首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   4095篇
  免费   289篇
  国内免费   195篇
化学   146篇
晶体学   1篇
力学   202篇
综合类   22篇
数学   3481篇
物理学   727篇
  2024年   6篇
  2023年   55篇
  2022年   77篇
  2021年   76篇
  2020年   98篇
  2019年   120篇
  2018年   97篇
  2017年   100篇
  2016年   86篇
  2015年   88篇
  2014年   221篇
  2013年   420篇
  2012年   227篇
  2011年   290篇
  2010年   243篇
  2009年   359篇
  2008年   331篇
  2007年   281篇
  2006年   222篇
  2005年   146篇
  2004年   132篇
  2003年   147篇
  2002年   94篇
  2001年   79篇
  2000年   69篇
  1999年   66篇
  1998年   73篇
  1997年   69篇
  1996年   63篇
  1995年   42篇
  1994年   43篇
  1993年   22篇
  1992年   23篇
  1991年   15篇
  1990年   8篇
  1989年   4篇
  1988年   6篇
  1987年   4篇
  1986年   7篇
  1985年   15篇
  1984年   4篇
  1983年   6篇
  1982年   6篇
  1981年   7篇
  1980年   11篇
  1978年   4篇
  1977年   5篇
  1976年   3篇
  1975年   2篇
  1973年   3篇
排序方式: 共有4579条查询结果,搜索用时 15 毫秒
981.
In the present paper we investigate when Hausdorff matrices and generalized Hausdorff matrices, with the same mass function, are equivalent, as bounded operators on c and ?p.  相似文献   
982.
In this paper, approximate solutions of vector optimization problems are analyzed via a metrically consistent ε-efficient concept. Several properties of the ε-efficient set are studied. By scalarization, necessary and sufficient conditions for approximate solutions of convex and nonconvex vector optimization problems are provided; a characterization is obtained via generalized Chebyshev norms, attaining the same precision in the vector problem as in the scalarization. This research was partially supported by the Ministerio de Educación y Ciencia (Spain), Project MTM2006-02629 and by the Consejería de Educación de la Junta de Castilla y León (Spain), Project VA027B06. The authors are grateful to the anonymous referees for helpful comments and suggestions.  相似文献   
983.
In a discriminatory processor sharing (DPS) queueing model, each job (or customer) belongs to one out of finitely many classes. The arrival processes are Poisson. Classes differ with respect to arrival rates and service time distributions. Moreover, classes have different priority levels. All jobs present are served simultaneously but the fraction of the server’s capacity allocated to each one of them is proportional to their class priority parameter (while the total capacity is of course fixed).  相似文献   
984.
Not much is known about the weight distribution of the generalized Reed-Muller code RM q (s,m) when q > 2, s > 2 and m ≥ 2. Even the second weight is only known for values of s being smaller than or equal to q/2. In this paper we establish the second weight for values of s being smaller than q. For s greater than (m – 1)(q – 1) we then find the first s + 1 – (m – 1)(q–1) weights. For the case m = 2 the second weight is now known for all values of s. The results are derived mainly by using Gröbner basis theoretical methods.  相似文献   
985.
具有散度形式的拟线性椭圆型方程解的振动性质   总被引:2,自引:0,他引:2  
利用偏Riccati变换和Young不等式技巧,得到了具有散度形式的拟线性椭圆型方程振动的一些新的充分准则。特别地,推广二阶常微分方程振动的Fite-Wintner定理与Kamenev定理到椭圆型方程。  相似文献   
986.
Private Information Retrieval (PIR) protocols, which allow the client to obtain data from servers without revealing its request, have many applications such as anonymous communication, media streaming, blockchain security, advertisement, etc. Multi-server PIR protocols, where the database is replicated among the non-colluding servers, provide high efficiency in the information-theoretic setting. Beimel et al. in CCC 12’ (further referred to as BIKO) put forward a paradigm for constructing multi-server PIR, capturing several previous constructions for k3 servers, as well as improving the best-known share complexity for 3-server PIR. A key component there is a share conversion scheme from corresponding linear three-party secret sharing schemes with respect to a certain type of “modified universal” relation. In a useful particular instantiation of the paradigm, they used a share conversion from (2,3)-CNF over Zm to three-additive sharing over Zpβ for primes p1,p2,p where p1p2 and m=p1·p2, and the relation is modified universal relation CSm. They reduced the question of the existence of the share conversion for a triple (p1,p2,p) to the (in)solvability of a certain linear system over Zp, and provided an efficient (in m,logp) construction of such a sharing scheme. Unfortunately, the size of the system is Θ(m2) which entails the infeasibility of a direct solution for big m’s in practice. Paskin-Cherniavsky and Schmerler in 2019 proved the existence of the conversion for the case of odd p1, p2 when p=p1, obtaining in this way infinitely many parameters for which the conversion exists, but also for infinitely many of them it remained open. In this work, using some algebraic techniques from the work of Paskin-Cherniavsky and Schmerler, we prove the existence of the conversion for even m’s in case p=2 (we computed β in this case) and the absence of the conversion for even m’s in case p>2. This does not improve the concrete efficiency of 3-server PIR; however, our result is promising in a broader context of constructing PIR through composition techniques with k3 servers, using the relation CSm where m has more than two prime divisors. Another our suggestion about 3-server PIR is that it’s possible to achieve a shorter server’s response using the relation CSm for extended SmSm. By computer search, in BIKO framework we found several such sets for small m’s which result in share conversion from (2,3)-CNF over Zm to 3-additive secret sharing over Zpβ, where β>0 is several times less than β, which implies several times shorter server’s response. We also suggest that such extended sets Sm can result in better PIR due to the potential existence of matching vector families with the higher Vapnik-Chervonenkis dimension.  相似文献   
987.
检测模糊控制器是否有隐匿缺陷的一种方法   总被引:1,自引:1,他引:0  
目的:检测模糊控制系统中的模糊控制器是否有隐匿的缺陷。方法:通过分析Zadeh算子与Einstain算子及2种广义算子之间的内在联系,给出了Zadeh算子与Einstain算子及2种广义算子之间的隶属关系,分别用各类算子检测模糊控制系统中的模糊控制器。结果:在检测模糊控制系统中的模糊控制器是否有隐匿的缺陷时,广义算子(如Einstain算子)是一种非常有效的工具。结论:广义算子(如Einstain算子)能检测出模糊控制系统中的模糊控制器是否有隐匿缺陷。  相似文献   
988.
Privacy-preserving machine learning has become an important study at present due to privacy policies. However, the efficiency gap between the plain-text algorithm and its privacy-preserving version still exists. In this paper, we focus on designing a novel secret-sharing-based K-means clustering algorithm. Particularly, we present an efficient privacy-preserving K-means clustering algorithm based on replicated secret sharing with honest-majority in the semi-honest model. More concretely, the clustering task is outsourced to three semi-honest computing servers. Theoretically, the proposed privacy-preserving scheme can be proven with full data privacy. Furthermore, the experimental results demonstrate that our proposed privacy version reaches the same accuracy as the plain-text one. Compared to the existing privacy-preserving scheme, our proposed protocol can achieve about 16.5×–25.2× faster computation and 63.8×–68.0× lower communication. Consequently, the proposed privacy-preserving scheme is suitable for secret-sharing-based secure outsourced computation.  相似文献   
989.
采用化学气相沉积(CVD)技术,通过CH4裂解法制备了碳纳米管(CNTs).使用旋转圆盘处理机(SDP)自组装技术,将纳米Pt和纳米Au电沉积在CNTs上对其进行修饰.随后,通过将铂粒子电化学沉积在CNTs修饰的玻碳电极(GCE)上以及利用静电效应将葡萄糖氧化酶固定在金电极上,制备了CNTs-Pt/GCE和CNTs-A...  相似文献   
990.
In this article, generalized Birkhoff equations are put forward by adding supplementary terms to the Birkhoff equations. A conformal invariance of the Birkhoff equations can be used to study the generalized Birkhoff Equations, and two examples are presented to illustrate the application of the results.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号