首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1876篇
  免费   39篇
  国内免费   11篇
化学   1244篇
晶体学   6篇
力学   81篇
数学   324篇
物理学   271篇
  2022年   18篇
  2021年   31篇
  2020年   23篇
  2019年   36篇
  2018年   29篇
  2017年   15篇
  2016年   57篇
  2015年   27篇
  2014年   36篇
  2013年   76篇
  2012年   82篇
  2011年   98篇
  2010年   55篇
  2009年   65篇
  2008年   88篇
  2007年   102篇
  2006年   96篇
  2005年   103篇
  2004年   84篇
  2003年   71篇
  2002年   48篇
  2001年   23篇
  2000年   28篇
  1999年   34篇
  1998年   19篇
  1997年   26篇
  1996年   24篇
  1995年   22篇
  1994年   21篇
  1993年   18篇
  1992年   24篇
  1991年   12篇
  1990年   19篇
  1989年   14篇
  1988年   13篇
  1987年   8篇
  1986年   14篇
  1985年   26篇
  1984年   22篇
  1983年   15篇
  1982年   17篇
  1981年   13篇
  1980年   11篇
  1979年   10篇
  1978年   10篇
  1977年   10篇
  1976年   7篇
  1975年   13篇
  1974年   10篇
  1888年   8篇
排序方式: 共有1926条查询结果,搜索用时 11 毫秒
971.
Through the graphical method proposed, it is possible to create a link between an MO multicenter bond index and VB structures. The value of the index depends on the order of the atoms involved, if there are more than three. For 5-c rings, three basic structures are required; the eventually different values are 12. Unlike the 6-c case, it may happen that different pairs of basic structures are used to build the same polygon. For the 6-c rings, including heteroatoms, the original degeneracy of benzene splits, leading eventually to 60 different Iring values.  相似文献   
972.
973.
When measuring very small ellipticities or rotations induced on a polarized beam of light, Fabry–Pérot cavities are often used to increase the number of passes within the region of interest. In this paper we show that due to the intrinsic birefringence of the reflective surface of the cavity mirrors, a cross talk between dichroism and ellipticity is induced. We also show how such a cross talk may be measured and kept under control by means of an adequate phase locking scheme of the laser to the cavity.PACS 75.30.Gw; 07.60.Fs; 42.25.-p; 42.62.-b  相似文献   
974.
The focus of this paper is the incomputability of some topological functions (with respect to certain representations) using the tools of Borel computability theory, as introduced by V. Brattka in [3] and [4]. First, we analyze some basic topological functions on closed subsets of ?n , like closure, border, intersection, and derivative, and we prove for such functions results of Σ02‐completeness and Σ03‐completeness in the effective Borel hierarchy. Then, following [13], we re‐consider two well‐known topological results: the lemmas of Urysohn and Urysohn‐Tietze for generic metric spaces (for the latter we refer to the proof given by Dieudonné). Both lemmas define Σ02‐computable functions which in some cases are even Σ02‐complete. (© 2006 WILEY‐VCH Verlag GmbH & Co. KGaA, Weinheim)  相似文献   
975.
This paper addresses the issue of computing the asymptotic worst-case of lower bounds for the Bin Packing Problem. We introduce a general result that allows to bound the asymptotic worst-case performance of any lower bound for the problem and to derive for the first time the asymptotic worst-case of the well-known bound L3 by Martello and Toth. We also show that the general result allows to easily derive the asymptotic worst-case of several lower bounds proposed in the literature.  相似文献   
976.
Some property and casualty insurers use automated detection systems to help to decide whether or not to investigate claims suspected of fraud. Claim screening systems benefit from the coded experience of previously investigated claims. The embedded detection models typically consist of scoring devices relating fraud indicators to some measure of suspicion of fraud. In practice these scoring models often focus on minimizing the error rate rather than on the cost of (mis)classification. We show that focusing on cost is a profitable approach. We analyse the effects of taking into account information on damages and audit costs early on in the screening process. We discuss several scenarios using real-life data. The findings suggest that with claim amount information available at screening time detection rules can be accommodated to increase expected profits. Our results show the value of cost-sensitive claim fraud screening and provide guidance on how to render this strategy operational.  相似文献   
977.
We discuss the problem of how a (commutative) generalized observable in a finite-dimensional Hilbert space (communtative effect-valued resolution of the identity) can be considered as an unsharp realization of some standard observable (projection-valued resolution of the identity). In particular, we give a concrete procedure for constructing such a standard observable. Some results about the “uniqueness” of the resulting observable are also examined.  相似文献   
978.
979.
The possibility of using feedback to achieve or to enhance system linearity is well known to control engineers since decades ago. A few major breakthroughs, made possible by the application of differential geometric tools to control theoretic issues, have revamped a new interest in all facets of the problem, including the search, the analysis and the computation of suitable approximate solutions. In the present paper, recent developments and new trends in the field are shortly reviewed, with special attention paid to some research issues currently addressed by the authors. Though primarily meant for learned mathematically oriented readers, the presentation focuses on ideas and concepts more than on their most general and mathematically rigorous formulations. On the other hand, it does not assume familiarity with advanced control theory nor modern control technology.  相似文献   
980.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号