首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   5044篇
  免费   234篇
  国内免费   583篇
化学   81篇
晶体学   1篇
力学   56篇
综合类   58篇
数学   5442篇
物理学   223篇
  2024年   8篇
  2023年   93篇
  2022年   56篇
  2021年   78篇
  2020年   96篇
  2019年   139篇
  2018年   156篇
  2017年   144篇
  2016年   138篇
  2015年   112篇
  2014年   212篇
  2013年   472篇
  2012年   144篇
  2011年   246篇
  2010年   232篇
  2009年   355篇
  2008年   377篇
  2007年   396篇
  2006年   337篇
  2005年   290篇
  2004年   239篇
  2003年   211篇
  2002年   200篇
  2001年   153篇
  2000年   154篇
  1999年   146篇
  1998年   127篇
  1997年   138篇
  1996年   83篇
  1995年   45篇
  1994年   44篇
  1993年   19篇
  1992年   20篇
  1991年   14篇
  1990年   14篇
  1989年   11篇
  1988年   11篇
  1987年   6篇
  1986年   9篇
  1985年   15篇
  1984年   11篇
  1983年   12篇
  1982年   16篇
  1981年   9篇
  1980年   21篇
  1979年   13篇
  1978年   13篇
  1977年   9篇
  1976年   5篇
  1975年   4篇
排序方式: 共有5861条查询结果,搜索用时 15 毫秒
991.
We consider the Poisson Boolean model of continuum percolation on a homogeneous space M. Let λ be the intensity of the underlying Poisson process. Let λ u be the infimum of the set of intensities that a.s. produce a unique unbounded component. First we show that if λ>λ u , then there is a.s. a unique unbounded component at λ. Then we let M=?2×? and show that at λ u there is a.s. not a unique unbounded component. These results are continuum analogs of theorems by Häggström, Peres and Schonmann.  相似文献   
992.
In this paper, we are concerned with the security of block ciphers against linear cryptanalysis and discuss the distance between the so-called practical security approach and the actual theoretical security provided by a given cipher. For this purpose, we present a number of illustrative experiments performed against small (i.e. computationally tractable) ciphers. We compare the linear probability of the best linear characteristic and the actual best linear probability (averaged over all keys). We also test the key equivalence hypothesis. Our experiments illustrate both that provable security against linear cryptanalysis is not achieved by present design strategies and the relevance of the practical security approach. Finally, we discuss the (im)possibility to derive actual design criteria from the intuitions underlined in these experiments. F.-X. Standaert is a Postdoctoral researcher of the Belgian Fund for Scientific Research (FNRS).  相似文献   
993.
The closed model category of exterior spaces, that contains the proper category, is a useful tool for the study of non compact spaces and manifolds. The notion of exterior weak ℕ-S-equivalences is given by exterior maps which induce isomorphisms on the k-th ℕ-exterior homotopy groups for k ∈ S, where S is a set of non negative integers. The category of exterior spaces with a base ray localized by exterior weak ℕ-S-equivalences is called the category of exterior ℕ-S-types. The existence of closed model structures in the category of exterior spaces permits to establish equivalences between homotopy categories obtained by dividing by exterior homotopy relations, and categories of fractions (localized categories) given by the inversion of classes of week equivalences. The family of neighbourhoods ‘at infinity’ of an exterior space can be interpreted as a global prospace and under the condition of first countable at infinity we can consider a global tower instead of a prospace. The objective of this paper is to use localized categories to find the connection between S-types of exterior spaces and S-types of global towers of spaces. The main result of this paper establishes an equivalence between the category of S-types of rayed first countable exterior spaces and the category of S-types of global towers of pointed spaces. As a consequence of this result, categories of global towers of algebraic models localized up to weak equivalences can be used to give some algebraic models of S-types. The authors acknowledge the financial support given by the projects FOMENTA 2007/03 and MTM2007-65431.  相似文献   
994.
In this paper we extend certain correlation inequalities for vector-valued Gaussian random variables due to Kolmogorov and Rozanov. The inequalities are applied to sequences of Gaussian random variables and Gaussian processes. For sequences of Gaussian random variables satisfying a correlation assumption, we prove a Borel-Cantelli lemma, maximal inequalities and several laws of large numbers. This extends results of Be?ka and Ciesielski and of Hytönen and the author. In the second part of the paper we consider a certain class of vector-valued Gaussian processes which are α-Hölder continuous in p-th moment. For these processes we obtain Besov regularity of the paths of order α. We also obtain estimates for the moments in the Besov norm. In particular, the results are applied to vector-valued fractional Brownian motions. These results extend earlier work of Ciesielski, Kerkyacharian and Roynette and of Hytönen and the author.  相似文献   
995.
在消费者偏好函数是强凸、连续和严格单调的条件下给出了不可分市场的一般均衡存在定理,因而也给出了离散空间中一般均衡存在的一个充分条件.  相似文献   
996.
薛学梅 《数学研究》2009,42(2):138-153
本文主要讨论抽象度量空间上的一致连续函数空间的Banach空间结构,代数结构和格结构.  相似文献   
997.
本文讨论了二阶凸和二阶凹条件下的二阶对称对偶问题,并利用有效性和真有效性概念证明了弱对偶、强对偶、逆对偶及自对偶定理。  相似文献   
998.
讨论自反Banach空间中的原——对偶锥线性优化问题的目标函数水平集的几何性质.在自反Banach空间中,证明了原目标函数水平集的最大模与对偶目标函数水平集的最大内切球半径几乎是成反比例的.  相似文献   
999.
1000.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号