首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   94篇
  免费   8篇
  国内免费   3篇
化学   22篇
力学   3篇
数学   42篇
物理学   9篇
无线电   29篇
  2023年   2篇
  2022年   5篇
  2021年   5篇
  2020年   2篇
  2019年   1篇
  2017年   1篇
  2016年   4篇
  2015年   6篇
  2014年   6篇
  2013年   5篇
  2012年   3篇
  2011年   4篇
  2010年   6篇
  2009年   7篇
  2008年   12篇
  2007年   3篇
  2006年   9篇
  2005年   2篇
  2004年   6篇
  2002年   2篇
  2001年   3篇
  1999年   3篇
  1997年   2篇
  1994年   3篇
  1993年   1篇
  1991年   2篇
排序方式: 共有105条查询结果,搜索用时 578 毫秒
101.
Two preferential attachment-type graph models which allow for dynamic addition/deletion of edges/vertices are considered. The focus of this paper is on the limiting expected degree of a fixed vertex. For both models a phase transition is seen to occur, i.e. if the probability with which edges are deleted is below a model-specific threshold value, the limiting expected degree is infinite, but if the probability is higher than the threshold value, the limiting expected degree is finite. In the regime above the critical threshold probability, however, the behaviour of the two models may differ. For one of the models a non-zero (as well as zero) limiting expected degree can be obtained whilst the other only has a zero limit. Furthermore, this phase transition is seen to occur for the same critical threshold probability of removing edges as the one which determines whether the degree sequence is of power-law type or if the tails decays exponentially fast.  相似文献   
102.
103.
In order to provide a practicable solution to data confidentiality in cloud storage service,a data assured deletion scheme,which achieves the fine grained access control,hopping and sniffing attacks resistance,data dynamics and deduplication,is proposed.In our scheme,data blocks are encrypted by a two-level encryption approach,in which the control keys are generated from a key derivation tree,encrypted by an All-OrNothing algorithm and then distributed into DHT network after being partitioned by secret sharing.This guarantees that only authorized users can recover the control keys and then decrypt the outsourced data in an ownerspecified data lifetime.Besides confidentiality,data dynamics and deduplication are also achieved separately by adjustment of key derivation tree and convergent encryption.The analysis and experimental results show that our scheme can satisfy its security goal and perform the assured deletion with low cost.  相似文献   
104.
程军  王淑军 《力学季刊》2007,28(4):583-591
SiC/Al梯度功能材料各梯度层由不同体积浓度的陶瓷和金属组成,由于材料组分梯度变化,克服了双材料界面的应力突变问题,获得了优异的使用性能.本文首先采用激光云纹干涉法,对具有四个梯度层的SiC/Al梯度功能材料紧凑拉伸试件在机械荷载作用下的拉伸实验位移场进行记录,进而获得紧凑拉伸试件裂纹口位移P-V曲线以及材料断裂韧度实验值;然后根据层合梯度功能材料理论分析模型,建立FGM紧凑拉伸试件的渐近分网有限元平面应变模型,采用通用有限元软件的单元删除模块对试件模型进行裂纹扩展单元的应变模拟分析,从计算所得的裂纹尖端应变图像分析得出梯度材料试件的裂纹扩展规律.  相似文献   
105.
Skeletal editing involves making specific point-changes to the core of a molecule through the selective insertion, deletion or exchange of atoms. It thus represents a potentially powerful strategy for the step-economic modification of complex substrates and is a perfect complement to methods such as C−H functionalization that target the molecular periphery. Given their ubiquity in biologically active compounds, the ability to perform skeletal editing on – and therefore interconvert between – aromatic heterocycles is especially valuable. This review summarizes both recent and key historical examples of skeletal editing as applied to interconversion of aromatic rings; we anticipate that it will serve to highlight not only the innovative and enabling nature of current skeletal editing methods, but also the tremendous opportunities that still exist in the field.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号