首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   969篇
  免费   21篇
  国内免费   65篇
化学   35篇
晶体学   1篇
力学   31篇
综合类   5篇
数学   942篇
物理学   41篇
  2024年   2篇
  2023年   12篇
  2022年   18篇
  2021年   6篇
  2020年   22篇
  2019年   21篇
  2018年   21篇
  2017年   22篇
  2016年   9篇
  2015年   15篇
  2014年   15篇
  2013年   125篇
  2012年   40篇
  2011年   35篇
  2010年   34篇
  2009年   78篇
  2008年   68篇
  2007年   75篇
  2006年   61篇
  2005年   42篇
  2004年   38篇
  2003年   30篇
  2002年   34篇
  2001年   24篇
  2000年   20篇
  1999年   19篇
  1998年   22篇
  1997年   16篇
  1996年   22篇
  1995年   13篇
  1994年   17篇
  1993年   10篇
  1992年   6篇
  1991年   8篇
  1990年   9篇
  1989年   3篇
  1988年   4篇
  1987年   3篇
  1986年   3篇
  1985年   5篇
  1984年   2篇
  1983年   2篇
  1982年   4篇
  1981年   6篇
  1980年   3篇
  1979年   4篇
  1978年   4篇
  1977年   1篇
  1976年   1篇
  1974年   1篇
排序方式: 共有1055条查询结果,搜索用时 15 毫秒
1.
2.
3.
A Generalization of Regular Left Acts   总被引:1,自引:0,他引:1  
AGeneralizationofRegularLeftActs*)LiuZhongkui(刘仲奎)(DepartmentofMathematics,NorthwestNormalUniversity,Lanzhou,730070)J.Ahsan(D...  相似文献   
4.
蕴涵代数与BCK代数   总被引:6,自引:0,他引:6  
系统研究 Fuzzy蕴涵代数与 BCK代数之间的关系 ,给出 MV代数与 BCK代数之间的联系 ,建立正则 FI代数和对合 BCK代数的对偶代数  相似文献   
5.
A Cayley map is a Cayley graph embedded in an orientable surface such that. the local rotations at every vertex are identical. In this paper, balanced regular Cayley maps for cyclic groups, dihedral groups, and generalized quaternion groups are classified.  相似文献   
6.
In this paper we are interested in the sufficient conditions which guarantee the regularityof solutions of 3-D ideal magnetohydrodynamic equations in the arbitrary time interval [0,T].Fivesufficient conditions are given.Our results are motivated by two main ideas:one is to control theaccumulation of vorticity alone;the other is to generalize the corresponding geometric conditions of3-D Euler equations to 3-D ideal magnetohydrodynamic equations.  相似文献   
7.
In the present paper we develop our approach for studying the stability of integer programming problems. We prove that the L-class enumeration method is stable on integer linear programming problems in the case of bounded relaxation sets [9]. The stability of some cutting plane algorithms is discussed.  相似文献   
8.
Characterizations of the containment of a convex set either in an arbitrary convex set or in the complement of a finite union of convex sets (i.e., the set, described by reverse-convex inequalities) are given. These characterizations provide ways of verifying the containments either by comparing their corresponding dual cones or by checking the consistency of suitable associated systems. The convex sets considered in this paper are the solution sets of an arbitrary number of convex inequalities, which can be either weak or strict inequalities. Particular cases of dual characterizations of set containments have played key roles in solving large scale knowledge-based data classification problems where they are used to describe the containments as inequality constraints in optimization problems. The idea of evenly convex set (intersection of open half spaces), which was introduced by W. Fenchel in 1952, is used to derive the dual conditions, characterizing the set containments.  相似文献   
9.
This paper exploits a stochastic representation of bivariate elliptical distributions in order to obtain asymptotic results which are determined by the tail behavior of the generator. Under certain specified assumptions, we present the limiting distribution of componentwise maxima, the limiting upper copula, and a bivariate version of the classical peaks over threshold result.  相似文献   
10.
We give a hierarchy of semidefinite upper bounds for the maximum size A(n,d) of a binary code of word length n and minimum distance at least d. At any fixed stage in the hierarchy, the bound can be computed (to an arbitrary precision) in time polynomial in n; this is based on a result of de Klerk et al. (Math Program, 2006) about the regular ∗-representation for matrix ∗-algebras. The Delsarte bound for A(n,d) is the first bound in the hierarchy, and the new bound of Schrijver (IEEE Trans. Inform. Theory 51:2859–2866, 2005) is located between the first and second bounds in the hierarchy. While computing the second bound involves a semidefinite program with O(n 7) variables and thus seems out of reach for interesting values of n, Schrijver’s bound can be computed via a semidefinite program of size O(n 3), a result which uses the explicit block-diagonalization of the Terwilliger algebra. We propose two strengthenings of Schrijver’s bound with the same computational complexity. Supported by the Netherlands Organisation for Scientific Research grant NWO 639.032.203.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号