全文获取类型
收费全文 | 4095篇 |
免费 | 289篇 |
国内免费 | 195篇 |
专业分类
化学 | 146篇 |
晶体学 | 1篇 |
力学 | 202篇 |
综合类 | 22篇 |
数学 | 3481篇 |
物理学 | 727篇 |
出版年
2024年 | 6篇 |
2023年 | 55篇 |
2022年 | 77篇 |
2021年 | 76篇 |
2020年 | 98篇 |
2019年 | 120篇 |
2018年 | 97篇 |
2017年 | 100篇 |
2016年 | 86篇 |
2015年 | 88篇 |
2014年 | 221篇 |
2013年 | 420篇 |
2012年 | 227篇 |
2011年 | 290篇 |
2010年 | 243篇 |
2009年 | 359篇 |
2008年 | 331篇 |
2007年 | 281篇 |
2006年 | 222篇 |
2005年 | 146篇 |
2004年 | 132篇 |
2003年 | 147篇 |
2002年 | 94篇 |
2001年 | 79篇 |
2000年 | 69篇 |
1999年 | 66篇 |
1998年 | 73篇 |
1997年 | 69篇 |
1996年 | 63篇 |
1995年 | 42篇 |
1994年 | 43篇 |
1993年 | 22篇 |
1992年 | 23篇 |
1991年 | 15篇 |
1990年 | 8篇 |
1989年 | 4篇 |
1988年 | 6篇 |
1987年 | 4篇 |
1986年 | 7篇 |
1985年 | 15篇 |
1984年 | 4篇 |
1983年 | 6篇 |
1982年 | 6篇 |
1981年 | 7篇 |
1980年 | 11篇 |
1978年 | 4篇 |
1977年 | 5篇 |
1976年 | 3篇 |
1975年 | 2篇 |
1973年 | 3篇 |
排序方式: 共有4579条查询结果,搜索用时 15 毫秒
981.
Inci Albayrak 《Journal of Mathematical Analysis and Applications》2007,328(1):414-428
In the present paper we investigate when Hausdorff matrices and generalized Hausdorff matrices, with the same mass function, are equivalent, as bounded operators on c and ?p. 相似文献
982.
In this paper, approximate solutions of vector optimization problems are analyzed via a metrically consistent ε-efficient concept. Several properties of the ε-efficient set are studied. By scalarization, necessary and sufficient conditions for approximate solutions of convex and
nonconvex vector optimization problems are provided; a characterization is obtained via generalized Chebyshev norms, attaining
the same precision in the vector problem as in the scalarization.
This research was partially supported by the Ministerio de Educación y Ciencia (Spain), Project MTM2006-02629 and by the Consejería
de Educación de la Junta de Castilla y León (Spain), Project VA027B06. The authors are grateful to the anonymous referees
for helpful comments and suggestions. 相似文献
983.
In a discriminatory processor sharing (DPS) queueing model, each job (or customer) belongs to one out of finitely many classes. The arrival processes are Poisson. Classes differ with respect to arrival rates and service time distributions. Moreover, classes have different priority levels. All jobs present are served simultaneously but the fraction of the server’s capacity allocated to each one of them is proportional to their class priority parameter (while the total capacity is of course fixed). 相似文献
984.
Olav Geil 《Designs, Codes and Cryptography》2008,48(3):323-330
Not much is known about the weight distribution of the generalized Reed-Muller code RM q (s,m) when q > 2, s > 2 and m ≥ 2. Even the second weight is only known for values of s being smaller than or equal to q/2. In this paper we establish the second weight for values of s being smaller than q. For s greater than (m – 1)(q – 1) we then find the first s + 1 – (m – 1)(q–1) weights. For the case m = 2 the second weight is now known for all values of s. The results are derived mainly by using Gröbner basis theoretical methods. 相似文献
985.
具有散度形式的拟线性椭圆型方程解的振动性质 总被引:2,自引:0,他引:2
利用偏Riccati变换和Young不等式技巧,得到了具有散度形式的拟线性椭圆型方程振动的一些新的充分准则。特别地,推广二阶常微分方程振动的Fite-Wintner定理与Kamenev定理到椭圆型方程。 相似文献
986.
Private Information Retrieval (PIR) protocols, which allow the client to obtain data from servers without revealing its request, have many applications such as anonymous communication, media streaming, blockchain security, advertisement, etc. Multi-server PIR protocols, where the database is replicated among the non-colluding servers, provide high efficiency in the information-theoretic setting. Beimel et al. in CCC 12’ (further referred to as BIKO) put forward a paradigm for constructing multi-server PIR, capturing several previous constructions for servers, as well as improving the best-known share complexity for 3-server PIR. A key component there is a share conversion scheme from corresponding linear three-party secret sharing schemes with respect to a certain type of “modified universal” relation. In a useful particular instantiation of the paradigm, they used a share conversion from -CNF over to three-additive sharing over for primes where and , and the relation is modified universal relation . They reduced the question of the existence of the share conversion for a triple to the (in)solvability of a certain linear system over , and provided an efficient (in ) construction of such a sharing scheme. Unfortunately, the size of the system is which entails the infeasibility of a direct solution for big m’s in practice. Paskin-Cherniavsky and Schmerler in 2019 proved the existence of the conversion for the case of odd , when , obtaining in this way infinitely many parameters for which the conversion exists, but also for infinitely many of them it remained open. In this work, using some algebraic techniques from the work of Paskin-Cherniavsky and Schmerler, we prove the existence of the conversion for even m’s in case (we computed in this case) and the absence of the conversion for even m’s in case . This does not improve the concrete efficiency of 3-server PIR; however, our result is promising in a broader context of constructing PIR through composition techniques with servers, using the relation where m has more than two prime divisors. Another our suggestion about 3-server PIR is that it’s possible to achieve a shorter server’s response using the relation for extended . By computer search, in BIKO framework we found several such sets for small m’s which result in share conversion from -CNF over to 3-additive secret sharing over , where is several times less than , which implies several times shorter server’s response. We also suggest that such extended sets can result in better PIR due to the potential existence of matching vector families with the higher Vapnik-Chervonenkis dimension. 相似文献
987.
检测模糊控制器是否有隐匿缺陷的一种方法 总被引:1,自引:1,他引:0
目的:检测模糊控制系统中的模糊控制器是否有隐匿的缺陷。方法:通过分析Zadeh算子与Einstain算子及2种广义算子之间的内在联系,给出了Zadeh算子与Einstain算子及2种广义算子之间的隶属关系,分别用各类算子检测模糊控制系统中的模糊控制器。结果:在检测模糊控制系统中的模糊控制器是否有隐匿的缺陷时,广义算子(如Einstain算子)是一种非常有效的工具。结论:广义算子(如Einstain算子)能检测出模糊控制系统中的模糊控制器是否有隐匿缺陷。 相似文献
988.
Privacy-preserving machine learning has become an important study at present due to privacy policies. However, the efficiency gap between the plain-text algorithm and its privacy-preserving version still exists. In this paper, we focus on designing a novel secret-sharing-based K-means clustering algorithm. Particularly, we present an efficient privacy-preserving K-means clustering algorithm based on replicated secret sharing with honest-majority in the semi-honest model. More concretely, the clustering task is outsourced to three semi-honest computing servers. Theoretically, the proposed privacy-preserving scheme can be proven with full data privacy. Furthermore, the experimental results demonstrate that our proposed privacy version reaches the same accuracy as the plain-text one. Compared to the existing privacy-preserving scheme, our proposed protocol can achieve about 16.5×–25.2× faster computation and 63.8×–68.0× lower communication. Consequently, the proposed privacy-preserving scheme is suitable for secret-sharing-based secure outsourced computation. 相似文献
989.
990.
In this article, generalized Birkhoff equations are put forward by adding supplementary terms to the Birkhoff equations. A conformal invariance of the Birkhoff equations can be used to study the generalized Birkhoff Equations, and two examples are presented to illustrate the application of the results. 相似文献