首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   2403篇
  免费   93篇
  国内免费   22篇
化学   1481篇
晶体学   15篇
力学   81篇
数学   435篇
物理学   364篇
无线电   142篇
  2023年   22篇
  2022年   51篇
  2021年   54篇
  2020年   59篇
  2019年   62篇
  2018年   60篇
  2017年   43篇
  2016年   91篇
  2015年   86篇
  2014年   106篇
  2013年   160篇
  2012年   189篇
  2011年   249篇
  2010年   128篇
  2009年   111篇
  2008年   169篇
  2007年   132篇
  2006年   140篇
  2005年   113篇
  2004年   96篇
  2003年   84篇
  2002年   65篇
  2001年   28篇
  2000年   24篇
  1999年   11篇
  1998年   13篇
  1997年   14篇
  1996年   16篇
  1995年   8篇
  1994年   9篇
  1993年   9篇
  1992年   8篇
  1990年   5篇
  1987年   3篇
  1986年   3篇
  1985年   9篇
  1984年   5篇
  1983年   3篇
  1982年   5篇
  1981年   5篇
  1980年   4篇
  1978年   8篇
  1977年   4篇
  1976年   5篇
  1975年   3篇
  1973年   4篇
  1971年   3篇
  1961年   3篇
  1942年   6篇
  1940年   3篇
排序方式: 共有2518条查询结果,搜索用时 15 毫秒
211.
We prove a local existence and uniqueness theorem for abstract parabolic problems of the type when the nonlinearity satisfies certain critical conditions. We apply this abstract result to the Navier-Stokes and heat equations.

  相似文献   

212.
Talak  Rajat  Manjunath  D.  Proutiere  Alexandre 《Queueing Systems》2019,92(1-2):103-130
Queueing Systems - We consider strategic arrivals to a FCFS service system that starts service at a fixed time and has to serve a fixed number of customers, for example, an airplane boarding...  相似文献   
213.
A matching covered graph is a non-trivial connected graph in which every edge is in some perfect matching. A non-bipartite matching covered graph G is near-bipartite if there are two edges e1 and e2 such that Ge1e2 is bipartite and matching covered. In 2000, Fischer and Little characterized Pfaffian near-bipartite graphs in terms of forbidden subgraphs [I. Fischer, C.H.C. Little, A characterization of Pfaffian near bipartite graphs, J. Combin. Theory Ser. B 82 (2001) 175-222.]. However, their characterization does not imply a polynomial time algorithm to recognize near-bipartite Pfaffian graphs. In this article, we give such an algorithm.We define a more general class of matching covered graphs, which we call weakly near-bipartite graphs. This class includes the near-bipartite graphs. We give a polynomial algorithm for recognizing weakly near-bipartite Pfaffian graphs. We also show that Fischer and Little’s characterization of near-bipartite Pfaffian graphs extends to this wider class.  相似文献   
214.
We provide bounds on the upper box-counting dimension of negatively invariant subsets of Banach spaces, a problem that is easily reduced to covering the image of the unit ball under a linear map by a collection of balls of smaller radius. As an application of the abstract theory we show that the global attractors of a very broad class of parabolic partial differential equations (semilinear equations in Banach spaces) are finite-dimensional.  相似文献   
215.
Functional nonparametric estimation of conditional extreme quantiles   总被引:1,自引:0,他引:1  
We address the estimation of quantiles from heavy-tailed distributions when functional covariate information is available and in the case where the order of the quantile converges to one as the sample size increases. Such “extreme” quantiles can be located in the range of the data or near and even beyond the boundary of the sample, depending on the convergence rate of their order to one. Nonparametric estimators of these functional extreme quantiles are introduced, their asymptotic distributions are established and their finite sample behavior is investigated.  相似文献   
216.
We construct a simple transformation whose centralizer is isomorphic to (?)2 ? A ?, where A is an aperiodic automorphism of ?2. As a corollary we obtain an example of a ?2-action \({({T_g})_{g \in {Z^2}}}\) with minimal self-joinings which is conjugate to the (twisted by A) action \({({T_{Ag}})_{g \in {Z^2}}}\). This answers a question of E. Glasner.  相似文献   
217.
218.
Metaheuristics represent an important class of techniques to solve, approximately, hard combinatorial optimization problems for which the use of exact methods is impractical. Some researches have been combining machine learning techniques with metaheuristics to adaptively guide and improve the search for near optimal solutions. An example of such development is the DM-GRASP, a hybrid version of the Greedy Randomized Adaptative Search Procedures (GRASP) metaheuristic which incorporates a data mining process. In this hybrid proposal, after executing half of the total number of iterations, the data mining process extracts patterns from an elite set of sub-optimal solutions for the optimization problem. These patterns present characteristics of near optimal solutions and can be used to guide the following half GRASP iterations in the search through the solution space. In this work, we explore new versions of the DM-GRASP metaheuristic to experiment, not a single activation, but multiple and adaptive executions of the data mining process during the metaheuristic execution. We also applied the data mining technique into a reactive GRASP to show that a more sophisticated and not memoryless GRASP approach can also benefit from the use of this technique. In order to evaluate these new proposals, we adopted the server replication for reliable multicast problem since the best known results for this problem were obtained by GRASP and DM-GRASP implementations. The computational experiments, comparing traditional GRASP, DM-GRASP, and the new proposals, showed that multiple and adaptive executions of the data mining process can improve the results obtained by the DM-GRASP hybrid metaheuristic—the new proposals were able to find better results in less computational time for the reliable multicast problem.  相似文献   
219.
Strong interaction of a system of quantum emitters (e.g., two-level atoms) with electromagnetic field induces specific correlations in the system accompanied by a drastic increase of emitted radiation (superradiation or superfluorescence). Despite the fact that since its prediction this phenomenon was subject to a vigorous experimental and theoretical research, there remain open question, in particular, concerning the possibility of a first order phase transition to the superradiant state from the vacuum state. In systems of natural and charge-based artificial atom this transition is prohibited by “no-go” theorems. Here we demonstrate numerically and confirm analytically a similar transition in a one-dimensional quantum metamaterial – a chain of artificial atoms (qubits) strongly interacting with classical electromagnetic fields in a transmission line. The system switches from vacuum state to the quasi-superradiant (QS) phase with one or several magnetic solitons and finite average occupation of qubit excited states along the transmission line. A quantum metamaterial in the QS phase circumvents the “no-go” restrictions by considerably decreasing its total energy relative to the vacuum state by exciting nonlinear electromagnetic solitons.  相似文献   
220.
The main contribution of this paper shows that distributed simulation of timed Petri nets (TPN) can take advantage of their structure to obtain a significant lookahead which is usually difficult to compute with other models. In this paper, we introduce a conservative-distributed simulation with a reduced number of control messages and without deadlock resolution. This approach is based on a part of optimism computed on the prediction time each logical process can determine for its advancement. Obviously this prediction time must be computed easily according to the structure of the simulated logical process. Timed Petri nets meet these requirements and we use their structure to evaluate the depth of the prediction. In conservative-distributed simulation, it is known that the deeper the prediction, the better the efficiency of the simulation. We present a method we have devised based on channel time prediction. We compare its performance to the Chandy–Misra method and to some related Petri nets approaches (Chiola). Experiments carried out on Sun stations show that there is more parallelism and a reduced number of null messages in the cases of deadlock avoidance. Moreover, considering deadlock detection and resolution technique we observe that in many cases no deadlock occurs with less control messages.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号