全文获取类型
收费全文 | 1579篇 |
免费 | 187篇 |
国内免费 | 75篇 |
专业分类
化学 | 86篇 |
力学 | 271篇 |
综合类 | 17篇 |
数学 | 1143篇 |
物理学 | 324篇 |
出版年
2024年 | 2篇 |
2023年 | 25篇 |
2022年 | 32篇 |
2021年 | 43篇 |
2020年 | 42篇 |
2019年 | 50篇 |
2018年 | 37篇 |
2017年 | 51篇 |
2016年 | 50篇 |
2015年 | 45篇 |
2014年 | 92篇 |
2013年 | 120篇 |
2012年 | 58篇 |
2011年 | 114篇 |
2010年 | 113篇 |
2009年 | 100篇 |
2008年 | 108篇 |
2007年 | 93篇 |
2006年 | 97篇 |
2005年 | 75篇 |
2004年 | 54篇 |
2003年 | 73篇 |
2002年 | 60篇 |
2001年 | 46篇 |
2000年 | 40篇 |
1999年 | 35篇 |
1998年 | 48篇 |
1997年 | 32篇 |
1996年 | 23篇 |
1995年 | 13篇 |
1994年 | 12篇 |
1993年 | 7篇 |
1992年 | 8篇 |
1991年 | 9篇 |
1990年 | 5篇 |
1989年 | 2篇 |
1988年 | 6篇 |
1987年 | 1篇 |
1986年 | 1篇 |
1985年 | 7篇 |
1984年 | 2篇 |
1982年 | 1篇 |
1981年 | 1篇 |
1980年 | 4篇 |
1979年 | 2篇 |
1978年 | 1篇 |
1977年 | 1篇 |
排序方式: 共有1841条查询结果,搜索用时 15 毫秒
171.
172.
Many models of physical and chemical processes give rise to ordinary differential equations with special structural properties that go unexploited by general-purpose software designed to solve numerically a wide range of differential equations. If those properties are to be exploited fully for the sake of better numerical stability, accuracy and/or speed, the differential equations may have to be solved by unconventional methods. This short paper is to publish composition constants obtained by the authors to increase efficiency of a family of mostly unconventional methods, called reflexive.
173.
Let be a sequence of interpolation schemes in of degree (i.e. for each one has unique interpolation by a polynomial of total degree and total order . Suppose that the points of tend to as and the Lagrange-Hermite interpolants, , satisfy for all monomials with . Theorem: for all functions of class in a neighborhood of . (Here denotes the Taylor series of at 0 to order .) Specific examples are given to show the optimality of this result.
174.
We establish the optimal asymptotic decay rate of per-session queue length tail distributions for a two-queue system where
a single constant rate server serves the two queues using the Generalized Processor Sharing (GPS) scheduling discipline. The
result is obtained using the sample-path large deviation principle and has implications in call admission control for high-speed
communication networks.
This revised version was published online in June 2006 with corrections to the Cover Date. 相似文献
175.
In this paper we provide upper and lower bounds on the randomness required by the dealer to set up a secret sharing scheme for infinite classes of access structures. Lower bounds are obtained using entropy arguments. Upper bounds derive from a decomposition construction based on combinatorial designs (in particular, t-(v,k,) designs). We prove a general result on the randomness needed to construct a scheme for the cycle Cn; when n is odd our bound is tight. We study the access structures on at most four participants and the connected graphs on five vertices, obtaining exact values for the randomness for all them. Also, we analyze the number of random bits required to construct anonymous threshold schemes, giving upper bounds. (Informally, anonymous threshold schemes are schemes in which the secret can be reconstructed without knowledge of which participants hold which shares.) 相似文献
176.
The stochastic behaviour of lifetimes of a two component system is often primarily influenced by the system structure and by the covariates shared by the components. Any meaningful attempt to model the lifetimes must take into consideration the factors affecting their stochastic behaviour. In particular, for a load share system, we describe a reliability model incorporating both the load share dependence and the effect of observed and unobserved covariates. The model includes a bivariate Weibull to characterize load share, a positive stable distribution to describe frailty, and also incorporates effects of observed covariates. We investigate various interesting reliability properties of this model using cross ratio functions and conditional survivor functions. We implement maximum likelihood estimation of the model parameters and discuss model adequacy and selection. We illustrate our approach using a simulation study. For a real data situation, we demonstrate the superiority of the proposed model that incorporates both load share and frailty effects over competing models that incorporate just one of these effects. An attractive and computationally simple cross‐validation technique is introduced to reconfirm the claim. We conclude with a summary and discussion. 相似文献
177.
178.
在Kyle模型中引入两个异质的内部交易者,利用理论模型推导的方式探讨他们是否会进行信息共享.研究发现在均衡状态下,内部交易者的期望利润是关于信息共享数量的减函数.当两个内部交易者不分享任何信息时,他们的期望利润能达到最大值;内部交易者没有动机进行信息共享. 相似文献
179.
《Numerical Methods for Partial Differential Equations》2018,34(1):336-356
In this article, we study the superconvergence analysis of conforming bilinear finite element method (FEM) for nonlinear Joule heating equations. Based on the rigorous estimates together with high accuracy analysis of this element, mean value technique and interpolation postprocessing approach, the superclose and superconvergent estimates about the related variables in H1‐norm are derived for semidiscrete and a linearized backward Euler fully discrete schemes, which extends the results of optimal estimates obtained for conforming FEMs in the previous literature. At last, a numerical experiment is performed to verify the theoretical analysis. 相似文献