首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1265篇
  免费   28篇
  国内免费   26篇
化学   244篇
力学   6篇
综合类   2篇
数学   984篇
物理学   83篇
  2024年   2篇
  2023年   16篇
  2022年   21篇
  2021年   9篇
  2020年   21篇
  2019年   18篇
  2018年   24篇
  2017年   18篇
  2016年   13篇
  2015年   4篇
  2014年   51篇
  2013年   83篇
  2012年   40篇
  2011年   69篇
  2010年   64篇
  2009年   119篇
  2008年   122篇
  2007年   97篇
  2006年   94篇
  2005年   50篇
  2004年   47篇
  2003年   26篇
  2002年   17篇
  2001年   34篇
  2000年   19篇
  1999年   49篇
  1998年   53篇
  1997年   32篇
  1996年   37篇
  1995年   17篇
  1994年   8篇
  1993年   7篇
  1992年   3篇
  1991年   3篇
  1990年   3篇
  1989年   4篇
  1988年   3篇
  1987年   4篇
  1986年   1篇
  1985年   10篇
  1984年   2篇
  1982年   1篇
  1981年   2篇
  1980年   1篇
  1977年   1篇
排序方式: 共有1319条查询结果,搜索用时 0 毫秒
1.
The drawbacks of our earlier report of preparing fuel cell catalyst arrays by borohydride reduction of inkjet prepared arrays of metal salts are discussed along with the need for inclusion of state-of-the-art metrics in all array screening. An alternative method for screening of hydrogen/air cathode catalysts, direct methanol fuel cell (DMFC) anode catalysts, and catalyst loading studies is provided. State-of-the-art Johnson Matthey catalysts were used in control experiments to demonstrate the utility of the array fuel cell for high throughput screening of fuel cell catalysts in the 3-4 mg/cm2 range. This report lays out hard learned rules for high throughput screening and demonstrates that the array fuel cell can be used for very precise screening of libraries of membrane electrode assembly (MEA) components without the pitfalls discussed in the introduction.  相似文献   
2.
Searching in trees   总被引:1,自引:0,他引:1  
In (Discrete Math. 17 (1977)181) Rivest introduced the search complexity of binary trees and proved that among all binary trees with a fixed search complexity the smallest ones are the so-called Fibonacci trees. This result is extended for q-trees. The structure of the smallest q-trees is again Fibonacci-like but more complicated than in the binary case. In addition an upper bound for the asymptotic growth of these trees is given.  相似文献   
3.
Previous researchers have designed shared control schemes with a view to minimising the likelihood that participants will conspire to perform an unauthorised act. But, human nature being what it is, systems inevitably fail; so shared control schemes should also be designed so that the police can identify conspirators after the fact. This requirement leads us to search for schemes with sparse access structures. We show how this can be done using ideas from coding theory. In particular, secret sharing schemes based on geometric codes whose dual [n,k,d] codes have d and n as their only nonzero weights are suitable. We determine their access structures and analyse their properties. We have found almost all of them, and established some relations among codes, designs and secret-sharing schemes.  相似文献   
4.
Future pathways for combinatorial chemistry   总被引:1,自引:0,他引:1  
Summary Investment in combinatorial chemistry (combichem) in the pharmaceutical industry is being driven by the need for increased efficiency. Results from pioneers in the field have demonstrated where mixture or discrete compound synthesis is useful, and what mixture sizes and compound concentrations are appropriate. To make the techniques of combichem of general utility in drug discovery, a broad range of advances is still required. Conversion of organic chemistry to solid phase conditions is key, as are developments in linkers and resins. Library design methodology requires further development. Combinatorial biosynthesis of focused libraries of natural products holds great promise for capitalising on hardwon natural product leads. Miniaturisation of screens is required to reduce the cost of screening combinatorial libraries. Developments in the processes preceding and following synthesis are required to enable the flow of increased numbers of compounds without new bottlenecks developing. The impact of combinatorial chemistry will be greatly enhanced by synergy with ongoing parallel developments in genetic technologies, screening technologies and bioinformatics.  相似文献   
5.
We study a variation of the knapsack problem in which each item has a profit, a weight and a penalty; the sum of profits of the selected items minus the largest penalty associated with the selected items must be maximized. We present an ILP formulation and an exact optimization algorithm.  相似文献   
6.
When Jack van Lint was appointed as full professor at the Eindhoven University of Technology at the age of 26 he combined a PhD in number theory with a very open scientific mind. It took a sabbatical visit to Bell Laboratories in 1966 to make him understand that a new and fascinating field of applied mathematics was emerging: discrete mathematics. It fascinated and inspired him for the rest of his life. When he passed away on September 28, 2004, he left behind a legacy of 18 books and 177 articles, covering many aspects of coding theory, combinatorics, and finite geometry.van Lint was also a strong international advocate of the role that discrete mathematics ought to play in modern applied mathematics curricula. Quite a few departments sought his advice. Years later, four different universities showed their appreciation by awarding him an honorary degree.This overview is an homage to van Lint's academic achievements and can serve as an introduction to his work for younger generations.  相似文献   
7.
刘文安  聂赞坎 《应用数学》2004,17(3):405-409
本文通过建立简洁而有效的搜索方法 ,证明了对于无穷多个n来说 ,三个目标的最优搜索问题的最小试验次数等于信息论下界 .同时也研究了上述问题的修正情形 ,证明了对于所有整数n来说 ,对应的最小试验次数或者等于信息论下界或者超过信息论下界 1次并且对于无穷多个区间 ,信息论下界均是可以达到的 .  相似文献   
8.
This paper describes an optimization technique based on an heuristic procedure which is applied to analyse and improve the efficiency of the design of Global Positioning System (GPS) surveying networks. GPS is a valuable survey tool because of its ability to increase the accuracy, speed and flexibility of a survey. A GPS network can be defined as a number of stations, which are co-ordinated by a series of sessions, formed by placing receivers on stations. The goal is to select the best order in which these sessions can be organised to give the best possible schedule. Generally, solving large networks to optimality requires impractical computational time. This paper proposes a Tabu Search technique which provides optimal or near-optimal solutions for large networks with an acceptable amount of computational effort. Computational results for several case studies with known and unknown optimal schedules have been presented to assess the performance of the proposed technique.  相似文献   
9.
Currently, most combinatorial optimisation problems have to be solved, if the optimum solution is sought, using general techniques to explore the space of feasible solutions and, more specifically, through exploratory enumerative procedures in trees and search graphs. We propose Branch and Win, a general formulation for understanding and synthesising the different tree search procedures that have been presented in the literature of operations research as well as in that of artificial intelligence. Several general ideas are also presented, whose application allows designing new hybrid search algorithms, in order to implement the procedure.  相似文献   
10.
Some New Results on Key Distribution Patterns and Broadcast Encryption   总被引:1,自引:0,他引:1  
This paper concerns methods by which a trusted authority can distribute keys and/or broadcast a message over a network, so that each member of a privileged subset of users can compute a specified key or decrypt the broadcast message. Moreover, this is done in such a way that no coalition is able to recover any information on a key or broadcast message they are not supposed to know. The problems are studied using the tools of information theory, so the security provided is unconditional (i.e., not based on any computational assumption).In a recent paper st95a, Stinson described a method of constructing key predistribution schemes by combining Mitchell-Piper key distribution patterns with resilient functions; and also presented a construction method for broadcast encryption schemes that combines Fiat-Naor key predistribution schemes with ideal secret sharing schemes. In this paper, we further pursue these two themes, providing several nice applications of these techniques by using combinatorial structures such as orthogonal arrays, perpendicular arrays, Steiner systems and universal hash families.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号