首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   563篇
  免费   131篇
  国内免费   20篇
化学   30篇
力学   15篇
综合类   13篇
数学   483篇
物理学   173篇
  2023年   12篇
  2022年   25篇
  2021年   31篇
  2020年   28篇
  2019年   24篇
  2018年   18篇
  2017年   27篇
  2016年   29篇
  2015年   17篇
  2014年   54篇
  2013年   30篇
  2012年   39篇
  2011年   43篇
  2010年   57篇
  2009年   51篇
  2008年   34篇
  2007年   44篇
  2006年   38篇
  2005年   17篇
  2004年   7篇
  2003年   16篇
  2002年   14篇
  2001年   12篇
  2000年   9篇
  1999年   3篇
  1998年   14篇
  1997年   5篇
  1996年   1篇
  1995年   1篇
  1994年   3篇
  1993年   2篇
  1992年   2篇
  1991年   4篇
  1990年   1篇
  1987年   1篇
  1986年   1篇
排序方式: 共有714条查询结果,搜索用时 109 毫秒
681.
Zhang  Zhi-Li 《Queueing Systems》1998,28(4):349-376
We establish asymptotic upper and lower bounds on the asymptotic decay rate of per-session queue length tail distributions for a multiple-queue system where a single constant rate server services the queues using the generalized processor sharing (GPS) scheduling discipline. In the special case where there are only two queues, the upper and lower bounds match, yielding the optimal bound proved in [15]. The dynamics of bandwidth sharing of a multiple-queue GPS system is captured using the notion of partial feasible sets, and the bounds are obtained using the sample-path large deviation principle. The results have implications in call admission control for high-speed communication networks. This revised version was published online in June 2006 with corrections to the Cover Date.  相似文献   
682.
In this paper, we study a discriminatory processor sharing queue with Poisson arrivals,K classes and general service times. For this queue, we prove a decomposition theorem for the conditional sojourn time of a tagged customer given the service times and class affiliations of the customers present in the system when the tagged customer arrives. We show that this conditional sojourn time can be decomposed inton+1 components if there aren customers present when the tagged customer arrives. Further, we show that thesen+1 components can be obtained as a solution of a system of non-linear integral equations. These results generalize known results about theM/G/1 egalitarian processor sharing queue.  相似文献   
683.
We consider a memoryless single server queue with two classes of customers, each having its fixed entry fee. We show that profit and social welfare may benefit from a service discipline based on relative priorities.  相似文献   
684.
This paper provides an exposition of methods by which a trusted authority can distribute keys and/or broadcast a message over a network, so that each member of a privileged subset of users can compute a specified key or decrypt the broadcast message. Moreover, this is done in such a way that no coalition is able to recover any information on a key or broadcast message they are not supposed to know. The problems are studied using the tools of information theory, so the security provided is unconditional (i.e., not based on any computational assumption).We begin by surveying some useful schemes for key distribution that have been presented in the literature, giving background and examples (but not too many proofs). In particular, we look more closely at the attractive concept of key distribution patterns, and present a new method for making these schemes more efficient through the use of resilient functions. Then we present a general approach to the construction of broadcast schemes that combines key predistribution schemes with secret sharing schemes. We discuss the Fiat-Naor Broadcast Scheme, as well as other, new schemes that can be constructed using this approach.  相似文献   
685.
A threshold quantum secret sharing (TQSS) scheme between multi-party and multi-party was proposed using a sequence of single photons, which is useful and efficient when the parties of communication are not all present. We described the process of this TQSS scheme and discussed its security. It was shown that entanglement is not necessary for quantum secret sharing. Moreover, the theoretic efficiency was improved to approach 100% as almost all the instances can be used for generating the private key, and each photon can carry one bit of information. This protocol is feasible with the present-day technique. Supported by the National Basic Research Program of China (973 Program)(Grant No. 2007CB311100), the National High-Technology Research and Development Program of China (Grant Nos. 2006AA01Z419 and 2006AA01Z440), the Major Research Plan of the National Natural Science Foundation of China (Grant No. 90604023), the Scientific Research Common Program of Beijing Municipal Commission of Education (Grant No. KM200810005004), the Scientific Research Foundation for the Youth of Beijing University of Technology (Grant No. 97007016200701), the Doctoral Scientific Research Activation Foundation of Beijing University of Technology (Grant No. 52007016200702), the ISN Open Foundation, and the National Laboratory for Modern Communications Science Foundation of China (Grant No. 9140C1101010601)  相似文献   
686.
为进一步丰富亚纯函数唯一性理论,寻求更佳的唯一性条件,利用亚纯函数Nevanlinna理论更精确地估计亚纯函数的n重值点的计数函数,得到两个亚纯函数与其导数具有某些分担值时的唯一性定理,推广和改进了相关文献的相关结果.  相似文献   
687.
By providing a free experience service, a service firm can attract more uninformed customers. However, it could reversely effect the delay-sensitive, informed customers’ decision. In this paper, we study a priority queueing system with free experience services. We study the customer behavior in equilibrium after we derive the expected customer waiting time. We then construct the service firm’s revenue function and obtain an optimal strategy for the service firm. Our results suggest that when the market size of informed customers is relatively small, the firm should consider providing free experience services for uninformed customers. Conversely, if the demand rate of potential informed customers is quite high, the firm should ignore uninformed customers.  相似文献   
688.
Estimation of efficiency of firms in a non-competitive market characterized by heterogeneous inputs and outputs along with their varying prices is questionable when factor-based technology sets are used in data envelopment analysis (DEA). In this scenario, a value-based technology becomes an appropriate reference technology against which efficiency can be assessed. In this contribution, the value-based models of Tone (2002) are extended in a directional DEA set up to develop new directional cost- and revenue-based measures of efficiency, which are then decomposed into their respective directional value-based technical and allocative efficiencies. These new directional value-based measures are more general, and include the existing value-based measures as special cases. These measures satisfy several desirable properties of an ideal efficiency measure. These new measures are advantageous over the existing ones in terms of (1) their ability to satisfy the most important property of translation invariance; (2) choices over the use of suitable direction vectors in handling negative data; and (3) flexibility in providing the decision makers with the option of specifying preferable direction vectors to incorporate their preferences. Finally, under the condition of no prior unit price information, a directional value-based measure of profit inefficiency is developed for firms whose underlying objectives are profit maximization. For an illustrative empirical application, our new measures are applied to a real-life data set of 50 US banks to draw inferences about the production correspondence of banking industry.  相似文献   
689.
Lease expiration management (LEM) in the apartment industry aims to control the number of lease expirations and thus achieve maximal revenue growth. We examine rental rate strategies in the context of LEM for apartment buildings that offer a single lease term and face demand uncertainty. We show that the building may incur a significant revenue loss if it fails to account for LEM in the determination of the rental rate. We also show that the use of LEM is a compromise approach between a limited optimization, where no future demand information is available, and a global optimization, where complete future demand information is available. We show that the use of LEM can enhance the apartment building’s revenue by as much as 8% when the desired number of expirations and associated costs are appropriately estimated. Numerical examples are included to illustrate the major results derived from our models and the impact on the apartment’s revenue of sensitivity to the desired number of expirations and associated costs.  相似文献   
690.
We provide a number of schemes for the splitting up of quantum information among k parties using a N-qubit linear cluster state as a quantum channel, such that the original information can be reconstructed only if all the parties cooperate. Explicit circuits are provided for these schemes, which are based on the concept of measurement based locking and unlocking of quantum information. These are experimentally feasible as they require measurements to be performed only on product basis.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号