全文获取类型
收费全文 | 1246篇 |
免费 | 69篇 |
国内免费 | 91篇 |
专业分类
化学 | 62篇 |
力学 | 275篇 |
综合类 | 6篇 |
数学 | 794篇 |
物理学 | 269篇 |
出版年
2024年 | 4篇 |
2023年 | 14篇 |
2022年 | 8篇 |
2021年 | 14篇 |
2020年 | 19篇 |
2019年 | 36篇 |
2018年 | 27篇 |
2017年 | 27篇 |
2016年 | 28篇 |
2015年 | 36篇 |
2014年 | 60篇 |
2013年 | 112篇 |
2012年 | 39篇 |
2011年 | 100篇 |
2010年 | 87篇 |
2009年 | 93篇 |
2008年 | 84篇 |
2007年 | 65篇 |
2006年 | 67篇 |
2005年 | 67篇 |
2004年 | 48篇 |
2003年 | 61篇 |
2002年 | 48篇 |
2001年 | 35篇 |
2000年 | 33篇 |
1999年 | 35篇 |
1998年 | 37篇 |
1997年 | 27篇 |
1996年 | 22篇 |
1995年 | 12篇 |
1994年 | 12篇 |
1993年 | 5篇 |
1992年 | 6篇 |
1991年 | 6篇 |
1990年 | 4篇 |
1989年 | 2篇 |
1988年 | 6篇 |
1986年 | 1篇 |
1985年 | 7篇 |
1984年 | 2篇 |
1982年 | 1篇 |
1981年 | 1篇 |
1980年 | 4篇 |
1979年 | 2篇 |
1978年 | 1篇 |
1977年 | 1篇 |
排序方式: 共有1406条查询结果,搜索用时 15 毫秒
181.
A multisecret threshold scheme is a system which protects a number of secret keys among a group of n participants. There is a secret sK associated with every subset K of k participants such that any t participants in K can reconstruct the secret sK, but a subset of w participants cannot get any information about a secret they are not associated with. This paper gives a construction for
the parameters t = 2, k = 3 and for any n and w that is optimal in the sense that participants hold the minimal amount of information.
Communicated by: P. Wild 相似文献
182.
183.
Cristina Bazgan W. Fernandez de la Vega Marek Karpinski 《Random Structures and Algorithms》2003,23(1):73-91
It is known that large fragments of the class of dense Minimum Constraint Satisfaction (MIN‐CSP) problems do not have polynomial time approximation schemes (PTASs) contrary to their Maximum Constraint Satisfaction analogs. In this paper we prove, somewhat surprisingly, that the minimum satisfaction of dense instances of kSAT ‐formulas, and linear equations mod 2, Ek‐LIN2, do have PTASs for any k. The MIN‐Ek‐LIN2 problems are equivalent to the k‐ary versions of the Nearest Codeword problem, the problem which is known to be exceedingly hard to approximate on general instances. The method of solution of the above problems depends on the development of a new density sampling technique for k‐uniform hypergraphs which could be of independent interest. © 2003 Wiley Periodicals, Inc. Random Struct. Alg., 23: 73–91, 2003 相似文献
184.
Göta Eriksson 《The Journal of Mathematical Behavior》2008,27(4):264-276
This article reports on 20 children's learning in arithmetic after teaching was adjusted to their conceptual development. The report covers periods from three months up to three terms in an ongoing intervention study of teachers and children in schools for the intellectually disabled and of remedial teaching in regular schools. The researcher classified each child's current counting scheme before and after each term. Recurrent supervision, aiming to facilitate the teachers’ modelling of their children's various conceptual levels and needs of learning, was conducted by the researcher. The teaching content in harmony with each child's ability was discussed with the teachers. This approach gives the teachers the opportunity to experience the children's own operational ways of solving problems. At the supervision meetings, the teachers theorized their practice together with the researcher, ending up with consistent models of the arithmetic of the child. So far, the children's and the teachers’ learning patterns are promising. 相似文献
185.
Yeng-Yung Tsui 《国际流体数值方法杂志》1991,13(2):167-199
This paper is concerned with a number of upstream-weighted second- and third-order difference schemes. Also considered are the conventional upwind and central difference schemes for comparison. It commences with a general difference equation which unifies all the given first-, second- and third-order schemes. The various schemes are evaluated through the use of the general equation. The unboundedness and accuracy of the solutions by the difference schemes are assessed via various analyses: examination of the coefficients of the difference equation, Taylor series truncation error analysis, study of the upstream connection to numerical diffusion, single-cell analysis. Finally, the difference schemes are tested on one- and two-dimensional model problems. It is shown that the high-order schemes suffer less from the problem of numerical diffusion than the first-order upwind difference scheme. However, unboundedness cannot be avoided in the solutions by these schemes. Among them the linear upwind difference scheme presents the best compromise between numerical diffusion and solution unboundedness. 相似文献
186.
A computationally efficient two-level iterative scheme is proposed for the solution of the interface problems with Lagrange multipliers, where the oscillatory part of the solution is resolved by means off smoothing using a new, efficient preconditioner whereas the smooth component of the solution is captured by the collocation-based problem on the auxilliary grid, that is solved directly using a sparse direct solver. A simple adaptive feature is built into the proposed solution method in order to guarantee convergence for ill-conditioned problems. Nmerical results presented for example problems including that of a Boeing crown panel show that the proposed tww-level solution technique outperfrmsnce the standard, single level iterative and direect solvers. 相似文献
187.
E. R. Jakobsen 《BIT Numerical Mathematics》2004,44(2):269-285
In this paper we provide estimates of the rates of convergence of monotone approximation schemes for non-convex equations in one space-dimension. The equations under consideration are the degenerate elliptic Isaacs equations with x-depending coefficients, and the results applies in particular to certain finite difference methods and control schemes based on the dynamic programming principle. Recently, Krylov, Barles, and Jakobsen obtained similar estimates for convex Hamilton–Jacobi–Bellman equations in arbitrary space-dimensions. Our results are only valid in one space-dimension, but they are the first results of this type for non-convex second-order equations. 相似文献
188.
We consider the parallel computation of flows of integral viscoelastic fluids on a heterogeneous network of workstations. The proposed methodology is relevant to computational mechanics problems which involve a compute-intensive treatment of internal variables (e.g. fibre suspension flow and deformation of viscoplastic solids). The main parallel computing issue in such applications is that of load balancing. Both static and dynamic allocation of work to processors are considered in the present paper. The proposed parallel algorithms have been implemented in an experimental, parallel version of the commercial POLYFLOW package developed in Louvain-la-Neuve. The implementation uses the public domain PVM software library (Parallel Virtual Machine), which we have extended in order to ease porting to heterogeneous networks. We describe parallel efficiency results obtained with three PVM configurations, involving up to seven workstations with maximum relative processing speeds of five. The physical problems are the stick/slip and abrupt contraction flows of a K.B.K.Z. integral fluid. Using static allocation, parallel efficiencies in the range 67%–85% were obtained on a PVM network with four workstations having relative speeds of 2:1:1:1. Parallel efficiencies higher than 90% were obtained on the three PVM configurations using the dynamic load-balancing schemes. 相似文献
189.
XOR-based Visual Cryptography Schemes 总被引:2,自引:0,他引:2
P.?TuylsEmail author H.?D.?L.?Hollmann J.?H.?Van?Lint L.?Tolhuizen 《Designs, Codes and Cryptography》2005,37(1):169-186
A recent publication introduced a Visual Crypto (VC) system, based on the polarisation of light. This VC system has goodresolution, contrast and colour properties.Mathematically, the VC system is described by the XOR operation (modulo two addition). In this paper we investigate Threshold Visual Secret Sharing schemes associated to XOR-based VC systems. Firstly, we show that n out of n schemes with optimal resolution and contrast exist, and that (2,n) schemes are equivalent to binary codes. It turns out that these schemes have much better resolution than their OR-based counterparts. Secondly, we provide two explicit constructions for general k out of n schemes. Finally, we derive bounds on the contrast and resolution of XOR-based schemes. It follows from these bounds that for k<n, the contrast is strictly smaller than one. Moreover, the bounds imply that XOR-based k out of n schemes for even k are fundamentally different from those for odd k.AMS Classification: 94A60 相似文献
190.