全文获取类型
收费全文 | 173975篇 |
免费 | 12237篇 |
国内免费 | 7972篇 |
专业分类
化学 | 69390篇 |
晶体学 | 1408篇 |
力学 | 10994篇 |
综合类 | 515篇 |
数学 | 39616篇 |
物理学 | 39890篇 |
综合类 | 32371篇 |
出版年
2024年 | 391篇 |
2023年 | 1721篇 |
2022年 | 2728篇 |
2021年 | 2962篇 |
2020年 | 2840篇 |
2019年 | 2563篇 |
2018年 | 12459篇 |
2017年 | 12140篇 |
2016年 | 9179篇 |
2015年 | 4382篇 |
2014年 | 4777篇 |
2013年 | 5916篇 |
2012年 | 10487篇 |
2011年 | 17372篇 |
2010年 | 10881篇 |
2009年 | 10988篇 |
2008年 | 11916篇 |
2007年 | 13805篇 |
2006年 | 4681篇 |
2005年 | 5335篇 |
2004年 | 4810篇 |
2003年 | 4554篇 |
2002年 | 3364篇 |
2001年 | 2470篇 |
2000年 | 2469篇 |
1999年 | 3218篇 |
1998年 | 2894篇 |
1997年 | 2745篇 |
1996年 | 2858篇 |
1995年 | 2338篇 |
1994年 | 2179篇 |
1993年 | 1915篇 |
1992年 | 1653篇 |
1991年 | 1480篇 |
1990年 | 1321篇 |
1989年 | 1185篇 |
1988年 | 947篇 |
1987年 | 769篇 |
1986年 | 568篇 |
1985年 | 439篇 |
1984年 | 258篇 |
1983年 | 224篇 |
1982年 | 198篇 |
1981年 | 152篇 |
1980年 | 130篇 |
1979年 | 93篇 |
1978年 | 93篇 |
1977年 | 71篇 |
1975年 | 73篇 |
1973年 | 84篇 |
排序方式: 共有10000条查询结果,搜索用时 8 毫秒
81.
In this paper we obtain a number of Maharam-type slice integral representations, with respect to scalar measures, for positive
projections in Dedekind complete vector lattices and f-algebras.
AMS Classification: 47B65, 46A40, 06F25 相似文献
82.
Compact, time‐harmonic, acoustic sources produce waves that decay too slowly to be square‐integrable on a line away from the sources. We introduce an inner product, arising directly from Green's second theorem, to form a Hilbert space of these waves and present examples of its computation.1 © 2005 Wiley Periodicals, Inc. 相似文献
83.
Gaston Casanova 《Advances in Applied Clifford Algebras》2004,14(2):249-252
We define analytic functions within Clifford Algebras CL, and study their trigonometric properties. We write the addition formulas when their arguments, A and B in CL, commute, this generalizes ordinary trigonometry. We examine in particular the case A2 = 1.
相似文献
84.
M. Lashkarizadeh Bami 《Semigroup Forum》2004,69(2):219-229
In the present paper it is shown that if S1 and S2 are two
Clifford topological semigroups satisfying certain conditions
and T is an isometric isomorphism of LUC(S1*) onto LUC(S2*), then T
maps S1 topologically isomorphically onto S2. Furthermore, T
maps M
l
n(S1) (M(S1), respectively) isometrically
isomorphically onto M
l
n(S2) (M(S2), respectively). Indeed,
we have obtained a generalization of a well-known result of
Ghahramani, Lau and Losert for locally compact groups to a more
general setting of Clifford topological semigroups. 相似文献
85.
Andrew Barton 《The Journal of the Operational Research Society》1987,38(10):965-974
This paper describes some work carried out in the Scientific Research and Development Branch (SRDB) of the Home Office, intended to contribute to an overall aim of building up internal expertise in the field of expert systems. This was done by carrying out a number of pilot and demonstrator projects, two of which are described in some detail. The plan, which proved successful, was to build as far as possible on the relevant skills already possessed by an OR group in the branch. The lessons learned from these are summarized in the hope that they will be of use to other groups who wish to become involved in this important area. 相似文献
86.
Junhua Chen 《Journal of organometallic chemistry》2006,691(3):470-474
Four novel hexadentate imidazolium salts were synthesized from hexakis(bromomethyl)benzene and 1-substituted imidazole. The arylation of aldehydes with arylboronic acids was effected conveniently and in high yields by a catalyst system generated in situ from these hexadentate imidazolium salts, [Rh(COD)Cl]2 and a base. 相似文献
87.
88.
89.
Static extracting method of software intended behavior based on API functions invoking 总被引:1,自引:0,他引:1
The method of extracting and describing the intended behavior of software precisely has become one of the key points in the fields of software behavior's dynamic and trusted authentication. In this paper, the author proposes a specified measure of extracting SIBDS (software intended behaviors describing sets) statically from the binary executable using the software's API functions invoking, and also introduces the definition of the structure used to store the SIBDS in detail. Experimental results demonstrate that the extracting method and the storage structure definition offers three strong properties: (i) it can describe the software's intended behavior accurately; (ii) it demands a small storage expense; (iii) it provides strong capability to defend against mimicry attack. 相似文献
90.