首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   950篇
  免费   28篇
  国内免费   58篇
化学   280篇
晶体学   4篇
力学   64篇
数学   531篇
物理学   157篇
  2023年   10篇
  2022年   21篇
  2021年   22篇
  2020年   31篇
  2019年   23篇
  2018年   33篇
  2017年   44篇
  2016年   21篇
  2015年   27篇
  2014年   63篇
  2013年   86篇
  2012年   65篇
  2011年   76篇
  2010年   62篇
  2009年   83篇
  2008年   51篇
  2007年   72篇
  2006年   34篇
  2005年   21篇
  2004年   14篇
  2003年   12篇
  2002年   12篇
  2001年   8篇
  2000年   16篇
  1999年   6篇
  1998年   13篇
  1997年   7篇
  1996年   14篇
  1995年   5篇
  1994年   6篇
  1993年   12篇
  1992年   8篇
  1991年   5篇
  1990年   4篇
  1989年   3篇
  1988年   3篇
  1987年   1篇
  1986年   4篇
  1985年   12篇
  1984年   4篇
  1983年   1篇
  1982年   3篇
  1981年   6篇
  1980年   2篇
  1979年   2篇
  1978年   3篇
  1977年   1篇
  1976年   4篇
排序方式: 共有1036条查询结果,搜索用时 15 毫秒
1.
Optimal stopping problems by two or more decision makers: a survey   总被引:1,自引:0,他引:1  
A review of the optimal stopping problem with more than a single decision maker (DM) is presented in this paper. We classify the existing literature according to the arrival of the offers, the utility of the DMs, the length of the sequence of offers, the nature of the game and the number of offers to be selected. We enumerate various definitions for this problem and describe some dynamic approaches. Fouad Ben Abdelaziz is on leave from the Institut Superieur de Gestion, University of Tunis, Tunisia e-mail: foued.benabdelaz@isg.run.tn.  相似文献   
2.
We study game formulas the truth of which is determined by a semantical game of uncountable length. The main theme is the study of principles stating reflection of these formulas in various admissible sets. This investigation leads to two weak forms of strict-II11 reflection (or ∑1-compactness). We show that admissible sets such as H2) and Lω2 which fail to have strict-II11 reflection, may or may not, depending on set-theoretic hypotheses satisfy one or both of these weaker forms. Mathematics Subject Classification : 03C70, 03C75.  相似文献   
3.
We study a leader follower game with two players: a terrorist and a state where the later one installs facilities that provide support in case of a terrorist attack. While the Terrorist attacks one of the metropolitan areas to maximize his utility, the State, which acts as a leader, installs the facilities such that the metropolitan area attacked is the one that minimizes her disutility (i.e., minimizes ‘loss’). We solve the problem efficiently for one facility and we formulate it as a mathematical programming problem for a general number of facilities. We demonstrate the problem via a case study of the 20 largest metropolitan areas in the United States.  相似文献   
4.
We examine the problem of building or fortifying a network to defend against enemy attacks in various scenarios. In particular, we examine the case in which an enemy can destroy any portion of any arc that a designer constructs on the network, subject to some interdiction budget. This problem takes the form of a three-level, two-player game, in which the designer acts first to construct a network and transmit an initial set of flows through the network. The enemy acts next to destroy a set of constructed arcs in the designer’s network, and the designer acts last to transmit a final set of flows in the network. Most studies of this nature assume that the enemy will act optimally; however, in real-world scenarios one cannot necessarily assume rationality on the part of the enemy. Hence, we prescribe optimal network design algorithms for three different profiles of enemy action: an enemy destroying arcs based on capacities, based on initial flows, or acting optimally to minimize our maximum profits obtained from transmitting flows.  相似文献   
5.
A stochastic version of Isaacs's (Ref. 1) game of two cars is dealt with here. In this version, the pursuer, owing to thrust and drag forces, has a variable speed, whereas the evader's speed is constant. Also, the pursuer can maneuver as long as his speed is bounded by some lower and upper limits. The probability of interception, corresponding to optimal (saddle-point) feedback strategies, is computed and serves as a reference for evaluating the performance of four different versions of the proportional navigation pursuit law as well as two other strategies.  相似文献   
6.
By showing that there is an upper bound for the price of anarchyρ(Γ) for a non-atomic congestion game Γ with only separable cost maps and fixed demands, Roughgarden and Tardos show that the cost of forgoing centralized control is mild. This letter shows that there is an upper bound for ρ(Γ) in Γ for fixed demands with symmetric cost maps. It also shows that there is a weaker bound for ρ(Γ) in Γ with elastic demands.  相似文献   
7.
In this paper, we deal with multicriteria matrix games. Different solution concepts have been proposed to cope with these games. Recently, the concept of Pareto-optimal security strategy which assures the property of security in the individual criteria against an opponent's deviation in strategy has been introduced. However, the idea of security behind this concept is based on expected values, so that this security might be violated by mixed strategies when replications are not allowed. To avoid this inconvenience, we propose in this paper a new concept of solution for these games: the G-goal security strategy, which includes as part of the solution the probability of obtaining prespecified values in the payoff functions. Thus, attitude toward risk together with payoff values are considered jointly in the solution analysis.  相似文献   
8.
We consider a general adversarial stochastic optimization model. Our model involves the design of a system that an adversary may subsequently attempt to destroy or degrade. We introduce SPAR, which utilizes mixed-integer programming for the design decision and a Markov decision process (MDP) for the modeling of our adversarial phase.  相似文献   
9.
In this paper, we carried out a theoretical study on the active site structures of the Mn-SOD with ab initio Hartree–Fock SCF method, and analyzed the molecular orbital energies, charges and atomic orbital contribution to the frontier molecular orbital.  相似文献   
10.
It is commonly assumed that phosphorus occurs almost exclusively in the environment as fully oxidized phosphate (primarily H2PO4 and HPO42−, where the oxidation state of phosphorus is +V). Recent developments in the field of microbiology and research on the origin of life have suggested a possibly significant role for reduced, inorganic forms of phosphorus in bacterial metabolism and as evolutionary precursors of biological phosphate compounds. Reduced inorganic forms of phosphorus include phosphorus acid (H3PO3, P(+III)), hypophosphorus acid (H3PO2, P(+I)) and various forms of phosphides (P(−III)). Reduced phosphorus has been detected in anaerobic sediments, sewage treatment facilities and in industrial and agricultural processes.Microbiological evidence suggests a significant role for reduced phosphorus species in metabolic processes and raises interesting questions regarding the biogeochemistry of this nutrient in the environment. However, the paucity of data on the presence and cycling of reduced phosphorus compounds in the environment requires attention in order to elucidate the role of these compounds in natural systems. This paper discusses the significance of reduced phosphorus in the natural environment, its speciation and methods of detection.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号