全文获取类型
收费全文 | 3795篇 |
免费 | 243篇 |
国内免费 | 460篇 |
专业分类
化学 | 2582篇 |
晶体学 | 27篇 |
力学 | 171篇 |
综合类 | 42篇 |
数学 | 1317篇 |
物理学 | 359篇 |
出版年
2024年 | 4篇 |
2023年 | 83篇 |
2022年 | 148篇 |
2021年 | 149篇 |
2020年 | 170篇 |
2019年 | 151篇 |
2018年 | 96篇 |
2017年 | 127篇 |
2016年 | 152篇 |
2015年 | 93篇 |
2014年 | 159篇 |
2013年 | 248篇 |
2012年 | 143篇 |
2011年 | 165篇 |
2010年 | 141篇 |
2009年 | 204篇 |
2008年 | 199篇 |
2007年 | 221篇 |
2006年 | 222篇 |
2005年 | 185篇 |
2004年 | 182篇 |
2003年 | 209篇 |
2002年 | 160篇 |
2001年 | 136篇 |
2000年 | 115篇 |
1999年 | 124篇 |
1998年 | 85篇 |
1997年 | 96篇 |
1996年 | 66篇 |
1995年 | 64篇 |
1994年 | 43篇 |
1993年 | 28篇 |
1992年 | 29篇 |
1991年 | 23篇 |
1990年 | 21篇 |
1989年 | 7篇 |
1988年 | 8篇 |
1987年 | 6篇 |
1986年 | 6篇 |
1985年 | 7篇 |
1984年 | 5篇 |
1983年 | 3篇 |
1982年 | 4篇 |
1981年 | 1篇 |
1979年 | 5篇 |
1977年 | 1篇 |
1972年 | 3篇 |
1971年 | 1篇 |
排序方式: 共有4498条查询结果,搜索用时 15 毫秒
1.
2.
3.
4.
We examine two criteria for balance of a gain graph, one based on binary cycles and one on circles. The graphs for which each criterion is valid depend on the set of allowed gain groups. The binary cycle test is invalid, except for forests, if any possible gain group has an element of odd order. Assuming all groups are allowed, or all abelian groups, or merely the cyclic group of order 3, we characterize, both constructively and by forbidden minors, the graphs for which the circle test is valid. It turns out that these three classes of groups have the same set of forbidden minors. The exact reason for the importance of the ternary cyclic group is not clear. © 2005 Wiley Periodicals, Inc. J Graph Theory 相似文献
5.
A (w,r) cover‐free family is a family of subsets of a finite set such that no intersection of w members of the family is covered by a union of r others. A (w,r) superimposed code is the incidence matrix of such a family. Such a family also arises in cryptography as the concept of key distribution pattern. In the present paper, we give some new results on superimposed codes. First we construct superimposed codes from super‐simple designs which give us results better than superimposed codes constructed by other known methods. Next we prove the uniqueness of the (1,2) superimposed code of size 9 × 12, the (2,2) superimposed code of size 14 × 8, and the (2,3) superimposed code of size 30 × 10. Finally, we improve numerical values of upper bounds for the asymptotic rate of some (w,r) superimposed codes. © 2004 Wiley Periodicals, Inc. 相似文献
6.
Hans R. Kricheldorf Lali Vakhtangishvili Gert Schwarz 《Journal of polymer science. Part A, Polymer chemistry》2004,42(22):5725-5735
Poly(pyridine ether)s were prepared in two ways: the polycondensation of silylated 1,1,1‐tris(4‐hydroxyphenyl)ethane (THPE) with 2,6‐difluoropyridine (method A) and the polycondensation of free THPE with 2,6‐dichloropyridine (method B). With method A, the THPE/difluoropyridine feed ratio was varied from 1.0:1.0 to 1.0:1.6. Cycles, bicycles, and multicycles were the main reaction products, and crosslinking was never observed. When ideal stoichiometry was used exclusively, multicycles free of functional groups were obtained. These multicycles were detectable in matrix‐assisted laser desorption/ionization time‐of‐flight (MALDI‐TOF) mass spectra up to B38C76 with a mass of approximately 32,000 Da. With method B, the reaction conditions were varied at a fixed feed ratio to achieve an optimum for the preparation of multicyclic polyethers, but because of the lower reactivity of 2,6‐dichloropyridine, a quantitative conversion was not achieved. The reaction products were characterized with MALDI‐TOF mass spectrometry, viscosity measurements, and size exclusion chromatography. © 2004 Wiley Periodicals, Inc. J Polym Sci Part A: Polym Chem 42: 5725–5735, 2004 相似文献
7.
We give a Gray code and constant average time generating algorithm for derangements, i.e., permutations with no fixed points. In our Gray code, each derangement is transformed into its successor either via one or two transpositions or a rotation of three elements. We generalize these results to permutations with number of fixed points bounded between two constants. 相似文献
8.
Tsonka Stefanova Baicheva 《Designs, Codes and Cryptography》1998,13(3):223-227
The covering radius of all ternary cyclic codes of length up to 25 is given. Some of the results were obtained by computer
and for others mathematical reasonings were applied. The minimal distances of all codes were recalculated. 相似文献
9.
Ross Anderson Cunsheng Ding Tor Helleseth Torleiv Klove 《Designs, Codes and Cryptography》1998,15(2):111-124
Previous researchers have designed shared control schemes with a view to minimising the likelihood that participants will conspire to perform an unauthorised act. But, human nature being what it is, systems inevitably fail; so shared control schemes should also be designed so that the police can identify conspirators after the fact. This requirement leads us to search for schemes with sparse access structures. We show how this can be done using ideas from coding theory. In particular, secret sharing schemes based on geometric codes whose dual [n,k,d] codes have d and n as their only nonzero weights are suitable. We determine their access structures and analyse their properties. We have found almost all of them, and established some relations among codes, designs and secret-sharing schemes. 相似文献
10.
Michael Giudici 《Designs, Codes and Cryptography》2006,39(2):163-172
We determine all linear codes C containing the constant code E, for which there is a weight-preserving group of semilinear automorphisms which acts transitively on the set of nontrivial
cosets of E in C.
Michael Giudici - The author holds an Australian Postdoctoral Fellowship. 相似文献