全文获取类型
收费全文 | 15226篇 |
免费 | 276篇 |
国内免费 | 80篇 |
专业分类
化学 | 8629篇 |
晶体学 | 105篇 |
力学 | 537篇 |
数学 | 2098篇 |
物理学 | 4213篇 |
出版年
2022年 | 100篇 |
2021年 | 119篇 |
2020年 | 175篇 |
2019年 | 116篇 |
2018年 | 126篇 |
2017年 | 100篇 |
2016年 | 209篇 |
2015年 | 231篇 |
2014年 | 265篇 |
2013年 | 552篇 |
2012年 | 602篇 |
2011年 | 755篇 |
2010年 | 435篇 |
2009年 | 380篇 |
2008年 | 646篇 |
2007年 | 704篇 |
2006年 | 703篇 |
2005年 | 727篇 |
2004年 | 602篇 |
2003年 | 470篇 |
2002年 | 432篇 |
2001年 | 428篇 |
2000年 | 393篇 |
1999年 | 242篇 |
1998年 | 202篇 |
1997年 | 196篇 |
1996年 | 261篇 |
1995年 | 243篇 |
1994年 | 219篇 |
1993年 | 266篇 |
1992年 | 243篇 |
1991年 | 231篇 |
1990年 | 178篇 |
1989年 | 185篇 |
1988年 | 216篇 |
1987年 | 199篇 |
1986年 | 154篇 |
1985年 | 210篇 |
1984年 | 196篇 |
1983年 | 148篇 |
1982年 | 189篇 |
1981年 | 160篇 |
1980年 | 158篇 |
1979年 | 159篇 |
1978年 | 165篇 |
1977年 | 124篇 |
1976年 | 140篇 |
1975年 | 105篇 |
1974年 | 123篇 |
1973年 | 101篇 |
排序方式: 共有10000条查询结果,搜索用时 0 毫秒
41.
42.
This paper concerns methods by which a trusted authority can distribute keys and/or broadcast a message over a network, so that each member of a privileged subset of users can compute a specified key or decrypt the broadcast message. Moreover, this is done in such a way that no coalition is able to recover any information on a key or broadcast message they are not supposed to know. The problems are studied using the tools of information theory, so the security provided is unconditional (i.e., not based on any computational assumption).In a recent paper st95a, Stinson described a method of constructing key predistribution schemes by combining Mitchell-Piper key distribution patterns with resilient functions; and also presented a construction method for broadcast encryption schemes that combines Fiat-Naor key predistribution schemes with ideal secret sharing schemes. In this paper, we further pursue these two themes, providing several nice applications of these techniques by using combinatorial structures such as orthogonal arrays, perpendicular arrays, Steiner systems and universal hash families. 相似文献
43.
Long-Mei Zeng Xiong Fu Jing-Yu Su Florecita De Guzman J. Francis Schmitz M. Bilayet Hossain Dick van Der Helm 《中国化学》1991,9(2):136-143
Three pyrrololactam alkaloids have been isolated from the marine sponge Phacellia fusca Schmidt collected from the South China Sea, and their structures were determined as 1–3 , on the grounds of spectral data. This is the first report of these compounds from this sponge. The structure of 1 was confirmed by X-ray analysis. 相似文献
44.
Susanne K. Wiedmer Toni Andersson Marika Sündermann Marja‐Liisa Riekkola Heikki Tenhu 《Journal of Polymer Science.Polymer Physics》2007,45(19):2655-2663
Cationic polyelectrolytes were synthesized and used as semipermanent coating materials for capillaries in electrophoresis. The polyelectrolytes used were a homopolymer of poly(methacryl oxyethyl trimethylammonium chloride) (PMOTAC) and its poly(ethylene glycol) (PEG)‐grafted analogue. Two PMOTAC polyelectrolytes, with molar masses of 85,000 and 300,000 g/mol, and PEG‐grafted PMOTAC with a molar mass of 280,000 g/mol were synthesized and then characterized by size exclusion chromatography (SEC) and nuclear magnetic resonance (NMR) spectroscopy. Attachment of the polyelectrolytes to the wall of the fused silica capillary for electrophoresis caused the electroosmotic flow (EOF) to reverse. The polyelectrolyte coatings were tested over the pH range 2–11 at different buffer ionic strengths, and the most stable and strongest anodic EOFs were obtained at acidic pH values with low ionic strength buffers. Between runs the capillary is merely rinsed for 2 or 3 min with the background electrolyte solution. With the PMOTAC coatings at pH values ≤5, the RSDs of the EOFs were less than 2.9% after 60 injections. The effects of the molar mass of the polycation and of PEGylation of PMOTAC on the interactions between the polycations and basic proteins were studied at acidic pH values. The differences in the effective electrophoretic mobilities, resolution values, and plate numbers of the proteins with the different coatings were due to the EOF, as demonstrated through calculations of reduced mobilities, relative resolution values, and relative plate numbers. © 2007 Wiley Periodicals, Inc. J Polym Sci Part B: Polym Phys 45: 2655–2663, 2007 相似文献
45.
46.
47.
M. Mahjour-Shafiei H.R. Amir-Ahmadi J.C.S. Bacelar R. Castelijns K. Ermisch E.D. van Garderen I. Gašparić M.N. Harakeh N. Kalantar-Nayestanaki M. Kiš H. Löhner O. Scholten 《Physics letters. [Part B]》2006
A series of nucleon–nucleon bremsstrahlung (NNγ) experiments at 190 MeV incident beam energy have been performed at KVI in order to gain more insight into the dynamics governing the bremsstrahlung reaction. After initial measurements wherein the bremsstrahlung process was studied far away from the elastic limit, a new study was used to probe the process nearer to the elastic limit by measuring at lower photon energies. Measured cross sections and analyzing powers are compared with the predictions of a microscopic model and those of two soft-photon models. The theoretical calculations overestimate the data by up to ≈30%, for some kinematics. 相似文献
48.
Demin D. L. Dzhelepov V. P. Filchenkov V. V. Grafov N. N. Grebinnik V. G. Migachev D. V. Konin A. D. Rudenko A. I. Sidorov V. T. Zhestkov Yu. G. Zinov V. G. Davies J. D. Bom V. R. van Eijk C. W. E. 《Hyperfine Interactions》1996,101(1):13-19
The ddµ molecule formation rate is experimentally measured for the two hyperfine states of the dµ-atom in the temperature range of 5–30 K. Results are consistent with a preliminary measurement by the TRIUMF group and contradict theoretical predictions. The work has been performed on the JINR phasotron (Dubna). 相似文献
49.
Hans Peters Hans van der Stel Ton Storcken 《Mathematical Methods of Operations Research》1993,38(2):213-229
A voting scheme assigns to each profile of alternatives reported byn individuals a compromise alternative. A voting scheme is strategy-proof if no individual is better off by lying, i.e., not reporting a best alternative. In this paper the main results concern the case where the set of alternatives is the Euclidean plane and the preferences are Euclidean. It is shown that for strategy-proof voting schemes continuity is equivalent to convexity of the range of the voting scheme. Using a result by Kim and Roush (1984), this leads to characterizations of surjective or unanimous, anonymous, strategy-proof voting schemes.Furthermore, the paper contains an extensive discussion of related results in the area. 相似文献
50.