全文获取类型
收费全文 | 388篇 |
免费 | 88篇 |
国内免费 | 39篇 |
专业分类
化学 | 34篇 |
力学 | 24篇 |
综合类 | 23篇 |
数学 | 228篇 |
物理学 | 206篇 |
出版年
2024年 | 3篇 |
2023年 | 2篇 |
2022年 | 10篇 |
2021年 | 15篇 |
2020年 | 11篇 |
2019年 | 7篇 |
2018年 | 6篇 |
2017年 | 14篇 |
2016年 | 17篇 |
2015年 | 10篇 |
2014年 | 23篇 |
2013年 | 22篇 |
2012年 | 20篇 |
2011年 | 31篇 |
2010年 | 31篇 |
2009年 | 27篇 |
2008年 | 36篇 |
2007年 | 21篇 |
2006年 | 27篇 |
2005年 | 35篇 |
2004年 | 25篇 |
2003年 | 26篇 |
2002年 | 17篇 |
2001年 | 15篇 |
2000年 | 9篇 |
1999年 | 10篇 |
1998年 | 10篇 |
1997年 | 2篇 |
1996年 | 3篇 |
1995年 | 6篇 |
1994年 | 3篇 |
1993年 | 2篇 |
1992年 | 1篇 |
1991年 | 1篇 |
1990年 | 2篇 |
1989年 | 1篇 |
1987年 | 1篇 |
1986年 | 2篇 |
1985年 | 1篇 |
1980年 | 3篇 |
1979年 | 1篇 |
1978年 | 1篇 |
1977年 | 3篇 |
1976年 | 2篇 |
排序方式: 共有515条查询结果,搜索用时 15 毫秒
71.
在基于身份的密钥提取过程中,使密钥生成器在私钥中嵌入随机数,从而使得密钥提取具有较好的灵活性,使得用户对一个身份可具备多个私钥,这无疑会增加密钥使用的安全性;基于这种新的密钥提取思路,给出一个基于身份的签名体制,新的密钥提取方式使得它具有更好的安全性和灵活性;新的基于身份的签名体制中具有最少对运算,因此,与类似的方案相比,其具备较好的计算效率;新签名体制的安全性依赖于k-合谋攻击问题(k-CAAP)的困难性,其在适应性选择消息和ID攻击下具备强不可伪造性,并且其安全性证明具有紧规约性. 相似文献
72.
73.
Comparisons of mixed systems with decreasing failure rate component lifetimes using dispersive order
下载免费PDF全文
![点击此处可从《商业与工业应用随机模型》网站下载免费的PDF全文](/ch/ext_images/free.gif)
Because lifetimes of systems are not deterministic, partially, orders are used for comparison purposes which lead us to provide optimal system configurations. This paper deals with a signature‐based dispersive ordering of mixed systems. It is assumed that component lifetimes are independent and identically distributed, and the common distribution has a decreasing failure rate function. Some illustrative examples are also given. 相似文献
74.
75.
David Cimasoni Vincent Florens 《Transactions of the American Mathematical Society》2008,360(3):1223-1264
In this paper, we use `generalized Seifert surfaces' to extend the Levine-Tristram signature to colored links in . This yields an integral valued function on the -dimensional torus, where is the number of colors of the link. The case corresponds to the Levine-Tristram signature. We show that many remarkable properties of the latter invariant extend to this -variable generalization: it vanishes for achiral colored links, it is `piecewise continuous', and the places of the jumps are determined by the Alexander invariants of the colored link. Using a -dimensional interpretation and the Atiyah-Singer -signature theorem, we also prove that this signature is invariant by colored concordance, and that it provides a lower bound for the `slice genus' of the colored link.
76.
77.
Email: valery{at}techunix.technion.ac.il
Received on January 31, 2006; Accepted on October 5, 2006 An infinite horizon linear-quadratic optimal control problemfor a singularly perturbed system with multiple point-wise anddistributed small delays in the state variable is considered.The set of Riccati-type equations, associated with this problemby the control optimality conditions, is studied. Since thesystem in the control problem is singularly perturbed, the equationsof this set are also perturbed by a small parameter of the singularperturbations. The zero-order asymptotic solution to this setof equations is constructed and justified. Based on this asymptoticsolution, parameter-free sufficient conditions for the existenceand uniqueness of solution to the original optimal control problemare established. 相似文献
78.
陈万吉 《应用数学和力学(英文版)》1986,7(5):481-487
According to recent studies of the generalized variational principle by Professor Chien Weizang, the more generalized hybrid variational principle for finite element method is given, from which a new kind of the generalized hybrid element model is etablished.Using the thin plate bending element with varying thickness as an example, we compare various hybrid elements based on different generalized variational principles. 相似文献
79.
Rabin's cryptosystem was proved to be as hard as factorization. However, Rabin's digital signature schemes is probabilistic. This paper shows two efficient Rabin type digital signature schemes, a basic scheme and an improved scheme. Both schemes run much faster than Rabin's scheme. They are deterministic and the size of a signature is much smaller than that of a signature in Rabin's scheme. Furthermore, it is proved that, by applying the technique of Bellare and Rogaway, the proposed scheme is secure against chosen plaintext attack. More precisely, breaking the proposed digital signature scheme by chosen plaintext attack is as hard as factoring N. 相似文献
80.
The configuration-dependent cranked Nilsson-Strutinsky approach was used to investigate the rotational structures in 128Pr and signature splittings of some observed bands could be well described quantitatively at high spin. Its modified model was used to calculate special configurations in order to distinguish the N=4 d3/2s1/2 and g7/2d5/2 orbitals. All observed bands were compared with the calculated configuration assigned to the band and the agreement between experiment and theory is remarkable. 相似文献