全文获取类型
收费全文 | 158篇 |
免费 | 2篇 |
国内免费 | 2篇 |
专业分类
化学 | 35篇 |
力学 | 3篇 |
数学 | 50篇 |
物理学 | 74篇 |
出版年
2022年 | 3篇 |
2021年 | 3篇 |
2020年 | 3篇 |
2019年 | 2篇 |
2018年 | 4篇 |
2017年 | 4篇 |
2016年 | 6篇 |
2015年 | 4篇 |
2014年 | 4篇 |
2013年 | 7篇 |
2012年 | 17篇 |
2011年 | 15篇 |
2010年 | 11篇 |
2009年 | 6篇 |
2008年 | 4篇 |
2007年 | 7篇 |
2006年 | 7篇 |
2005年 | 8篇 |
2004年 | 8篇 |
2003年 | 8篇 |
2002年 | 8篇 |
2001年 | 3篇 |
2000年 | 3篇 |
1999年 | 3篇 |
1998年 | 2篇 |
1995年 | 1篇 |
1991年 | 1篇 |
1986年 | 1篇 |
1984年 | 1篇 |
1983年 | 1篇 |
1981年 | 1篇 |
1980年 | 1篇 |
1979年 | 1篇 |
1978年 | 1篇 |
1976年 | 2篇 |
1971年 | 1篇 |
排序方式: 共有162条查询结果,搜索用时 0 毫秒
111.
We introduce a concept of independence entropy for symbolic dynamical systems. This notion of entropy measures the extent to which one can freely insert symbols in positions without violating the constraint defined by the shift space. We show that for a certain class of one-dimensional shift spaces X, the independence entropy coincides with the limiting, as d tends to infinity, topological entropy of the dimensional shift defined by imposing the constraints of X in each of the d cardinal directions. This is of interest because for these shift spaces independence entropy is easy to compute. Thus, while in these cases, the topological entropy of the d-dimensional shift (d≥2) is difficult to compute, the limiting topological entropy is easy to compute. In some cases, we also compute the rate of convergence of the sequence of d-dimensional entropies. This work generalizes earlier work on constrained systems with unconstrained positions. 相似文献
112.
Yaniv Altshuler Michael Fire Erez Shmueli Yuval Elovici Alfred Bruckstein Alex Pentland David Lazer 《Journal of statistical physics》2013,152(3):399-418
This paper develops a methodology to aggregate signals in a network regarding some hidden state of the world. We argue that focusing on edges around hubs will under certain circumstances amplify the faint signals disseminating in a network, allowing for more efficient detection of that hidden state. We apply this method to detecting emergencies in mobile phone data, demonstrating that under a broad range of cases and a constraint in how many edges can be observed at a time, focusing on the egocentric networks around key hubs will be more effective than sampling random edges. We support this conclusion analytically, through simulations, and with analysis of a dataset containing the call log data from a major mobile carrier in a European nation. 相似文献
113.
Omri Sarig 《Inventiones Mathematicae》2002,150(3):629-653
We describe a method for proving subexponential lower bounds for correlations functions, and apply it to study decay of correlations
for maps with countable Markov partitions. One result is that LS Young’s upper estimates [Y2] are optimal in many situations.
Our method is based on a general result concerning the asymptotics of renewal sequences of bounded operators acting on Banach
spaces, which we apply to the iterates of the transfer operator.
Oblatum 14-VII-2001 & 5-VI-2002?Published online: 6 August 2002
Dedicated to B. Weiss on the occasion of his 60th birthday
RID="*"
ID="*"This research was supported by the Nuffield Foundation, NUF-NAL 00. 相似文献
114.
We present a novel method for the formation of a complete depolarizer that is based on a polarization-state scrambling procedure over the space domain. Such an element can be achieved by use of cascaded, computer-generated, space-variant subwavelength dielectric gratings. We introduce a theoretical analysis and experimentally demonstrate a depolarizer for infrared radiation at a wavelength of 10.6 microm. 相似文献
115.
Breakdown of the internet under intentional attack 总被引:16,自引:0,他引:16
We study the tolerance of random networks to intentional attack, whereby a fraction p of the most connected sites is removed. We focus on scale-free networks, having connectivity distribution P(k) approximately k(-alpha), and use percolation theory to study analytically and numerically the critical fraction p(c) needed for the disintegration of the network, as well as the size of the largest connected cluster. We find that even networks with alpha < or = 3, known to be resilient to random removal of sites, are sensitive to intentional attack. We also argue that, near criticality, the average distance between sites in the spanning (largest) cluster scales with its mass, M, as square root of [M], rather than as log (k)M, as expected for random networks away from criticality. 相似文献
116.
Omri M. Sarig 《Israel Journal of Mathematics》2001,121(1):285-311
We extend Ruelle’s Perron-Frobenius theorem to the case of Hölder continuous functions on a topologically mixing topological Markov shift with a countable number of states. LetP(?) denote the Gurevic pressure of ? and letL ? be the corresponding Ruelle operator. We present a necessary and sufficient condition for the existence of a conservative measure ν and a continuous functionh such thatL ? * ν=e P(?)ν,L ? h=e P(?) h and characterize the case when ∝hdν<∞. In the case whendm=hdν is infinite, we discuss the asymptotic behaviour ofL ? k , and show how to interpretdm as an equilibrium measure. We show how the above properties reflect in the behaviour of a suitable dynamical zeta function. These resutls extend the results of [18] where the case ∝hdν<∞ was studied. 相似文献
117.
118.
We classify the ergodic invariant Radon measures for horocycle flows on d–covers of compact Riemannian surfaces of negative curvature, thus proving a conjecture of M. Babillot and F. Ledrappier. An important tool is a result in the ergodic theory of equivalence relations concerning the reduction of the range of a cocycle by the addition of a coboundary. Dedicated to the memory of M. Babillot 相似文献
119.
Zvi?AradEmail author Ya’akov?Erez Mikhail?Muzychuk 《Israel Journal of Mathematics》2004,142(1):285-314
The paper studies standard integral table algebras containing an element of width two. It is shown that the table subalgebra
generated by such an element is exactly isomorphic to one of the table algebras described in Main Theorems 1.1. and 1.2.
The contribution of this author is a part of his Ph.D. thesis at Bar-Ilan University under the supervision of Z. Arad and
M. Muzychuk.
This author was partially supported by the Israeli Ministry of Absorption. 相似文献
120.
A new class of vectorial vortex based on coherent addition of two orthogonal circularly polarized Bessel beams of identical order but with different propagation constants is presented. The transversely space-variant axially symmetric polarization distributions of these vectorial fields rotate as they propagate, while they maintain a propagation-invariant Bessel intensity distribution. These properties were demonstrated by use of discrete space-variant subwavelength gratings for 10.6 microm CO2 laser radiation. The polarization properties were verified by both full space-variant polarization analysis and measurements. Rotating intensity patterns are also demonstrated by transmitting the vectorial vortices through a linear polarizer. 相似文献