首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1246篇
  免费   69篇
  国内免费   91篇
化学   62篇
力学   275篇
综合类   6篇
数学   794篇
物理学   269篇
  2024年   4篇
  2023年   14篇
  2022年   8篇
  2021年   14篇
  2020年   19篇
  2019年   36篇
  2018年   27篇
  2017年   27篇
  2016年   28篇
  2015年   36篇
  2014年   60篇
  2013年   112篇
  2012年   39篇
  2011年   100篇
  2010年   87篇
  2009年   93篇
  2008年   84篇
  2007年   65篇
  2006年   67篇
  2005年   67篇
  2004年   48篇
  2003年   61篇
  2002年   48篇
  2001年   35篇
  2000年   33篇
  1999年   35篇
  1998年   37篇
  1997年   27篇
  1996年   22篇
  1995年   12篇
  1994年   12篇
  1993年   5篇
  1992年   6篇
  1991年   6篇
  1990年   4篇
  1989年   2篇
  1988年   6篇
  1986年   1篇
  1985年   7篇
  1984年   2篇
  1982年   1篇
  1981年   1篇
  1980年   4篇
  1979年   2篇
  1978年   1篇
  1977年   1篇
排序方式: 共有1406条查询结果,搜索用时 15 毫秒
181.
A multisecret threshold scheme is a system which protects a number of secret keys among a group of n participants. There is a secret sK associated with every subset K of k participants such that any t participants in K can reconstruct the secret sK, but a subset of w participants cannot get any information about a secret they are not associated with. This paper gives a construction for the parameters t = 2, k = 3 and for any n and w that is optimal in the sense that participants hold the minimal amount of information. Communicated by: P. Wild  相似文献   
182.
183.
It is known that large fragments of the class of dense Minimum Constraint Satisfaction (MIN‐CSP) problems do not have polynomial time approximation schemes (PTASs) contrary to their Maximum Constraint Satisfaction analogs. In this paper we prove, somewhat surprisingly, that the minimum satisfaction of dense instances of kSAT ‐formulas, and linear equations mod 2, Ek‐LIN2, do have PTASs for any k. The MIN‐Ek‐LIN2 problems are equivalent to the k‐ary versions of the Nearest Codeword problem, the problem which is known to be exceedingly hard to approximate on general instances. The method of solution of the above problems depends on the development of a new density sampling technique for k‐uniform hypergraphs which could be of independent interest. © 2003 Wiley Periodicals, Inc. Random Struct. Alg., 23: 73–91, 2003  相似文献   
184.
This article reports on 20 children's learning in arithmetic after teaching was adjusted to their conceptual development. The report covers periods from three months up to three terms in an ongoing intervention study of teachers and children in schools for the intellectually disabled and of remedial teaching in regular schools. The researcher classified each child's current counting scheme before and after each term. Recurrent supervision, aiming to facilitate the teachers’ modelling of their children's various conceptual levels and needs of learning, was conducted by the researcher. The teaching content in harmony with each child's ability was discussed with the teachers. This approach gives the teachers the opportunity to experience the children's own operational ways of solving problems. At the supervision meetings, the teachers theorized their practice together with the researcher, ending up with consistent models of the arithmetic of the child. So far, the children's and the teachers’ learning patterns are promising.  相似文献   
185.
This paper is concerned with a number of upstream-weighted second- and third-order difference schemes. Also considered are the conventional upwind and central difference schemes for comparison. It commences with a general difference equation which unifies all the given first-, second- and third-order schemes. The various schemes are evaluated through the use of the general equation. The unboundedness and accuracy of the solutions by the difference schemes are assessed via various analyses: examination of the coefficients of the difference equation, Taylor series truncation error analysis, study of the upstream connection to numerical diffusion, single-cell analysis. Finally, the difference schemes are tested on one- and two-dimensional model problems. It is shown that the high-order schemes suffer less from the problem of numerical diffusion than the first-order upwind difference scheme. However, unboundedness cannot be avoided in the solutions by these schemes. Among them the linear upwind difference scheme presents the best compromise between numerical diffusion and solution unboundedness.  相似文献   
186.
A computationally efficient two-level iterative scheme is proposed for the solution of the interface problems with Lagrange multipliers, where the oscillatory part of the solution is resolved by means off smoothing using a new, efficient preconditioner whereas the smooth component of the solution is captured by the collocation-based problem on the auxilliary grid, that is solved directly using a sparse direct solver. A simple adaptive feature is built into the proposed solution method in order to guarantee convergence for ill-conditioned problems. Nmerical results presented for example problems including that of a Boeing crown panel show that the proposed tww-level solution technique outperfrmsnce the standard, single level iterative and direect solvers.  相似文献   
187.
In this paper we provide estimates of the rates of convergence of monotone approximation schemes for non-convex equations in one space-dimension. The equations under consideration are the degenerate elliptic Isaacs equations with x-depending coefficients, and the results applies in particular to certain finite difference methods and control schemes based on the dynamic programming principle. Recently, Krylov, Barles, and Jakobsen obtained similar estimates for convex Hamilton–Jacobi–Bellman equations in arbitrary space-dimensions. Our results are only valid in one space-dimension, but they are the first results of this type for non-convex second-order equations.  相似文献   
188.
We consider the parallel computation of flows of integral viscoelastic fluids on a heterogeneous network of workstations. The proposed methodology is relevant to computational mechanics problems which involve a compute-intensive treatment of internal variables (e.g. fibre suspension flow and deformation of viscoplastic solids). The main parallel computing issue in such applications is that of load balancing. Both static and dynamic allocation of work to processors are considered in the present paper. The proposed parallel algorithms have been implemented in an experimental, parallel version of the commercial POLYFLOW package developed in Louvain-la-Neuve. The implementation uses the public domain PVM software library (Parallel Virtual Machine), which we have extended in order to ease porting to heterogeneous networks. We describe parallel efficiency results obtained with three PVM configurations, involving up to seven workstations with maximum relative processing speeds of five. The physical problems are the stick/slip and abrupt contraction flows of a K.B.K.Z. integral fluid. Using static allocation, parallel efficiencies in the range 67%–85% were obtained on a PVM network with four workstations having relative speeds of 2:1:1:1. Parallel efficiencies higher than 90% were obtained on the three PVM configurations using the dynamic load-balancing schemes.  相似文献   
189.
XOR-based Visual Cryptography Schemes   总被引:2,自引:0,他引:2  
A recent publication introduced a Visual Crypto (VC) system, based on the polarisation of light. This VC system has goodresolution, contrast and colour properties.Mathematically, the VC system is described by the XOR operation (modulo two addition). In this paper we investigate Threshold Visual Secret Sharing schemes associated to XOR-based VC systems. Firstly, we show that n out of n schemes with optimal resolution and contrast exist, and that (2,n) schemes are equivalent to binary codes. It turns out that these schemes have much better resolution than their OR-based counterparts. Secondly, we provide two explicit constructions for general k out of n schemes. Finally, we derive bounds on the contrast and resolution of XOR-based schemes. It follows from these bounds that for k<n, the contrast is strictly smaller than one. Moreover, the bounds imply that XOR-based k out of n schemes for even k are fundamentally different from those for odd k.AMS Classification: 94A60  相似文献   
190.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号