首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1339篇
  免费   42篇
  国内免费   73篇
化学   414篇
晶体学   4篇
力学   15篇
综合类   3篇
数学   456篇
物理学   227篇
综合类   335篇
  2023年   8篇
  2022年   18篇
  2021年   15篇
  2020年   8篇
  2019年   23篇
  2018年   22篇
  2017年   17篇
  2016年   26篇
  2015年   32篇
  2014年   52篇
  2013年   76篇
  2012年   48篇
  2011年   61篇
  2010年   58篇
  2009年   69篇
  2008年   74篇
  2007年   61篇
  2006年   50篇
  2005年   56篇
  2004年   45篇
  2003年   43篇
  2002年   56篇
  2001年   34篇
  2000年   48篇
  1999年   27篇
  1998年   19篇
  1997年   23篇
  1996年   23篇
  1995年   22篇
  1994年   17篇
  1993年   7篇
  1992年   12篇
  1991年   7篇
  1990年   7篇
  1989年   3篇
  1988年   5篇
  1987年   5篇
  1985年   28篇
  1984年   23篇
  1983年   16篇
  1982年   12篇
  1981年   37篇
  1980年   15篇
  1979年   9篇
  1978年   21篇
  1977年   28篇
  1976年   22篇
  1975年   16篇
  1974年   18篇
  1973年   19篇
排序方式: 共有1454条查询结果,搜索用时 312 毫秒
81.
A definition of a generalized filled-in Julia set generated by an infinite array of proper polynomial mappings in  is introduced. It is shown that such Julia sets depend analytically on the defining polynomial mappings.  相似文献   
82.
We give sufficient conditions for the existence of a model structure on operads in an arbitrary symmetric monoidal model category. General invariance properties for homotopy algebras over operads are deduced.  相似文献   
83.
Robin Forman 《Combinatorica》2000,20(4):489-504
M   is a non-contractible subcomplex of a simplex S then M is evasive. In this paper we make this result quantitative, and show that the more non-contractible M is, the more evasive M is. Recall that M is evasive if for every decision tree algorithm A there is a face of S that requires that one examines all vertices of S (in the order determined by A) before one is able to determine whether or not lies in M. We call such faces evaders of A. M is nonevasive if and only if there is a decision tree algorithm A with no evaders. A main result of this paper is that for any decision tree algorithm A, there is a CW complex M', homotopy equivalent to M, such that the number of cells in M' is precisely
where the constant is +1 if the emptyset is not an evader of A, and -1 otherwise. In particular, this implies that if there is a decision tree algorithm with no evaders, then M is homotopy equivalent to a point. This is the theorem in [12]. In fact, in [12] it was shown that if M is non-collapsible then M is evasive, and we also present a quantitative version of this more precise statement. The proofs use the discrete Morse theory developed in [6]. Received May 7, 1999 / Revised May 17, 2000  相似文献   
84.
1937年9月-1942年8月,胡适在美国度过了5年外交生涯。任大使期间,在经费困难和国际环境险恶的情况下,他一方面与美国上层频繁接触,获得了美国的两笔贷款,为抗战筹措资金;另一方面豁出性命讲演,宣传蒋介石和国民政府的对日政策,为抗日作舆论宣传。但由于客观环境的限制和他人的误解,以及与宋子文之间的龃龉,最终被蒋介石免职。  相似文献   
85.
钢筋砼抗渗结构的开裂是渗漏的主要原因,这个带有普遍性的问题长期困扰着广大施工技术人员。在普通砼中掺入适量的U型膨胀剂,减小了砼结构开裂的可能性,提高了砼的抗渗能力,为防水砼的施工提供一种借鉴的方法。  相似文献   
86.
Credal networks generalize Bayesian networks by relaxing the requirement of precision of probabilities. Credal networks are considerably more expressive than Bayesian networks, but this makes belief updating NP-hard even on polytrees. We develop a new efficient algorithm for approximate belief updating in credal networks. The algorithm is based on an important representation result we prove for general credal networks: that any credal network can be equivalently reformulated as a credal network with binary variables; moreover, the transformation, which is considerably more complex than in the Bayesian case, can be implemented in polynomial time. The equivalent binary credal network is then updated by L2U, a loopy approximate algorithm for binary credal networks. Overall, we generalize L2U to non-binary credal networks, obtaining a scalable algorithm for the general case, which is approximate only because of its loopy nature. The accuracy of the inferences with respect to other state-of-the-art algorithms is evaluated by extensive numerical tests.  相似文献   
87.
We present an intrinsic and concrete development of the subdivision of small categories, give some simple examples and derive its fundamental properties. As an application, we deduce an alternative way to compare the homotopy categories of spaces and small categories, by using partially ordered sets. This yields a new conceptual proof to the well-known fact that these two homotopy categories are equivalent.  相似文献   
88.
We show that extensions of algebraically closed fields induce full and faithful functors between the respective motivic stable homotopy categories with finite coefficients.  相似文献   
89.
利用语音压缩技术和ISDNU接口实现的数字用户环路倍增设备,可在一对用户线上传输多路高质量的话音或数据。介绍了该系统的技术基础、传输结构和软硬实现及其监控管理功能。  相似文献   
90.
It is shown that SU(2)×U(1) can be broken at the tree level, without the occurrence of global potential minima that break U(1)e.m., in supergravity models that are more general than those proposed by Nilles, Srednicki and Wyler. The study comprises an analysis of models with a general soft supersymmetry-breaking structure as well as those of the Hall-Lykken-Weinberg type.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号