首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   210篇
  免费   5篇
化学   58篇
力学   2篇
数学   108篇
物理学   22篇
无线电   25篇
  2023年   2篇
  2022年   7篇
  2021年   5篇
  2020年   7篇
  2019年   2篇
  2018年   5篇
  2017年   5篇
  2016年   6篇
  2015年   6篇
  2014年   7篇
  2013年   17篇
  2012年   17篇
  2011年   13篇
  2010年   6篇
  2009年   7篇
  2008年   8篇
  2007年   10篇
  2006年   4篇
  2005年   5篇
  2004年   4篇
  2003年   2篇
  2002年   2篇
  2001年   4篇
  2000年   1篇
  1999年   8篇
  1998年   7篇
  1997年   5篇
  1996年   2篇
  1995年   1篇
  1994年   2篇
  1993年   1篇
  1992年   2篇
  1991年   5篇
  1990年   2篇
  1989年   2篇
  1988年   4篇
  1987年   2篇
  1986年   1篇
  1985年   1篇
  1984年   2篇
  1983年   2篇
  1982年   3篇
  1981年   1篇
  1979年   2篇
  1978年   1篇
  1977年   1篇
  1976年   1篇
  1974年   1篇
  1972年   1篇
  1971年   3篇
排序方式: 共有215条查询结果,搜索用时 29 毫秒
81.
A graph is well-covered if every maximal independent set is maximum. This concept, introduced by Plummer in 1970 (J. Combin. Theory 8 (1970)), is the focal point of much interest and current research. We consider well-covered 2-degenerate graphs and supply a structural (and polynomial time algorithm) characterization of the class called 3-separable graphs. Also we consider parity graphs studied by Finbow and Hartnell and answer the question posed by them (Ars. Combin. 40 (1995)) by proving, among other results, that the decision problem: “given a graph G which is a parity graph, is G also well-covered graph?” is in the class CO-NPC. In addition we supply some complexity results that answer some problems due to Plummer (Quaestiones Math. 16 (1993)) and Finbow, Hartnell, and Whitehead (Discrete Math. 125 (1994)). © 1997 John Wiley & Sons, Inc. J Graph Theory 25: 85–94, 1997  相似文献   
82.
We define an ending lamination for a Weil–Petersson geodesic ray. Despite the lack of a natural visual boundary for the Weil–Petersson metric [Bro2], these ending laminations provide an effective boundary theory that encodes much of its asymptotic CAT(0) geometry. In particular, we prove an ending lamination theorem (Theorem 1.1) for the full-measure set of rays that recur to the thick part, and we show that the association of an ending lamination embeds asymptote classes of recurrent rays into the Gromov-boundary of the curve complex C(S){\mathcal{C}(S)}. As an application, we establish fundamentals of the topological dynamics of the Weil–Petersson geodesic flow, showing density of closed orbits and topological transitivity.  相似文献   
83.
Asymptotic bounds for some bipartite graph: complete graph Ramsey numbers   总被引:6,自引:0,他引:6  
The Ramsey number r(H,Kn) is the smallest integer N so that each graph on N vertices that fails to contain H as a subgraph has independence number at least n. It is shown that r(K2,m,Kn)(m−1+o(1))(n/log n)2 and r(C2m,Kn)c(n/log n)m/(m−1) for m fixed and n→∞. Also r(K2,n,Kn)=Θ(n3/log2 n) and .  相似文献   
84.
We consider the extension of the standard single-determinant Kohn–Sham method to the case of a multi-configuration auxiliary wave function. By applying the rigorous Kohn–Sham method to this case, we construct the proper interacting and auxiliary energy functionals. Following the Hohenberg–Kohn theorem for both energy functionals, we derive the corresponding multi-configuration Kohn–Sham equations, based on a local effective potential. At the end of the analysis we show that, at the ground state, the auxiliary wavefunction must collapse into a single-determinant wave function, equal to the regular KS wavefunction. We also discuss the stability of the wavefunction in multi-configuration density functional theory methods where the auxiliary system is partially interacting, and the remaining (residual) correlation is evaluated as a functional of the density. As an example showing both the challenges and the possibilities, we implement such a procedure for the perfect pairing wavefunction, using a residual correlation functional that is based on the Lee–Yang–Parr functional, and present results for an elementary bond-breaking process.  相似文献   
85.
We present a modification of Dykstra's algorithm which allows us to avoid projections onto general convex sets. Instead, we calculate projections onto either a half-space or onto the intersection of two half-spaces. Convergence of the algorithm is established and special choices of the half-spaces are proposed.The option to project onto half-spaces instead of general convex sets makes the algorithm more practical. The fact that the half-spaces are quite general enables us to apply the algorithm in a variety of cases and to generalize a number of known projection algorithms.The problem of projecting a point onto the intersection of closed convex sets receives considerable attention in many areas of mathematics and physics as well as in other fields of science and engineering such as image reconstruction from projections.In this work we propose a new class of algorithms which allow projection onto certain super half-spaces, i.e., half-spaces which contain the convex sets. Each one of the algorithms that we present gives the user freedom to choose the specific super half-space from a family of such half-spaces. Since projecting a point onto a half-space is an easy task to perform, the new algorithms may be more useful in practical situations in which the construction of the super half-spaces themselves is not too difficult.  相似文献   
86.
The active role of alumina, pentalithium aluminate (Li5AlO4, Li-aluminate), and pentasodium aluminate (Na5AlO4, Na-aluminate) as the surface protection coatings produced via atomic layer deposition on Li and Mn-rich NCM cathode materials 0.33Li2MnO3·0.67LiNi0.4Co0.2Mn0.4O2 is discussed. A notable improvement in the electrochemical behavior of the coated cathodes has been found while tested in Li-coin cells at 30 °C. Though all the coated cathodes demonstrate enhanced electrochemical cycling and rate performances, Na-aluminate coated cathodes exhibit exemplary behavior. Prolonged cycling and rate capability testing demonstrate that after more than 400 cycles at 1 C rate, the uncoated cathode delivers only 63 mAh g−1, while those with alumina, Li-aluminate, and Na-aluminate coatings exhibit approximately two times higher specific capacities. The coated cathodes display steady average discharge potential and lower evolution of the voltage hysteresis during prolonged cycling compared to the uncoated cathode. Importantly, Na-aluminate coated cathode shows a lowering in gases (O2, CO2, H2, etc.) evolution. Post-cycling analysis of the electrodes demonstrates higher morphological integrity of the coated cathode materials and lower transition metals dissolution from them. The coatings mitigate undesirable side reactions between the electrodes and the electrolyte solution in the cells.  相似文献   
87.
Generalized distances give rise to generalized projections into convex sets. An important question is whether or not one can use within the same projection algorithm different types of such generalized projections. This question has practical consequences in the area of signal detection and image recovery in situations that can be formulated mathematically as a convex feasibility problem. Using an extension of Pierra's product space formalism, we show here that a multiprojection algorithm converges. Our algorithm is fully simultaneous, i.e., it uses in each iterative stepall sets of the convex feasibility problem. Different multiprojection algorithms can be derived from our algorithmic scheme by a judicious choice of the Bregman functions which govern the process. As a by-product of our investigation we also obtain blockiterative schemes for certain kinds of linearly constraned optimization problems.  相似文献   
88.
Alkylating agents are simple and reactive molecules that are commonly used in many and diverse fields, such as organic synthesis, medicine, and agriculture. Some highly reactive alkylating species are also being used as blister chemical warfare agents. The detection and identification of alkylating agent is not a trivial issue because of their high reactivity and simple structure. Here, a novel polythiophene derivative that is capable of reacting with alkylating agents is reported, along with its application in direct electrical sensing of alkylators using an organic field‐effect transistor, OFET, device. Upon reacting with alkylators, the OFET containing the new polythiophene analogue as its channel becomes conductive, and the gate effect is lost; this is in marked contrast to the response of the OFET to “innocent” vapors, such as alcohols and acetone. By following the drain–source current under gate bias, one can easily follow the processes of absorption of the analyte to the polythiophene channel and their subsequent reaction.  相似文献   
89.
All‐dielectric metasurfaces provide a powerful platform for a new generation of flat optical devices, in particular, for applications in telecommunication systems, due to their low losses and high transparency in the infrared. However, active and reversible tuning of such metasurfaces remains a challenge. This study experimentally demonstrates and theoretically justifies a novel scenario of the dynamical reversible tuning of all‐dielectric metasurfaces based on the temperature‐dependent change of the refractive index of silicon. How to design an all‐dielectric metasurface with sharp resonances by achieving interference between magnetic dipole and electric quadrupole modes of constituted nanoparticles arranged in a 2D lattice is shown. Thermal tuning of these resonances can cause drastic but reciprocal changes in the directional scattering of the metasurface in a spectral window of 75 nm. This change can result in a 50‐fold enhancement of the radiation directionality. This type of reversible tuning can play a significant role in novel flat optical devices including the metalenses and metaholograms.  相似文献   
90.
The aim of this paper is to demonstrate the feasibility of authenticated throughput-efficient routing in an unreliable and dynamically changing synchronous network in which the majority of malicious insiders try to destroy and alter messages or disrupt communication in any way. More specifically, in this paper we seek to answer the following question: Given a network in which the majority of nodes are controlled by a node-controlling adversary and whose topology is changing every round, is it possible to develop a protocol with polynomially bounded memory per processor (with respect to network size) that guarantees throughput-efficient and correct end-to-end communication? We answer the question affirmatively for extremely general corruption patterns: we only request that the topology of the network and the corruption pattern of the adversary leaves at least one path each round connecting the sender and receiver through honest nodes (though this path may change at every round). Out construction works in the public-key setting and enjoys optimal transfer rate and bounded memory per processor (that is polynomial in the network size and does not depend on the amount of traffic). We stress that our protocol assumes no knowledge of which nodes are corrupted nor which path is reliable at any round, and is also fully distributed with nodes making decisions locally, so that they need not know the topology of the network at any time. The optimality that we prove for our protocol is very strong. Given any routing protocol, we evaluate its efficiency (rate of message delivery) in the “worst case,” that is with respect to the worst possible graph and against the worst possible (polynomially bounded) adversarial strategy (subject to the above mentioned connectivity constraints). Using this metric, we show that there does not exist any protocol that can be asymptotically superior (in terms of throughput) to ours in this setting. We remark that the aim of our paper is to demonstrate via explicit example the feasibility of throughput-efficient authenticated adversarial routing. However, we stress that out protocol is not intended to provide a practical solution, as due to its complexity, no attempt thus far has been made to reduce constants and memory requirements. Our result is related to recent work of Barak et al. (Proc. of Advances in Cryptology—27th EUROCRYPT 2008, LNCS, vol. 4965, pp. 341–360, 2008) who studied fault localization in networks assuming a private-key trusted-setup setting. Our work, in contrast, assumes a public-key PKI setup and aims at not only fault localization, but also transmission optimality. Among other things, our work answers one of the open questions posed in the Barak et al. paper regarding fault localization on multiple paths. The use of a public-key setting to achieve strong error-correction results in networks was inspired by the work of Micali et al. (Proc. of 2nd Theory of Cryptography Conf., LNCS, vol. 3378, pp. 1–16, 2005) who showed that classical error correction against a polynomially bounded adversary can be achieved with surprisingly high precision. Our work is also related to an interactive coding theorem of Rajagopalan and Schulman (Proc. 26th ACM Symp. on Theory of Computing, pp. 790–799, 1994) who showed that in noisy-edge static-topology networks a constant overhead in communication can also be achieved (provided none of the processors are malicious), thus establishing an optimal-rate routing theorem for static-topology networks. Finally, our work is closely related and builds upon to the problem of End-To-End Communication in distributed networks, studied by Afek and Gafni (Proc. of the 7th ACM Symp. on Principles of Distributed Computing, pp. 131–148, 1988); Awebuch et al. (Proc. of the 30th IEEE Symp. on Foundations of Computer Science, FOCS, 1989); Afek et al. (Proc. of the 11th ACM Symp. on Principles of Distributed Computing, pp. 35–46, 1992); and Afek et al. (J. Algorithms 22:158–186, 1997), though none of these papers consider or ensure correctness in the setting of a node-controlling adversary that may corrupt the majority of the network.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号