全文获取类型
收费全文 | 58篇 |
免费 | 1篇 |
国内免费 | 2篇 |
专业分类
化学 | 13篇 |
晶体学 | 1篇 |
数学 | 17篇 |
物理学 | 30篇 |
出版年
2018年 | 2篇 |
2017年 | 1篇 |
2014年 | 2篇 |
2013年 | 4篇 |
2012年 | 3篇 |
2011年 | 5篇 |
2010年 | 4篇 |
2009年 | 1篇 |
2008年 | 1篇 |
2005年 | 1篇 |
2004年 | 1篇 |
2002年 | 3篇 |
2001年 | 2篇 |
2000年 | 5篇 |
1999年 | 4篇 |
1998年 | 2篇 |
1996年 | 4篇 |
1995年 | 2篇 |
1994年 | 2篇 |
1993年 | 5篇 |
1988年 | 2篇 |
1987年 | 1篇 |
1980年 | 1篇 |
1978年 | 1篇 |
1977年 | 1篇 |
1976年 | 1篇 |
排序方式: 共有61条查询结果,搜索用时 15 毫秒
1.
2.
This article reports in detail on the discovery that zirconium(IV) salts of secondary amides and lactams are transformed by Cp(2)ZrHCl to N-substituted imines in one step. The method represents the first controlled reduction of amides and lactams to the corresponding imines, a transformation that is otherwise very difficult to achieve because imines are reduced more rapidly than carboxamides by most metal hydride reagents. No products of reductive cleavage of the carboxamides are observed. Efforts to replace 2 mol equiv of Cp(2)ZrHCl with simpler, less costly alternatives led to the finding that a diisobutylaluminum enolate can be substituted for the initial zirconium enolate. Such aluminum amides are smoothly reduced to the corresponding imine using Cp(2)ZrHCl in good yield. Moreover, aluminum amides are also reduced to imines using either low-valent titanium species or triethylsilane. In these alternative procedures, use of Cp(2)ZrHCl is eliminated altogether in the title transformation. 相似文献
3.
4.
Hennig A Hoffmann A Borcherding H Thiele T Schedler U Resch-Genger U 《Chemical communications (Cambridge, England)》2011,47(27):7842-7844
We introduce a method to determine the number of accessible functional groups on a polymer microsphere surface based on the interaction between the macrocyclic host cucurbit[7]uril (CB7) and a guest reacted to the microsphere surface. After centrifugation, CB7 in the supernatant is quantified by addition of a fluorescent dye. The difference between added and detected CB7 affords the number of accessible surface functional groups. 相似文献
5.
A new, vectorial approach to fast correlation attacks on binary memoryless combiners is proposed. Instead of individual input sequences or their linear combinations, the new attack is targeting subsets of input sequences as a whole thus exploiting the full correlation between the chosen subset and the output sequence. In particular, the set of all the input sequences can be chosen as the target. The attack is based on a novel iterative probabilistic algorithm which is also applicable to general memoryless combiners over finite fields or finite rings. To illustrate the effectiveness of the introduced approach, experimental results obtained for random balanced combining functions are presentedMost of this work was done while he was with Rome CryptoDesign Center, Gemplus, Italy 相似文献
6.
The motion of a holonomic scleronomic non-conservative mechanicalsystem with minimal dissipation is considered. As applicationsof the theory several problems are studied in detail. 相似文献
7.
8.
We survey the theory of Poisson traces (or zeroth Poisson homology) developed by the authors in a series of recent papers. The goal is to understand this subtle invariant of (singular) Poisson varieties, conditions for it to be finite-dimensional, its relationship to the geometry and topology of symplectic resolutions, and its applications to quantizations. The main technique is the study of a canonical D-module on the variety. In the case the variety has finitely many symplectic leaves (such as for symplectic singularities and Hamiltonian reductions of symplectic vector spaces by reductive groups), the D-module is holonomic, and hence, the space of Poisson traces is finite-dimensional. As an application, there are finitely many irreducible finite-dimensional representations of every quantization of the variety. Conjecturally, the D-module is the pushforward of the canonical D-module under every symplectic resolution of singularities, which implies that the space of Poisson traces is dual to the top cohomology of the resolution. We explain many examples where the conjecture is proved, such as symmetric powers of du Val singularities and symplectic surfaces and Slodowy slices in the nilpotent cone of a semisimple Lie algebra. We compute the D-module in the case of surfaces with isolated singularities and show it is not always semisimple. We also explain generalizations to arbitrary Lie algebras of vector fields, connections to the Bernstein–Sato polynomial, relations to two-variable special polynomials such as Kostka polynomials and Tutte polynomials, and a conjectural relationship with deformations of symplectic resolutions. In the appendix we give a brief recollection of the theory of D-modules on singular varieties that we require. 相似文献
9.
A Mukherjee M Dasgupta DJ Hinde CR Morton AC Berriman RD Butt JO Newton H Timmers 《Pramana》2001,57(1):195-198
Fusion cross-sections for the 7Li + 12C reaction have been measured at energies above the Coulomb barrier by the direct detection of evaporation residues. The heavy
evaporation residues with energies below 3 MeV could not be separated out from the α-particles in the spectrum and hence their
contribution was estimated using statistical model calculations. The present work indicates that suppression of fusion cross-sections
due to the breakup of 7Li may not be significant for 7Li + 12C reaction at energies around the barrier. 相似文献
10.
The alternating step generator is a well-known keystream generator consisting of two stop/go clocked LFSRs, LFSR1 and LFSR2, whose clocks are controlled by another LFSR, LFSR3, which is clocked regularly. A probabilistic analysis of this generator is conducted which shows that the posterior probabilites of individual bits of the first derivatives of the regularly clocked LFSR1 and LFSR2 sequences, when conditioned on a given segment of the first derivative of the keystream sequence, can be computed efficiently in a number of probabilistic models of interest. The expected values of these probabilities, for a random keystream sequence, are derived by an approximate theoretical analysis and are also verified by systematic computer experiments. It is pointed out that these posterior probabilities can be enhanced in a resynchronization scenario and thus used for a low-complexity fast correlation attack on the two LFSRs. More generally, it is argued that even without resynchronization these probabilities may be significantly different from one half for fast correlation attacks based on iterative decoding algorithms to be successful, although with incresead complexity. A related method for computing the posterior probabilities of individual bits of the LFSR3 sequence, when conditioned on both the keystream sequence and the LFSR1 and LFSR2 sequences, is also developed. As these posterior probabilities are much more different from one half, they can be used for a low-complexity fast correlation attack on LFSR3, provided that the initial states of LFSR1 and LFSR2 are previously reconstructed. 相似文献