首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   12482篇
  免费   706篇
  国内免费   57篇
化学   8715篇
晶体学   38篇
力学   295篇
数学   1857篇
物理学   1677篇
无线电   663篇
  2023年   108篇
  2022年   122篇
  2021年   222篇
  2020年   303篇
  2019年   317篇
  2018年   154篇
  2017年   183篇
  2016年   469篇
  2015年   509篇
  2014年   538篇
  2013年   690篇
  2012年   963篇
  2011年   966篇
  2010年   596篇
  2009年   531篇
  2008年   777篇
  2007年   726篇
  2006年   675篇
  2005年   653篇
  2004年   512篇
  2003年   419篇
  2002年   411篇
  2001年   186篇
  2000年   162篇
  1999年   151篇
  1998年   159篇
  1997年   154篇
  1996年   124篇
  1995年   96篇
  1994年   93篇
  1993年   99篇
  1992年   74篇
  1991年   73篇
  1990年   59篇
  1989年   75篇
  1988年   59篇
  1987年   44篇
  1986年   46篇
  1985年   59篇
  1984年   50篇
  1983年   50篇
  1982年   51篇
  1981年   60篇
  1980年   45篇
  1979年   48篇
  1978年   49篇
  1977年   45篇
  1976年   51篇
  1975年   45篇
  1973年   36篇
排序方式: 共有10000条查询结果,搜索用时 187 毫秒
11.
12.
13.
14.
15.
The Hadwiger number of a graph G, denoted h(G), is the largest integer t such that G contains Kt as a minor. A famous conjecture due to Hadwiger in 1943 states that for every graph G, h(G)χ(G), where χ(G) denotes the chromatic number of G. Let α(G) denote the independence number of G. A graph is H-free if it does not contain the graph H as an induced subgraph. In 2003, Plummer, Stiebitz and Toft proved that h(G)χ(G) for all H-free graphs G with α(G)2, where H is any graph on four vertices with α(H)2, H=C5, or H is a particular graph on seven vertices. In 2010, Kriesell subsequently generalized the statement to include all forbidden subgraphs H on five vertices with α(H)2. In this note, we prove that h(G)χ(G) for all W5-free graphs G with α(G)2, where W5 denotes the wheel on six vertices.  相似文献   
16.
Itaconate (ITA) is an emerging powerhouse of innate immunity with therapeutic potential that is limited in its ability to be administered in a soluble form. A library of polyester materials that incorporate ITA into polymer backbones resulting in materials with inherent immunoregulatory behavior is developed. Harnessing hydrolytic degradation release from polyester backbones, ITA polymers result in the mechanism specific immunoregulatory properties on macrophage polarization in vitro. In a functional assay, the polymer-released ITA inhibits bacterial growth on acetate. Translation to an in vivo model of biomaterial associated inflammation, intraperitoneal injection of ITA polymers demonstrate a rapid resolution of inflammation in comparison to a control polymer silicone, demonstrating the value of sustained biomimetic presentation of ITA.  相似文献   
17.

The combinatorial integral approximation decomposition splits the optimization of a discrete-valued control into two steps: solving a continuous relaxation of the discrete control problem, and computing a discrete-valued approximation of the relaxed control. Different algorithms exist for the second step to construct piecewise constant discrete-valued approximants that are defined on given decompositions of the domain. It is known that the resulting discrete controls can be constructed such that they converge to a relaxed control in the \(\hbox {weak}^*\) topology of \(L^\infty \) if the grid constant of this decomposition is driven to zero. We exploit this insight to formulate a general approximation result for optimization problems, which feature discrete and distributed optimization variables, and which are governed by a compact control-to-state operator. We analyze the topology induced by the grid refinements and prove convergence rates of the control vectors for two problem classes. We use a reconstruction problem from signal processing to demonstrate both the applicability of the method outside the scope of differential equations, the predominant case in the literature, and the effectiveness of the approach.

  相似文献   
18.
Security for ad hoc network environments has received a lot of attention as of today. Previous work has mainly been focussing on secure routing, fairness issues, and malicious node detection. However, the issue of introducing and conserving trust relationships has received considerably less attention. In this article, we present a scalable method for the use of public key certificates and their revocation in mobile ad hoc networks (MANETs). With the LKN-ad hoc security framework (LKN-ASF) a certificate management protocol has been introduced, bringing PKI technology to MANETs. In addition a performance analysis of two different revocation approaches for MANETs will be presented.  相似文献   
19.
20.
Sans résuméEspace projectif sur un corps algébriquement clos de caractéristique zéro  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号