全文获取类型
收费全文 | 4173篇 |
免费 | 280篇 |
国内免费 | 106篇 |
专业分类
化学 | 2305篇 |
晶体学 | 54篇 |
力学 | 163篇 |
综合类 | 6篇 |
数学 | 715篇 |
物理学 | 674篇 |
无线电 | 642篇 |
出版年
2024年 | 5篇 |
2023年 | 80篇 |
2022年 | 93篇 |
2021年 | 138篇 |
2020年 | 163篇 |
2019年 | 137篇 |
2018年 | 149篇 |
2017年 | 102篇 |
2016年 | 191篇 |
2015年 | 137篇 |
2014年 | 172篇 |
2013年 | 325篇 |
2012年 | 268篇 |
2011年 | 306篇 |
2010年 | 203篇 |
2009年 | 193篇 |
2008年 | 258篇 |
2007年 | 229篇 |
2006年 | 210篇 |
2005年 | 202篇 |
2004年 | 161篇 |
2003年 | 146篇 |
2002年 | 137篇 |
2001年 | 81篇 |
2000年 | 44篇 |
1999年 | 47篇 |
1998年 | 37篇 |
1997年 | 34篇 |
1996年 | 28篇 |
1995年 | 30篇 |
1994年 | 25篇 |
1993年 | 18篇 |
1992年 | 12篇 |
1991年 | 10篇 |
1990年 | 11篇 |
1989年 | 8篇 |
1988年 | 13篇 |
1987年 | 12篇 |
1986年 | 15篇 |
1985年 | 14篇 |
1984年 | 15篇 |
1983年 | 18篇 |
1982年 | 13篇 |
1981年 | 13篇 |
1980年 | 6篇 |
1979年 | 7篇 |
1977年 | 5篇 |
1976年 | 5篇 |
1975年 | 5篇 |
1973年 | 4篇 |
排序方式: 共有4559条查询结果,搜索用时 15 毫秒
21.
We prove some basic properties of Donaldson’s flow of surfaces in a hyperkähler 4-manifold. When the initial submanifold is symplectic with respect to one Kähler form and Lagrangian with respect to another, we show that certain kinds of singularities cannot form, and we prove a convergence result under a condition related to one considered by M.-T. Wang for the mean curvature flow. 相似文献
22.
We continue the investigation of locally testable codes, i.e., error‐correcting codes for which membership of a given word in the code can be tested probabilistically by examining it in very few locations. We give two general results on local testability: First, motivated by the recently proposed notion of robust probabilistically checkable proofs, we introduce the notion of robust local testability of codes. We relate this notion to a product of codes introduced by Tanner and show a very simple composition lemma for this notion. Next, we show that codes built by tensor products can be tested robustly and somewhat locally by applying a variant of a test and proof technique introduced by Raz and Safra in the context of testing low‐degree multivariate polynomials (which are a special case of tensor codes). Combining these two results gives us a generic construction of codes of inverse polynomial rate that are testable with poly‐logarithmically many queries. We note that these locally testable tensor codes can be obtained from any linear error correcting code with good distance. Previous results on local testability, albeit much stronger quantitatively, rely heavily on algebraic properties of the underlying codes. © 2006 Wiley Periodicals, Inc. Random Struct. Alg., 2006 相似文献
23.
Ben J. Morris 《Random Structures and Algorithms》2002,21(2):135-146
We study the problem of sampling contingency tables (nonnegative integer matrices with specified row and column sums) uniformly at random. We give an algorithm which runs in polynomial time provided that the row sums ri and the column sums cj satisfy ri = Ω(n3/2m log m), and cj = Ω(m3/2n log n). This algorithm is based on a reduction to continuous sampling from a convex set. The same approach was taken by Dyer, Kannan, and Mount in previous work. However, the algorithm we present is simpler and has weaker requirements on the row and column sums. © 2002 Wiley Periodicals, Inc. Random Struct. Alg., 21: 135–146, 2002 相似文献
24.
A new concept of orthogonality in real normed linear spaces is introduced. Typical properties of orthogonality (homogeneity, symmetry, additivity, ...) and relations between this orthogonality and other known orthogonalities (Birkhoff, Boussouis, Unitary-Boussouis and Diminnie) are studied. In particular, some characterizations of inner product spaces are obtained. 相似文献
25.
M.I.Gil' 《Annals of Differential Equations》2004,20(2):145-154
The nonlocal initial problem for nonlinear nonautonomous evolution equati-ons in a Banach space is considered. It is assumed that the nonlinearities havethe local Lipschitz properties. The existence and uniqueness of mild solutionsare proved. Applications to integro-differential equations are discussed.The main tool in the paper is the normalizing mapping (the generalizednorm). 相似文献
26.
Ben Morris 《Probability Theory and Related Fields》2003,125(2):259-265
We show that a.s. all of the connected components of the Wired Spanning Forest are recurrent, proving a conjecture of Benjamini,
Lyons, Peres and Schramm. Our analysis relies on a simple martingale involving the effective conductance between the endpoints
of an edge in a uniform spanning tree. We believe that this martingale is of independent interest and will find further applications
in the study of uniform spanning trees and forests.
Received: 20 April 2001 / Revised version: 23 July 2002 / Published online: 14 November 相似文献
27.
In a mobile ad hoc network, difficulties exist in supporting address autoconfiguration and naming resolution due to the lack of centralized servers. This letter presents a novel approach, called name‐based autoconfiguration (NBA), which uses host names to determine IP addresses and provides address autoconfiguration and name resolution as a single protocol. 相似文献
28.
Alex F. Meindertsma Michael M. Pollard Ben L. Feringa Johannes G. de Vries Adriaan J. Minnaard 《Tetrahedron: Asymmetry》2007,18(24):2849-2858
This paper describes the enantioselective hydrogenation of vinylthioethers. We show that thioether derivatives of maleic esters can be hydrogenated with full conversion and up to 60% ee, and that α-thioether cinnamic acids can be hydrogenated in 51% ee with modest conversion. 相似文献
29.
Node cooperation in hybrid ad hoc networks 总被引:2,自引:0,他引:2
Ben Salem N. Buttyan L. Hubaux J.-P. Jakobsson M. 《Mobile Computing, IEEE Transactions on》2006,5(4):365-376
A hybrid ad hoc network is a structure-based network that is extended using multihop communications. Indeed, in this kind of network, the existence of a communication link between the mobile station and the base station is not required: A mobile station that has no direct connection with a base station can use other mobile stations as relays. Compared with conventional (single-hop) structure-based networks, this new generation can lead to a better use of the available spectrum and to a reduction of infrastructure costs. However, these benefits would vanish if the mobile nodes did not properly cooperate and forward packets for other nodes. In this paper, we propose a charging and rewarding scheme to encourage the most fundamental operation, namely packet forwarding. We use "MAC layering" to reduce the space overhead in the packets and a stream cipher encryption mechanism to provide "implicit. authentication" of the nodes involved in the communication. We analyze the robustness of our protocols against rational and malicious attacks. We show that-using our solution-collaboration is rational for selfish nodes. We also show that our protocols thwart rational attacks and detect malicious attacks. 相似文献
30.