首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   361篇
  免费   9篇
  国内免费   29篇
化学   138篇
晶体学   2篇
力学   16篇
综合类   11篇
数学   162篇
物理学   70篇
  2024年   2篇
  2023年   8篇
  2022年   9篇
  2021年   4篇
  2020年   9篇
  2019年   44篇
  2018年   12篇
  2017年   11篇
  2016年   7篇
  2015年   8篇
  2014年   6篇
  2013年   74篇
  2012年   12篇
  2011年   12篇
  2010年   14篇
  2009年   19篇
  2008年   25篇
  2007年   14篇
  2006年   13篇
  2005年   10篇
  2004年   13篇
  2003年   9篇
  2002年   9篇
  2001年   8篇
  2000年   6篇
  1999年   8篇
  1998年   9篇
  1997年   2篇
  1996年   9篇
  1995年   3篇
  1994年   2篇
  1992年   2篇
  1991年   1篇
  1989年   1篇
  1987年   1篇
  1986年   1篇
  1985年   1篇
  1984年   1篇
排序方式: 共有399条查询结果,搜索用时 15 毫秒
31.
微机实时控制中的汉字开发   总被引:3,自引:0,他引:3  
本文提出了在微机实时测量与控制中开发汉字的方法,给出了有关程序及流程图。要点是借助于 CCDOS 中的 CCLIB 库离线建立专用的小汉字库,使用时,完全不用任何 CCDOS 汉字系统来支持,大大节省内存空间,简而易行。特别适用于把汉字作为菜单提示或帮助的实时应用软件廉价开发。  相似文献   
32.
33.
《Discrete Mathematics》2023,346(1):113168
We present a simple algorithm that generates a cyclic 2-Gray code for ballot sequences. The algorithm generates each ballot sequence in constant amortized time using a linear amount of space. This is the first known cyclic 2-Gray code for ballot sequences that achieves this time bound. In addition, the algorithm can be easily modified to output ballot sequences in binary reflected Gray code order in constant amortized time per string using a linear amount of space.  相似文献   
34.
京津冀、长三角和珠三角城市群是中国经济高度发达、最具发展潜力的区域,在低碳发展方面起到引领作用.从经济、资源、环境和绩效的角度构建区域低碳协同发展评价指标体系,采用结合逼近理想解的TOPSIS方法、灰色关联理论和距离协同模型,利用2005~2014年三大城市群50个城市数据实证分析了三大城市群的低碳协同发展程度.结果表明,三大城市群低碳协同发展度整体上呈现上升趋势,其低碳协同程度从高到底依次为长三角、珠三角和京津冀城市群.  相似文献   
35.
Provably secure non-interactive key distribution based on pairings   总被引:1,自引:0,他引:1  
We define a security notion for non-interactive key distribution protocols. We identify an apparently hard computational problem related to pairings, the Bilinear Diffie-Hellman problem (BDH). After extending Sakai, Ohgishi, and Kasahara's pairing based protocol to a slightly more general setting, we show that breaking the system is polynomially equivalent to solving BDH in the random oracle model and thus establish a security proof.  相似文献   
36.
It is shown that the polynomialp(t) = Tr[(A+tB)m]has positive coefficients when m = 6 and A and B are any two 3-by-3 complex Hermitian positive definite matrices. This case is the first that is not covered by prior, general results. This problem arises from a conjecture raised by Bessis, Moussa, and Villani in connection with a long-standing problem in theoretical physics. The full conjecture, as shown recently by Lieb and Seiringer, is equivalent to p(t) having positive coefficients for any m and any two n-by-n positive definite matrices. We show that, generally, the question in the real case reduces to that of singular A and B, and this is a key part of our proof.  相似文献   
37.
The square of a language L is the set of all words pp where pL. The square of a regular language may be regular too or context‐free or none of both. We give characterizations for each of these cases and show that it is decidable whether a regular language has one of these properties. (© 2005 WILEY‐VCH Verlag GmbH & Co. KGaA, Weinheim)  相似文献   
38.
The precise and stereocontrolled synthesis of the C9-C23 portion, the key mother spiroketal of the HIV-1 protease inhibitive didemnaketals from the ascidian Didemnum sp., has been carried out through multisteps starting from (R)-pulegone as the chiral template. This approach involved the distereoselective construction of eight chiral centers by intramolecular chiral inducement and the coupling of two fragments by Julia reaction.  相似文献   
39.
Authentication codes are used to protect communication against a malicious adversary. In this paper we investigate unconditionally secure multiround authentication schemes. In a multiround scheme a message is authenticated by passing back and forth several codewords between the sender and receiver. We define a multiround authentication model and show how to calculate the probability of a successful attack for this model. We prove the security for a 3-round scheme and give a construction for the 3-round scheme based on Reed-Solomom codes. This construction has a very small key size for even extremely large messages. Furthermore, a secure scheme for an arbitrary number of rounds is given. We give a new upper bound for the keys size of an n-round scheme.  相似文献   
40.
 The metrology system in Iceland has been reviewed and developed in the light of the increased needs of industry and other users of the system, in some cases to comply with the requirements of the agreement between the European Union and the European Economic Area which the Icelandic government signed in 1992. After a short historical review, the current legislation is explained, the metrological infrastructure is described, and the plans for the coming years are discussed. Received: 27 November 1995 Accepted: 18 December 1995  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号