全文获取类型
收费全文 | 2785篇 |
免费 | 65篇 |
国内免费 | 82篇 |
专业分类
化学 | 210篇 |
晶体学 | 8篇 |
力学 | 37篇 |
综合类 | 10篇 |
数学 | 585篇 |
物理学 | 317篇 |
综合类 | 1765篇 |
出版年
2024年 | 5篇 |
2023年 | 57篇 |
2022年 | 32篇 |
2021年 | 29篇 |
2020年 | 41篇 |
2019年 | 32篇 |
2018年 | 23篇 |
2017年 | 37篇 |
2016年 | 45篇 |
2015年 | 61篇 |
2014年 | 141篇 |
2013年 | 169篇 |
2012年 | 142篇 |
2011年 | 166篇 |
2010年 | 175篇 |
2009年 | 190篇 |
2008年 | 170篇 |
2007年 | 157篇 |
2006年 | 135篇 |
2005年 | 125篇 |
2004年 | 119篇 |
2003年 | 99篇 |
2002年 | 110篇 |
2001年 | 95篇 |
2000年 | 81篇 |
1999年 | 89篇 |
1998年 | 89篇 |
1997年 | 74篇 |
1996年 | 54篇 |
1995年 | 29篇 |
1994年 | 32篇 |
1993年 | 20篇 |
1992年 | 13篇 |
1991年 | 17篇 |
1990年 | 9篇 |
1989年 | 9篇 |
1988年 | 13篇 |
1987年 | 13篇 |
1986年 | 4篇 |
1985年 | 5篇 |
1984年 | 5篇 |
1983年 | 7篇 |
1982年 | 3篇 |
1981年 | 3篇 |
1978年 | 5篇 |
1977年 | 2篇 |
1969年 | 1篇 |
排序方式: 共有2932条查询结果,搜索用时 15 毫秒
1.
2.
关于高师院校计算机专业教学改革的几点建议 总被引:1,自引:0,他引:1
本文以高等师范院校计算机专业教学改革为例,从教育观念的更新、教学模式的转变、教学手段的更新、教学对象的再认识、教学中的教材教法等多个方面分析以网络为主的现代教育模式改革的思想,目的在于探索出一条以多媒体和网络为主体的教学环境下的教育新思路。 相似文献
3.
4.
Steven R. Corman 《Computational & Mathematical Organization Theory》2006,12(1):35-49
The predominant idea for using network concepts to fight terrorists centers on disabling key parts of their communication
networks. Although this counternetwork strategy is clearly a sound approach, it is vulnerable to missing, incomplete, or erroneous
information about the network. This paper describes a different and complementary application of network concepts to terrorist
organizations. It is based on activity focus networks (AFNs), which represent the complex activity system of an organization.
An activity focus is a conceptual or physical entity around which joint activity is organized. Any organization has a number
of these, which are in some cases compatible and in some cases incompatible. The set of foci and their relations of compatibility
and incompatibility define the AFN. A hypothetical AFN for a terrorist organization is specified and tested in a simulation
called AQAS. It shows that certain activity foci, and in particular one combination, have high potential as pressure points
for the activity system. The AFN approach complements the counternetwork approach by reducing the downside risk of incomplete
information about the communication network, and enhancing the effectiveness of counternetwork approaches over time.
Steven R. Corman is Professor in the Hugh Downs School of Human Communication at Arizona State University and Chair of the Organizational
Communication Division of the International Communication Association. His research interests include communication networks
and activity systems, high-resolution text and discourse analysis, and modeling and simulation of human communication systems. 相似文献
5.
针对目前电磁场数值处理中计算繁杂慢速和耗费资源过多的问题,本文提出了一种基于神经网络小波理论进行计算的新方法。文中着重介绍了利用小波变换神经网络的基本理论,结合电磁场数值计算的基本方法,推导变换进而得到一个通用公式和处理方法。在该方法中,神经网络学习内容少和数据处理简单,因此该方法具有计算速度快,占用资源少的优点,并有用硬件实现的前景。 相似文献
6.
李鲁群 《山东科技大学学报(自然科学版)》1996,(4)
本文通过对非网络版软件在单机上运行环境分析,找出了一套调整此类软件使其在Novell网上运行的方法,并提出了非网络软件在Novell网上运行环境的设计的观点,具有较大的意义。 相似文献
7.
Luca Lambertini Raimondello Orsini 《Central European Journal of Operations Research》2007,15(1):105-117
We reconsider the role of network externalities in a dynamic spatial monopoly where the firm must invest in order to accumulate
capacity, while consumers may have either linear or quadratic preferences. We (1) characterise saddle point equilibria, (2)
prove that the extent of market coverage is increasing in the network effect and (3) unlike the existing static literature
on the same problem, the monopolist may not make introductory price offers. Then, we briefly deal with the socially optimal
solution, showing that, in general, a planner would serve more consumers than a profit-seeking monopolist.
相似文献
8.
9.
模糊集技术在网络信息过滤系统中的应用研究 总被引:2,自引:0,他引:2
本文将模糊模式识别引入到校园网信息过滤系统中,通过网页内容识别和分级技术将各种不同网站进行分类,过滤和禁止有害网络信息,从而达到校园网的信息“净化”目的。 相似文献
10.
On the departure process of a leaky bucket system with long-range dependent input traffic 总被引:2,自引:0,他引:2
Due to the strong experimental evidence that the traffic to be offered to future broadband networks will display long-range
dependence, it is important to study the possible implications that such traffic may have for the design and performance of
these networks. In particular, an important question is whether the offered traffic preserves its long-range dependent nature
after passing through a policing mechanism at the interface of the network. One of the proposed solutions for flow control
in the context of the emerging ATM standard is the so-called leaky bucket scheme. In this paper we consider a leaky bucket
system with long-range dependent input traffic. We adopt the following popular model for long-range dependent traffic: Time
is discrete. At each unit time a random number of sessions is initiated, having the distribution of a Poisson random variable
with mean λ. Each of these sessions has a random duration τ, where the integer random variable τ has finite mean, infinite
variance, and a regularly varying tail, i.e., P(τ >К) ~ К-Lα
L(К), where 1 < α < 2 L(·) is a slowly varying function. Once a session is initiated, it generates one cell at each unit of time until its termination.
We examine the departure process of the leaky bucket policing mechanism driven by such an arrival process, and show that it
too is long-range dependent for any token buffer size and any - finite or infinite - cell buffer size. Moreover, upper and
lower bounds for the covariance sequence of the output process are established. The above results demonstrate that long-range
dependence cannot be removed by the kinds of flow control schemes that are currently being envisioned for broadband networks.
This revised version was published online in June 2006 with corrections to the Cover Date. 相似文献