首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   551篇
  免费   35篇
  国内免费   32篇
化学   13篇
力学   1篇
综合类   37篇
数学   514篇
物理学   53篇
  2023年   4篇
  2022年   13篇
  2021年   11篇
  2020年   14篇
  2019年   14篇
  2018年   9篇
  2017年   8篇
  2016年   10篇
  2015年   1篇
  2014年   11篇
  2013年   44篇
  2012年   17篇
  2011年   26篇
  2010年   27篇
  2009年   42篇
  2008年   40篇
  2007年   24篇
  2006年   32篇
  2005年   30篇
  2004年   32篇
  2003年   32篇
  2002年   22篇
  2001年   27篇
  2000年   15篇
  1999年   19篇
  1998年   15篇
  1997年   8篇
  1996年   15篇
  1995年   14篇
  1994年   7篇
  1993年   7篇
  1992年   4篇
  1991年   2篇
  1990年   4篇
  1989年   2篇
  1988年   1篇
  1986年   1篇
  1985年   3篇
  1984年   3篇
  1983年   2篇
  1982年   3篇
  1981年   1篇
  1974年   1篇
  1959年   1篇
排序方式: 共有618条查询结果,搜索用时 296 毫秒
11.
本文证明了n维布尔矩阵维数的一个新的缺断区间为这一结果扩充了一些已知的结论.  相似文献   
12.
The question if there exist nonnormal bent functions was an open question for several years. A Boolean function in n variables is called normal if there exists an affine subspace of dimension n/2 on which the function is constant. In this paper we give the first nonnormal bent function and even an example for a nonweakly normal bent function. These examples belong to a class of bent functions found in [J.F. Dillon, H. Dobbertin, New cyclic difference sets with Singer parameters, in: Finite Fields and Applications, to appear], namely the Kasami functions. We furthermore give a construction which extends these examples to higher dimensions. Additionally, we present a very efficient algorithm that was used to verify the nonnormality of these functions.  相似文献   
13.
In this article, a novel method is proposed for investigating the set controllability of Markov jump switching Boolean control networks (MJSBCNs). Specifically, the switching signal is described as a discrete-time homogeneous Markov chain. By resorting to the expectation and switching indicator function, an expectation system is constructed. Based on the expectation system, a novel verifiable condition is established for solving the set reachability of MJSBCNs. With the newly obtained results on set reachability, a necessary and sufficient condition is further derived for the set controllability of MJSBCNs. The obtained results are applied to Boolean control networks with Markov jump time delays. Examples are demonstrated to justify the theoretical results.  相似文献   
14.
Two Fraenkel-Mostowski models are constructed in which the Boolean Prime Ideal Theorem is true. In both models, AC for countable sets is true, but AC for sets of cardinality 2 and the 2m = m principle are both false. The Principle of Dependent Choices is true in the first model, but false in the second. Mathematics Subject Classification: 03E25, 03E35, 04A25.  相似文献   
15.
A general approach to information correction and fusion for belief functions is proposed, where not only may the information items be irrelevant, but sources may lie as well. We introduce a new correction scheme, which takes into account uncertain metaknowledge on the source’s relevance and truthfulness and that generalizes Shafer’s discounting operation. We then show how to reinterpret all connectives of Boolean logic in terms of source behavior assumptions with respect to relevance and truthfulness. We are led to generalize the unnormalized Dempster’s rule to all Boolean connectives, while taking into account the uncertainties pertaining to assumptions concerning the behavior of sources. Eventually, we further extend this approach to an even more general setting, where source behavior assumptions do not have to be restricted to relevance and truthfulness. We also establish the commutativity property between correction and fusion processes, when the behaviors of the sources are independent.  相似文献   
16.
Nonlinear filter generators are commonly used as keystream generators in stream ciphers. A nonlinear filter generator utilizes a nonlinear filtering function to combine the outputs of a linear feedback shift register (LFSR) to improve the linear complexity of keystream sequences. However, the LFSR-based stream ciphers are still potentially vulnerable to algebraic attacks that recover the key from some keystream bits. Although the known algebraic attacks only require polynomial time complexity of computations, all have their own constraints. This paper uses the linearization of nonlinear filter generators to cryptanalyze LFSR-based stream ciphers. Such a method works for any nonlinear filter generators. Viewing a nonlinear filter generator as a Boolean network that evolves as an automaton through Boolean functions, we first give its linearization representation. Compared to the linearization representation in Limniotis et al. (2008), this representation requires lower spatial complexity of computations in most cases. Based on the representation, the key recoverability is analyzed via the observability of Boolean networks. An algorithm for key recovery is given as well. Compared to the exhaustive search to recover the key, using this linearization representation requires lower time complexity of computations, though it leads to exponential time complexity.  相似文献   
17.
18.
本文研究了完备布尔代数L的商格Q(L),建立 L上q-集构成的集合Q′(L)与Q(L)之间的同构,得出了完备布尔代数的商格仍是完备布尔代数,并给出了完备布尔代数范畴的某些性质.  相似文献   
19.
Bool阵的逆阵     
We give a characterization of a regular Boolean matrix and prove that AB = I Implies that BA = I, where A and B are Boolean matrices whose elements belong to a Boolean algebra of a set with more than two elements.  相似文献   
20.
Martin's Axiom does not imply that all automorphisms of are somewhere trivial. An alternate method for obtaining models where every automorphism of is somewhere trivial is explained.

  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号