全文获取类型
收费全文 | 993篇 |
免费 | 43篇 |
国内免费 | 22篇 |
专业分类
化学 | 7篇 |
晶体学 | 6篇 |
力学 | 6篇 |
综合类 | 20篇 |
数学 | 824篇 |
物理学 | 195篇 |
出版年
2024年 | 1篇 |
2023年 | 33篇 |
2022年 | 54篇 |
2021年 | 51篇 |
2020年 | 46篇 |
2019年 | 27篇 |
2018年 | 19篇 |
2017年 | 25篇 |
2016年 | 31篇 |
2015年 | 19篇 |
2014年 | 35篇 |
2013年 | 39篇 |
2012年 | 14篇 |
2011年 | 32篇 |
2010年 | 22篇 |
2009年 | 64篇 |
2008年 | 76篇 |
2007年 | 54篇 |
2006年 | 61篇 |
2005年 | 27篇 |
2004年 | 30篇 |
2003年 | 36篇 |
2002年 | 53篇 |
2001年 | 41篇 |
2000年 | 33篇 |
1999年 | 53篇 |
1998年 | 29篇 |
1997年 | 24篇 |
1996年 | 15篇 |
1995年 | 3篇 |
1994年 | 1篇 |
1993年 | 1篇 |
1992年 | 3篇 |
1991年 | 1篇 |
1984年 | 1篇 |
1983年 | 1篇 |
1982年 | 1篇 |
1979年 | 1篇 |
1977年 | 1篇 |
排序方式: 共有1058条查询结果,搜索用时 0 毫秒
21.
Derek H. Smith Richard P. Ward Stephanie Perkins 《Designs, Codes and Cryptography》2009,51(3):231-243
Let V = {1, 2, . . . , M} and let be a set of Hadamard matrices with the property that the magnitude of the dot product of any two rows of distinct matrices
is bounded above. A Hadamard partition is any partition of the set of all rows of the matrices H
i
into Hadamard matrices. Such partitions have an application to the security of quasi-synchronous code-division multiple-access
radio systems when loosely synchronized (LS) codes are used as spreading codes. A new generation of LS code can be used for
each information bit to be spread. For each generation, a Hadamard matrix from some partition is selected for use in the code
construction. This code evolution increases security against eavesdropping and jamming. One security aspect requires that
the number of Hadamard partitions be large. Thus the number of partitions is studied here. If a Kerdock code construction
is used for the set of matrices, the Hadamard partition constructed is shown to be unique. It is also shown here that this
is not the case if a Gold (or Gold-like) code construction is used. In this case the number of Hadamard partitions can be
enumerated, and is very large.
相似文献
22.
A 0-1 matrix is d-disjunct if no column is covered by the union of any d other columns. A 0-1 matrix is (d; z)-disjunct if for any column C and any d other columns, there exist at least z rows such that each of them has value 1 at column C and value 0 at all the other d columns. Let t(d, n) and t(d, n; z) denote the minimum number of rows required by a d-disjunct matrix and a (d; z)-disjunct matrix with n columns, respectively. We give a very short proof for the currently best upper bound on t(d, n). We also generalize our method to obtain a new upper bound on t(d, n; z).
The work of Y. Cheng and G. Lin is supported by Natural Science and Engineering Research Council
(NSERC) of Canada, and the Alberta Ingenuity Center for Machine Learning (AICML) at the University
of Alberta.
The work of D.-Z. Du is partially supported by National Science Foundation under grant No.CCF0621829. 相似文献
23.
Let be a finite field and a positive integer. In this paper, we find a new combinatorial method to determine weight enumerators of reducible cyclic codes and their dual codes of length over , which just generalize results of Zhu et al. (2015); especially, we also give the weight enumerator of a cyclic code, which is viewed as a partial Melas code. Furthermore, weight enumerators obtained in this paper are all in the form of power of a polynomial. 相似文献
25.
Two infinite families of two–character sets in PG(5,q) arising from the Veronese surface of PG(5,q) are constructed. 相似文献
26.
We introduce new classes of 2-weight cyclic codes which are direct sums of 1-weight irreducible cyclic codes
相似文献
27.
The main results of this paper are in two directions. First, the family of finite local Frobenius non-chain rings of length 4 (hence of nilpotency index 3) is determined. As a by-product all finite local Frobenius non-chain rings with elements, (p a prime) are given. Second, the number and structure of γ-constacyclic codes over finite local Frobenius non-chain rings with nilpotency index 3, of length relatively prime to the characteristic of the residue field of the ring, are determined. 相似文献
28.
29.
In this paper, we classify all optimal linear[n, n/2] codes up to length 12. We show that thereis a unique optimal [10, 5, 5] code up to equivalence. 相似文献
30.
利用有限域上2-幂零矩阵构作Cartesian认证码 总被引:2,自引:0,他引:2
给出 2 -幂零矩阵的Jordan标准型在相似变换下的稳定群的结构 ,利用有限域上 2 -幂零矩阵构作了一个Cartesian认证码 ,计算出了该认证码的参数 .在假定编码规则按等概率分布选取的条件下 ,计算出了该认证码被成功的模仿攻击的最大概率PI 及被成功的替换攻击的最大概率PS. 相似文献