首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   9868篇
  免费   1317篇
  国内免费   389篇
化学   1045篇
晶体学   17篇
力学   1191篇
综合类   335篇
数学   5696篇
物理学   3290篇
  2024年   26篇
  2023年   97篇
  2022年   277篇
  2021年   299篇
  2020年   212篇
  2019年   230篇
  2018年   244篇
  2017年   393篇
  2016年   493篇
  2015年   321篇
  2014年   584篇
  2013年   658篇
  2012年   523篇
  2011年   596篇
  2010年   473篇
  2009年   620篇
  2008年   657篇
  2007年   653篇
  2006年   540篇
  2005年   488篇
  2004年   429篇
  2003年   362篇
  2002年   334篇
  2001年   304篇
  2000年   256篇
  1999年   225篇
  1998年   204篇
  1997年   191篇
  1996年   155篇
  1995年   129篇
  1994年   77篇
  1993年   92篇
  1992年   76篇
  1991年   45篇
  1990年   50篇
  1989年   35篇
  1988年   34篇
  1987年   31篇
  1986年   32篇
  1985年   32篇
  1984年   30篇
  1983年   9篇
  1982年   19篇
  1981年   5篇
  1980年   5篇
  1979年   6篇
  1978年   3篇
  1977年   6篇
  1959年   5篇
  1957年   2篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
71.
This paper is about algorithms that schedule tasks to be performed in a distributed failure‐prone environment, when processors communicate by message‐passing, and when tasks are independent and of unit length. The processors work under synchrony and may fail by crashing. Failure patterns are imposed by adversaries. Linearly‐bounded adversaries may fail up to a constant fraction of the processors. Weakly‐adaptive adversaries have to select, prior to the start of an execution, a subset of processors to be failure‐prone, and then may fail only the selected processors, at arbitrary steps, in the course of the execution. Strongly adaptive adversaries have a total number of failures as the only restriction on failure patterns. The measures of complexity are work, measured as the available processor steps, and communication, measured as the number of point‐to‐point messages. A randomized algorithm is developed, that attains both ??(n log*n) expected work and ??(n log*n) expected communication, against weakly‐adaptive linearly‐bounded adversaries, in the case when the numbers of tasks and processors are both equal to n. This is in contrast with performance of algorithms against strongly‐adaptive linearly‐bounded adversaries, which has to be Ω(n log n/log log n) in terms of work. © 2003 Wiley Periodicals, Inc. Random Struct. Alg., 2004  相似文献   
72.
A multiwall carbon nanotube crossroads has been fabricated by a manipulation technique using a glass microcapillary, and the low temperature transport properties investigated. The two-terminal conductance of an individual tube shows Tomonaga–Luttinger liquid behavior GTα at high temperature and dI/dVV α at low temperature. However, no evidence of such a power-law behavior is obtained in the four-terminal conductance at the junction, where the conductance shows an almost metallic behavior ‘corrected’ by weak localization. Weak localization would essentially appear in electron states at the junctions of MWNTs.  相似文献   
73.
In this note we make a correction in the paper [1] by two of the authors. Specifically we modify an auxiliary localization result and prove that the applications to the saturation theory of some outstanding conservative operators remain valid. Moreover, we enrich a corollary dealing with the well-known Szász-Mirakjan operators. This revised version was published online in June 2006 with corrections to the Cover Date.  相似文献   
74.
In this paper,we consider a class of quadratic maximization problems.For a subclass of the problems,we show that the SDP relaxation approach yields an approximation solution with the ratio is dependent on the data of the problem with α being a uniform lower bound.In light of this new bound,we show that the actual worst-case performance ratio of the SDP relaxation approach (with the triangle inequalities added) is at least α δd if every weight is strictly positive,where δd > 0 is a constant depending on the problem dimension and data.  相似文献   
75.
This paper studies the problem of how changes in the design of the genetic algorithm (GA) have an effect on the results obtained in real-life applications. In this study, focused on the application of a GA to the tuning of technical trading rules in the context of financial markets, our tentative thesis is that the GA is robust with respect to design changes. The optimization of technical trading systems is a suitable area for the application of the GA metaheuristic, as the complexity of the problem grows exponentially as new technical rules are added to the system and as the answer time is crucial when applying the system to real-time data. Up to now, most of GAs applications to this subject obviated the question of possible “design dependence” in their results. The data we report, based on our experiments, do not allow us to refute the hypothesis of robustness of the GA to design implementation, when applying to technical trading systems tuning.  相似文献   
76.
在波长路由光网优化设计的过程中考虑了物理传输损伤造成的限制,提出了一种联合优化思路.将光信号在传输过程中的物理损伤作为问题公式的另一维约束,给出了相应的启发式算法,并按照由粗到细的机制对所提出的思路做了相应的评估,同时对负荷平衡问题作了初步的分析.数值结果表明这种算法可以获得与优化值相近的波长需求解,并且能够保证网络的传输性能,其业务分布随着备选路径的增加而趋向均衡.  相似文献   
77.
The parallel version of precondition techniques is developed for matrices arising from the Galerkin boundary element method for two-dimensional domains with Dirichlet boundary conditions. Results were obtained for implementations on a transputer network as well as on an nCUBE-2 parallel computer showing that iterative solution methods are very well suited for a MIMD computer. A comparison of numerical results for iterative and direct solution methods is presented and underlines the superiority of iterative methods for large systems.  相似文献   
78.
I.IlltroductionWhenanactiveunderwateracousticalpositioningsystemissearchingforanunderwatertarget,itisnecessaryforittocompleteatransmittingandreceivingcycIewithineachworkingperiodinordertofindoutthelocationofthetargetcorrectly.Forexample,whenanunder-wateracoustica1synchronouspositioningsystemistrackinganunderwatertargetwithagivensynchr0nizingperiod,thepropagati0ntimeofthepositioningsignaltravellingfr0mthetaJrgettothearrayofthesystemshouldbelessthanthesynchronizingperiod0therwisetargetdis-tance…  相似文献   
79.
几种约束广义逆矩阵的有限算法   总被引:2,自引:0,他引:2  
1引言与引理众所周知,关于非奇异方阵的正则逆的有限算法是由Faddeev大给在1949年之前提出的,这就是著名的Faddeev算法[1,P…334-336]。自从五十年代中期广义逆矩阵的研究复兴与发展以来,有不少学者提出了关于广义逆矩阵的有限算法。第一个给出关于广义逆矩  相似文献   
80.
A primal-dual version of the proximal point algorithm is developed for linearly constrained convex programming problems. The algorithm is an iterative method to find a saddle point of the Lagrangian of the problem. At each iteration of the algorithm, we compute an approximate saddle point of the Lagrangian function augmented by quadratic proximal terms of both primal and dual variables. Specifically, we first minimize the function with respect to the primal variables and then approximately maximize the resulting function of the dual variables. The merit of this approach exists in the fact that the latter function is differentiable and the maximization of this function is subject to no constraints. We discuss convergence properties of the algorithm and report some numerical results for network flow problems with separable quadratic costs.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号