首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1202篇
  免费   67篇
  国内免费   2篇
化学   694篇
晶体学   5篇
力学   26篇
数学   334篇
物理学   212篇
  2023年   10篇
  2022年   13篇
  2021年   17篇
  2020年   18篇
  2019年   31篇
  2018年   33篇
  2017年   28篇
  2016年   90篇
  2015年   44篇
  2014年   51篇
  2013年   85篇
  2012年   101篇
  2011年   110篇
  2010年   51篇
  2009年   49篇
  2008年   77篇
  2007年   59篇
  2006年   60篇
  2005年   55篇
  2004年   38篇
  2003年   29篇
  2002年   18篇
  2001年   11篇
  2000年   13篇
  1999年   3篇
  1998年   8篇
  1997年   6篇
  1996年   11篇
  1995年   8篇
  1994年   7篇
  1993年   10篇
  1992年   3篇
  1991年   12篇
  1990年   14篇
  1989年   12篇
  1988年   5篇
  1987年   12篇
  1986年   6篇
  1985年   2篇
  1984年   10篇
  1983年   5篇
  1982年   3篇
  1981年   7篇
  1980年   8篇
  1979年   2篇
  1978年   6篇
  1973年   2篇
  1972年   3篇
  1971年   3篇
  1963年   4篇
排序方式: 共有1271条查询结果,搜索用时 984 毫秒
61.
[reaction: see text] Hydroxymethyl-substituted tetrahydrofurans were prepared with high diastereoselectivity by reaction of the carbanion derived from 3,4-epoxybutyl phenyl sulfone with aldehydes in the presence of a mixture of lithium and potassium tert-butoxides. Initial formation of aldol-type adducts is a nondiastereoselective but reversible process; thus, subsequent formation of one main diastereoisomer is controlled by the relative rates of cyclization. The configuration of the carbon stereocenter at the oxirane ring is inverted in the course of the S(N)2 process, and two new centers are created diastereoselectively.  相似文献   
62.
We study the loss of entanglement of a bipartite state subjected to discarding or measurement of one qubit. Examining behavior of different entanglement measures, we find that entanglement of formation, entanglement cost, logarithmic negativity, and one-way distillable entanglement are lockable measures in that they can decrease arbitrarily after measuring one qubit. We prove that any convex and asymptotically noncontinuous measure is lockable. As a consequence, all the convex-roof measures can be locked. The relative entropy of entanglement is shown to be a nonlockable measure.  相似文献   
63.
We characterize the set of shared quantum states which contain a cryptographically private key. This allows us to recast the theory of privacy as a paradigm closely related to that used in entanglement manipulation. It is shown that one can distill an arbitrarily secure key from bound entangled states. There are also states that have less distillable private keys than the entanglement cost of the state. In general, the amount of distillable key is bounded from above by the relative entropy of entanglement. Relationships between distillability and distinguishability are found for a class of states which have Bell states correlated to separable hiding states. We also describe a technique for finding states exhibiting irreversibility in entanglement distillation.  相似文献   
64.
We consider the problem
?2Δu?V(x)u+up=0,u>0,uH1(R2),
where p>1, ?>0 is a small parameter and V is a uniformly positive, smooth potential. Let Γ be a closed curve, nondegenerate geodesic relative to the weighted arclength ΓVσ, where σ=p+1p?1?12. We prove the existence of a solution uε concentrating along the whole of Γ, exponentially small in ? at any positive distance from it, provided that ? is small and away from certain critical numbers. This proves a conjecture raised in [A. Ambrosetti, A. Malchiodi, W.-M. Ni, Singularly perturbed elliptic equations with symmetry: existence of solutions concentrating on spheres, Part I, Commun. Math. Phys. 235 (2003) 427–466] in the two-dimensional case. To cite this article: M. del Pino et al., C. R. Acad. Sci. Paris, Ser. I 341 (2005).  相似文献   
65.
There are aspects of privacy theory that are analogous to quantum theory. In particular one can define distillable key and key cost in parallel to distillable entanglement and entanglement cost. We present here classical privacy theory as a particular case of information theory with adversaries, where similar general laws hold as in entanglement theory. We place the result of Renner and Wolf—that intrinsic information is lower bound for key cost—into this general formalism. Then we show that the question of whether intrinsic information is equal to key cost is equivalent to the question of whether Alice and Bob can create a distribution product with Eve using IM bits of secret key. We also propose a natural analogue of relative entropy of entanglement in privacy theory and show that it is equal to the intrinsic information. We also provide a formula analogous to the entanglement of formation for classical distributions. It is our pleasure to dedicate this paper to Asher Peres on the occasion of his seventieth birthday.  相似文献   
66.
67.
The smallness of quark masses suppresses the CP violation from the Kobayashi-Maskawa phase to a level that is many orders of magnitude below what is required to explain the observed baryon asymmetry. We point out that if, as a result of time variation in the Yukawa couplings, quark masses were large at the time of the electroweak phase transition, then the Kobayashi-Maskawa mechanism could be the source of the asymmetry. The Froggatt-Nielsen mechanism provides a plausible framework where the Yukawa couplings could all be of order 1 at that time, and settle to their present values before nucleo-synthesis. The problems related to a strong first order electroweak phase transition may also be alleviated in this framework. Our scenario reveals a loophole in the commonly held view that the Kobayashi-Maskawa mechanism cannot be the dominant source of CP violation to play a role in baryogenesis.  相似文献   
68.
We show that the internal control of adaptation can be obtained from the properties of the phase lag that results from phase synchronization of two nonidentical chaotic oscillators. The direction and magnitude of the phase lag depend upon the relative internal properties of the coupled units, and they can be used as indicators during the adjustment of dynamics, i.e., adaptation of the target unit to match that of the control. The properties of the phase lag are obtained using a method based on the estimation of properties of the distributions of relative event times of both (target and control) units. The phase lag dependent mechanism to control the adaptation process was applied to a system of nonidentical R?ssler oscillators and a system of nonidentical Lorenz oscillators. We also elucidate its importance as a control mechanism of the changes of neuronal activity showing its application to neural adaptation.  相似文献   
69.
Peleg A 《Optics letters》2004,29(17):1980-1982
The effect of delayed Raman response on soliton collisions in wavelength division multiplexing (WDM) transmission systems is investigated. Taking into account the stochastic nature of pulse sequences in different frequency channels and the Raman-induced cross talk, it is shown that the soliton amplitude is a random variable with a log-normal distribution. Moreover, the Raman-induced self-frequency shift and cross-frequency shift are also random variables with log-normal-like distributions. These results imply that fluctuations in soliton amplitude and frequency induced by soliton collisions in the presence of delayed Raman response play an important role in massive WDM transmission.  相似文献   
70.
The interplay between two basic quantities--quantum communication and information--is investigated. Quantum communication is an important resource for quantum states shared by two parties and is directly related to entanglement. Recently, the amount of local information that can be drawn from a state has been shown to be closely related to the nonlocal properties of the state. Here we consider both formation and extraction processes, and analyze informational resources as a function of quantum communication. The resulting diagrams in information space allow us to observe phaselike transitions when correlations become classical.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号