首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   61篇
  免费   0篇
  国内免费   1篇
化学   7篇
晶体学   1篇
数学   9篇
物理学   45篇
  2018年   1篇
  2015年   1篇
  2013年   2篇
  2011年   1篇
  2008年   2篇
  2007年   2篇
  2006年   1篇
  2005年   5篇
  2004年   3篇
  2002年   3篇
  2001年   1篇
  2000年   7篇
  1999年   5篇
  1998年   3篇
  1996年   3篇
  1995年   3篇
  1994年   3篇
  1993年   7篇
  1992年   1篇
  1990年   1篇
  1988年   2篇
  1987年   2篇
  1980年   1篇
  1978年   1篇
  1972年   1篇
排序方式: 共有62条查询结果,搜索用时 15 毫秒
1.
2.
3.
The temperature dependence of spin coherence in InGaAs quantum dots is obtained from quantum beats observed in polarization-resolved pump-probe experiments. Within the same sample we clearly distinguish between coherent spin dynamics leading to quantum beats and incoherent long-lived spin-memory effects. Analysis of the coherent data using a theoretical model reveals approximately 10 times greater stability of the spin coherence at high temperature compared to that found previously for exciton states in four-wave-mixing experiments by Borri et al. [Phys. Rev. Lett. 87, 157401 (2001)]]. The data on incoherent polarization reveal a new form of spin memory based on charged quantum dots.  相似文献   
4.
We give two constructions for semi-regular relative difference sets (RDSs) in groups whose order is not a prime power, where the order u of the forbidden subgroup is greater than 2. No such RDSs were previously known. We use examples from the first construction to produce semi-regular RDSs in groups whose order can contain more than two distinct prime factors. For u greater than 2 these are the first such RDSs, and for u=2 we obtain new examples.  相似文献   
5.
A new, vectorial approach to fast correlation attacks on binary memoryless combiners is proposed. Instead of individual input sequences or their linear combinations, the new attack is targeting subsets of input sequences as a whole thus exploiting the full correlation between the chosen subset and the output sequence. In particular, the set of all the input sequences can be chosen as the target. The attack is based on a novel iterative probabilistic algorithm which is also applicable to general memoryless combiners over finite fields or finite rings. To illustrate the effectiveness of the introduced approach, experimental results obtained for random balanced combining functions are presentedMost of this work was done while he was with Rome CryptoDesign Center, Gemplus, Italy  相似文献   
6.
The motion of a holonomic scleronomic non-conservative mechanicalsystem with minimal dissipation is considered. As applicationsof the theory several problems are studied in detail.  相似文献   
7.
8.
9.
A microwave-enhanced, palladium-catalyzed protocol for the alpha-arylation of a protected glycine in neat water is described. This reaction proceeds rapidly, under non-inert conditions, to afford a range of phenylglycine derivatives in moderate to good yields. Based on this alpha-arylation, a number of aryl L-methionine-SR-sulfoximine (MSO) analogues were prepared and evaluated for their Mycobacterium tuberculosis glutamine synthetase (TB-GS) inhibitory activity.  相似文献   
10.
Fusion cross-sections for the 7Li + 12C reaction have been measured at energies above the Coulomb barrier by the direct detection of evaporation residues. The heavy evaporation residues with energies below 3 MeV could not be separated out from the α-particles in the spectrum and hence their contribution was estimated using statistical model calculations. The present work indicates that suppression of fusion cross-sections due to the breakup of 7Li may not be significant for 7Li + 12C reaction at energies around the barrier.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号