全文获取类型
收费全文 | 236篇 |
免费 | 42篇 |
国内免费 | 30篇 |
专业分类
化学 | 30篇 |
力学 | 5篇 |
综合类 | 20篇 |
数学 | 118篇 |
物理学 | 135篇 |
出版年
2023年 | 1篇 |
2022年 | 4篇 |
2021年 | 11篇 |
2020年 | 9篇 |
2019年 | 5篇 |
2018年 | 6篇 |
2017年 | 10篇 |
2016年 | 10篇 |
2015年 | 7篇 |
2014年 | 12篇 |
2013年 | 12篇 |
2012年 | 7篇 |
2011年 | 19篇 |
2010年 | 19篇 |
2009年 | 18篇 |
2008年 | 21篇 |
2007年 | 7篇 |
2006年 | 20篇 |
2005年 | 24篇 |
2004年 | 15篇 |
2003年 | 12篇 |
2002年 | 13篇 |
2001年 | 10篇 |
2000年 | 5篇 |
1999年 | 9篇 |
1998年 | 8篇 |
1997年 | 2篇 |
1996年 | 1篇 |
1995年 | 3篇 |
1994年 | 2篇 |
1993年 | 1篇 |
1992年 | 1篇 |
1990年 | 1篇 |
1989年 | 1篇 |
1985年 | 1篇 |
1978年 | 1篇 |
排序方式: 共有308条查询结果,搜索用时 15 毫秒
31.
Point estimators for the parameters of the component lifetime distribution in coherent systems are evolved assuming to be independently and identically Weibull distributed component lifetimes. We study both complete and incomplete information under continuous monitoring of the essential component lifetimes. First, we prove that the maximum likelihood estimator (MLE) under complete information based on progressively Type‐II censored system lifetimes uniquely exists and we present two approaches to compute the estimates. Furthermore, we consider an ad hoc estimator, a max‐probability plan estimator and the MLE for the parameters under incomplete information. In order to compute the MLEs, we consider a direct maximization of the likelihood and an EM‐algorithm–type approach, respectively. In all cases, we illustrate the results by simulations of the five‐component bridge system and the 10‐component parallel system, respectively. 相似文献
32.
Holonomy algebras of Weyl connections in Lorentzian signature are classified. In particular, examples of Weyl connections with all possible holonomy algebras are constructed. 相似文献
33.
34.
通过融合蒸发反应144Nd(19F,5n)布居了双奇核158Tm的高自旋态. 扩展了原来已知的带结构, 并建立了一条新转动带. 通过与相邻核的比较, 讨论158Tm核中两条四准粒子带的内禀组态, 并分别指定为πh11/2\otimes νh9/2(α=+1/2)\otimes (νi13/2)2和πh11/2\otimes νh9/2(α=-1/2)\otimes (νi13/2)2
组态. 建立在πh11/2\otimes νi13/2组态上的转动带被观测到呈现持续旋称反转现象, 而前述的两条高自旋区的
四准粒子转动带也呈旋称反转. 对这两种类型的旋称反转现象的可能机制进行了简单而定性的讨论. 相似文献
35.
在A≈80区奇-奇核旋称反转问题上已提出几种机制,但没有一种理论推断是结论性的.在本工作中将角动量投影壳模型应用到80,82Rb核,对组态为πg9/2⊙νg9/2的正宇称晕带和组态为π(p1/2,p3/2,f5/2)⊙νg9/2 的负宇称晕带理论计算和实验结果进行了比较,特别是对正宇称晕带中的signature反转机制进行了探讨.角动量投影壳模型计算显示正宇称晕带中的signature反转是原子核随自旋增加形状发生变化的信号,其间原子核从低自旋的长椭球变到高自旋的扁椭球.此外,还确定了此两带的原子核形状 相似文献
36.
Certificateless signature: a new security model and an improved generic construction 总被引:2,自引:0,他引:2
Bessie C. Hu Duncan S. Wong Zhenfeng Zhang Xiaotie Deng 《Designs, Codes and Cryptography》2007,42(2):109-126
Certificateless cryptography involves a Key Generation Center (KGC) which issues a partial key to a user and the user also
independently generates an additional public/secret key pair in such a way that the KGC who knows only the partial key but
not the additional secret key is not able to do any cryptographic operation on behalf of the user; and a third party who replaces
the public/secret key pair but does not know the partial key cannot do any cryptographic operation as the user either. We
call this attack launched by the third party as the key replacement attack. In ACISP 2004, Yum and Lee proposed a generic
construction of digital signature schemes under the framework of certificateless cryptography. In this paper, we show that
their generic construction is insecure against key replacement attack. In particular, we give some concrete examples to show
that the security requirements of some building blocks they specified are insufficient to support some of their security claims.
We then propose a modification of their scheme and show its security in a new and simplified security model. We show that
our simplified definition and adversarial model not only capture all the distinct features of certificateless signature but
are also more versatile when compared with all the comparable ones. We believe that the model itself is of independent interest.A
conventional certificateless signature scheme only achieves Girault’s Level 2 security. For achieving Level 3 security, that
a conventional signature scheme in Public Key Infrastructure does, we propose an extension to our definition of certificateless
signature scheme and introduce an additional security model for this extension. We show that our generic construction satisfies
Level 3 security after some appropriate and simple modification.
A preliminary version of the extended abstract of partial results appeared in ACISP 2006 [9]. 相似文献
37.
一种移动Agent的安全认证方案的设计与实现 总被引:2,自引:0,他引:2
针对移动Agent的安全问题,简要介绍了几种常用的安全认证技术,并在公钥密码体制认证方案的基础上,提出并实现了一种可用于移动Agent和Agent平台之间安全认证的方案。证书采用X.509证书格式,使用RSA和IDEA混合加密的算法,密钥管理采用PGP算法中公私钥环的方式,使该认证方案具有很高的安全性。文中详细说明了方案的实现流程,并深入分析了其安全性。结果表明,采用该方案能有效改善移动Agent的安全性。 相似文献
38.
We introduce the notion of signature for relations in mapping class groups and show that the signature of a Lefschetz fibration over the 2-sphere is the sum of the signatures for basic relations contained in its monodromy. Combining explicit calculations of the signature cocycle with a technique of substituting positive relations, we give some new examples of non-holomorphic Lefschetz fibrations of genus and which violate slope bounds for non-hyperelliptic fibrations on algebraic surfaces of general type.
39.
Marten Van Dijk Dwaine Clarke Blaise Gassend G. Edward Suh Srinivas Devadas 《Designs, Codes and Cryptography》2006,39(2):253-273
We present protocols for speeding up fixed-base variable-exponent exponentiation and variable-base fixed-exponent exponentiation
using an untrusted computational resource. In the fixed-base protocols, the exponent may be blinded. In the variable-base
protocols, the base may be blinded. The protocols are described for exponentiation in a cyclic group. We describe how to extend
them to exponentiation modulo an integer where the modulus is the product of primes with single multiplicity. The protocols
provide a speedup of
over the square-and-multiply algorithm, where k is the bitlength of the exponent.
One application of the protocols is to speed up exponentiation-based verification in discrete log-based signature and credential
schemes. The protocols also allow signature verifiers to dynamically choose, for each message, the amount of work it would
like to perform to verify the signature. This results in a work-security tradeoff. We introduce a fifth protocol to perform
variable-base variable- exponent exponentiation, which also has this feature.
Our model allows the trusted resource to perform computations in its idle time. The protocols facilitate the offloading of
work to the offline stage, such that the work the trusted resource performs when it has to do an exponentiation is smaller.
Our protocols are unconditionally secure. 相似文献
40.
??Coherent systems are very important in reliability,survival analysis and other life sciences. In this paper, we consider the number of working components in an $(n-k+1)$-out-of-$n$ system, given that at least $(n-m+1)$ components are working at time $t$, and the system has failed at time $t$. In this condition, we compute the probability that there are exactly $i$ working components. First the reliability and several stochastic properties are obtained. Furthermore, we extend the results to general coherent systems with absolutely continuous and exchangeable components. 相似文献