首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   10351篇
  免费   1422篇
  国内免费   394篇
化学   856篇
晶体学   16篇
力学   1305篇
综合类   359篇
数学   6114篇
物理学   3517篇
  2024年   25篇
  2023年   97篇
  2022年   318篇
  2021年   292篇
  2020年   207篇
  2019年   236篇
  2018年   251篇
  2017年   377篇
  2016年   493篇
  2015年   331篇
  2014年   592篇
  2013年   687篇
  2012年   567篇
  2011年   623篇
  2010年   484篇
  2009年   645篇
  2008年   667篇
  2007年   700篇
  2006年   563篇
  2005年   511篇
  2004年   438篇
  2003年   388篇
  2002年   367篇
  2001年   316篇
  2000年   278篇
  1999年   257篇
  1998年   229篇
  1997年   207篇
  1996年   155篇
  1995年   134篇
  1994年   96篇
  1993年   119篇
  1992年   93篇
  1991年   60篇
  1990年   57篇
  1989年   35篇
  1988年   41篇
  1987年   32篇
  1986年   41篇
  1985年   40篇
  1984年   33篇
  1983年   10篇
  1982年   22篇
  1981年   8篇
  1980年   7篇
  1979年   7篇
  1978年   5篇
  1977年   7篇
  1959年   5篇
  1957年   4篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
31.
We address the problem of computing homotopic shortest paths in the presence of obstacles in the plane. Problems on homotopy of paths received attention very recently [Cabello et al., in: Proc. 18th Annu. ACM Sympos. Comput. Geom., 2002, pp. 160–169; Efrat et al., in: Proc. 10th Annu. European Sympos. Algorithms, 2002, pp. 411–423]. We present two output-sensitive algorithms, for simple paths and non-simple paths. The algorithm for simple paths improves the previous algorithm [Efrat et al., in: Proc. 10th Annu. European Sympos. Algorithms, 2002, pp. 411–423]. The algorithm for non-simple paths achieves O(log2n) time per output vertex which is an improvement by a factor of O(n/log2n) of the previous algorithm [Hershberger, Snoeyink, Comput. Geom. Theory Appl. 4 (1994) 63–98], where n is the number of obstacles. The running time has an overhead O(n2+) for any positive constant . In the case k<n2+, where k is the total size of the input and output, we improve the running to O((n+k+(nk)2/3)logO(1)n).  相似文献   
32.
带有给定凸切线多边形的保形五次样条逼近   总被引:3,自引:0,他引:3  
本讨论带有给定切线多边形的保形逼近问题.给出了一条与给定切线多边形相切的保形五次参数祥条曲线。  相似文献   
33.
We describe an infeasible interior point algorithm for convex minimization problems. The method uses quasi-Newton techniques for approximating the second derivatives and providing superlinear convergence. We propose a new feasibility control of the iterates by introducing shift variables and by penalizing them in the barrier problem. We prove global convergence under standard conditions on the problem data, without any assumption on the behavior of the algorithm.  相似文献   
34.
In this paper, a new class of Runge–Kutta methods is introduced. Some basic properties of this subgroup of algebraically stable methods are presented and a complete parametric representation is given. Necessary and sufficient order conditions for lower order methods as well as sufficient order conditions for higher order methods are derived yielding a significantly reduced number of conditions when compared with general Runge–Kutta methods. Design examples conclude this paper.  相似文献   
35.
We consider the discretization in time of an inhomogeneous parabolicequation in a Banach space setting, using a representation ofthe solution as an integral along a smooth curve in the complexleft half-plane which, after transformation to a finite interval,is then evaluated to high accuracy by a quadrature rule. Thisreduces the problem to a finite set of elliptic equations withcomplex coefficients, which may be solved in parallel. The paperis a further development of earlier work by the authors, wherewe treated the homogeneous equation in a Hilbert space framework.Special attention is given here to the treatment of the forcingterm. The method is combined with finite-element discretizationin spatial variables.  相似文献   
36.
37.
We present a practical polynomial-time algorithm for computing the zeta function of a Kummer curve over a finite field of small characteristic. Such algorithms have recently been obtained using a method of Kedlaya based upon Monsky–Washnitzer cohomology, and are of interest in cryptography. We take a different approach. The problem is reduced to that of computing the L-function of a multiplicative character sum. This latter task is achieved via a cohomological formula based upon the work of Dwork and Reich. We show, however, that our method and that of Kedlaya are very closely related.Dedicated to the memory of Gian-Carlo Rota  相似文献   
38.
In this paper, the author at first develops a method to study convergence of the cascade algorithm in a Banach space without stable assumption on the initial (see Theorem 2.1), and then applies the previous result on the convergence to characterizing compactly supported refinable distributions in fractional Sobolev spaces and Holder continuous spaces (see Theorems 3.1, 3.3, and 3.4). Finally the author applies the above characterization to choosing appropriate initial to guarantee the convergence of the cascade algorithm (see Theorem 4.2).  相似文献   
39.
Algebraic modelling languages allow models to be implemented in such a way that they can easily be understood and modified. They are therefore a working environment commonly used by practitioners in Operations Research. Having once developed models, they need to be integrated inside the company information system. This step often involves embedding a model into a programming language environment: many existing algebraic modelling languages make possible to run parameterised models and subsequently retrieve their results, but without any facility for interacting with the model during the model generation or solution process.In this paper we show how to use the Mosel environment to implement complex algorithms directly in the modelling language.The Office cleaning problem is solved by a branch-and-cut algorithm, implemented entirely in the modelling language (including the definition of the callback function for the solver). Secondly, a cutting stock problem is solved by column generation, also implemented in the modelling language.AMS classification: 90Cxx, 65K05, 68N15  相似文献   
40.
A result of Balas and Yu (1989) states that the number of maximal independent sets of a graph G is at most p+1, where is the number of pairs of vertices in G at distance 2, and p is the cardinality of a maximum induced matching in G. In this paper, we give an analogue of this result for hypergraphs and, more generally, for subsets of vectors in the product of n lattices =1××n, where the notion of an induced matching in G is replaced by a certain binary tree each internal node of which is mapped into . We show that our bounds may be nearly sharp for arbitrarily large hypergraphs and lattices. As an application, we prove that the number of maximal infeasible vectors x=1××n for a system of polymatroid inequalities does not exceed max{Q,logt/c(2Q,)}, where is the number of minimal feasible vectors for the system, , , and c(,) is the unique positive root of the equation 2c(c/log–1)=1. This bound is nearly sharp for the Boolean case ={0,1}n, and it allows for the efficient generation of all minimal feasible sets to a given system of polymatroid inequalities with quasi-polynomially bounded right-hand sides . This research was supported by the National Science Foundation (Grant IIS-0118635), and by the Office of Naval Research (Grant N00014-92-J-1375). The second and third authors are also grateful for the partial support by DIMACS, the National Science Foundation's Center for Discrete Mathematics and Theoretical Computer Science.Mathematics Subject Classification (2000):20E28, 20G40, 20C20  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号