全文获取类型
收费全文 | 1876篇 |
免费 | 39篇 |
国内免费 | 11篇 |
专业分类
化学 | 1244篇 |
晶体学 | 6篇 |
力学 | 81篇 |
数学 | 324篇 |
物理学 | 271篇 |
出版年
2022年 | 18篇 |
2021年 | 31篇 |
2020年 | 23篇 |
2019年 | 36篇 |
2018年 | 29篇 |
2017年 | 15篇 |
2016年 | 57篇 |
2015年 | 27篇 |
2014年 | 36篇 |
2013年 | 76篇 |
2012年 | 82篇 |
2011年 | 98篇 |
2010年 | 55篇 |
2009年 | 65篇 |
2008年 | 88篇 |
2007年 | 102篇 |
2006年 | 96篇 |
2005年 | 103篇 |
2004年 | 84篇 |
2003年 | 71篇 |
2002年 | 48篇 |
2001年 | 23篇 |
2000年 | 28篇 |
1999年 | 34篇 |
1998年 | 19篇 |
1997年 | 26篇 |
1996年 | 24篇 |
1995年 | 22篇 |
1994年 | 21篇 |
1993年 | 18篇 |
1992年 | 24篇 |
1991年 | 12篇 |
1990年 | 19篇 |
1989年 | 14篇 |
1988年 | 13篇 |
1987年 | 8篇 |
1986年 | 14篇 |
1985年 | 26篇 |
1984年 | 22篇 |
1983年 | 15篇 |
1982年 | 17篇 |
1981年 | 13篇 |
1980年 | 11篇 |
1979年 | 10篇 |
1978年 | 10篇 |
1977年 | 10篇 |
1976年 | 7篇 |
1975年 | 13篇 |
1974年 | 10篇 |
1888年 | 8篇 |
排序方式: 共有1926条查询结果,搜索用时 11 毫秒
971.
Carlos Guido Bollini Mario Giambiagi Myriam Segre de Giambiagi Aloysio Paiva de Figueiredo 《Structural chemistry》2001,12(2):113-120
Through the graphical method proposed, it is possible to create a link between an MO multicenter bond index and VB structures. The value of the index depends on the order of the atoms involved, if there are more than three. For 5-c rings, three basic structures are required; the eventually different values are 12. Unlike the 6-c case, it may happen that different pairs of basic structures are used to build the same polygon. For the 6-c rings, including heteroatoms, the original degeneracy of benzene splits, leading eventually to 60 different Iring values. 相似文献
972.
973.
G. Zavattini G. Cantatore R. Cimino G. Di Domenico F. Della Valle M. Karuza E. Milotti G. Ruoso 《Applied physics. B, Lasers and optics》2006,83(4):571-577
When measuring very small ellipticities or rotations induced on a polarized beam of light, Fabry–Pérot cavities are often used to increase the number of passes within the region of interest. In this paper we show that due to the intrinsic birefringence of the reflective surface of the cavity mirrors, a cross talk between dichroism and ellipticity is induced. We also show how such a cross talk may be measured and kept under control by means of an adequate phase locking scheme of the laser to the cavity.PACS 75.30.Gw; 07.60.Fs; 42.25.-p; 42.62.-b 相似文献
974.
Guido Gherardi 《Mathematical Logic Quarterly》2006,52(6):625-642
The focus of this paper is the incomputability of some topological functions (with respect to certain representations) using the tools of Borel computability theory, as introduced by V. Brattka in [3] and [4]. First, we analyze some basic topological functions on closed subsets of ?n , like closure, border, intersection, and derivative, and we prove for such functions results of Σ02‐completeness and Σ03‐completeness in the effective Borel hierarchy. Then, following [13], we re‐consider two well‐known topological results: the lemmas of Urysohn and Urysohn‐Tietze for generic metric spaces (for the latter we refer to the proof given by Dieudonné). Both lemmas define Σ02‐computable functions which in some cases are even Σ02‐complete. (© 2006 WILEY‐VCH Verlag GmbH & Co. KGaA, Weinheim) 相似文献
975.
Teodor Gabriel Crainic Guido Perboli Miriam Pezzuto Roberto Tadei 《European Journal of Operational Research》2007
This paper addresses the issue of computing the asymptotic worst-case of lower bounds for the Bin Packing Problem. We introduce a general result that allows to bound the asymptotic worst-case performance of any lower bound for the problem and to derive for the first time the asymptotic worst-case of the well-known bound L3 by Martello and Toth. We also show that the general result allows to easily derive the asymptotic worst-case of several lower bounds proposed in the literature. 相似文献
976.
Stijn Viaene Mercedes Ayuso Montserrat Guillen Dirk Van Gheel Guido Dedene 《European Journal of Operational Research》2007
Some property and casualty insurers use automated detection systems to help to decide whether or not to investigate claims suspected of fraud. Claim screening systems benefit from the coded experience of previously investigated claims. The embedded detection models typically consist of scoring devices relating fraud indicators to some measure of suspicion of fraud. In practice these scoring models often focus on minimizing the error rate rather than on the cost of (mis)classification. We show that focusing on cost is a profitable approach. We analyse the effects of taking into account information on damages and audit costs early on in the screening process. We discuss several scenarios using real-life data. The findings suggest that with claim amount information available at screening time detection rules can be accommodated to increase expected profits. Our results show the value of cost-sensitive claim fraud screening and provide guidance on how to render this strategy operational. 相似文献
977.
Gianpiero Cattaneo Tiziana Marsico Giuseppe Nisticò Guido Bacciagaluppi 《Foundations of Physics》1997,27(10):1323-1343
We discuss the problem of how a (commutative) generalized observable in a finite-dimensional Hilbert space (communtative effect-valued
resolution of the identity) can be considered as an unsharp realization of some standard observable (projection-valued resolution
of the identity). In particular, we give a concrete procedure for constructing such a standard observable. Some results about
the “uniqueness” of the resulting observable are also examined. 相似文献
978.
979.
The possibility of using feedback to achieve or to enhance system linearity is well known to control engineers since decades ago. A few major breakthroughs, made possible by the application of differential geometric tools to control theoretic issues, have revamped a new interest in all facets of the problem, including the search, the analysis and the computation of suitable approximate solutions. In the present paper, recent developments and new trends in the field are shortly reviewed, with special attention paid to some research issues currently addressed by the authors. Though primarily meant for learned mathematically oriented readers, the presentation focuses on ideas and concepts more than on their most general and mathematically rigorous formulations. On the other hand, it does not assume familiarity with advanced control theory nor modern control technology. 相似文献
980.