全文获取类型
收费全文 | 448篇 |
免费 | 2篇 |
国内免费 | 1篇 |
专业分类
力学 | 1篇 |
数学 | 412篇 |
物理学 | 38篇 |
出版年
2023年 | 1篇 |
2022年 | 6篇 |
2021年 | 3篇 |
2020年 | 4篇 |
2019年 | 6篇 |
2018年 | 10篇 |
2017年 | 6篇 |
2015年 | 5篇 |
2014年 | 31篇 |
2013年 | 42篇 |
2012年 | 39篇 |
2011年 | 45篇 |
2010年 | 44篇 |
2009年 | 46篇 |
2008年 | 25篇 |
2007年 | 38篇 |
2006年 | 12篇 |
2005年 | 7篇 |
2004年 | 4篇 |
2003年 | 3篇 |
2002年 | 4篇 |
2001年 | 2篇 |
2000年 | 4篇 |
1999年 | 2篇 |
1998年 | 6篇 |
1997年 | 4篇 |
1996年 | 10篇 |
1995年 | 2篇 |
1994年 | 3篇 |
1993年 | 3篇 |
1992年 | 2篇 |
1991年 | 4篇 |
1990年 | 1篇 |
1989年 | 2篇 |
1987年 | 1篇 |
1986年 | 2篇 |
1985年 | 6篇 |
1984年 | 2篇 |
1982年 | 1篇 |
1981年 | 4篇 |
1980年 | 1篇 |
1979年 | 1篇 |
1978年 | 2篇 |
1977年 | 1篇 |
1976年 | 4篇 |
排序方式: 共有451条查询结果,搜索用时 9 毫秒
1.
We study game formulas the truth of which is determined by a semantical game of uncountable length. The main theme is the study of principles stating reflection of these formulas in various admissible sets. This investigation leads to two weak forms of strict-II11 reflection (or ∑1-compactness). We show that admissible sets such as H(ω2) and Lω2 which fail to have strict-II11 reflection, may or may not, depending on set-theoretic hypotheses satisfy one or both of these weaker forms. Mathematics Subject Classification : 03C70, 03C75. 相似文献
2.
Chi Kin Chau Kwang Mong Sim 《Operations Research Letters》2003,31(5):327-334
By showing that there is an upper bound for the price of anarchyρ(Γ) for a non-atomic congestion game Γ with only separable cost maps and fixed demands, Roughgarden and Tardos show that the cost of forgoing centralized control is mild. This letter shows that there is an upper bound for ρ(Γ) in Γ for fixed demands with symmetric cost maps. It also shows that there is a weaker bound for ρ(Γ) in Γ with elastic demands. 相似文献
3.
The problem of defining threat strategies in nonzero-sum games is considered, and a definition of optimal threat strategies is proposed in the static case. This definition is then extended to differential games, and sufficient conditions for optimality of threat strategies are derived. These are then applied to a simple example. The definition proposed here is then compared with the definition of threat strategies given by Nash. 相似文献
4.
J. Lewin 《Journal of Optimization Theory and Applications》1976,18(3):429-432
The solution given by Isaacs to the bang-bang-bang problem is shown to be a solution in aweak sense only. A solution in a stronger sense is demonstrated involving the notions of extended closed-loop strategies and of extended value-function. The bang-bang-bang singular surface is interpreted in a new way.The author is grateful to Professor J. V. Breakwell for his criticism and valuable remarks. 相似文献
5.
Theo S. H. Driessen 《TOP》1996,4(1):165-185
Summary The τ-value is a one-point solution concept for transferable utility (TU-) games. The paper introduces a particular type of
a reduced game. It is established that the τ-value possesses the reduced game property with respect to the reduced game presented.
That is, there is no inconsistency in what the players of the reduced game receive-either in the original game or in the reduced
game-according to the τ-value concept. In addition, the paper provides an axiomatic characterization of the τ-value in terms
of the relevant reduced game property and standardness for two-person games. 相似文献
6.
Due to the increasing deployment of heterogeneous networks (HetNets), the selection of which radio access technologies (RATs) for Internet of Things (IoT) devices such as user equipments (UEs) has recently received extensive attention in mobility management research. Most of existing RAT selection methods only optimize the selection strategies from the UE side or network side, which results in heavy network congestion, poor user experience and system utility degradation. In this paper the UE side and the network side are considered comprehensively, based on the game theory (GT) model we propose a reinforcement learning with assisted network information algorithm to overcome the crucial points. The assisted information is formulated as a semi-Markov decision process (SMDP) provided for UEs to make accurate decisions, and we adopt the iteration approach to reach the optimal policy. Moreover, we investigate the impacts of different parameters on the system utility and handover performance. Numerical results validate that our proposed algorithm can mitigate unnecessary handovers and improve system throughputs. 相似文献
7.
In this paper, we propose an optimization framework to determine the distribution of power and bits/channel use to secondary users in a competitive cognitive radio networks. The objectives of the optimization framework are to minimize total transmission power, maximize total bits/channel use and also to maintain quality of service. An upper bound on probability of bit error and lower bound on bits/channel use requirement of secondary users are considered as quality of service. The optimization problem is also constrained by total power budget across channels for a user. Simulating the framework in a centralized manner shows that more transmit power is required to allocate in a channel with higher noise power. However, allocation of bits/channel use is directly proportional to signal to interference plus noise power ratio. The proposed framework is more capable of supporting high bits/channel use requirement than existing resource allocation framework. We also develop the game theoretic user based distributed approach of the proposed framework. We see that user based distributed solution also follows centralized solution. 相似文献
8.
In some real complex systems the structures are difficult to map or changing over time. To explore the evolution of strategies on these complex systems, it is not realistic enough to specify their structures or topological properties in advance. In this paper, we address the evolutionary game on a stochastic growth network adopting the prisoner’s dilemma game. We introduce a growing rate q to control the ratio of network growth to strategy evolution. A large q denotes that the network grows faster than strategy evolution. Simulation results show that a fast growing rate is helpful to promote the average payoffs of both cooperators and defectors. Moreover, this parameter also significantly influences the cooperation frequency on the resulting networks. The coexisting mechanisms in this paper may provide a beneficial insight for understanding the emergence of complex topological structures and game behaviors in numerous real systems. 相似文献
9.
We study the possible advantages of adopting quantum strategies in multi-player evolutionary games. We base our study on the three-player Prisoner’s Dilemma (PD) game. In order to model the simultaneous interaction between three agents we use hypergraphs and hypergraph networks. In particular, we study two types of networks: a random network and a SF-like network. The obtained results show that in the case of a three-player game on a hypergraph network, quantum strategies are not necessarily stochastically stable strategies. In some cases, the defection strategy can be as good as a quantum one. 相似文献
10.
One of the challenges of cellular automaton research is finding models with a low complexity and at the same time a rich dynamics. A measure of low complexity is the number of states in the model and the number of transition rules to switch between those states. In this paper, we propose a 2-dimensional 2-state cellular automaton that-though governed by a single simple transition rule-has a sufficiently rich dynamics to be computationally universal. According to the transition rule, a cell’s state is determined by the sum of the states of the cells at orthogonal or diagonal distances one or two from the cell (distance-2 Moore neighbourhood), but not by the previous state of the cell itself. Notwithstanding its simplicity, this model is able to generate a great variety of patterns, including several types of stable configurations, oscillators and patterns that move over cellular space (gliders). We prove the computational universality of the model by constructing a universal set of logic gates (NOT and AND) from these patterns. A key element in this proof is the shifting of phases and positions of signals such that they meet the input requirements of the logic gates. Similarities of the model with classical spin systems are also discussed. 相似文献