全文获取类型
收费全文 | 31321篇 |
免费 | 2702篇 |
国内免费 | 2493篇 |
专业分类
化学 | 3691篇 |
晶体学 | 52篇 |
力学 | 1450篇 |
综合类 | 427篇 |
数学 | 6052篇 |
物理学 | 3831篇 |
综合类 | 21013篇 |
出版年
2024年 | 217篇 |
2023年 | 406篇 |
2022年 | 814篇 |
2021年 | 861篇 |
2020年 | 794篇 |
2019年 | 779篇 |
2018年 | 746篇 |
2017年 | 962篇 |
2016年 | 1098篇 |
2015年 | 1084篇 |
2014年 | 1645篇 |
2013年 | 1708篇 |
2012年 | 1853篇 |
2011年 | 1980篇 |
2010年 | 1534篇 |
2009年 | 1862篇 |
2008年 | 1869篇 |
2007年 | 2416篇 |
2006年 | 2169篇 |
2005年 | 1754篇 |
2004年 | 1603篇 |
2003年 | 1374篇 |
2002年 | 1163篇 |
2001年 | 965篇 |
2000年 | 792篇 |
1999年 | 707篇 |
1998年 | 609篇 |
1997年 | 508篇 |
1996年 | 402篇 |
1995年 | 352篇 |
1994年 | 256篇 |
1993年 | 222篇 |
1992年 | 191篇 |
1991年 | 147篇 |
1990年 | 162篇 |
1989年 | 111篇 |
1988年 | 113篇 |
1987年 | 67篇 |
1986年 | 50篇 |
1985年 | 42篇 |
1984年 | 32篇 |
1983年 | 14篇 |
1982年 | 20篇 |
1981年 | 7篇 |
1980年 | 6篇 |
1979年 | 7篇 |
1978年 | 4篇 |
1977年 | 6篇 |
1959年 | 7篇 |
1955年 | 13篇 |
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
991.
《Optimization》2012,61(9):1957-1982
We present new infeasible path-following methods for linear monotone complementarity problems based on Auslender, Teboulle and Ben-Tiba’s log-quadratic barrier functions. The central paths associated with these barriers are always well defined and, for those problems which have a solution, convergent to a pair of complementary solutions. Starting points in these paths are easy to compute. The theoretical iteration-complexity of these new path-following methods is derived and improved by a strategy which uses relaxed hybrid proximal-extragradient steps to control the quadratic term. Encouraging preliminary numerical experiments are presented. 相似文献
992.
《Optimization》2012,61(5):705-714
A NP-hard problem (P) of mixed-discrete linear programming is considered which consists in the minimization of a linear objective function subject to a special non-connected subset of an unbounded polymatroid. For this problem we describe three polynomial approximate algorithms including a greedy algorithm and a fully polynomial approximation scheme solving a special subproblem of (P). 相似文献
993.
Antonio Punzo Antonello Maruotti 《Journal of computational and graphical statistics》2016,25(4):1097-1098
The Gaussian hidden Markov model (HMM) is widely considered for the analysis of heterogenous continuous multivariate longitudinal data. To robustify this approach with respect to possible elliptical heavy-tailed departures from normality, due to the presence of outliers, spurious points, or noise (collectively referred to as bad points herein), the contaminated Gaussian HMM is here introduced. The contaminated Gaussian distribution represents an elliptical generalization of the Gaussian distribution and allows for automatic detection of bad points in the same natural way as observations are typically assigned to the latent states in the HMM context. Once the model is fitted, each observation has a posterior probability of belonging to a particular state and, inside each state, of being a bad point or not. In addition to the parameters of the classical Gaussian HMM, for each state we have two more parameters, both with a specific and useful interpretation: one controls the proportion of bad points and one specifies their degree of atypicality. A sufficient condition for the identifiability of the model is given, an expectation-conditional maximization algorithm is outlined for parameter estimation and various operational issues are discussed. Using a large-scale simulation study, but also an illustrative artificial dataset, we demonstrate the effectiveness of the proposed model in comparison with HMMs of different elliptical distributions, and we also evaluate the performance of some well-known information criteria in selecting the true number of latent states. The model is finally used to fit data on criminal activities in Italian provinces. Supplementary materials for this article are available online 相似文献
994.
??In this paper, we estimate parameters of gamma life distribution
and normal life distribution by EM algorithm based on Type-II hybrid censored data. The
covariance matrices are derived as well. Some numerical examples are also presented for
illustration. 相似文献
995.
Dongfang Li Hongyu Qin Xiujun Cheng Fengyan Wu 《Mathematical Methods in the Applied Sciences》2016,39(8):1935-1944
In this study, a parameterized split Newton method is derived by using the accelerating technique. Convergence and error estimates of the method are obtained. In practical application, the proposed method can give a better result in view of computational CPU time. Numerical examples on several partial differential equations are shown to illustrate our findings. Copyright © 2015 John Wiley & Sons, Ltd. 相似文献
996.
Bernhard Haeupler Gopal Pandurangan David Peleg Rajmohan Rajaraman Zhifeng Sun 《Random Structures and Algorithms》2016,48(3):565-587
We study randomized gossip‐based processes in dynamic networks that are motivated by information discovery in large‐scale distributed networks such as peer‐to‐peer and social networks. A well‐studied problem in peer‐to‐peer networks is resource discovery, where the goal for nodes (hosts with IP addresses) is to discover the IP addresses of all other hosts. Also, some of the recent work on self‐stabilization algorithms for P2P/overlay networks proceed via discovery of the complete network. In social networks, nodes (people) discover new nodes through exchanging contacts with their neighbors (friends). In both cases the discovery of new nodes changes the underlying network — new edges are added to the network — and the process continues in the changed network. Rigorously analyzing such dynamic (stochastic) processes in a continuously changing topology remains a challenging problem with obvious applications. This paper studies and analyzes two natural gossip‐based discovery processes. In the push discovery or triangulation process, each node repeatedly chooses two random neighbors and connects them (i.e., “pushes” their mutual information to each other). In the pull discovery process or the two‐hop walk, each node repeatedly requests or “pulls” a random contact from a random neighbor and connects itself to this two‐hop neighbor. Both processes are lightweight in the sense that the amortized work done per node is constant per round, local, and naturally robust due to the inherent randomized nature of gossip. Our main result is an almost‐tight analysis of the time taken for these two randomized processes to converge. We show that in any undirected n‐node graph both processes take rounds to connect every node to all other nodes with high probability, whereas is a lower bound. We also study the two‐hop walk in directed graphs, and show that it takes time with high probability, and that the worst‐case bound is tight for arbitrary directed graphs, whereas Ω(n2) is a lower bound for strongly connected directed graphs. A key technical challenge that we overcome in our work is the analysis of a randomized process that itself results in a constantly changing network leading to complicated dependencies in every round. We discuss implications of our results and their analysis to discovery problems in P2P networks as well as to evolution in social networks. © 2016 Wiley Periodicals, Inc. Random Struct. Alg., 48, 565–587, 2016 相似文献
997.
Optimal replacement and allocation of multi‐state elements in k‐within‐m‐from‐r/n sliding window systems 下载免费PDF全文
This paper proposes a new model that generalizes the linear sliding window system to the case of multiple failures. The considered k ‐within‐ m ‐from‐ r / n sliding window system consists of n linearly ordered multi‐state elements and fails if at least k groups out of m consecutive groups of r consecutive multi‐state elements have cumulative performance lower than the demand W . A reliability evaluation algorithm is suggested for the proposed system. In order to increase the system availability, maintenance actions can be performed, and the elements can be optimally allocated. A joint element allocation and maintenance optimization model is formulated with the objective of minimizing the total maintenance cost subjected to the pre‐specified system availability requirement. Basic procedures of genetic algorithms are adapted to solve the optimization problem. Numerical experiments are presented to illustrate the applications. Copyright © 2015 John Wiley & Sons, Ltd. 相似文献
998.
999.
Nonlinear function approximation: Computing smooth solutions with an adaptive greedy algorithm 总被引:1,自引:0,他引:1
In contrast to linear schemes, nonlinear approximation techniques allow for dimension independent rates of convergence. Unfortunately, typical algorithms (such as, e.g., backpropagation) are not only computationally demanding, but also unstable in the presence of data noise. While we can show stability for a weak relaxed greedy algorithm, the resulting method has the drawback that it requires in practise unavailable smoothness information about the data.In this work we propose an adaptive greedy algorithm which does not need this information but rather recovers it iteratively from the available data. We show that the generated approximations are always at least as smooth as the original function and that the algorithm also remains stable, when it is applied to noisy data. Finally, the applicability of this algorithm is demonstrated by numerical experiments. 相似文献
1000.