全文获取类型
收费全文 | 563篇 |
免费 | 131篇 |
国内免费 | 20篇 |
专业分类
化学 | 30篇 |
力学 | 15篇 |
综合类 | 13篇 |
数学 | 483篇 |
物理学 | 173篇 |
出版年
2023年 | 12篇 |
2022年 | 25篇 |
2021年 | 31篇 |
2020年 | 28篇 |
2019年 | 24篇 |
2018年 | 18篇 |
2017年 | 27篇 |
2016年 | 29篇 |
2015年 | 17篇 |
2014年 | 54篇 |
2013年 | 30篇 |
2012年 | 39篇 |
2011年 | 43篇 |
2010年 | 57篇 |
2009年 | 51篇 |
2008年 | 34篇 |
2007年 | 44篇 |
2006年 | 38篇 |
2005年 | 17篇 |
2004年 | 7篇 |
2003年 | 16篇 |
2002年 | 14篇 |
2001年 | 12篇 |
2000年 | 9篇 |
1999年 | 3篇 |
1998年 | 14篇 |
1997年 | 5篇 |
1996年 | 1篇 |
1995年 | 1篇 |
1994年 | 3篇 |
1993年 | 2篇 |
1992年 | 2篇 |
1991年 | 4篇 |
1990年 | 1篇 |
1987年 | 1篇 |
1986年 | 1篇 |
排序方式: 共有714条查询结果,搜索用时 109 毫秒
681.
We establish asymptotic upper and lower bounds on the asymptotic decay rate of per-session queue length tail distributions
for a multiple-queue system where a single constant rate server services the queues using the generalized processor sharing
(GPS) scheduling discipline. In the special case where there are only two queues, the upper and lower bounds match, yielding
the optimal bound proved in [15]. The dynamics of bandwidth sharing of a multiple-queue GPS system is captured using the notion
of partial feasible sets, and the bounds are obtained using the sample-path large deviation principle. The results have implications
in call admission control for high-speed communication networks.
This revised version was published online in June 2006 with corrections to the Cover Date. 相似文献
682.
In this paper, we study a discriminatory processor sharing queue with Poisson arrivals,K classes and general service times. For this queue, we prove a decomposition theorem for the conditional sojourn time of a tagged customer given the service times and class affiliations of the customers present in the system when the tagged customer arrives. We show that this conditional sojourn time can be decomposed inton+1 components if there aren customers present when the tagged customer arrives. Further, we show that thesen+1 components can be obtained as a solution of a system of non-linear integral equations. These results generalize known results about theM/G/1 egalitarian processor sharing queue. 相似文献
683.
Refael Hassin 《Operations Research Letters》2006,34(2):191-198
We consider a memoryless single server queue with two classes of customers, each having its fixed entry fee. We show that profit and social welfare may benefit from a service discipline based on relative priorities. 相似文献
684.
On Some Methods for Unconditionally Secure Key Distribution and Broadcast Encryption 总被引:5,自引:0,他引:5
Doug R. Stinson 《Designs, Codes and Cryptography》1997,12(3):215-243
This paper provides an exposition of methods by which a trusted authority can distribute keys and/or broadcast a message over a network, so that each member of a privileged subset of users can compute a specified key or decrypt the broadcast message. Moreover, this is done in such a way that no coalition is able to recover any information on a key or broadcast message they are not supposed to know. The problems are studied using the tools of information theory, so the security provided is unconditional (i.e., not based on any computational assumption).We begin by surveying some useful schemes for key distribution that have been presented in the literature, giving background and examples (but not too many proofs). In particular, we look more closely at the attractive concept of key distribution patterns, and present a new method for making these schemes more efficient through the use of resilient functions. Then we present a general approach to the construction of broadcast schemes that combines key predistribution schemes with secret sharing schemes. We discuss the Fiat-Naor Broadcast Scheme, as well as other, new schemes that can be constructed using this approach. 相似文献
685.
A threshold quantum secret sharing (TQSS) scheme between multi-party and multi-party was proposed using a sequence of single
photons, which is useful and efficient when the parties of communication are not all present. We described the process of
this TQSS scheme and discussed its security. It was shown that entanglement is not necessary for quantum secret sharing. Moreover,
the theoretic efficiency was improved to approach 100% as almost all the instances can be used for generating the private
key, and each photon can carry one bit of information. This protocol is feasible with the present-day technique.
Supported by the National Basic Research Program of China (973 Program)(Grant No. 2007CB311100), the National High-Technology
Research and Development Program of China (Grant Nos. 2006AA01Z419 and 2006AA01Z440), the Major Research Plan of the National
Natural Science Foundation of China (Grant No. 90604023), the Scientific Research Common Program of Beijing Municipal Commission
of Education (Grant No. KM200810005004), the Scientific Research Foundation for the Youth of Beijing University of Technology
(Grant No. 97007016200701), the Doctoral Scientific Research Activation Foundation of Beijing University of Technology (Grant
No. 52007016200702), the ISN Open Foundation, and the National Laboratory for Modern Communications Science Foundation of
China (Grant No. 9140C1101010601) 相似文献
686.
陶毅翔 《纯粹数学与应用数学》2014,(1):84-92
为进一步丰富亚纯函数唯一性理论,寻求更佳的唯一性条件,利用亚纯函数Nevanlinna理论更精确地估计亚纯函数的n重值点的计数函数,得到两个亚纯函数与其导数具有某些分担值时的唯一性定理,推广和改进了相关文献的相关结果. 相似文献
687.
By providing a free experience service, a service firm can attract more uninformed customers. However, it could reversely effect the delay-sensitive, informed customers’ decision. In this paper, we study a priority queueing system with free experience services. We study the customer behavior in equilibrium after we derive the expected customer waiting time. We then construct the service firm’s revenue function and obtain an optimal strategy for the service firm. Our results suggest that when the market size of informed customers is relatively small, the firm should consider providing free experience services for uninformed customers. Conversely, if the demand rate of potential informed customers is quite high, the firm should ignore uninformed customers. 相似文献
688.
Estimation of efficiency of firms in a non-competitive market characterized by heterogeneous inputs and outputs along with their varying prices is questionable when factor-based technology sets are used in data envelopment analysis (DEA). In this scenario, a value-based technology becomes an appropriate reference technology against which efficiency can be assessed. In this contribution, the value-based models of Tone (2002) are extended in a directional DEA set up to develop new directional cost- and revenue-based measures of efficiency, which are then decomposed into their respective directional value-based technical and allocative efficiencies. These new directional value-based measures are more general, and include the existing value-based measures as special cases. These measures satisfy several desirable properties of an ideal efficiency measure. These new measures are advantageous over the existing ones in terms of (1) their ability to satisfy the most important property of translation invariance; (2) choices over the use of suitable direction vectors in handling negative data; and (3) flexibility in providing the decision makers with the option of specifying preferable direction vectors to incorporate their preferences. Finally, under the condition of no prior unit price information, a directional value-based measure of profit inefficiency is developed for firms whose underlying objectives are profit maximization. For an illustrative empirical application, our new measures are applied to a real-life data set of 50 US banks to draw inferences about the production correspondence of banking industry. 相似文献
689.
Lease expiration management (LEM) in the apartment industry aims to control the number of lease expirations and thus achieve maximal revenue growth. We examine rental rate strategies in the context of LEM for apartment buildings that offer a single lease term and face demand uncertainty. We show that the building may incur a significant revenue loss if it fails to account for LEM in the determination of the rental rate. We also show that the use of LEM is a compromise approach between a limited optimization, where no future demand information is available, and a global optimization, where complete future demand information is available. We show that the use of LEM can enhance the apartment building’s revenue by as much as 8% when the desired number of expirations and associated costs are appropriately estimated. Numerical examples are included to illustrate the major results derived from our models and the impact on the apartment’s revenue of sensitivity to the desired number of expirations and associated costs. 相似文献
690.
We provide a number of schemes for the splitting up of quantum information among k parties using a N-qubit linear cluster state as a quantum channel, such that the original information can be reconstructed only if all the parties cooperate. Explicit circuits are provided for these schemes, which are based on the concept of measurement based locking and unlocking of quantum information. These are experimentally feasible as they require measurements to be performed only on product basis. 相似文献