首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   563篇
  免费   131篇
  国内免费   20篇
化学   30篇
力学   15篇
综合类   13篇
数学   483篇
物理学   173篇
  2023年   12篇
  2022年   25篇
  2021年   31篇
  2020年   28篇
  2019年   24篇
  2018年   18篇
  2017年   27篇
  2016年   29篇
  2015年   17篇
  2014年   54篇
  2013年   30篇
  2012年   39篇
  2011年   43篇
  2010年   57篇
  2009年   51篇
  2008年   34篇
  2007年   44篇
  2006年   38篇
  2005年   17篇
  2004年   7篇
  2003年   16篇
  2002年   14篇
  2001年   12篇
  2000年   9篇
  1999年   3篇
  1998年   14篇
  1997年   5篇
  1996年   1篇
  1995年   1篇
  1994年   3篇
  1993年   2篇
  1992年   2篇
  1991年   4篇
  1990年   1篇
  1987年   1篇
  1986年   1篇
排序方式: 共有714条查询结果,搜索用时 0 毫秒
671.
介绍了北京师范大学的一门针对化学师范生职前教育训练的实践类课程——“中学化学教学设计与实践”,主要包括该课程的特色和发展历程.以实际班级授课为例详细介绍了常规的一对一指导教学模式,以及结合网络课程进行线上和线下同步教学的模式.另外,介绍了该门课的2种网络课型,即“爱课程网”的精品资源共享课和“京师在线”网上的MOOC课的课程框架和课程资源.  相似文献   
672.
方新  蹇明  靳留乾 《运筹与管理》2017,26(6):132-139
研究表明回购契约与收益共享契约具有等价性,然而二者却适用于不同的供应链。本文从提前期可控的视角并将供应链管理引入需求分布自由的市场环境,研究二者的适应性。首先构建一体化供应链系统的决策模型,基于模型推导其最优生产量和最优生产时点的存在性条件;然后分别以回购契约和收益共享契约作为激励机制,研究契约对单一供应商-零售商构成的二级分散供应链系统的适应性。结果表明,回购契约和收益共享契约均能协调供应链,但二者具有不同的适应性:当单位时间内边际生产成本增幅较大时,供应商偏好选择回购契约;提前压缩期越长,零售商越偏好选择收益共享契约。最后通过数值分析验证文章模型的有效性。  相似文献   
673.
This paper concentrates on cost sharing situations which arise when delayed joint projects involve joint delay costs. The problem here is to determine fair shares for each of the agents who contribute to the delay of the project such that the total delay cost is cleared. We focus on the evaluation of the responsibility of each agent in delaying the project based on the activity graph representation of the project and then on solving the important problem of the delay cost sharing among the agents involved. Two approaches, both rooted in cooperative game theory methods are presented as possible solutions. In the first approach delay cost sharing rules are introduced which are based on the delay of the project and on the individual delays of the agents who perform activities. This approach is inspired by the bankruptcy and taxation literature and leads to five rules: the (truncated) proportional rule, the (truncated) constrained equal reduction rule and the constrained equal contribution rule. By introducing two coalitional games related to delay cost sharing problems, which we call the pessimistic delay game and the optimistic delay game, also game theoretical solutions as the Shapley value, the nucleolus and the -value generate delay cost sharing rules. In the second approach the delays of the relevant paths in the activity graph together with the delay of the project play a role. A two-stage solution is proposed. The first stage can be seen as a game between paths, where the delay cost of the project has to be allocated to the paths. Here serial cost sharing methods play a role. In the second stage the allocated costs of each path are divided proportionally to the individual delays among the activities in the path.  相似文献   
674.
In a conventional secret sharing scheme a dealer uses secure point-to-point channels to distribute the shares of a secret to a number of participants. At a later stage an authorised group of participants send their shares through secure point-to-point channels to a combiner who will reconstruct the secret. In this paper, we assume no point-to-point channel exists and communication is only through partial broadcast channels. A partial broadcast channel is a point-to-multipoint channel that enables a sender to send the same message simultaneously and privately to a fixed subset of receivers. We study secret sharing schemes with partial broadcast channels, called partial broadcast secret sharing schemes. We show that a necessary and sufficient condition for the partial broadcast channel allocation of a (t, n)-threshold partial secret sharing scheme is equivalent to a combinatorial object called a cover-free family. We use this property to construct a (t, n)-threshold partial broadcast secret sharing scheme with O(log n) partial broadcast channels. This is a significant reduction compared to n point-to-point channels required in a conventional secret sharing scheme. Next, we consider communication rate of a partial broadcast secret sharing scheme defined as the ratio of the secret size to the total size of messages sent by the dealer. We show that the communication rate of a partial broadcast secret sharing scheme can approach 1/O(log n) which is a significant increase over the corresponding value, 1/n, in the conventional secret sharing schemes. We derive a lower bound on the communication rate and show that for a (t,n)-threshold partial broadcast secret sharing scheme the rate is at least 1/t and then we propose constructions with high communication rates. We also present the case of partial broadcast secret sharing schemes for general access structures, discuss possible extensions of this work and propose a number of open problems.   相似文献   
675.
This article studies the problem of uniqueness of two entire or meromorphic functions whose differential polynomials share a finite set. The results extend and improve on some theorems given in [3].  相似文献   
676.
通过三阶段博弈模型分析竞争性企业技术联盟知识共享效应,结果表明:知识共享的程度是随着竞争性企业技术联盟规模的扩大而增加的.因为随着技术联盟规模的扩大,知识共享的规模收益会逐渐上升,从而减少了由于知识溢出而带来的损失.因此,在企业技术联盟内部构建一个能够有效地吸收、保持和共享知识的机制对于提高技术联盟的绩效具有积极的作用.  相似文献   
677.
Over the past few decades, the Processor-Sharing (PS) discipline has attracted a great deal of attention in the queueing literature. While the PS paradigm emerged in the sixties as an idealization of round-robin scheduling in time-shared computer systems, it has recently captured renewed interest as a useful concept for modeling the flow-level performance of bandwidth-sharing protocols in communication networks. In contrast to the simple geometric queue length distribution, the sojourn time lacks such a nice closed-form characterization, even for exponential service requirements. In case of heavy-tailed service requirements however, there exists a simple asymptotic equivalence between the sojourn time and the service requirement distribution, which is commonly referred to as a reduced service rate approximation. In the present survey paper, we give an overview of several methods that have been developed to obtain such an asymptotic equivalence under various distributional assumptions. We outline the differences and similarities between the various approaches, discuss some connections, and present necessary and sufficient conditions for an asymptotic equivalence to hold. We also consider the generalization of the reduced service rate approximation to several extensions of the M/G/1 PS queue. In addition, we identify a relationship between the reduced service rate approximation and a queue length distribution with a geometrically decaying tail, and extend it to so-called bandwidth-sharing networks. The state-of-the-art with regard to sojourn time asymptotics in PS queues with light-tailed service requirements is also briefly described. Last, we reflect on some possible avenues for further research. AMS Subject Classification 60K25 (primary), 60F10, 68M20, 90B18, 90B22 (secondary).  相似文献   
678.
In this paper we study linear secret sharing schemes by monotone span programs, according to the relation between realizing access structures by linear secret sharing schemes and computing monotone Boolean functions by monotone span programs. We construct some linear secret sharing schemes. Furthermore, we study the rearrangements of access structures that is very important in practice.  相似文献   
679.
We give in this paper an algorithm to compute the sojourn time distribution in the processor sharing, single server queue with Poisson arrivals and phase type distributed service times. In a first step, we establish the differential system governing the conditional sojourn times probability distributions in this queue, given the number of customers in the different phases of the PH distribution at the arrival instant of a customer. This differential system is then solved by using a uniformization procedure and an exponential of matrix. The proposed algorithm precisely consists of computing this exponential with a controlled accuracy. This algorithm is then used in practical cases to investigate the impact of the variability of service times on sojourn times and the validity of the so-called reduced service rate (RSR) approximation, when service times in the different phases are highly dissymmetrical. For two-stage PH distributions, we give conjectures on the limiting behavior in terms of an M/M/1 PS queue and provide numerical illustrative examples.This revised version was published online in June 2005 with corrected coverdate  相似文献   
680.
To achieve a constant overflow probability, the two queueing resources, viz. buffer and bandwidth, can be traded off. In this paper we prove that, under general circumstances, the corresponding trade-off curve is convex in the 'many-sources scaling'. This convexity enables optimal resource partitioning in a queueing system supporting heterogeneous traffic, with heterogeneous quality-of-service requirements.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号