首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   2411篇
  免费   356篇
  国内免费   68篇
化学   247篇
晶体学   1篇
力学   40篇
综合类   49篇
数学   2230篇
物理学   268篇
  2024年   4篇
  2023年   25篇
  2022年   86篇
  2021年   125篇
  2020年   117篇
  2019年   115篇
  2018年   73篇
  2017年   125篇
  2016年   171篇
  2015年   80篇
  2014年   191篇
  2013年   202篇
  2012年   142篇
  2011年   152篇
  2010年   154篇
  2009年   151篇
  2008年   126篇
  2007年   155篇
  2006年   117篇
  2005年   93篇
  2004年   69篇
  2003年   64篇
  2002年   51篇
  2001年   43篇
  2000年   34篇
  1999年   25篇
  1998年   27篇
  1997年   14篇
  1996年   13篇
  1995年   12篇
  1994年   8篇
  1993年   11篇
  1992年   7篇
  1991年   8篇
  1990年   6篇
  1989年   2篇
  1988年   6篇
  1987年   2篇
  1986年   3篇
  1985年   6篇
  1984年   3篇
  1983年   2篇
  1982年   1篇
  1981年   4篇
  1980年   1篇
  1979年   2篇
  1978年   2篇
  1977年   2篇
  1976年   2篇
  1975年   1篇
排序方式: 共有2835条查询结果,搜索用时 15 毫秒
11.
Recently, Fishbum and Lavalle (1995) and Lefèvre and Utev (1996) have considered some stochastic order relations specific for arithmetic random variables. The present work is concerned with these orderings, together with two other classes of stochastic order relations closely related. First, attention is paid to characterizations and various properties of all these orderings. Then, sufficient conditions of crossing-type for the two new classes of orderings are derived and extrema among discrete random variables are deduced. This is applied in actuarial sciences to obtain new bounds for the classical single life premiums as well as for the probability of ruin in the compound binomial risk model.  相似文献   
12.
证券投资组合的风险与收益   总被引:4,自引:1,他引:3  
本文利用概率统计原理对证券的投资组合能减轻所遇的风险作了讨论 ,并介绍了如何选择投资组合可使所遇风险达到最小  相似文献   
13.
Previous researchers have designed shared control schemes with a view to minimising the likelihood that participants will conspire to perform an unauthorised act. But, human nature being what it is, systems inevitably fail; so shared control schemes should also be designed so that the police can identify conspirators after the fact. This requirement leads us to search for schemes with sparse access structures. We show how this can be done using ideas from coding theory. In particular, secret sharing schemes based on geometric codes whose dual [n,k,d] codes have d and n as their only nonzero weights are suitable. We determine their access structures and analyse their properties. We have found almost all of them, and established some relations among codes, designs and secret-sharing schemes.  相似文献   
14.
This paper presents an analysis of a portfolio model which can be used to assist a property-liability insurance company in determining the optimal composition of the insurance and investment portfolios. By introducing insurer's threshold risk and relaxing some non-realistic assumptions made in traditional chance constraint insurance and investment portfolio models, we propose a method for an insurer to maximize his return threshold for a given threshold risk level. This proposed model can be used to optimize the composition of underwriting and investment portfolios regarding the insurer's threshold risk level, as well as to generate the efficient frontier by adjusting insurer's threshold risk levels. A numerical example is given based on the industry's aggregated data for a sixteen year period.  相似文献   
15.
In this paper we consider the (t, n)-threshold visual secret sharing scheme (VSSS) in which black pixels in a secret black-white images is reproduced perfectly as black pixels when we stack arbitrary t shares. This paper provides a new characterization of the (t, n)-threshold visual secret sharing scheme with such a property (hereafter, we call such a VSSS the (t, n)-PBVSSS for short). We use an algebraic method to characterize basis matrices of the (t, n)-PBVSSS in a certain class of matrices. We show that the set of all homogeneous polynomials each element of which yields basis matrices of the (t, n)-PBVSSS becomes a set of lattice points in an (nt+1)-dimensional linear space. In addition, we prove that the optimal basis matrices in the sense of maximizing the relative difference among all the basis matrices in the class coincides with the basis matrices given by Blundo, Bonis and De Santis [3] for all nt ≥ 2.  相似文献   
16.
We provide an approximate analysis of the transient sojourn time for a processor sharing queue with time varying arrival and service rates, where the load can vary over time, including periods of overload. Using the same asymptotic technique as uniform acceleration as demonstrated in [12] and [13], we obtain fluid and diffusion limits for the sojourn time of the Mt/Mt/1 processor-sharing queue. Our analysis is enabled by the introduction of a “virtual customer” which differs from the notion of a “tagged customer” in that the former has no effect on the processing time of the other customers in the system. Our analysis generalizes to non-exponential service and interarrival times, when the fluid and diffusion limits for the queueing process are known.  相似文献   
17.
传统理论认为个体是风险厌恶的,展望理论提出个体是损失厌恶的,对于损失的感受程度比赢得要强烈得多。本文通过实验表明,大部分个体对于股票投资是风险追求,而不是风险厌恶的,而且在两个参考点之外的区间个体更偏好风险,而在两个参考点之内的区间对风险的偏好程度相对要小。  相似文献   
18.
We present a general risk model where the aggregate claims, as well as the premium function, evolve by jumps. This is achieved by incorporating a Lévy process into the model. This seeks to account for the discrete nature of claims and asset prices. We give several explicit examples of Lévy processes that can be used to drive a risk model. This allows us to incorporate aggregate claims and premium fluctuations in the same process. We discuss important features of such processes and their relevance to risk modeling. We also extend classical results on ruin probabilities to this model. Copyright © 2003 John Wiley & Sons, Ltd.  相似文献   
19.
On a question of Gross   总被引:1,自引:0,他引:1  
Using the notion of weighted sharing of sets we prove two uniqueness theorems which improve the results proved by Fang and Qiu [H. Qiu, M. Fang, A unicity theorem for meromorphic functions, Bull. Malaysian Math. Sci. Soc. 25 (2002) 31-38], Lahiri and Banerjee [I. Lahiri, A. Banerjee, Uniqueness of meromorphic functions with deficient poles, Kyungpook Math. J. 44 (2004) 575-584] and Yi and Lin [H.X. Yi, W.C. Lin, Uniqueness theorems concerning a question of Gross, Proc. Japan Acad. Ser. A 80 (2004) 136-140] and thus provide an answer to the question of Gross [F. Gross, Factorization of meromorphic functions and some open problems, in: Proc. Conf. Univ. Kentucky, Lexington, KY, 1976, in: Lecture Notes in Math., vol. 599, Springer, Berlin, 1977, pp. 51-69], under a weaker hypothesis.  相似文献   
20.
In this paper the steady-state behavior of a closed queueing network with multiple classes and large populations is investigated. One of the two nodes of the network simply introduces random delays and the discipline in the other node is discriminatory processor sharing. The network is not product-form, so not even the steady-state behavior is known. We assume that the usage is moderately heavy, and obtain two-term asymptotic approximations to the mean number of jobs, and the mean sojourn time, of each class of jobs in the processor node. We also obtain the leading term in the asymptotic approximation to the joint distribution of the number of jobs in the processor node, which is a zero-mean multivariate Gaussian distribution around a line through the origin.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号