首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   11324篇
  免费   1458篇
  国内免费   944篇
化学   3014篇
晶体学   69篇
力学   813篇
综合类   243篇
数学   4635篇
物理学   4952篇
  2023年   80篇
  2022年   268篇
  2021年   299篇
  2020年   244篇
  2019年   227篇
  2018年   243篇
  2017年   324篇
  2016年   363篇
  2015年   310篇
  2014年   587篇
  2013年   800篇
  2012年   590篇
  2011年   684篇
  2010年   580篇
  2009年   682篇
  2008年   778篇
  2007年   762篇
  2006年   644篇
  2005年   618篇
  2004年   500篇
  2003年   483篇
  2002年   458篇
  2001年   328篇
  2000年   341篇
  1999年   323篇
  1998年   316篇
  1997年   247篇
  1996年   206篇
  1995年   183篇
  1994年   187篇
  1993年   118篇
  1992年   117篇
  1991年   90篇
  1990年   72篇
  1989年   80篇
  1988年   73篇
  1987年   67篇
  1986年   47篇
  1985年   73篇
  1984年   47篇
  1983年   35篇
  1982年   47篇
  1981年   23篇
  1980年   22篇
  1979年   28篇
  1978年   33篇
  1977年   19篇
  1976年   20篇
  1975年   10篇
  1973年   14篇
排序方式: 共有10000条查询结果,搜索用时 0 毫秒
81.
Tian  Naishuo  Zhang  Zhe George 《Queueing Systems》2003,44(2):183-202
We study a GI/M/c type queueing system with vacations in which all servers take vacations together when the system becomes empty. These servers keep taking synchronous vacations until they find waiting customers in the system at a vacation completion instant.The vacation time is a phase-type (PH) distributed random variable. Using embedded Markov chain modeling and the matrix geometric solution methods, we obtain explicit expressions for the stationary probability distributions of the queue length at arrivals and the waiting time. To compare the vacation model with the classical GI/M/c queue without vacations, we prove conditional stochastic decomposition properties for the queue length and the waiting time when all servers are busy. Our model is a generalization of several previous studies.  相似文献   
82.
面对多样化的市场需求,企业的销售渠道也变得异常复杂,利用网络图可以简化实际问题,并能形象地描述它。本根据网络知识建立了产品分销模型,探求企业在市场需求固定和随机时的最优收益。最后,章还进行实例验算,并做出相应的结果分析。  相似文献   
83.
Petr Lachout 《Acta Appl Math》2003,78(1-3):243-250
The paper introduces an extension of the epi-convergence, the lower semicontinuous approximation and the epi-upper semicontinuous approximation of random real functions in distribution. The new notions could be helpful tools for sensitivity analyzes of stochastic optimization problems. The research is evoked by S. Vogel and continues the research started by Vogel and the author.  相似文献   
84.
We determine the limiting density of the zeroes of Heine–Stieltjes polynomials (or of any set of points satisfying the conclusion of Heine–Stieltjes Theorem) in the thermodynamic limit and use this to prove a strong law of large numbers for the zeroes.  相似文献   
85.
It is generally in a firm’s interest for its supply chain partners to invest in innovations. To the extent that these innovations either reduce the partners’ variable costs or stimulate demand for the end product, they will tend to lead to higher levels of output for all of the firms in the chain. However, in response to the innovations of its partners, a firm may have an incentive to opportunistically increase its own prices. The possibility of such opportunistic behavior creates a hold-up problem that leads supply chain partners to underinvest in innovation. Clearly, this hold-up problem could be eliminated by a pre-commitment to price. However, by making an advance commitment to price, a firm sacrifices an important means of responding to demand uncertainty. In this paper we examine the trade-off that is faced when a firm’s channel partner has opportunities to invest in either cost reduction or quality improvement, i.e. demand enhancement. Should it commit to a price in order to encourage innovation, or should it remain flexible in order to respond to demand uncertainty. We discuss several simple wholesale pricing mechanisms with respect to this trade-off.  相似文献   
86.
A Tandem Queue with Coupled Processors: Computational Issues   总被引:2,自引:0,他引:2  
In Resing and Örmeci [16] it is shown that the two-stage tandem queue with coupled processors can be solved using the theory of boundary value problems. In this paper we consider the issues that arise when calculating performance measures like the mean queue length and the fraction of time a station is empty. It is assumed that jobs arrive at the first station according to a Poisson process and require service at both stations before leaving the system. The amount of work that a job requires at each of the stations is an independent, exponentially distributed random variable. When both stations are nonempty, the total service capacity is shared among the stations according to fixed proportions. When one of the stations becomes empty, the total service capacity is given to the nonempty station. We study the two-dimensional Markov process representing the numbers of jobs at the two stations. The problem of finding the generating function of the stationary distribution can be reduced to two different Riemann-Hilbert boundary value problems, where both problems yield a complete analytical solution. We discuss the similarities and differences between the two problems, and relate them to the computational aspects of obtaining performance measures.  相似文献   
87.
肖伯钧 《大学物理》2003,22(5):22-24
讨论了银道面内的引力场强分布和太阳在银河系中所受引力与到银心距离r的关系,指出引力场强g并不是与r的平方成反比,这是由于银河系的大小和形状不能忽略造成的.强调了万有引力定律的适用条件.  相似文献   
88.
本文研究了三维Minkowski空间中直线汇的一些性质,特别是关于类时线汇的性质.讨论了线汇基本元素的存在性,并证明了关于三维Minkowski空间中类时线汇的配分参数的一个结果,推广了苏步青1927年的—个成果.  相似文献   
89.
Some New Results on Key Distribution Patterns and Broadcast Encryption   总被引:1,自引:0,他引:1  
This paper concerns methods by which a trusted authority can distribute keys and/or broadcast a message over a network, so that each member of a privileged subset of users can compute a specified key or decrypt the broadcast message. Moreover, this is done in such a way that no coalition is able to recover any information on a key or broadcast message they are not supposed to know. The problems are studied using the tools of information theory, so the security provided is unconditional (i.e., not based on any computational assumption).In a recent paper st95a, Stinson described a method of constructing key predistribution schemes by combining Mitchell-Piper key distribution patterns with resilient functions; and also presented a construction method for broadcast encryption schemes that combines Fiat-Naor key predistribution schemes with ideal secret sharing schemes. In this paper, we further pursue these two themes, providing several nice applications of these techniques by using combinatorial structures such as orthogonal arrays, perpendicular arrays, Steiner systems and universal hash families.  相似文献   
90.
本文讨论了在指数型寿命数据中,对同时存在的异常大数据和异常小数据的检验方法,给出了一个明确的判别标准,并以一例说明其应用。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号