首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   17642篇
  免费   360篇
  国内免费   74篇
化学   10146篇
晶体学   122篇
力学   607篇
数学   2393篇
物理学   4808篇
  2022年   84篇
  2021年   130篇
  2020年   191篇
  2019年   146篇
  2018年   138篇
  2017年   118篇
  2016年   262篇
  2015年   285篇
  2014年   314篇
  2013年   629篇
  2012年   705篇
  2011年   886篇
  2010年   518篇
  2009年   444篇
  2008年   759篇
  2007年   807篇
  2006年   784篇
  2005年   808篇
  2004年   666篇
  2003年   546篇
  2002年   509篇
  2001年   486篇
  2000年   449篇
  1999年   276篇
  1998年   233篇
  1997年   230篇
  1996年   303篇
  1995年   282篇
  1994年   264篇
  1993年   300篇
  1992年   297篇
  1991年   267篇
  1990年   215篇
  1989年   209篇
  1988年   235篇
  1987年   213篇
  1986年   179篇
  1985年   240篇
  1984年   213篇
  1983年   173篇
  1982年   207篇
  1981年   184篇
  1980年   185篇
  1979年   185篇
  1978年   183篇
  1977年   157篇
  1976年   167篇
  1975年   130篇
  1974年   146篇
  1973年   130篇
排序方式: 共有10000条查询结果,搜索用时 484 毫秒
111.
112.
A modified expansion-shock tube for nucleation and condensation studies in a supersaturated vapour is described. An analysis is made of the gas-dynamical properties of the new tube configuration and numerical simulations with the Random Choice Method are compared with experiments. It is shown that with the modified configuration one single nucleation pulse can be realized.  相似文献   
113.
114.
In this paper we present a framework for solving stochastic programs with complete integer recourse and discretely distributed right-hand side vector, using Gröbner basis methods from computational algebra to solve the numerous second-stage integer programs. Using structural properties of the expected integer recourse function, we prove that under mild conditions an optimal solution is contained in a finite set. Furthermore, we present a basic scheme to enumerate this set and suggest improvements to reduce the number of function evaluations needed.  相似文献   
115.
Some New Results on Key Distribution Patterns and Broadcast Encryption   总被引:1,自引:0,他引:1  
This paper concerns methods by which a trusted authority can distribute keys and/or broadcast a message over a network, so that each member of a privileged subset of users can compute a specified key or decrypt the broadcast message. Moreover, this is done in such a way that no coalition is able to recover any information on a key or broadcast message they are not supposed to know. The problems are studied using the tools of information theory, so the security provided is unconditional (i.e., not based on any computational assumption).In a recent paper st95a, Stinson described a method of constructing key predistribution schemes by combining Mitchell-Piper key distribution patterns with resilient functions; and also presented a construction method for broadcast encryption schemes that combines Fiat-Naor key predistribution schemes with ideal secret sharing schemes. In this paper, we further pursue these two themes, providing several nice applications of these techniques by using combinatorial structures such as orthogonal arrays, perpendicular arrays, Steiner systems and universal hash families.  相似文献   
116.
We have performed for the first time precision spectroscopy on a coasting fast7Li+ ion beam in a storage ring. The ion beam moving with 6.4% speed of light was first electron cooled and then merged with two counterpropagating laser beams acting on two different hyperfine transitions sharing a common upper level (λ-system). One laser was frequency locked to thea 3 127J2 hfs frequency component established as a secondary frequency standard at 514 nm. The second laser was tuned over theλ-resonance, which was recorded relative to127J2 hfs components. This experiment is sensitive to the time dilation in fast moving frames and will lead to new limits for the verification of special relatively. The present status of the experiment and perspectives in accuracy are discussed.  相似文献   
117.
We study a processor-sharing model in which users choose between a high- and a low-priority service, based on their utility functions and prices charged by the service provider. The latter aims at revenue maximization. The model is motivated by file transmissions in data networks with distributed congestion control.  相似文献   
118.
119.
Monodisperse magnetizable colloidal silica particles in a stable dispersion have been functionalized with a homogeneous catalyst: a PCP–pincer Pd-complex. In a proof-of-principle experiment we demonstrate the catalytic activity of the colloids in a C–C bond formation reaction. Advantages of the magnetic silica carriers are the large surface-to-volume ratio and the easy recovery by magnetic separation. After magnetic separation, the catalyst-loaded particles are readily redispersed for further use.  相似文献   
120.
Three pyrrololactam alkaloids have been isolated from the marine sponge Phacellia fusca Schmidt collected from the South China Sea, and their structures were determined as 1–3 , on the grounds of spectral data. This is the first report of these compounds from this sponge. The structure of 1 was confirmed by X-ray analysis.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号