
  2008年   38篇
  2007年   28篇
  2006年   30篇
  2005年   20篇
  2004年   24篇
  2003年   18篇
  2002年   23篇
  2001年   8篇
  2000年   11篇
  1999年   5篇
  1997年   5篇
  1996年   7篇
  1995年   12篇
  1994年   5篇
  1993年   18篇
  1992年   13篇
  1991年   5篇
  1988年   6篇
  1986年   5篇
  1985年   8篇
  1984年   7篇
  1980年   4篇
  1979年   18篇
  1978年   5篇
  1977年   9篇
  1976年   9篇
  1975年   10篇
  1974年   10篇
  1973年   17篇
  1971年   5篇
  1968年   4篇
  1962年   4篇
  1959年   7篇
  1958年   6篇
  1954年   5篇
  1935年   5篇
排序方式: 共有848条查询结果,搜索用时 12 毫秒
841.
We contribute to current research on single-period returns policies by making a clear distinction between models in which transfer price is exogenous and models in which one dominant party unilaterally declares a price. We compare the equilibrium contracts that result from these two approaches and derive conditions for the equilibrium returns policy to be Pareto-efficient when transfer price is exogenous. Our main result is distribution free, but we make some interesting observations on channel performance when demand is uniformly distributed.  相似文献   
842.
In (2,n) visual cryptographic schemes, a secret image(text or picture) is encrypted into n shares, which are distributed among n participants. The image cannot be decoded from any single share but any two participants can together decode it visually, without using any complex decoding mechanism. In this paper, we introduce three meaningful optimality criteria for evaluating different schemes and show that some classes of combinatorial designs, such as BIB designs, PBIB designs and regular graph designs, can yield a large number of black and white (2,n) schemes that are optimal with respect to all these criteria. For a practically useful range of n, we also obtain optimal schemes with the smallest possible pixel expansion.  相似文献   
843.
In recent years transportation agencies have introduced patrol based response programs to remove roadway incidents rapidly. With the evolution of technology incident detection and notification from remote traffic operation centers is possible and patrols to detect incidents are not necessary. Instead, the response units can be placed at various depots in urban areas and dispatched to incident sites upon notification. In this paper, we propose a reliability based mixed integer programming model to find best locations of incidence response depots and assign response vehicles to these depots so that incidents can be cleared efficiently at a minimum cost. The approach is unique as it considers fixed and variable costs of vehicles and depots, occurrences of major and minor incidents, and reliability of response service in the same model. Numerical results are generated for an example problem and sensitivity analysis is conducted to explore the relationships between parameters of the problem.  相似文献   
844.
The maximum entropy approach used together with fractional moments has proven to be a flexible and powerful tool for density approximation of a positive random variable. In this paper we consider an optimality criterion based on the Kullback–Leibler distance in order to select appropriate fractional moments. We discuss the properties of the proposed procedure when all the available information comes from a sample of observations. The method is applied to the size distribution of the U.S. family income. Copyright © 2008 John Wiley & Sons, Ltd.  相似文献   
845.
In this note we prove two theorems. In theorem 1 we prove that if M andN are two non-zero reflexive modules of finite projective dimensions over a Gorenstein local ring, such that Hom (M, N) is a third module of syzygies, then the natural homomorphismM* ⊗N → Hom (M, N) is an isomorphism. This extends the result in [7]. In theorem 2, we prove that projective dimension of a moduleM over a regular local ringR is less than or equal ton if and only if ExtR n (M, R) ⊗M → ExtR n (M, M) is surjective; in which case it is actually bijective. This extends the usual criterion for the projectivity of a module.  相似文献   
846.
Given an n-vertex outer-planar graph G and a set P of n points in the plane, we present an O(nlog3n) time and O(n) space algorithm to compute a straight-line embedding of G in P, improving upon the algorithm in [8,12] that requires O(n2) time. Our algorithm is near-optimal as there is an Ω(nlogn) lower bound for the problem [4]. We present a simpler O(nd) time and O(n) space algorithm to compute a straight-line embedding of G in P where lognd2n is the length of the longest vertex disjoint path in the dual of G. Therefore, the time complexity of the simpler algorithm varies between O(nlogn) and O(n2) depending on the value of d. More efficient algorithms are presented for certain restricted cases. If the dual of G is a path, then an optimal Θ(nlogn) time algorithm is presented. If the given point set is in convex position then we show that O(n) time suffices.  相似文献   
847.
848.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号