全文获取类型
收费全文 | 1983篇 |
免费 | 181篇 |
国内免费 | 129篇 |
专业分类
化学 | 105篇 |
晶体学 | 2篇 |
力学 | 83篇 |
综合类 | 26篇 |
数学 | 285篇 |
物理学 | 247篇 |
综合类 | 1545篇 |
出版年
2024年 | 12篇 |
2023年 | 31篇 |
2022年 | 70篇 |
2021年 | 45篇 |
2020年 | 50篇 |
2019年 | 47篇 |
2018年 | 44篇 |
2017年 | 67篇 |
2016年 | 50篇 |
2015年 | 79篇 |
2014年 | 135篇 |
2013年 | 111篇 |
2012年 | 140篇 |
2011年 | 123篇 |
2010年 | 94篇 |
2009年 | 100篇 |
2008年 | 118篇 |
2007年 | 170篇 |
2006年 | 138篇 |
2005年 | 132篇 |
2004年 | 87篇 |
2003年 | 76篇 |
2002年 | 66篇 |
2001年 | 34篇 |
2000年 | 30篇 |
1999年 | 23篇 |
1998年 | 20篇 |
1997年 | 24篇 |
1996年 | 29篇 |
1995年 | 19篇 |
1994年 | 21篇 |
1993年 | 13篇 |
1992年 | 15篇 |
1991年 | 8篇 |
1990年 | 7篇 |
1989年 | 5篇 |
1988年 | 5篇 |
1987年 | 7篇 |
1986年 | 4篇 |
1985年 | 3篇 |
1984年 | 8篇 |
1983年 | 4篇 |
1982年 | 2篇 |
1981年 | 7篇 |
1980年 | 2篇 |
1979年 | 5篇 |
1978年 | 5篇 |
1977年 | 6篇 |
1975年 | 1篇 |
1955年 | 1篇 |
排序方式: 共有2293条查询结果,搜索用时 0 毫秒
91.
对具有消息恢复的数字签名方案提出了两种攻击方法.此外,对原方案进行了改进,通过对改进方案的安全性分析得出结论:改进方案比原方案更安全,并且消息恢复过程只需要计算一次大数模幂乘和两次单向函数. 相似文献
92.
麦蚜天敌捕食强度的灰色评判 总被引:1,自引:0,他引:1
利用灰色局势决策理论,对两种麦蚜的优势种天敌作了灰色评判。结果表明,从捕食强度来看,小麦的孕穗期至腊熟期阶段,麦长管蚜与麦二叉蚜的优势种天敌依次为:龟纹瓢虫,草间小黑蛛和八斑球腹蛛。 相似文献
93.
混合互补判断矩阵一致性研究 总被引:3,自引:0,他引:3
给出混合互补判断矩阵一致性的定义和判别加性一致性的方法.定义了核算子、核矩阵,对带有精确数、三角模糊数和梯形模糊数的混合互补判断矩阵给出基于核矩阵的一致性调整方法,调整量可以是精确数也可以是模糊数.最后给出一个应用实例. 相似文献
94.
95.
Hung-Yu Chien 《Applied mathematics and computation》2005,170(2):3127-1289
A multi-signature scheme with distinguished signing authorities is a multi-signature scheme where the signed document is divided into several parts and each signer signs only on the part which he is responsible for. This article shows the security weakness of Wu–Hsu’s ID-based multi-signature scheme with distinguished signing authorities. 相似文献
96.
A new, vectorial approach to fast correlation attacks on binary memoryless combiners is proposed. Instead of individual input sequences or their linear combinations, the new attack is targeting subsets of input sequences as a whole thus exploiting the full correlation between the chosen subset and the output sequence. In particular, the set of all the input sequences can be chosen as the target. The attack is based on a novel iterative probabilistic algorithm which is also applicable to general memoryless combiners over finite fields or finite rings. To illustrate the effectiveness of the introduced approach, experimental results obtained for random balanced combining functions are presentedMost of this work was done while he was with Rome CryptoDesign Center, Gemplus, Italy 相似文献
97.
模糊综合评价模型在教师评价中的应用 总被引:12,自引:0,他引:12
冯梅 《数学的实践与认识》2004,34(11):35-38
教师评价是教育评价的一个重要环节 ,我国教师评价的历史不长 ,所以目前尚未建立起科学的评价体系 ,由于教师评价的多因素性及评价因素的模糊性 ,可以用模糊数学建立综合评价模型 . 相似文献
98.
99.
We propose a new attack on Feistel ciphers with a non-surjective round function such as the CAST cipher family and LOKI91. We extend the attack towards block ciphers that use a non-uniformly distributed round function and apply the extended attack to the CAST family. This attack demonstrates that the round function of a Feistel cipher with six to eight rounds needs to be surjective and sufficiently uniform. 相似文献
100.
This paper investigates the relations between theorems of the alternative and the minimum norm duality theorem. A typical theorem of the alternative is associated with two systems of linear inequalities and/or equalities, a primal system and a dual one, asserting that either the primal system has a solution, or the dual system has a solution, but never both. On the other hand, the minimum norm duality theorem says that the minimum distance from a given point z to a convex set
is equal to the maximum of the distances from z to the hyperplanes separating z and
. We consider the theorems of Farkas, Gale, Gordan, and Motzkin, as well as new theorems that characterize the optimality conditions of discrete l
1-approximation problems and multifacility location problems. It is shown that, with proper choices of
, each of these theorems can be recast as a pair of dual problems: a primal steepest descent problem that resembles the original primal system, and a dual least–norm problem that resembles the original dual system. The norm that defines the least-norm problem is the dual norm with respect to that which defines the steepest descent problem. Moreover, let y solve the least norm problem and let r denote the corresponding residual vector. If r=0, which means that z
, then y solves the dual system. Otherwise, when r0 and z
, any dual vector of r solves both the steepest descent problem and the primal system. In other words, let x solve the steepest descent problem; then, r and x are aligned. These results hold for any norm on
. If the norm is smooth and strictly convex, then there are explicit rules for retrieving x from r and vice versa. 相似文献