全文获取类型
收费全文 | 94篇 |
免费 | 8篇 |
国内免费 | 3篇 |
专业分类
化学 | 22篇 |
力学 | 3篇 |
数学 | 42篇 |
物理学 | 9篇 |
无线电 | 29篇 |
出版年
2023年 | 2篇 |
2022年 | 5篇 |
2021年 | 5篇 |
2020年 | 2篇 |
2019年 | 1篇 |
2017年 | 1篇 |
2016年 | 4篇 |
2015年 | 6篇 |
2014年 | 6篇 |
2013年 | 5篇 |
2012年 | 3篇 |
2011年 | 4篇 |
2010年 | 6篇 |
2009年 | 7篇 |
2008年 | 12篇 |
2007年 | 3篇 |
2006年 | 9篇 |
2005年 | 2篇 |
2004年 | 6篇 |
2002年 | 2篇 |
2001年 | 3篇 |
1999年 | 3篇 |
1997年 | 2篇 |
1994年 | 3篇 |
1993年 | 1篇 |
1991年 | 2篇 |
排序方式: 共有105条查询结果,搜索用时 578 毫秒
101.
Two preferential attachment-type graph models which allow for dynamic addition/deletion of edges/vertices are considered. The focus of this paper is on the limiting expected degree of a fixed vertex. For both models a phase transition is seen to occur, i.e. if the probability with which edges are deleted is below a model-specific threshold value, the limiting expected degree is infinite, but if the probability is higher than the threshold value, the limiting expected degree is finite. In the regime above the critical threshold probability, however, the behaviour of the two models may differ. For one of the models a non-zero (as well as zero) limiting expected degree can be obtained whilst the other only has a zero limit. Furthermore, this phase transition is seen to occur for the same critical threshold probability of removing edges as the one which determines whether the degree sequence is of power-law type or if the tails decays exponentially fast. 相似文献
102.
103.
In order to provide a practicable solution to data confidentiality in cloud storage service,a data assured deletion scheme,which achieves the fine grained access control,hopping and sniffing attacks resistance,data dynamics and deduplication,is proposed.In our scheme,data blocks are encrypted by a two-level encryption approach,in which the control keys are generated from a key derivation tree,encrypted by an All-OrNothing algorithm and then distributed into DHT network after being partitioned by secret sharing.This guarantees that only authorized users can recover the control keys and then decrypt the outsourced data in an ownerspecified data lifetime.Besides confidentiality,data dynamics and deduplication are also achieved separately by adjustment of key derivation tree and convergent encryption.The analysis and experimental results show that our scheme can satisfy its security goal and perform the assured deletion with low cost. 相似文献
104.
SiC/Al梯度功能材料各梯度层由不同体积浓度的陶瓷和金属组成,由于材料组分梯度变化,克服了双材料界面的应力突变问题,获得了优异的使用性能.本文首先采用激光云纹干涉法,对具有四个梯度层的SiC/Al梯度功能材料紧凑拉伸试件在机械荷载作用下的拉伸实验位移场进行记录,进而获得紧凑拉伸试件裂纹口位移P-V曲线以及材料断裂韧度实验值;然后根据层合梯度功能材料理论分析模型,建立FGM紧凑拉伸试件的渐近分网有限元平面应变模型,采用通用有限元软件的单元删除模块对试件模型进行裂纹扩展单元的应变模拟分析,从计算所得的裂纹尖端应变图像分析得出梯度材料试件的裂纹扩展规律. 相似文献
105.
Skeletal editing involves making specific point-changes to the core of a molecule through the selective insertion, deletion or exchange of atoms. It thus represents a potentially powerful strategy for the step-economic modification of complex substrates and is a perfect complement to methods such as C−H functionalization that target the molecular periphery. Given their ubiquity in biologically active compounds, the ability to perform skeletal editing on – and therefore interconvert between – aromatic heterocycles is especially valuable. This review summarizes both recent and key historical examples of skeletal editing as applied to interconversion of aromatic rings; we anticipate that it will serve to highlight not only the innovative and enabling nature of current skeletal editing methods, but also the tremendous opportunities that still exist in the field. 相似文献