首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   3779篇
  免费   453篇
  国内免费   154篇
化学   193篇
晶体学   1篇
力学   838篇
综合类   55篇
数学   2399篇
物理学   900篇
  2024年   2篇
  2023年   56篇
  2022年   79篇
  2021年   108篇
  2020年   147篇
  2019年   114篇
  2018年   101篇
  2017年   128篇
  2016年   132篇
  2015年   110篇
  2014年   187篇
  2013年   267篇
  2012年   176篇
  2011年   235篇
  2010年   204篇
  2009年   250篇
  2008年   227篇
  2007年   233篇
  2006年   221篇
  2005年   188篇
  2004年   155篇
  2003年   166篇
  2002年   110篇
  2001年   116篇
  2000年   105篇
  1999年   89篇
  1998年   108篇
  1997年   64篇
  1996年   56篇
  1995年   26篇
  1994年   49篇
  1993年   27篇
  1992年   32篇
  1991年   33篇
  1990年   16篇
  1989年   15篇
  1988年   4篇
  1987年   11篇
  1986年   6篇
  1985年   8篇
  1984年   9篇
  1983年   4篇
  1982年   2篇
  1980年   2篇
  1979年   2篇
  1978年   2篇
  1976年   2篇
  1957年   1篇
  1936年   1篇
排序方式: 共有4386条查询结果,搜索用时 15 毫秒
21.
We provide an approximate analysis of the transient sojourn time for a processor sharing queue with time varying arrival and service rates, where the load can vary over time, including periods of overload. Using the same asymptotic technique as uniform acceleration as demonstrated in [12] and [13], we obtain fluid and diffusion limits for the sojourn time of the Mt/Mt/1 processor-sharing queue. Our analysis is enabled by the introduction of a “virtual customer” which differs from the notion of a “tagged customer” in that the former has no effect on the processing time of the other customers in the system. Our analysis generalizes to non-exponential service and interarrival times, when the fluid and diffusion limits for the queueing process are known.  相似文献   
22.
基于移动Agent技术的医学图像检索方法   总被引:1,自引:0,他引:1  
针对现有医学图像检索方法中,检索算法速度较慢、准确性较低以及远程检索时占用大量带宽等问题,设计并实现了一种基于移动Agent技术的医学图像检索方法,重点讨论了该方法实现的关键技术,包括提升框架下的M带整数小波变换和提取多通道纹理特征的检索算法.模拟实验结果表明,该方法实时性较强,占用网络带宽较少,采用的算法运算速度提高近10倍、运算复杂度降低约50%,提取的纹理特征能充分表达图像内容,较好地满足了医学图像的检索要求,实现了对医学图像库快速较准确的检索.  相似文献   
23.
Given a dilation matrix A :ℤd→ℤd, and G a complete set of coset representatives of 2π(A −Td/ℤd), we consider polynomial solutions M to the equation ∑ g∈G M(ξ+g)=1 with the constraints that M≥0 and M(0)=1. We prove that the full class of such functions can be generated using polynomial convolution kernels. Trigonometric polynomials of this type play an important role as symbols for interpolatory subdivision schemes. For isotropic dilation matrices, we use the method introduced to construct symbols for interpolatory subdivision schemes satisfying Strang–Fix conditions of arbitrary order. Research partially supported by the Danish Technical Science Foundation, Grant No. 9701481, and by the Danish SNF-PDE network.  相似文献   
24.
On a question of Gross   总被引:1,自引:0,他引:1  
Using the notion of weighted sharing of sets we prove two uniqueness theorems which improve the results proved by Fang and Qiu [H. Qiu, M. Fang, A unicity theorem for meromorphic functions, Bull. Malaysian Math. Sci. Soc. 25 (2002) 31-38], Lahiri and Banerjee [I. Lahiri, A. Banerjee, Uniqueness of meromorphic functions with deficient poles, Kyungpook Math. J. 44 (2004) 575-584] and Yi and Lin [H.X. Yi, W.C. Lin, Uniqueness theorems concerning a question of Gross, Proc. Japan Acad. Ser. A 80 (2004) 136-140] and thus provide an answer to the question of Gross [F. Gross, Factorization of meromorphic functions and some open problems, in: Proc. Conf. Univ. Kentucky, Lexington, KY, 1976, in: Lecture Notes in Math., vol. 599, Springer, Berlin, 1977, pp. 51-69], under a weaker hypothesis.  相似文献   
25.
Due to the strong experimental evidence that the traffic to be offered to future broadband networks will display long-range dependence, it is important to study the possible implications that such traffic may have for the design and performance of these networks. In particular, an important question is whether the offered traffic preserves its long-range dependent nature after passing through a policing mechanism at the interface of the network. One of the proposed solutions for flow control in the context of the emerging ATM standard is the so-called leaky bucket scheme. In this paper we consider a leaky bucket system with long-range dependent input traffic. We adopt the following popular model for long-range dependent traffic: Time is discrete. At each unit time a random number of sessions is initiated, having the distribution of a Poisson random variable with mean λ. Each of these sessions has a random duration τ, where the integer random variable τ has finite mean, infinite variance, and a regularly varying tail, i.e., P(τ >К) ~ К-Lα L(К), where 1 < α < 2 L(·) is a slowly varying function. Once a session is initiated, it generates one cell at each unit of time until its termination. We examine the departure process of the leaky bucket policing mechanism driven by such an arrival process, and show that it too is long-range dependent for any token buffer size and any - finite or infinite - cell buffer size. Moreover, upper and lower bounds for the covariance sequence of the output process are established. The above results demonstrate that long-range dependence cannot be removed by the kinds of flow control schemes that are currently being envisioned for broadband networks. This revised version was published online in June 2006 with corrections to the Cover Date.  相似文献   
26.
In this paper the steady-state behavior of a closed queueing network with multiple classes and large populations is investigated. One of the two nodes of the network simply introduces random delays and the discipline in the other node is discriminatory processor sharing. The network is not product-form, so not even the steady-state behavior is known. We assume that the usage is moderately heavy, and obtain two-term asymptotic approximations to the mean number of jobs, and the mean sojourn time, of each class of jobs in the processor node. We also obtain the leading term in the asymptotic approximation to the joint distribution of the number of jobs in the processor node, which is a zero-mean multivariate Gaussian distribution around a line through the origin.  相似文献   
27.
A uniqueness theorem for two distinct non-constant meromorphic functions that share three values of finite weights is proved, which generalizes two previous results by H.X. Yi, and X.M. Li and H.X. Yi. As applications of it, many known results by H.X. Yi and P. Li, etc. could be improved. Furthermore, with the concept of finite-weight sharing, extensions on Osgood-Yang's conjecture and Mues' conjecture, and a generalization of some prevenient results by M. Ozawa and H. Ueda, ect. could be obtained.  相似文献   
28.
Finite groups of prime order must be cyclic. It is natural to ask what about association schemes of prime order. In this paper, we will give an answer to this question. An association scheme of prime order is commutative, and its valencies of nontrivial relations and multiplicities of nontrivial irreducible characters are constant. Moreover, if we suppose that the minimal splitting field is an abelian extension of the field of rational numbers, then the character table is the same as that of a Schurian scheme.  相似文献   
29.
This paper considers a two-echelon capacitated supply chain with two non-identical retailers and information sharing. We characterize the optimal inventory policies. We also study the benefits of the optimal stock rationing policy over the first come first served (FCFS) and the modified echelon-stock rationing (MESR) policies.  相似文献   
30.
1 IntroductionThispaperisdevotedtostudywhatkindofdiscreteschemesofthefollowing 2n dimen sionalHamiltoniansystemswithparameterinnormalform u=J2n H uT,  H =H(u ,λ) ,(1 )whereu∈R2n,λ∈R ,H∈Ck+1(R2n×R ,R) ,k≥ 6,andJ2n =0In-In 0 ,In:unitmatrixofordernhasthepropertyofinheritinghom…  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号