首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   15226篇
  免费   276篇
  国内免费   80篇
化学   8629篇
晶体学   105篇
力学   537篇
数学   2098篇
物理学   4213篇
  2022年   100篇
  2021年   119篇
  2020年   175篇
  2019年   116篇
  2018年   126篇
  2017年   100篇
  2016年   209篇
  2015年   231篇
  2014年   265篇
  2013年   552篇
  2012年   602篇
  2011年   755篇
  2010年   435篇
  2009年   380篇
  2008年   646篇
  2007年   704篇
  2006年   703篇
  2005年   727篇
  2004年   602篇
  2003年   470篇
  2002年   432篇
  2001年   428篇
  2000年   393篇
  1999年   242篇
  1998年   202篇
  1997年   196篇
  1996年   261篇
  1995年   243篇
  1994年   219篇
  1993年   266篇
  1992年   243篇
  1991年   231篇
  1990年   178篇
  1989年   185篇
  1988年   216篇
  1987年   199篇
  1986年   154篇
  1985年   210篇
  1984年   196篇
  1983年   148篇
  1982年   189篇
  1981年   160篇
  1980年   158篇
  1979年   159篇
  1978年   165篇
  1977年   124篇
  1976年   140篇
  1975年   105篇
  1974年   123篇
  1973年   101篇
排序方式: 共有10000条查询结果,搜索用时 0 毫秒
41.
42.
Some New Results on Key Distribution Patterns and Broadcast Encryption   总被引:1,自引:0,他引:1  
This paper concerns methods by which a trusted authority can distribute keys and/or broadcast a message over a network, so that each member of a privileged subset of users can compute a specified key or decrypt the broadcast message. Moreover, this is done in such a way that no coalition is able to recover any information on a key or broadcast message they are not supposed to know. The problems are studied using the tools of information theory, so the security provided is unconditional (i.e., not based on any computational assumption).In a recent paper st95a, Stinson described a method of constructing key predistribution schemes by combining Mitchell-Piper key distribution patterns with resilient functions; and also presented a construction method for broadcast encryption schemes that combines Fiat-Naor key predistribution schemes with ideal secret sharing schemes. In this paper, we further pursue these two themes, providing several nice applications of these techniques by using combinatorial structures such as orthogonal arrays, perpendicular arrays, Steiner systems and universal hash families.  相似文献   
43.
Three pyrrololactam alkaloids have been isolated from the marine sponge Phacellia fusca Schmidt collected from the South China Sea, and their structures were determined as 1–3 , on the grounds of spectral data. This is the first report of these compounds from this sponge. The structure of 1 was confirmed by X-ray analysis.  相似文献   
44.
Cationic polyelectrolytes were synthesized and used as semipermanent coating materials for capillaries in electrophoresis. The polyelectrolytes used were a homopolymer of poly(methacryl oxyethyl trimethylammonium chloride) (PMOTAC) and its poly(ethylene glycol) (PEG)‐grafted analogue. Two PMOTAC polyelectrolytes, with molar masses of 85,000 and 300,000 g/mol, and PEG‐grafted PMOTAC with a molar mass of 280,000 g/mol were synthesized and then characterized by size exclusion chromatography (SEC) and nuclear magnetic resonance (NMR) spectroscopy. Attachment of the polyelectrolytes to the wall of the fused silica capillary for electrophoresis caused the electroosmotic flow (EOF) to reverse. The polyelectrolyte coatings were tested over the pH range 2–11 at different buffer ionic strengths, and the most stable and strongest anodic EOFs were obtained at acidic pH values with low ionic strength buffers. Between runs the capillary is merely rinsed for 2 or 3 min with the background electrolyte solution. With the PMOTAC coatings at pH values ≤5, the RSDs of the EOFs were less than 2.9% after 60 injections. The effects of the molar mass of the polycation and of PEGylation of PMOTAC on the interactions between the polycations and basic proteins were studied at acidic pH values. The differences in the effective electrophoretic mobilities, resolution values, and plate numbers of the proteins with the different coatings were due to the EOF, as demonstrated through calculations of reduced mobilities, relative resolution values, and relative plate numbers. © 2007 Wiley Periodicals, Inc. J Polym Sci Part B: Polym Phys 45: 2655–2663, 2007  相似文献   
45.
46.
47.
A series of nucleon–nucleon bremsstrahlung (NNγ) experiments at 190 MeV incident beam energy have been performed at KVI in order to gain more insight into the dynamics governing the bremsstrahlung reaction. After initial measurements wherein the bremsstrahlung process was studied far away from the elastic limit, a new study was used to probe the process nearer to the elastic limit by measuring at lower photon energies. Measured cross sections and analyzing powers are compared with the predictions of a microscopic model and those of two soft-photon models. The theoretical calculations overestimate the data by up to ≈30%, for some kinematics.  相似文献   
48.
The ddµ molecule formation rate is experimentally measured for the two hyperfine states of the dµ-atom in the temperature range of 5–30 K. Results are consistent with a preliminary measurement by the TRIUMF group and contradict theoretical predictions. The work has been performed on the JINR phasotron (Dubna).  相似文献   
49.
A voting scheme assigns to each profile of alternatives reported byn individuals a compromise alternative. A voting scheme is strategy-proof if no individual is better off by lying, i.e., not reporting a best alternative. In this paper the main results concern the case where the set of alternatives is the Euclidean plane and the preferences are Euclidean. It is shown that for strategy-proof voting schemes continuity is equivalent to convexity of the range of the voting scheme. Using a result by Kim and Roush (1984), this leads to characterizations of surjective or unanimous, anonymous, strategy-proof voting schemes.Furthermore, the paper contains an extensive discussion of related results in the area.  相似文献   
50.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号