全文获取类型
收费全文 | 261篇 |
免费 | 0篇 |
专业分类
化学 | 6篇 |
晶体学 | 1篇 |
力学 | 1篇 |
数学 | 89篇 |
物理学 | 164篇 |
出版年
2023年 | 1篇 |
2022年 | 1篇 |
2021年 | 3篇 |
2020年 | 9篇 |
2019年 | 7篇 |
2018年 | 2篇 |
2017年 | 7篇 |
2016年 | 5篇 |
2015年 | 2篇 |
2014年 | 7篇 |
2013年 | 6篇 |
2012年 | 9篇 |
2011年 | 10篇 |
2010年 | 13篇 |
2009年 | 8篇 |
2008年 | 16篇 |
2007年 | 12篇 |
2006年 | 9篇 |
2005年 | 6篇 |
2004年 | 10篇 |
2003年 | 10篇 |
2002年 | 13篇 |
2001年 | 8篇 |
2000年 | 5篇 |
1999年 | 7篇 |
1998年 | 6篇 |
1997年 | 12篇 |
1996年 | 8篇 |
1995年 | 1篇 |
1992年 | 2篇 |
1991年 | 2篇 |
1990年 | 5篇 |
1987年 | 1篇 |
1986年 | 2篇 |
1985年 | 3篇 |
1983年 | 2篇 |
1982年 | 8篇 |
1981年 | 1篇 |
1980年 | 1篇 |
1979年 | 3篇 |
1978年 | 2篇 |
1976年 | 5篇 |
1975年 | 3篇 |
1973年 | 2篇 |
1971年 | 2篇 |
1969年 | 3篇 |
1968年 | 1篇 |
排序方式: 共有261条查询结果,搜索用时 16 毫秒
1.
S. N. Molotkov 《Journal of Experimental and Theoretical Physics》2004,98(2):374-389
The coding of quantum communication channels in real time is considered as applied to the situation when information is coded into continuous quantum degrees of freedom (into the shape of the amplitude of quantum states with an arbitrary number of photons). It is shown that the nonlocalizability of states in quantum field theory requires that the identity of particles should be taken into account. This, together with the finiteness of the limit speed of propagation, leads to the fact that the formulas for the transmission rate of nonrelativistic communication channels have an asymptotic character; i.e., these formulas are formally valid only when the separation between messages is infinite (when the identity of particles can be neglected) and, hence, when the transmission rate in [bit/message s] is infinitely small. A real-time information capacity of a sequential relativistic quantum communication channel is obtained that takes into account the identity of particles for pure signal states with an arbitrary number of photons. An explicit analytic expression is obtained for the transmission rate of a quantum channel of finite bandwidth for one-photon input states. 相似文献
2.
S. N. Molotkov 《JETP Letters》2004,80(8):563-567
A “collective” attack on the key is considered, and its connection with the classical capacity of a quantum communication channel is analyzed. It has been shown that the allowable error probability for legitimate users to which the secure key can be extracted is less than half the value for “translucent” eavesdropping and individual measurements. 相似文献
3.
S. N. Molotkov 《Journal of Experimental and Theoretical Physics》2003,97(5):1053-1074
A principally new approach ensuring secure key distribution via an open quantum communication channel is proposed. In contrast to the existing schemes, in which the security is based upon special properties of nonorthogonal states in the Hilbert space, the security of the proposed scheme relies on a spacetime structure of states and on certain constraints imposed by special relativity. Using these factors, it is possible to provide for secure key transmission using practically arbitrary quantum states. 相似文献
4.
S. N. Molotkov 《JETP Letters》2002,76(1):71-76
A new relativistic quantum cryptosystem is proposed in which the information is carried by the extended single-photon states with orthogonal polarizations and effective length exceeding the communication channel length. The light “arrest” effect is used as a procedure for the detection and preparation of extended states. The cryptosystem is secure against any eavesdropping attempts, because its states are quantized and the propagation velocity is limited. In this scheme, the preparation and detection procedures are local in space but require a finite time, depending on the extension of the states. The preparation for detecting at the receiver end begins before the state left the source at the input end. 相似文献
5.
6.
Honkonen J. Komarova M. V. Molotkov Yu. G. Nalimov M. Yu. 《Theoretical and Mathematical Physics》2019,200(3):1360-1373
Theoretical and Mathematical Physics - We construct a quantum kinetic theory of a weakly interacting critical boson gas using the expectation values of products of Heisenberg field operators in the... 相似文献
7.
JETP Letters - A simple fundamental modification of quantum key distribution protocols has been proposed: it is not required to protect the results of avalanche detectors from an eavesdropper, but... 相似文献
8.
L. A. Molotkov U. Baimagambetov N. S. Smirnova 《Journal of Mathematical Sciences》1982,20(5):2448-2461
To investigate the propagation of normal waves in a free, transversally isotropic, elastic layer it is necessary to determine the roots of the corresponding dispersion equation. It is shown that with increasing wave number the roots move monotonically along the axis of the phase velocity. The initial and final points of the roots are found. Examples of computations of the roots are given.Translated from Zapiski Nauchnykh Seminarov Leningradskogo Otdeleniya Matematicheskogo Instituta im. V. A. Steklova AN SSSR, Vol. 99, pp. 85–103, 1980. 相似文献
9.
L. A. Molotkov 《Journal of Mathematical Sciences》2003,117(2):3982-3993
For a medium in which porous and elastic layers alternate and there is slide contact on the interfaces, an effective model is established. This model is of three phases and includes two elastic phases and one fluid phase. Specific features of this effective model are that two waves with triangular front sets propagate and the second (slow) longitudinal wave is absent in it. In the special case where the thickness of elastic layers is very small but they continue to work as barriers for fluid particles from porous layers, the effective model is of two phases, and one of the triangular front sets disappears. Bibliography: 14 titles. 相似文献
10.