全文获取类型
收费全文 | 1265篇 |
免费 | 28篇 |
国内免费 | 26篇 |
专业分类
化学 | 244篇 |
力学 | 6篇 |
综合类 | 2篇 |
数学 | 984篇 |
物理学 | 83篇 |
出版年
2024年 | 2篇 |
2023年 | 16篇 |
2022年 | 21篇 |
2021年 | 9篇 |
2020年 | 21篇 |
2019年 | 18篇 |
2018年 | 24篇 |
2017年 | 18篇 |
2016年 | 13篇 |
2015年 | 4篇 |
2014年 | 51篇 |
2013年 | 83篇 |
2012年 | 40篇 |
2011年 | 69篇 |
2010年 | 64篇 |
2009年 | 119篇 |
2008年 | 122篇 |
2007年 | 97篇 |
2006年 | 94篇 |
2005年 | 50篇 |
2004年 | 47篇 |
2003年 | 26篇 |
2002年 | 17篇 |
2001年 | 34篇 |
2000年 | 19篇 |
1999年 | 49篇 |
1998年 | 53篇 |
1997年 | 32篇 |
1996年 | 37篇 |
1995年 | 17篇 |
1994年 | 8篇 |
1993年 | 7篇 |
1992年 | 3篇 |
1991年 | 3篇 |
1990年 | 3篇 |
1989年 | 4篇 |
1988年 | 3篇 |
1987年 | 4篇 |
1986年 | 1篇 |
1985年 | 10篇 |
1984年 | 2篇 |
1982年 | 1篇 |
1981年 | 2篇 |
1980年 | 1篇 |
1977年 | 1篇 |
排序方式: 共有1319条查询结果,搜索用时 0 毫秒
1.
The drawbacks of our earlier report of preparing fuel cell catalyst arrays by borohydride reduction of inkjet prepared arrays of metal salts are discussed along with the need for inclusion of state-of-the-art metrics in all array screening. An alternative method for screening of hydrogen/air cathode catalysts, direct methanol fuel cell (DMFC) anode catalysts, and catalyst loading studies is provided. State-of-the-art Johnson Matthey catalysts were used in control experiments to demonstrate the utility of the array fuel cell for high throughput screening of fuel cell catalysts in the 3-4 mg/cm2 range. This report lays out hard learned rules for high throughput screening and demonstrates that the array fuel cell can be used for very precise screening of libraries of membrane electrode assembly (MEA) components without the pitfalls discussed in the introduction. 相似文献
2.
Searching in trees 总被引:1,自引:0,他引:1
Frank Recker 《Discrete Applied Mathematics》2004,140(1-3):169-183
In (Discrete Math. 17 (1977)181) Rivest introduced the search complexity of binary trees and proved that among all binary trees with a fixed search complexity the smallest ones are the so-called Fibonacci trees. This result is extended for q-trees. The structure of the smallest q-trees is again Fibonacci-like but more complicated than in the binary case. In addition an upper bound for the asymptotic growth of these trees is given. 相似文献
3.
Ross Anderson Cunsheng Ding Tor Helleseth Torleiv Klove 《Designs, Codes and Cryptography》1998,15(2):111-124
Previous researchers have designed shared control schemes with a view to minimising the likelihood that participants will conspire to perform an unauthorised act. But, human nature being what it is, systems inevitably fail; so shared control schemes should also be designed so that the police can identify conspirators after the fact. This requirement leads us to search for schemes with sparse access structures. We show how this can be done using ideas from coding theory. In particular, secret sharing schemes based on geometric codes whose dual [n,k,d] codes have d and n as their only nonzero weights are suitable. We determine their access structures and analyse their properties. We have found almost all of them, and established some relations among codes, designs and secret-sharing schemes. 相似文献
4.
Future pathways for combinatorial chemistry 总被引:1,自引:0,他引:1
David Brown 《Molecular diversity》1997,2(4):217-222
Summary Investment in combinatorial chemistry (combichem) in the pharmaceutical industry is being driven by the need for increased efficiency. Results from pioneers in the field have demonstrated where mixture or discrete compound synthesis is useful, and what mixture sizes and compound concentrations are appropriate. To make the techniques of combichem of general utility in drug discovery, a broad range of advances is still required. Conversion of organic chemistry to solid phase conditions is key, as are developments in linkers and resins. Library design methodology requires further development. Combinatorial biosynthesis of focused libraries of natural products holds great promise for capitalising on hardwon natural product leads. Miniaturisation of screens is required to reduce the cost of screening combinatorial libraries. Developments in the processes preceding and following synthesis are required to enable the flow of increased numbers of compounds without new bottlenecks developing. The impact of combinatorial chemistry will be greatly enhanced by synergy with ongoing parallel developments in genetic technologies, screening technologies and bioinformatics. 相似文献
5.
We study a variation of the knapsack problem in which each item has a profit, a weight and a penalty; the sum of profits of the selected items minus the largest penalty associated with the selected items must be maximized. We present an ILP formulation and an exact optimization algorithm. 相似文献
6.
Bram van Asch Henk Hollmann Henk van Tilborg 《Journal of Combinatorial Theory, Series A》2006,113(8):1594-1613
When Jack van Lint was appointed as full professor at the Eindhoven University of Technology at the age of 26 he combined a PhD in number theory with a very open scientific mind. It took a sabbatical visit to Bell Laboratories in 1966 to make him understand that a new and fascinating field of applied mathematics was emerging: discrete mathematics. It fascinated and inspired him for the rest of his life. When he passed away on September 28, 2004, he left behind a legacy of 18 books and 177 articles, covering many aspects of coding theory, combinatorics, and finite geometry.van Lint was also a strong international advocate of the role that discrete mathematics ought to play in modern applied mathematics curricula. Quite a few departments sought his advice. Years later, four different universities showed their appreciation by awarding him an honorary degree.This overview is an homage to van Lint's academic achievements and can serve as an introduction to his work for younger generations. 相似文献
7.
8.
This paper describes an optimization technique based on an heuristic procedure which is applied to analyse and improve the efficiency of the design of Global Positioning System (GPS) surveying networks. GPS is a valuable survey tool because of its ability to increase the accuracy, speed and flexibility of a survey. A GPS network can be defined as a number of stations, which are co-ordinated by a series of sessions, formed by placing receivers on stations. The goal is to select the best order in which these sessions can be organised to give the best possible schedule. Generally, solving large networks to optimality requires impractical computational time. This paper proposes a Tabu Search technique which provides optimal or near-optimal solutions for large networks with an acceptable amount of computational effort. Computational results for several case studies with known and unknown optimal schedules have been presented to assess the performance of the proposed technique. 相似文献
9.
Currently, most combinatorial optimisation problems have to be solved, if the optimum solution is sought, using general techniques
to explore the space of feasible solutions and, more specifically, through exploratory enumerative procedures in trees and
search graphs. We propose Branch and Win, a general formulation for understanding and synthesising the different tree search
procedures that have been presented in the literature of operations research as well as in that of artificial intelligence.
Several general ideas are also presented, whose application allows designing new hybrid search algorithms, in order to implement
the procedure. 相似文献
10.
This paper concerns methods by which a trusted authority can distribute keys and/or broadcast a message over a network, so that each member of a privileged subset of users can compute a specified key or decrypt the broadcast message. Moreover, this is done in such a way that no coalition is able to recover any information on a key or broadcast message they are not supposed to know. The problems are studied using the tools of information theory, so the security provided is unconditional (i.e., not based on any computational assumption).In a recent paper st95a, Stinson described a method of constructing key predistribution schemes by combining Mitchell-Piper key distribution patterns with resilient functions; and also presented a construction method for broadcast encryption schemes that combines Fiat-Naor key predistribution schemes with ideal secret sharing schemes. In this paper, we further pursue these two themes, providing several nice applications of these techniques by using combinatorial structures such as orthogonal arrays, perpendicular arrays, Steiner systems and universal hash families. 相似文献