全文获取类型
收费全文 | 1488篇 |
免费 | 85篇 |
国内免费 | 37篇 |
专业分类
化学 | 233篇 |
晶体学 | 9篇 |
力学 | 42篇 |
综合类 | 58篇 |
数学 | 708篇 |
物理学 | 560篇 |
出版年
2024年 | 1篇 |
2023年 | 40篇 |
2022年 | 55篇 |
2021年 | 59篇 |
2020年 | 34篇 |
2019年 | 38篇 |
2018年 | 24篇 |
2017年 | 61篇 |
2016年 | 53篇 |
2015年 | 44篇 |
2014年 | 82篇 |
2013年 | 128篇 |
2012年 | 83篇 |
2011年 | 79篇 |
2010年 | 94篇 |
2009年 | 98篇 |
2008年 | 108篇 |
2007年 | 95篇 |
2006年 | 81篇 |
2005年 | 45篇 |
2004年 | 42篇 |
2003年 | 38篇 |
2002年 | 33篇 |
2001年 | 23篇 |
2000年 | 13篇 |
1999年 | 15篇 |
1998年 | 15篇 |
1997年 | 14篇 |
1996年 | 20篇 |
1995年 | 9篇 |
1994年 | 16篇 |
1993年 | 4篇 |
1992年 | 7篇 |
1991年 | 10篇 |
1990年 | 2篇 |
1989年 | 5篇 |
1988年 | 3篇 |
1987年 | 3篇 |
1986年 | 3篇 |
1985年 | 4篇 |
1984年 | 7篇 |
1983年 | 8篇 |
1982年 | 3篇 |
1981年 | 3篇 |
1978年 | 5篇 |
1977年 | 2篇 |
1969年 | 1篇 |
排序方式: 共有1610条查询结果,搜索用时 15 毫秒
101.
Hua Lu 《Optics Communications》2011,284(8):2254-2256
We present an asymptotic security proof of deterministic quantum key distribution (DQKD) with a two-way quantum channel. The security proof of DQKD with a two-way quantum channel is different from that of BB84, because Eve can attack the travel qubits twice, both in line Bob to Alice and in line Alice to Bob. With the no-signaling principle and the property of mutual information, we obtain an upper bound of the final key generation of entanglement-based DQKD and hence single-photon four-state DQKD. Our results can be applied to the protocol of QKD with two-step quantum channels. 相似文献
102.
Reputation-based network selection mechanism using game theory 总被引:1,自引:0,他引:1
Ramona Trestian Olga Ormond Gabriel-Miro MunteanAuthor vitae 《Physical Communication》2011,4(3):156-171
Current and future wireless environments are based on the coexistence of multiple networks supported by various access technologies deployed by different operators. As wireless network deployments increase, their usage is also experiencing a significant growth. In this heterogeneous multi-technology multi-application multi-terminal multi-user environment users will be able to freely connect to any of the available access technologies. Network selection mechanisms will be required in order to keep mobile users “always best connected” anywhere and anytime. In such a heterogeneous environment, game theory techniques can be adopted in order to understand and model competitive or cooperative scenarios between rational decision makers. In this work we propose a theoretical framework for combining reputation-based systems, game theory and network selection mechanism. We define a network reputation factor which reflects the network’s previous behaviour in assuring service guarantees to the user. Using the repeated Prisoner’s Dilemma game, we model the user–network interaction as a cooperative game and we show that by defining incentives for cooperation and disincentives against defecting on service guarantees, repeated interaction sustains cooperation. 相似文献
103.
Xi X Cegla FB Lowe M Thiemann A Nowak T Mettin R Holsteyns F Lippert A 《Ultrasonics》2011,51(8):1014-1025
The use of bubbles in applications such as surface chemistry, drug delivery, and ultrasonic cleaning etc. has been enormously popular in the past two decades. It has been recognized that acoustically-driven bubbles can be used to disturb the flow field near a boundary in order to accelerate physical or chemical reactions on the surface. The interactions between bubbles and a surface have been studied experimentally and analytically. However, most of the investigations focused on violently oscillating bubbles (also known as cavitation bubble), less attention has been given to understand the interactions between moderately oscillating bubbles and a boundary. Moreover, cavitation bubbles were normally generated in situ by a high intensity laser beam, little experimental work has been carried out to study the translational trajectory of a moderately oscillating bubble in an acoustic field and subsequent interactions with the surface. This paper describes the design of an ultrasonic test cell and explores the mechanism of bubble manipulation within the test cell. The test cell consists of a transducer, a liquid medium and a glass backing plate. The acoustic field within the multi-layered stack was designed in such a way that it was effectively one dimensional. This was then successfully simulated by a one dimensional network model. The model can accurately predict the impedance of the test cell as well as the mode shape (distribution of particle velocity and stress/pressure field) within the whole assembly. The mode shape of the stack was designed so that bubbles can be pushed from their injection point onto a backing glass plate. Bubble radial oscillation was simulated by a modified Keller–Miksis equation and bubble translational motion was derived from an equation obtained by applying Newton’s second law to a bubble in a liquid medium. Results indicated that the bubble trajectory depends on the acoustic pressure amplitude and initial bubble size: an increase of pressure amplitude or a decrease of bubble size forces bubbles larger than their resonant size to arrive at the target plate at lower heights, while the trajectories of smaller bubbles are less influenced by these factors. The test cell is also suitable for testing the effects of drag force on the bubble motion and for studying the bubble behavior near a surface. 相似文献
104.
105.
To minimize traffic congestion, understanding how traffic dynamics depend on network structure is necessary. Many real-world complex systems can be described as multilayer structures. In this paper, we introduce the idea of layers to establish a traffic model of two-layer complex networks. By comparing different two-layer complex networks based on random and scale-free networks, we find that the physical layer is much more important to the network capacity of two-layer complex networks than the logical layer. Two-layer complex networks with a homogeneous physical topology are found to be more tolerant to congestion. Moreover, simulation results show that the heterogeneity of logical and physical topologies makes the packet-delivery process of two-layer networks more efficient in the free-flow state, without the occurrence of traffic congestion. 相似文献
106.
Computing optimal capacity allocations in network revenue management is computationally hard. The problem of computing exact Nash equilibria in non-zero-sum games is computationally hard, too. We present a fast heuristic that, in case it cannot converge to an exact Nash equilibrium, computes an approximation to it in general network revenue management problems under competition. We also investigate the question whether it is worth taking competition into account when making (network) capacity allocation decisions. Computational results show that the payoffs in the approximate equilibria are very close to those in exact ones. Taking competition into account never leads to a lower revenue than ignoring competition, no matter what the competitor does. Since we apply linear continuous models, computation time is very short. 相似文献
107.
Eduardo Álvarez-Miranda Valentina Cacchiani Andrea Lodi Tiziano Parriani Daniel R. Schmidt 《European Journal of Operational Research》2014
We study a single-commodity Robust Network Design problem (RND) in which an undirected graph with edge costs is given together with a discrete set of balance matrices, representing different supply/demand scenarios. In each scenario, a subset of the nodes is exchanging flow. The goal is to determine the minimum cost installation of capacities on the edges such that the flow exchange is feasible for every scenario. Previously conducted computational investigations on the problem motivated the study of the complexity of some special cases and we present complexity results on them, including hypercubes. In turn, these results lead to the definition of new instances (random graphs with {−1, 0, 1} balances) that are computationally hard for the natural flow formulation. These instances are then solved by means of a new heuristic algorithm for RND, which consists of three phases. In the first phase the graph representing the network is reduced by heuristically deleting a subset of the arcs, and a feasible solution is built. The second phase consists of a neighborhood search on the reduced graph based on a Mixed-Integer (Linear) Programming (MIP) flow model. Finally, the third phase applies a proximity search approach to further improve the solution, taking into account the original graph. The heuristic is tested on the new instances, and the comparison with the solutions obtained by Cplex on a natural flow formulation shows the effectiveness of the proposed method. 相似文献
108.
109.
信息安全服务外包决策分析模型研究 总被引:1,自引:1,他引:0
随着信息化的发展,信息安全得到前所未有的重视,国家主管机构的监管越来越严厉,企业在面临强制压力的合规性问题时可以选择自行部署,也可以选择服务外包.通过建立数学模型模拟了这个过程.分析结果表明:在强制压力情况下,如果用户选择外包方式,那么用户信息系统的期望值随着强制压力的提高而降低,信息安全服务供应商的利润则随着强制压力的提高而提高. 相似文献
110.
We examine a network upgrade problem for cost flows. A budget can be distributed among the arcs of the network. An investment on each single arc can be used either to decrease the arc flow cost, or to increase the arc capacity, or both. The goal is to maximize the flow through the network while not exceeding bounds on the budget and on the total flow cost.
The problems are NP-hard even on series-parallel graphs. We provide an approximation algorithm on series-parallel graphs which, for arbitrary δ,>0, produces a solution which exceeds the bounds on the budget and the flow cost by factors of at most 1+δ and 1+, respectively, while the amount of flow is at least that of an optimum solution. The running time of the algorithm is polynomial in the input size and 1/(δ). In addition we give an approximation algorithm on general graphs applicable to problem instances with small arc capacities. 相似文献