全文获取类型
收费全文 | 528篇 |
免费 | 137篇 |
国内免费 | 22篇 |
专业分类
化学 | 34篇 |
力学 | 14篇 |
综合类 | 14篇 |
数学 | 425篇 |
物理学 | 200篇 |
出版年
2023年 | 14篇 |
2022年 | 31篇 |
2021年 | 36篇 |
2020年 | 27篇 |
2019年 | 22篇 |
2018年 | 18篇 |
2017年 | 26篇 |
2016年 | 30篇 |
2015年 | 16篇 |
2014年 | 50篇 |
2013年 | 25篇 |
2012年 | 32篇 |
2011年 | 42篇 |
2010年 | 48篇 |
2009年 | 37篇 |
2008年 | 37篇 |
2007年 | 38篇 |
2006年 | 40篇 |
2005年 | 17篇 |
2004年 | 8篇 |
2003年 | 17篇 |
2002年 | 14篇 |
2001年 | 12篇 |
2000年 | 10篇 |
1999年 | 3篇 |
1998年 | 14篇 |
1997年 | 5篇 |
1996年 | 1篇 |
1995年 | 1篇 |
1994年 | 4篇 |
1993年 | 2篇 |
1992年 | 2篇 |
1991年 | 4篇 |
1990年 | 1篇 |
1987年 | 2篇 |
1986年 | 1篇 |
排序方式: 共有687条查询结果,搜索用时 15 毫秒
91.
The impact of sharing customer returns information in a supply chain with and without a buyback policy 总被引:1,自引:0,他引:1
Jing Chen 《European Journal of Operational Research》2011,213(3):478-488
In this paper, we examine a single period problem in a supply chain in which a Stackelberg manufacturer supplies a product to a retailer who faces customer returns and demand uncertainty. We show that the manufacturer incurs a significant profit loss with and without a buyback policy if it fails to account for customer returns in the wholesale price decision. Under the assumption that the retailer is better informed than the manufacturer on customer returns information, we show that without a buyback policy, the retailer prefers not to share if the manufacturer overestimates while it prefers to share customer returns information if the manufacturer underestimates this information. If the manufacturer offers a buyback policy, we have the opposite results. We also discuss incentives to share the customer returns information and some of the issues that are raised in sharing this information. 相似文献
92.
93.
Hisham Ali Jawad Ahmad Zakwan Jaroucheh Pavlos Papadopoulos Nikolaos Pitropakis Owen Lo Will Abramson William J. Buchanan 《Entropy (Basel, Switzerland)》2022,24(10)
Historically, threat information sharing has relied on manual modelling and centralised network systems, which can be inefficient, insecure, and prone to errors. Alternatively, private blockchains are now widely used to address these issues and improve overall organisational security. An organisation’s vulnerabilities to attacks might change over time. It is utterly important to find a balance among a current threat, the potential countermeasures, their consequences and costs, and the estimation of the overall risk that this provides to the organisation. For enhancing organisational security and automation, applying threat intelligence technology is critical for detecting, classifying, analysing, and sharing new cyberattack tactics. Trusted partner organisations can then share newly identified threats to improve their defensive capabilities against unknown attacks. On this basis, organisations can help reduce the risk of a cyberattack by providing access to past and current cybersecurity events through blockchain smart contracts and the Interplanetary File System (IPFS). The suggested combination of technologies can make organisational systems more reliable and secure, improving system automation and data quality. This paper outlines a privacy-preserving mechanism for threat information sharing in a trusted way. It proposes a reliable and secure architecture for data automation, quality, and traceability based on the Hyperledger Fabric private-permissioned distributed ledger technology and the MITRE ATT&CK threat intelligence framework. This methodology can also be applied to combat intellectual property theft and industrial espionage. 相似文献
94.
Indrajit Lahiri 《Journal of Mathematical Analysis and Applications》2002,271(1):206-216
In this paper we prove a uniqueness theorem for meromorphic functions sharing three values with some weight which improves some known results. 相似文献
95.
在模糊需求和非对称销售价格信息下,研究了由单一制造商和零售商组成的两级闭环供应链系统的协调问题。通过建立不确定环境下的集中决策和收益共享-费用共担契约决策模型,分别得到了不同模型下闭环供应链系统的最优策略。并进一步通过算例分析了契约下供应链各方收益随模糊需求和价格的变化情况,以及该契约对整个系统决策效率的影响。结果表明:收益共享-费用共担契约能有效实现模糊闭环供应链系统的协调,实现闭环供应链系统决策的最优化;其次,需求和零售价格的不确定性程度越高,对零售商的最优订购量、供应链成员及系统利润的影响也越大。 相似文献
96.
知识共享与间接互惠:基于计算实验方法的研究 总被引:2,自引:0,他引:2
团队中,个体知识共享行为的回报往往来自第三方而非受助者,而以直接互惠为视角的知识共享研究却不足以解释此类现象。采用基于计算机仿真实验方法,通过赋予Agent记忆、推理、决策和沟通等能力,研究受表型背叛、组织信任氛围及声誉传播机制影响下,间接互惠机制对团队大范围知识共享行为的维系机理。研究发现,由于辨别者的存在,即使无条件共享者会成为绝对多数,隐藏者并不会大量侵入群体。这意味着间接互惠机制维系了团队大范围知识共享行为。在低的组织信任氛围水平下,辨别者和隐藏者虽然能够共存,团队内的知识共享行为却没有出现。即使只有少数成员能观察到周围同事的知识共享行为,只要声誉信息能够有效传播,间接互惠对广泛知识共享行为的维系作用就能够发挥。 相似文献
97.
We establish the optimal asymptotic decay rate of per-session queue length tail distributions for a two-queue system where
a single constant rate server serves the two queues using the Generalized Processor Sharing (GPS) scheduling discipline. The
result is obtained using the sample-path large deviation principle and has implications in call admission control for high-speed
communication networks.
This revised version was published online in June 2006 with corrections to the Cover Date. 相似文献
98.
This paper studies the idea of weighted sharing and proves two main theorems which generalize some results given by G. Brosch, Q. Zhang and other authors. 相似文献
99.
This paper presents a large deviation analysis of the steady-state sojourn time distribution in the GI/G/1 PS queue. Logarithmic estimates are obtained under the assumption of the service time distribution having a light tail,
thus supplementing recent results for the heavy-tailed setting. Our proof gives insight into the way a large sojourn time
occurs, enabling the construction of an (asymptotically efficient) importance sampling algorithm. Finally our results for
PS are compared to a number of other service disciplines, such as FCFS, LCFS, and SRPT.
2000 mathematics subject classification: 60K25. 相似文献
100.
A multisecret threshold scheme is a system which protects a number of secret keys among a group of n participants. There is a secret sK associated with every subset K of k participants such that any t participants in K can reconstruct the secret sK, but a subset of w participants cannot get any information about a secret they are not associated with. This paper gives a construction for
the parameters t = 2, k = 3 and for any n and w that is optimal in the sense that participants hold the minimal amount of information.
Communicated by: P. Wild 相似文献