全文获取类型
收费全文 | 361篇 |
免费 | 9篇 |
国内免费 | 29篇 |
专业分类
化学 | 138篇 |
晶体学 | 2篇 |
力学 | 16篇 |
综合类 | 11篇 |
数学 | 162篇 |
物理学 | 70篇 |
出版年
2024年 | 2篇 |
2023年 | 8篇 |
2022年 | 9篇 |
2021年 | 4篇 |
2020年 | 9篇 |
2019年 | 44篇 |
2018年 | 12篇 |
2017年 | 11篇 |
2016年 | 7篇 |
2015年 | 8篇 |
2014年 | 6篇 |
2013年 | 74篇 |
2012年 | 12篇 |
2011年 | 12篇 |
2010年 | 14篇 |
2009年 | 19篇 |
2008年 | 25篇 |
2007年 | 14篇 |
2006年 | 13篇 |
2005年 | 10篇 |
2004年 | 13篇 |
2003年 | 9篇 |
2002年 | 9篇 |
2001年 | 8篇 |
2000年 | 6篇 |
1999年 | 8篇 |
1998年 | 9篇 |
1997年 | 2篇 |
1996年 | 9篇 |
1995年 | 3篇 |
1994年 | 2篇 |
1992年 | 2篇 |
1991年 | 1篇 |
1989年 | 1篇 |
1987年 | 1篇 |
1986年 | 1篇 |
1985年 | 1篇 |
1984年 | 1篇 |
排序方式: 共有399条查询结果,搜索用时 15 毫秒
31.
微机实时控制中的汉字开发 总被引:3,自引:0,他引:3
林卫星 《宁波大学学报(理工版)》1992,(1)
本文提出了在微机实时测量与控制中开发汉字的方法,给出了有关程序及流程图。要点是借助于 CCDOS 中的 CCLIB 库离线建立专用的小汉字库,使用时,完全不用任何 CCDOS 汉字系统来支持,大大节省内存空间,简而易行。特别适用于把汉字作为菜单提示或帮助的实时应用软件廉价开发。 相似文献
32.
33.
《Discrete Mathematics》2023,346(1):113168
We present a simple algorithm that generates a cyclic 2-Gray code for ballot sequences. The algorithm generates each ballot sequence in constant amortized time using a linear amount of space. This is the first known cyclic 2-Gray code for ballot sequences that achieves this time bound. In addition, the algorithm can be easily modified to output ballot sequences in binary reflected Gray code order in constant amortized time per string using a linear amount of space. 相似文献
34.
区域低碳协同发展评价:京津冀、长三角和珠三角城市群的比较分析 总被引:1,自引:0,他引:1
京津冀、长三角和珠三角城市群是中国经济高度发达、最具发展潜力的区域,在低碳发展方面起到引领作用.从经济、资源、环境和绩效的角度构建区域低碳协同发展评价指标体系,采用结合逼近理想解的TOPSIS方法、灰色关联理论和距离协同模型,利用2005~2014年三大城市群50个城市数据实证分析了三大城市群的低碳协同发展程度.结果表明,三大城市群低碳协同发展度整体上呈现上升趋势,其低碳协同程度从高到底依次为长三角、珠三角和京津冀城市群. 相似文献
35.
Régis Dupont 《Discrete Applied Mathematics》2006,154(2):270-276
We define a security notion for non-interactive key distribution protocols. We identify an apparently hard computational problem related to pairings, the Bilinear Diffie-Hellman problem (BDH). After extending Sakai, Ohgishi, and Kasahara's pairing based protocol to a slightly more general setting, we show that breaking the system is polynomially equivalent to solving BDH in the random oracle model and thus establish a security proof. 相似文献
36.
On the Positivity of the Coefficients of a Certain Polynomial Defined by Two Positive Definite Matrices 总被引:1,自引:0,他引:1
It is shown that the polynomialp(t) = Tr[(A+tB)m]has positive coefficients when m = 6 and A and B are any two 3-by-3 complex Hermitian positive definite matrices. This case is the first that is not covered by prior, general results. This problem arises from a conjecture raised by Bessis, Moussa, and Villani in connection with a long-standing problem in theoretical physics. The full conjecture, as shown recently by Lieb and Seiringer, is equivalent to p(t) having positive coefficients for any m and any two n-by-n positive definite matrices. We show that, generally, the question in the real case reduces to that of singular A and B, and this is a key part of our proof. 相似文献
37.
Gerhard Lischke 《Mathematical Logic Quarterly》2005,51(3):299-304
The square of a language L is the set of all words pp where p ∈ L. The square of a regular language may be regular too or context‐free or none of both. We give characterizations for each of these cases and show that it is decidable whether a regular language has one of these properties. (© 2005 WILEY‐VCH Verlag GmbH & Co. KGaA, Weinheim) 相似文献
38.
The precise and stereocontrolled synthesis of the C9-C23 portion, the key mother spiroketal of the HIV-1 protease inhibitive didemnaketals from the ascidian Didemnum sp., has been carried out through multisteps starting from (R)-pulegone as the chiral template. This approach involved the distereoselective construction of eight chiral centers by intramolecular chiral inducement and the coupling of two fragments by Julia reaction. 相似文献
39.
Christian Gehrmann 《Designs, Codes and Cryptography》1998,15(1):67-86
Authentication codes are used to protect communication against a malicious adversary. In this paper we investigate unconditionally secure multiround authentication schemes. In a multiround scheme a message is authenticated by passing back and forth several codewords between the sender and receiver. We define a multiround authentication model and show how to calculate the probability of a successful attack for this model. We prove the security for a 3-round scheme and give a construction for the 3-round scheme based on Reed-Solomom codes. This construction has a very small key size for even extremely large messages. Furthermore, a secure scheme for an arbitrary number of rounds is given. We give a new upper bound for the keys size of an n-round scheme. 相似文献
40.
G. H. Fridgeirsson 《Accreditation and quality assurance》1996,1(4):160-162
The metrology system in Iceland has been reviewed and developed in the light of the increased needs of industry and other
users of the system, in some cases to comply with the requirements of the agreement between the European Union and the European
Economic Area which the Icelandic government signed in 1992. After a short historical review, the current legislation is explained,
the metrological infrastructure is described, and the plans for the coming years are discussed.
Received: 27 November 1995 Accepted: 18 December 1995 相似文献