首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   252篇
  免费   4篇
  国内免费   1篇
化学   93篇
晶体学   1篇
力学   6篇
数学   42篇
物理学   70篇
无线电   45篇
  2022年   2篇
  2021年   4篇
  2018年   4篇
  2017年   3篇
  2016年   3篇
  2015年   3篇
  2014年   4篇
  2013年   8篇
  2012年   7篇
  2011年   11篇
  2010年   4篇
  2009年   9篇
  2008年   9篇
  2007年   11篇
  2006年   6篇
  2005年   14篇
  2004年   12篇
  2003年   7篇
  2002年   7篇
  2001年   5篇
  2000年   4篇
  1999年   7篇
  1998年   6篇
  1997年   3篇
  1996年   3篇
  1995年   4篇
  1994年   3篇
  1993年   4篇
  1992年   7篇
  1991年   4篇
  1990年   7篇
  1988年   2篇
  1987年   7篇
  1986年   2篇
  1985年   4篇
  1984年   4篇
  1983年   6篇
  1982年   4篇
  1980年   4篇
  1979年   2篇
  1978年   3篇
  1977年   5篇
  1976年   6篇
  1974年   2篇
  1973年   3篇
  1972年   4篇
  1969年   3篇
  1968年   3篇
  1937年   1篇
  1922年   1篇
排序方式: 共有257条查询结果,搜索用时 187 毫秒
91.
92.
93.
94.
Nucleon-nucleon scattering phase shifts determine the diagonal element of the transition matrix. The off-diagonal elements are not completely arbitrary but have conditions imposed on them by the range and the tail of the potential. Electromagnetic interaction can also be used to place restrictions on the off-diagonal elements. We find that the cross section of the deuteron photodisintegration is sensitive to the off-shell transition matrix. The integrated cross section can be varied by as much as 30 % or more, and the matrix element for the El transition by a factor of 2. While the matrix element for the photodisintegration depends on the off-shell elements of the T-matrix, it cannot be used to discriminate between alternative off-shell T-matrices. We have constructed classes of different off-shell T-matrices, which produce identical photo-disintegration cross sections and other two-body scattering and bound-state properties.  相似文献   
95.
96.
97.
The reversible assembly of helical supramolecular polymers of chiral molecular building blocks is known to be governed by the interplay between mass action and the competition between weakly and strongly bound states of these building blocks. The highly co-operative transition from free monomers at high temperatures to long helical aggregates at low temperatures can be monitored by photoluminescence spectroscopy that probes the energetically lowest-lying optical excitations in the assemblies. In order to provide the interpretation of obtained spectroscopic data with a firm theoretical basis, we present a comprehensive model that combines a statistical theory of the equilibrium polymerization with a quantum-mechanical theory that not only accounts for the conformational properties of the assemblies but also describes the impact of correlated energetic disorder stemming from deformations within the chromophores and their interaction with solvent molecules. The theoretical predictions are compared to fluorescence spectra of chiral oligo(p-phenylene-vinylene) molecules in the solvent dodecane and we find them to qualitatively describe the red-shift of the main fluorescence peak and its decreasing intensity upon aggregation.  相似文献   
98.
Recent targeted attacks have increased significantly in sophistication, undermining the fundamental assumptions on which most cryptographic primitives rely for security. For instance, attackers launching an Advanced Persistent Threat (APT) can steal full cryptographic keys, violating the very secrecy of “secret” keys that cryptographers assume in designing secure protocols. In this article, we introduce a game-theoretic framework for modeling various computer security scenarios prevalent today, including targeted attacks. We are particularly interested in situations in which an attacker periodically compromises a system or critical resource completely, learns all its secret information and is not immediately detected by the system owner or defender. We propose a two-player game between an attacker and defender called FlipIt or The Game of “Stealthy Takeover.” In FlipIt, players compete to control a shared resource. Unlike most existing games, FlipIt allows players to move at any given time, taking control of the resource. The identity of the player controlling the resource, however, is not revealed until a player actually moves. To move, a player pays a certain move cost. The objective of each player is to control the resource a large fraction of time, while minimizing his total move cost. FlipIt provides a simple and elegant framework in which we can formally reason about the interaction between attackers and defenders in practical scenarios. In this article, we restrict ourselves to games in which one of the players (the defender) plays with a renewal strategy, one in which the intervals between consecutive moves are chosen independently and uniformly at random from a fixed probability distribution. We consider attacker strategies ranging in increasing sophistication from simple periodic strategies (with moves spaced at equal time intervals) to more complex adaptive strategies, in which moves are determined based on feedback received during the game. For different classes of strategies employed by the attacker, we determine strongly dominant strategies for both players (when they exist), strategies that achieve higher benefit than all other strategies in a particular class. When strongly dominant strategies do not exist, our goal is to characterize the residual game consisting of strategies that are not strongly dominated by other strategies. We also prove equivalence or strict inclusion of certain classes of strategies under different conditions. Our analysis of different FlipIt variants teaches cryptographers, system designers, and the community at large some valuable lessons:
  1. Systems should be designed under the assumption of repeated total compromise, including theft of cryptographic keys. FlipIt provides guidance on how to implement a cost-effective defensive strategy.
  2. Aggressive play by one player can motivate the opponent to drop out of the game (essentially not to play at all). Therefore, moving fast is a good defensive strategy, but it can only be implemented if move costs are low. We believe that virtualization has a huge potential in this respect.
  3. Close monitoring of one’s resources is beneficial in detecting potential attacks faster, gaining insight into attacker’s strategies, and scheduling defensive moves more effectively.
Interestingly, FlipIt finds applications in other security realms besides modeling of targeted attacks. Examples include cryptographic key rotation, password changing policies, refreshing virtual machines, and cloud auditing.  相似文献   
99.
Primers and probes were developed for the element-specific detection of cry1A.105 and cry2Ab2 genes, based on their DNA sequence as present in GM maize MON89034. Cry genes are present in many genetically modified (GM) plants and they are important targets for developing GMO element-specific detection methods. Element-specific methods can be of use to screen for the presence of GMOs in food and feed supply chains. Moreover, a combination of GMO elements may indicate the potential presence of unapproved GMOs (UGMs). Primer-probe combinations were evaluated in terms of specificity, efficiency and limit of detection. Except for specificity, the complete experiment was performed in 9 PCR runs, on 9 different days and by testing 8 DNA concentrations. The results showed a high specificity and efficiency for cry1A.105 and cry2Ab2 detection. The limit of detection was between 0.05 and 0.01 ng DNA per PCR reaction for both assays. These data confirm the applicability of these new primer-probe combinations for element detection that can contribute to the screening for GM and UGM crops in food and feed samples.  相似文献   
100.
The ground state rotational spectra of 2-fluoropyridine and 3-fluoropyridine have been investigated using both Fourier transform microwave (FTMW) and chirped pulse Fourier transform microwave (cp-FTMW) spectroscopies. In addition to the parent species, the spectra of the (13)C and (15)N singly substituted isotopologues were recorded in the 8-23 GHz region in natural abundance. The rotational constants determined for the seven isotopologues of each were used to calculate relevant geometric parameters including the bond distances and angles of the pyridine ring backbone. The derived structures show a more pronounced deviation from the pyridine ring geometry when the fluorine substituent is ortho to nitrogen which is consistent with ab initio predictions at various levels of theory. Analysis of the (14)N hyperfine structure provided an additional source of information about the electronic structure surrounding the nitrogen atom as a function of fluorine substitution. Together, the experimental results are consistent with a bonding model that involves hyperconjugation whereby fluorine donates electron density from its lone pair into the π-system of pyridine.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号