首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   15574篇
  免费   325篇
  国内免费   84篇
化学   8890篇
晶体学   109篇
力学   540篇
数学   2149篇
物理学   4295篇
  2022年   90篇
  2021年   122篇
  2020年   178篇
  2019年   118篇
  2018年   129篇
  2017年   100篇
  2016年   224篇
  2015年   229篇
  2014年   279篇
  2013年   563篇
  2012年   622篇
  2011年   786篇
  2010年   444篇
  2009年   390篇
  2008年   658篇
  2007年   728篇
  2006年   726篇
  2005年   750篇
  2004年   618篇
  2003年   487篇
  2002年   451篇
  2001年   435篇
  2000年   400篇
  1999年   248篇
  1998年   211篇
  1997年   206篇
  1996年   267篇
  1995年   248篇
  1994年   224篇
  1993年   269篇
  1992年   244篇
  1991年   234篇
  1990年   187篇
  1989年   187篇
  1988年   222篇
  1987年   204篇
  1986年   155篇
  1985年   215篇
  1984年   200篇
  1983年   151篇
  1982年   191篇
  1981年   163篇
  1980年   161篇
  1979年   160篇
  1978年   166篇
  1977年   125篇
  1976年   144篇
  1975年   105篇
  1974年   124篇
  1973年   102篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
101.
Some New Results on Key Distribution Patterns and Broadcast Encryption   总被引:1,自引:0,他引:1  
This paper concerns methods by which a trusted authority can distribute keys and/or broadcast a message over a network, so that each member of a privileged subset of users can compute a specified key or decrypt the broadcast message. Moreover, this is done in such a way that no coalition is able to recover any information on a key or broadcast message they are not supposed to know. The problems are studied using the tools of information theory, so the security provided is unconditional (i.e., not based on any computational assumption).In a recent paper st95a, Stinson described a method of constructing key predistribution schemes by combining Mitchell-Piper key distribution patterns with resilient functions; and also presented a construction method for broadcast encryption schemes that combines Fiat-Naor key predistribution schemes with ideal secret sharing schemes. In this paper, we further pursue these two themes, providing several nice applications of these techniques by using combinatorial structures such as orthogonal arrays, perpendicular arrays, Steiner systems and universal hash families.  相似文献   
102.
We study a processor-sharing model in which users choose between a high- and a low-priority service, based on their utility functions and prices charged by the service provider. The latter aims at revenue maximization. The model is motivated by file transmissions in data networks with distributed congestion control.  相似文献   
103.
104.
Monodisperse magnetizable colloidal silica particles in a stable dispersion have been functionalized with a homogeneous catalyst: a PCP–pincer Pd-complex. In a proof-of-principle experiment we demonstrate the catalytic activity of the colloids in a C–C bond formation reaction. Advantages of the magnetic silica carriers are the large surface-to-volume ratio and the easy recovery by magnetic separation. After magnetic separation, the catalyst-loaded particles are readily redispersed for further use.  相似文献   
105.
Three pyrrololactam alkaloids have been isolated from the marine sponge Phacellia fusca Schmidt collected from the South China Sea, and their structures were determined as 1–3 , on the grounds of spectral data. This is the first report of these compounds from this sponge. The structure of 1 was confirmed by X-ray analysis.  相似文献   
106.
In the first part we prove an extension of the Chern-Lashof inequality for noncompact immersed manifolds with finitely many ends. For this we give a lower bound of the total absolute curvature in terms of topological invariants of the manifold. In the second part we discuss tightness properties for such immersions. Finally, we give an upper bound for the substantial codimension.

  相似文献   

107.
108.
109.
110.
A series of nucleon–nucleon bremsstrahlung (NNγ) experiments at 190 MeV incident beam energy have been performed at KVI in order to gain more insight into the dynamics governing the bremsstrahlung reaction. After initial measurements wherein the bremsstrahlung process was studied far away from the elastic limit, a new study was used to probe the process nearer to the elastic limit by measuring at lower photon energies. Measured cross sections and analyzing powers are compared with the predictions of a microscopic model and those of two soft-photon models. The theoretical calculations overestimate the data by up to ≈30%, for some kinematics.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号