全文获取类型
收费全文 | 9053篇 |
免费 | 848篇 |
国内免费 | 526篇 |
专业分类
化学 | 497篇 |
晶体学 | 7篇 |
力学 | 612篇 |
综合类 | 202篇 |
数学 | 7034篇 |
物理学 | 2075篇 |
出版年
2024年 | 27篇 |
2023年 | 104篇 |
2022年 | 174篇 |
2021年 | 171篇 |
2020年 | 254篇 |
2019年 | 253篇 |
2018年 | 230篇 |
2017年 | 283篇 |
2016年 | 238篇 |
2015年 | 194篇 |
2014年 | 300篇 |
2013年 | 719篇 |
2012年 | 338篇 |
2011年 | 406篇 |
2010年 | 358篇 |
2009年 | 532篇 |
2008年 | 563篇 |
2007年 | 510篇 |
2006年 | 514篇 |
2005年 | 391篇 |
2004年 | 380篇 |
2003年 | 402篇 |
2002年 | 417篇 |
2001年 | 347篇 |
2000年 | 372篇 |
1999年 | 293篇 |
1998年 | 252篇 |
1997年 | 198篇 |
1996年 | 170篇 |
1995年 | 87篇 |
1994年 | 117篇 |
1993年 | 84篇 |
1992年 | 80篇 |
1991年 | 86篇 |
1990年 | 65篇 |
1989年 | 65篇 |
1988年 | 58篇 |
1987年 | 43篇 |
1986年 | 33篇 |
1985年 | 54篇 |
1984年 | 65篇 |
1983年 | 29篇 |
1982年 | 29篇 |
1981年 | 35篇 |
1980年 | 18篇 |
1979年 | 18篇 |
1978年 | 18篇 |
1977年 | 13篇 |
1976年 | 11篇 |
1973年 | 6篇 |
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
121.
Vasiliy A. Ustimenko 《Acta Appl Math》2002,74(2):117-153
A combinatorial method of encryption with a similarity to the classical scheme of linear coding has been suggested by the author. The general idea is to treat vertices of a graph as messages and arcs of a certain length as encryption tools. We will study the quality of such an encryption in the case of graphs of high girth by comparing the probability to guess the message, (vertex) at random with the probability of breaking the key, i.e. guessing the encoding arc. In fact, the quality is good for graphs which are close to the Erdös bound, defined by the Even Cycle Theorem.In the case of parallelotopic graphs, there is a uniform way to match arcs with strings in a certain alphabet. Among parallelotopic graphs we distinguish linguistic graphs of affine type whose vertices (messages) and arcs (encoding tools) both could be naturally identified with vectors over the GF(q), and neighbors of the vertex defined by a system of linear equations. We will discuss families of linguistic and parallelotopic graphs of increasing girth as the source for assymmetric cryptographic functions and related open key algorithms.Several constructions of families of linguistic graphs of high girth with good quality, complexity and expansion coefficients will be considered. Some of those constructions have been obtained via group-theoretical and geometrical techniques. 相似文献
122.
Given a rectangular array whose entries represent the pixels of a digitalized image, we consider the problem of reconstructing an image from the number of occurrences of each color in every column and in every row. The complexity of this problem is still open when there are just three colors in the image. We study some special cases where the number of occurrences of each color is limited to small values. Formulations in terms of edge coloring in graphs and as timetabling problems are used; complexity results are derived from the model. 相似文献
123.
Thomas Andreae 《Journal of Graph Theory》2002,39(4):222-229
For a graph A and a positive integer n, let nA denote the union of n disjoint copies of A; similarly, the union of ?0 disjoint copies of A is referred to as ?0A. It is shown that there exist (connected) graphs A and G such that nA is a minor of G for all n??, but ?0A is not a minor of G. This supplements previous examples showing that analogous statements are true if, instead of minors, isomorphic embeddings or topological minors are considered. The construction of A and G is based on the fact that there exist (infinite) graphs G1, G2,… such that Gi is not a minor of Gj for all i ≠ j. In contrast to previous examples concerning isomorphic embeddings and topological minors, the graphs A and G presented here are not locally finite. The following conjecture is suggested: for each locally finite connected graph A and each graph G, if nA is a minor of G for all n ? ?, then ?0A is a minor of G, too. If true, this would be a far‐reaching generalization of a classical result of R. Halin on families of disjoint one‐way infinite paths in graphs. © 2002 Wiley Periodicals, Inc. J Graph Theory 39: 222–229, 2002; DOI 10.1002/jgt.10016 相似文献
124.
125.
Xia Chen 《Journal of Theoretical Probability》2006,19(3):721-739
We establish moderate and small deviations for the ranges of integer valued random walks. Our theorems apply to the limsup
and the liminf laws of the iterated logarithm.
We establish moderate and small deviations for the ranges of integer valued random walks. Our theorems apply to the limsup
and the liminf laws of the iterated logarithm. 相似文献
126.
In a recent paper [17] we proposed a stochastic algorithm which generates optimal probabilities for the decompression of
an image represented by the fixed point of an IFS system (SAOP). We show here that such an algorithm is in fact a non trivial
example of Generalized Random System with Complete Connections. We also exhibit a generalization which could represent the
solution to the inverse problem for an image with grey levels, if a fixed set of contraction maps is available.
Received: 1 July 2002 相似文献
127.
记Ore2=min{d(y) d(x)|x,y∈V(G),d(x,y)=2},本得到:若n阶图G的Ore2≥n 1,则G是[5;n]泛连通图。此是比Faudree等人的定理进一步的结果。 相似文献
128.
一类随机环境中的随机游动 总被引:5,自引:2,他引:3
在Solomn的模型的基础上对一类随机环境中随机游动进行了讨论,并得出了一个常返性准则和一些极限性质。 相似文献
129.
130.
Steven J. Sepanski 《Journal of Theoretical Probability》1997,10(4):1053-1063
For independent identically distributed random vectors belonging to the generalized Domain of Attraction of the multivariate normal law, we define two partial sum processes analogous to that of Donsker's Theorem. We prove that each converges in distribution to a Brownian Motion in the space of continuous functions. One process uses nonrandom operator normalization, and the other is a studentization of the first, using normalization by the empirical covariance operator. 相似文献