全文获取类型
收费全文 | 357篇 |
免费 | 1篇 |
国内免费 | 4篇 |
专业分类
化学 | 5篇 |
力学 | 1篇 |
数学 | 330篇 |
物理学 | 26篇 |
出版年
2023年 | 22篇 |
2022年 | 21篇 |
2021年 | 15篇 |
2020年 | 20篇 |
2019年 | 13篇 |
2018年 | 13篇 |
2017年 | 19篇 |
2016年 | 10篇 |
2015年 | 8篇 |
2014年 | 20篇 |
2013年 | 43篇 |
2012年 | 8篇 |
2011年 | 23篇 |
2010年 | 13篇 |
2009年 | 23篇 |
2008年 | 16篇 |
2007年 | 22篇 |
2006年 | 14篇 |
2005年 | 7篇 |
2004年 | 4篇 |
2003年 | 4篇 |
2002年 | 6篇 |
2001年 | 3篇 |
2000年 | 2篇 |
1999年 | 1篇 |
1998年 | 1篇 |
1997年 | 2篇 |
1996年 | 2篇 |
1995年 | 2篇 |
1994年 | 1篇 |
1992年 | 1篇 |
1989年 | 1篇 |
1985年 | 1篇 |
1984年 | 1篇 |
排序方式: 共有362条查询结果,搜索用时 31 毫秒
161.
Permutations with low differential uniformity are widely used in cipher design. Recently, Bracken, Tan and Tan (2012) [5] presented a method to construct differentially 4-uniform permutations by changing certain conditions of known APN functions. They guessed that only two classes of existing quadratic APN functions have this property. They succeeded in proving one class and left the other one as an open problem. In this paper, with the help of a computer, those polynomials are proved to be differentially 4-uniform but may not be permutation polynomials, which give a negative answer to this problem. 相似文献
162.
163.
164.
In this paper, we propose several classes of complete permutation polynomials over a finite field based on certain polynomials over its subfields or subsets. In addition, a class of complete permutation trinomials with Niho exponents is studied, and the number of these complete permutation trinomials is also determined. 相似文献
165.
Cai Heng Li 《代数通讯》2013,41(11):4722-4743
We determine finite simple groups which have a subgroup of index with exactly two distinct prime divisors. Then from this we derive a classification of primitive permutation groups of degree a product of two prime-powers. 相似文献
166.
Mariusz Grech 《Discrete Mathematics》2008,308(7):1142-1152
In this paper we study representations of permutation groups as automorphism groups of colored graphs and supergraphs. In particular, we consider how such representations for various products of permutation groups can be obtained from representations of factors and how the degree of complexity increases in such constructions. 相似文献
167.
Fabrice Bazzaro 《Discrete Mathematics》2009,309(11):3465-717
We show that every comparability graph of any two-dimensional poset over n elements (a.k.a. permutation graph) can be preprocessed in O(n) time, if two linear extensions of the poset are given, to produce an O(n) space data-structure supporting distance queries in constant time. The data-structure is localized and given as a distance labeling, that is each vertex receives a label of O(logn) bits so that distance queries between any two vertices are answered by inspecting their labels only. This result improves the previous scheme due to Katz, Katz and Peleg [M. Katz, N.A. Katz, D. Peleg, Distance labeling schemes for well-separated graph classes, Discrete Applied Mathematics 145 (2005) 384-402] by a log n factor.As a byproduct, our data-structure supports all-pair shortest-path queries in O(d) time for distance-d pairs, and so identifies in constant time the first edge along a shortest path between any source and destination.More fundamentally, we show that this optimal space and time data-structure cannot be extended for higher dimension posets. More precisely, we prove that for comparability graphs of three-dimensional posets, every distance labeling scheme requires Ω(n1/3) bit labels. 相似文献
168.
169.
Gadi Aleksandrowicz 《Journal of Combinatorial Theory, Series A》2012,119(3):503-520
Plane polyominoes are edge-connected sets of cells on the orthogonal lattice Z2, considered identical if their cell sets are equal up to an integral translation. We introduce a novel injection from the set of polyominoes with n cells to the set of permutations of [n], and classify the families of convex polyominoes and tree-like convex polyominoes as classes of permutations that avoid some sets of forbidden patterns. By analyzing the structure of the respective permutations of the family of tree-like convex polyominoes, we are able to find the generating function of the sequence that enumerates this family, conclude that this sequence satisfies the linear recurrence an=6an−1−14an−2+16an−3−9an−4+2an−5, and compute the closed-form formula an=2n+2−(n3−n2+10n+4)/2. 相似文献
170.
An (n, d, k)-mapping f is a mapping from binary vectors of length n to permutations of length n + k such that for all x, y
{0,1}n, dH (f(x), f(y)) ≥ dH (x, y) + d, if dH (x, y) ≤ (n + k) − d and dH (f(x), f(y)) = n + k, if dH (x, y) > (n + k) − d. In this paper, we construct an (n,3,2)-mapping for any positive integer n ≥ 6. An (n, r)-permutation array is a permutation array of length n and any two permutations of which have Hamming distance at least r. Let P(n, r) denote the maximum size of an (n, r)-permutation array and A(n, r) denote the same setting for binary codes. Applying (n,3,2)-mappings to the design of permutation array, we can construct an efficient permutation array (easy to encode and decode)
with better code rate than previous results [Chang (2005). IEEE Trans inf theory 51:359–365, Chang et al. (2003). IEEE Trans
Inf Theory 49:1054–1059; Huang et al. (submitted)]. More precisely, we obtain that, for n ≥ 8, P(n, r) ≥ A(n − 2, r − 3) > A(n − 1,r − 2) = A(n, r − 1) when n is even and P(n, r) ≥ A(n − 2, r − 3) = A(n − 1, r − 2) > A(n, r − 1) when n is odd. This improves the best bound A(n − 1,r − 2) so far [Huang et al. (submitted)] for n ≥ 8.
The work was supported in part by the National Science Council of Taiwan under contract NSC-93-2213-E-009-117 相似文献