首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   270篇
  免费   5篇
  国内免费   11篇
化学   55篇
力学   3篇
数学   133篇
物理学   95篇
  2023年   1篇
  2022年   2篇
  2021年   1篇
  2020年   1篇
  2019年   5篇
  2018年   5篇
  2017年   4篇
  2016年   10篇
  2015年   7篇
  2014年   8篇
  2013年   10篇
  2012年   20篇
  2011年   17篇
  2010年   17篇
  2009年   8篇
  2008年   21篇
  2007年   13篇
  2006年   10篇
  2005年   18篇
  2004年   9篇
  2003年   10篇
  2002年   5篇
  2001年   5篇
  2000年   4篇
  1999年   4篇
  1998年   8篇
  1997年   5篇
  1996年   15篇
  1995年   1篇
  1994年   5篇
  1993年   1篇
  1992年   1篇
  1991年   3篇
  1990年   1篇
  1989年   1篇
  1988年   7篇
  1987年   2篇
  1986年   2篇
  1985年   1篇
  1984年   3篇
  1983年   4篇
  1982年   1篇
  1981年   3篇
  1980年   1篇
  1979年   2篇
  1976年   1篇
  1975年   1篇
  1970年   2篇
排序方式: 共有286条查询结果,搜索用时 15 毫秒
41.
42.
For every 1 > δ > 0 there exists a c = c(δ) > 0 such that for every group G of order n, and for a set S of c(δ) log n random elements in the group, the expected value of the second largest eigenvalue of the normalized adjacency matrix of the Cayley graph X(G, S) is at most (1 - δ). This implies that almost every such a graph is an ?(δ)-expander. For Abelian groups this is essentially tight, and explicit constructions can be given in some cases. © 1994 John Wiley & Sons, Inc.  相似文献   
43.
Characterizing sets of permutations whose associated quasisymmetric function is symmetric and Schur-positive is a long-standing problem in algebraic combinatorics. In this paper, we present a general method to construct Schur-positive sets and multisets, based on geometric grid classes and the product operation. Our approach produces many new instances of Schur-positive sets and provides a broad framework that explains the existence of known such sets that until now were sporadic cases.  相似文献   
44.
The expressions for the fractional number ofK 0's and¯K 0's in a neutral kaon beam are discussed with reference to time-reversal asymmetry. The suggested relation between the sign of Re ( is the Lee-WuT-violation parameter) and the cosmological arrow of time ifCPT is broken is further clarified.Research sponsored by the Air Force Office of Scientific Research, Office of Aerospace Research, U.S. Air Force, under AFOSR grant number EOOAR-68-0010, through the European Office of Aerospace Research.  相似文献   
45.
46.
It is shown that the edges of any n-point vertex expander can be replaced by new edges so that the resulting graph is an edge expander, and such that any two vertices that are joined by a new edge are at distance in the original graph. This result is optimal, and is shown to have various geometric consequences. In particular, it is used to obtain an alternative perspective on the recent algorithm of Arora et al. [Proceedings of the 36th Annual ACM Symposium on the Theory of Computing, 2004, pp. 222-231.] for approximating the edge expansion of a graph, and to give a nearly optimal lower bound on the ratio between the observable diameter and the diameter of doubling metric measure spaces which are quasisymmetrically embeddable in Hilbert space.  相似文献   
47.
Transport through quantum dots in the Kondo regime obeys an effective low-temperature theory in terms of weakly interacting quasiparticles. Despite the weakness of the interaction, we find that the backscattering current and hence the shot noise are dominated by two-quasiparticle scattering. We show that the simultaneous presence of one- and two-quasiparticle scattering results in a universal average charge 5/3e as measured by shot-noise experiments. An experimental verification of our prediction would constitute a most stringent test of the low-energy theory of the Kondo effect.  相似文献   
48.
Randomized algorithms provide solutions to two ubiquitous problems: (1) the distributed calculation of a principal component analysis or singular value decomposition of a highly rectangular matrix, and (2) the distributed calculation of a low-rank approximation (in the form of a singular value decomposition) to an arbitrary matrix. Carefully honed algorithms yield results that are uniformly superior to those of the stock, deterministic implementations in Spark (the popular platform for distributed computation); in particular, whereas the stock software will without warning return left singular vectors that are far from numerically orthonormal, a significantly burnished randomized implementation generates left singular vectors that are numerically orthonormal to nearly the machine precision.  相似文献   
49.
We consider the following dynamic Boolean model introduced by van den Berg et al. (Stoch. Process. Appl. 69:247–257, 1997). At time 0, let the nodes of the graph be a Poisson point process in ${\mathbb{R}^d}$ with constant intensity and let each node move independently according to Brownian motion. At any time t, we put an edge between every pair of nodes whose distance is at most r. We study three fundamental problems in this model: detection (the time until a target point—fixed or moving—is within distance r of some node of the graph); coverage (the time until all points inside a finite box are detected by the graph); and percolation (the time until a given node belongs to the infinite connected component of the graph). We obtain precise asymptotics for these quantities by combining ideas from stochastic geometry, coupling and multi-scale analysis.  相似文献   
50.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号